last executing test programs: 4m30.549544816s ago: executing program 1 (id=2254): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600aec100200000000100000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r0, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb8, 0x0, 0xfffffffffffffe86, 0x0, 0x0, &(0x7f0000000680), 0x8, 0x96, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0xae, &(0x7f00000004c0)=""/174, 0x40f00, 0x4a, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0x1, 0x1, 0xffff}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000008c0)=[r0, r0, r0, r0, r0, r2], &(0x7f0000000900)=[{0x0, 0x4, 0x0, 0x4}, {0x1, 0x4, 0xc, 0x9}, {0x1, 0x5, 0x7, 0x1}, {0x5, 0x3, 0x7, 0x8}, {0x1, 0x1, 0x0, 0xc}, {0x5, 0x5, 0xa, 0x4}], 0x10, 0x9, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) write$cgroup_subtree(r3, 0x0, 0x44) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x154}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='fsi_master_gpio_in\x00', r4, 0x0, 0x8}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 4m29.746495181s ago: executing program 1 (id=2256): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000071103d00000000009500000700000000c37cd3797255dac064ab0ca263590fe1e818a15bea5ca787e550c7d7c8faf6e5cb31636e16b644aab90d17e2b34aee82a29a9255fc620f5cce7be3c49aa32d0314b896d444cb04198c0dfb59b9d6b591b8806b4e41ef620949d16edd1c0161dc9e68217d2863136a16bf15924280f6deea7bbef816e3398f58b3509bb90309fe97c2edd17159b9203eeee2f8e12353169a10e17824540efbbb7059a00b4ae95dc25c4f50c58c01e15cbb31cfe337e9bf33b6fadb13ba77e050a2831f4abc5e177c81380bea9e56880f249dfa22707251d56e0c43a3702662ad7156f0bf9bcd6f38632f5817ac16d9d2b4a401689b116e9d85770833e9a472126b592e7dca38aa596b35b558e2b216d07f984aa296f963ba29f632129b8fe0bae102ebe25e00779bddf4e33d85c91f191fe6e4483afc09"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000646c6c2500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000f00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000040)='mm_lru_insertion\x00', r0}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0xa, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r2}, &(0x7f0000000040), &(0x7f0000000140)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r2}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r2, &(0x7f0000000040)}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) 4m29.595786381s ago: executing program 1 (id=2258): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32=r2], 0x18}, 0x0) sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r2], 0x18}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) close(r6) 4m29.595178291s ago: executing program 1 (id=2259): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)=ANY=[], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="06000000fdffffffffffffff000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000030000000400"/28], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40b04000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x15, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000005000000000000000300000018110000", @ANYRES32=0x1, @ANYBLOB="020000000000000000b70200000914000000b7030000000000008500000083000000bf090000e40000005509010000000000b606000000000000000000000000008520000001", @ANYRES32, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000410000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x4}}, 0x0, 0xffeffbffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000100000000000000b8da5eb804c5fa657f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b000000000000800000ad76407b00000000000022bcf296e84f624f69fccd1afb10634e92a2ad14bed9eda306d551918148cd69", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 4m22.219391381s ago: executing program 1 (id=2277): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x18, 0x0, 0x10001, 0xf, 0x1820, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000002080)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000f2beb318e1e15bc642af27030000003d5699cfe9572dee6e9296cb293b3fc47cd899f068173ebd4afcaa30ffc8278106c2830970c7586010783397aa8e9816741fc41ad4d9f778b3d8783d5410939678db2c596a2298791fe28d635436c5ac9c72f13008a7561f7ce8490d2ff0ff8db77d5de7f5b2b309b8f877eee3911dd2206e18869bcdd8e41236f6716d6eb33f391b500383705e"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f375ffff86dd6317ce62070000000000000000431ccaf57b00000000000000000104"], 0xfe1b) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x541b, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000001c0)='(pu&&\"\t&&') bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) mkdir(&(0x7f0000001080)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x88) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r8, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 4m21.920043072s ago: executing program 1 (id=2278): socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0xffffffffffffff0e) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d40)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_to_hsr\x00'}) syz_clone(0x42048000, &(0x7f00000002c0)="131b375b4fe710c1e4f0a04235f453718bd62af261b3db4d823dbedc848b7977de1ddcf7cda2cc98cbe44ba093b17ccd186cae247d3313ea3b23ea7272459b8c23cfe2b989e458348804020f8859159ff3b550b1bee119", 0x57, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="6ed788f233f6389350eae4fb5b7aa99f07326a8191f3c6526ea8dbae625e28e04444592063a526c4d73b7c3ee257afc070e25e95814eadc017369e8947745aa59065a61068ca45e041ad698240fd11192e908a55bf7a2c99f69b1d4a7e750060f44d9e3781e58247f0f3dd33406869dbb138f86ec01d0df8e0ffcebf39995ad29af4d6a2055ed7bd8b0d164335d5f1fee219eec37bc7bb435521e3b2af96372442fa2dbb38") socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='net_dev_xmit\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 4m6.591654336s ago: executing program 32 (id=2278): socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0xffffffffffffff0e) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d40)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_to_hsr\x00'}) syz_clone(0x42048000, &(0x7f00000002c0)="131b375b4fe710c1e4f0a04235f453718bd62af261b3db4d823dbedc848b7977de1ddcf7cda2cc98cbe44ba093b17ccd186cae247d3313ea3b23ea7272459b8c23cfe2b989e458348804020f8859159ff3b550b1bee119", 0x57, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="6ed788f233f6389350eae4fb5b7aa99f07326a8191f3c6526ea8dbae625e28e04444592063a526c4d73b7c3ee257afc070e25e95814eadc017369e8947745aa59065a61068ca45e041ad698240fd11192e908a55bf7a2c99f69b1d4a7e750060f44d9e3781e58247f0f3dd33406869dbb138f86ec01d0df8e0ffcebf39995ad29af4d6a2055ed7bd8b0d164335d5f1fee219eec37bc7bb435521e3b2af96372442fa2dbb38") socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='net_dev_xmit\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 2m34.750616753s ago: executing program 0 (id=2702): syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000100), 0x237, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18000, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81, 0x81, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x15) 2m33.884860538s ago: executing program 0 (id=2705): r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) gettid() mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) r5 = openat$cgroup_procs(r1, &(0x7f0000001a80)='tasks\x00', 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz0\x00', 0x1ff) write$cgroup_pid(r5, &(0x7f0000000380), 0x12) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x44208400, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000040), 0x1) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1, 0xf, &(0x7f0000000480)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000001c0)=r7, 0x4) sendmsg$inet(r9, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 2m32.783215824s ago: executing program 0 (id=2708): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x2d) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x4004743c, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x4, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 2m32.270653706s ago: executing program 0 (id=2709): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000000}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 2m31.979447998s ago: executing program 0 (id=2710): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004"], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000380)=""/76}, 0x20) (fail_nth: 1) 2m31.372489301s ago: executing program 0 (id=2711): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)=ANY=[], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r2, @ANYBLOB="06000000fdffffffffffffff000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000030000000400"/28], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40b04000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x15, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000005000000000000000300000018110000", @ANYRES32=0x1, @ANYBLOB="020000000000000000b70200000914000000b7030000000000008500000083000000bf090000e40000005509010000000000b606000000000000000000000000008520000001", @ANYRES32], 0x0, 0x3, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000410000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x4}}, 0x0, 0xffeffbffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000100000000000000b8da5eb804c5fa657f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b000000000000800000ad76407b00000000000022bcf296e84f624f69fccd1afb10634e92a2ad14bed9eda306d551918148cd69", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 2m15.914950275s ago: executing program 33 (id=2711): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)=ANY=[], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r2, @ANYBLOB="06000000fdffffffffffffff000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000030000000400"/28], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40b04000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x15, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000005000000000000000300000018110000", @ANYRES32=0x1, @ANYBLOB="020000000000000000b70200000914000000b7030000000000008500000083000000bf090000e40000005509010000000000b606000000000000000000000000008520000001", @ANYRES32], 0x0, 0x3, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000410000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x4}}, 0x0, 0xffeffbffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000100000000000000b8da5eb804c5fa657f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b000000000000800000ad76407b00000000000022bcf296e84f624f69fccd1afb10634e92a2ad14bed9eda306d551918148cd69", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 17.384155226s ago: executing program 4 (id=3068): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r2], 0x18}, 0x0) sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r2], 0x18}, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="000000ec2109c300000000000000b6685ebe7615270377f5f94996276879f5ffe37d2ea36d16d2af4372b1450e16f497ccbe64adb7b0afa3c03104a3e43cd68fc7411a72b4c974a2117eecffe1c9ac76edff8d68ff21b5468796169582289ba1d60512", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0xe8034000, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x5dc}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000240)='hugetlb.1GB.limit_in_bytes\x00', 0x2, 0x0) close(r2) close(r6) 17.357546406s ago: executing program 4 (id=3069): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)=ANY=[], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="06000000fdffffffffffffff000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000030000000400"/28], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40b04000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x15, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000005000000000000000300000018110000", @ANYRES32=0x1, @ANYBLOB="020000000000000000b70200000914000000b7030000000000008500000083000000bf090000e40000005509010000000000b606000000000000000000000000008520000001", @ANYRES32, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000410000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x4}}, 0x0, 0xffeffbffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000100000000000000b8da5eb804c5fa657f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b000000000000800000ad76407b00000000000022bcf296e84f624f69fccd1afb10634e92a2ad14bed9eda306d551918148cd69", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 14.77400766s ago: executing program 3 (id=3076): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0600000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="0000050000003a70f30700"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000002c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000007c0)=ANY=[], 0x6) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) gettid() mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = openat$cgroup_int(r4, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) r8 = openat$cgroup_procs(r4, &(0x7f0000001a80)='tasks\x00', 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz0\x00', 0x1ff) write$cgroup_pid(r8, &(0x7f0000000380), 0x12) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x44208400, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_int(r7, &(0x7f0000000040), 0x1) 12.787551101s ago: executing program 6 (id=3079): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x3, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}, 0x0, 0x0, 0x40000}, 0x0, 0x0, r2, 0x0) 12.126565734s ago: executing program 3 (id=3080): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001280)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18000, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81, 0x81, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x15) 12.116683674s ago: executing program 3 (id=3082): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r6, 0x0, 0x1ff}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000011c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014800000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@typedef={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x5f, 0x2e]}}, 0x0, 0x2b, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000180)='target_cmd_complete\x00', r6, 0x0, 0x3}, 0x18) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r8, r9, 0x5, 0x0, 0x0, @void, @value}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r8}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 11.739454986s ago: executing program 6 (id=3084): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='neigh_create\x00', 0xffffffffffffffff, 0x0, 0x2}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x9, 0x10, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0x14, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cc618b7ffc5dd4c, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @value}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r4, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0400000034000000670600000300000050c00100", @ANYRES32=r1, @ANYBLOB="69feffff00"/20, @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB="01000000040000000200"/20, @ANYRES32=r5, @ANYBLOB="273d61b1f58cd7f64fe1076f7b9452d795a7c6398d20ab5098448f1ebc694b", @ANYRES32=r5, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000002e00)=ANY=[@ANYRES64=r0], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6e, '\x00', 0x0, @sched_cls=0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x7}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0xe, 0x8000}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x16d, 0x0, &(0x7f0000000980)="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", 0x0, 0xf, 0xe8034000, 0x0, 0x90, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc, 0x0, 0x7}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000001c0)=[0x0], &(0x7f00000002c0)=[0x0], 0x0, 0xe6, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x43, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, r7, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001d40)={&(0x7f00000009c0)='sched_switch\x00'}, 0x10) 11.180484229s ago: executing program 3 (id=3087): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) write$cgroup_subtree(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd6372ce22667f2c00dbf6e97158b33d4fec877f1b6d76745b686158bbcfe8875afdef00010000000029"], 0x280) ioctl$TUNSETOFFLOAD(r3, 0x40086602, 0x2000ff0f) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd63f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r2, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x19, 0x11, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x58000000, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='GPL\x00', 0x387e, 0x0, 0x0, 0x40f00, 0x64, '\x00', r7, @cgroup_sockopt=0x16, r2, 0x8, &(0x7f00000005c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x4, 0x6c, 0x7}, 0x10, 0xffffffffffffffff, r0, 0x2, &(0x7f0000000640)=[r6, r2, r2, r5, r2, r5, r2, r6], &(0x7f0000000680)=[{0x1, 0x4, 0x6, 0x1}, {0x1, 0x2, 0x1, 0x9}], 0x10, 0x4, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x95e3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={0x0, r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.self_freezing\x00', 0x26e1, 0x0) syz_open_procfs$namespace(0x0, 0x0) 10.253920645s ago: executing program 5 (id=3089): socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0xffffffffffffff0e) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d40)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_to_hsr\x00'}) syz_clone(0x42048000, &(0x7f00000002c0)="131b375b4fe710c1e4f0a04235f453718bd62af261b3db4d823dbedc848b7977de1ddcf7cda2cc98cbe44ba093b17ccd186cae247d3313ea3b23ea7272459b8c23cfe2b989e458348804020f8859159ff3b550b1bee119", 0x57, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="6ed788f233f6389350eae4fb5b7aa99f07326a8191f3c6526ea8dbae625e28e04444592063a526c4d73b7c3ee257afc070e25e95814eadc017369e8947745aa59065a61068ca45e041ad698240fd11192e908a55bf7a2c99f69b1d4a7e750060f44d9e3781e58247f0f3dd33406869dbb138f86ec01d0df8e0ffcebf39995ad29af4d6a2055ed7bd8b0d164335d5f1fee219eec37bc7bb435521e3b2af96372442fa2dbb38") socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 10.234315304s ago: executing program 6 (id=3090): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0, 0x0, 0x0, 0xaa}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2000000}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x4, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 9.983123866s ago: executing program 6 (id=3092): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r6, 0x0, 0x1ff}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000011c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014800000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@typedef={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x5f, 0x2e]}}, 0x0, 0x2b, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000180)='target_cmd_complete\x00', r6, 0x0, 0x3}, 0x18) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r8, r9, 0x5, 0x0, 0x0, @void, @value}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r8}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 9.674229247s ago: executing program 4 (id=3093): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014800000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@typedef={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x5f, 0x2e]}}, 0x0, 0x2b, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5, 0x0, 0x0, @void, @value}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 9.010197571s ago: executing program 6 (id=3095): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRES32], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1004}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x200}, r2, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 8.803885682s ago: executing program 4 (id=3096): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x4e, 0x1, 0x0, 0x0, 0x0, 0x210e, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fff, 0xaea}, 0x110104, 0x32, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfb, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x40047451, 0x2000000c) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9, 0x0, 0x0, 0x1fffffff}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x1c}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 7.942194697s ago: executing program 6 (id=3098): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b700000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)=ANY=[], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="06000000fdffffffffffffff000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000030000000400"/28], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40b04000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x15, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000005000000000000000300000018110000", @ANYRES32=0x1, @ANYBLOB="020000000000000000b70200000914000000b7030000000000008500000083000000bf090000e40000005509010000000000b606000000000000000000000000008520000001", @ANYRES32, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000410000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x4}}, 0x0, 0xffeffbffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000100000000000000b8da5eb804c5fa657f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b000000000000800000ad76407b00000000000022bcf296e84f624f69fccd1afb10634e92a2ad14bed9eda306d551918148cd69", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 7.517327469s ago: executing program 4 (id=3100): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x2d) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x4004743c, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x4, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="b700000004000000bca30000000000002403000040feffff720af0ff0000000071a4f0ff000000001f030000000000002e0a0200000000002600000008ff000e61148c00000000001d430000000000007a0a00fe00581c1f6114500000000000b503f7fff80000009500000000000000033bc065b78111c6dfa041b63af4a3912435f1a864a7aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168e5181554a090f30002af51efd601b6bf01c8e8b1fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e65440000000000000000028610643a98d9ec21ead2ed51b104d4d91af25b845b9f7d08d123deda88c658d42ecbf28bf7076c15b463bebc72f526dd70252e79166d858fcd0e06dd31af9612fa402d0b11008e59a5923906f88b53987ad1714e72ba7d06a59ff616236fd9aa58f0177184b6a89adaf17b0a6041bdef728f5089048ddff6da40f9411fe7226a40409d6e37c4f46756d31cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10076443d643649393bf52d2105bd901128c7e0ec82701c8204a1deeed4155617572652d950ad31928b0b036dc2869f478341d02d0f5ad94b081fcd507acb4b9c67382f13d000000225d85ae49cee383dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdbb9893a5de817101ab062cd54e67051d355d84ce97bb0c6b6a595e487a2cc47c0efbb2d71cde2c10f0bc6980fe78683ac5c0c31032599dd273863be9261eee52216d009f4c52048ef8c126aeef5f510a8f1aded94a129e4aec6e8d9ab06faffc3a15d91c2ea3e2e04cfe031b287539d0540059fe6c7fe7cd8697502c7596566de74e425da5e7f009602a9f61d3804b3e0a1053abdc31282dfb15eb6841bb64a1b3045024a982f3c48b936e6f9e0fcda88fe4413537528fdb6153baae244e7bf573eac34b781337ad5901a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44022a579dfc0229cc0dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc48899b212c55318294270a1ad10c80fef7c24d47afcc829ba0f85da6d888f18ea40ab959f6074ab2a40d85d1501783a7ab51380d7b4ead35a385e0b4a26b602396df7e0c1e02b88c114f244a9bf93f04bf072f0861f5c0b000000000000eedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba3401e6a52acb1188883ad2a3b1832371fe5bc621426d1ed01b389708165b9cdbae2ed9dc7358f0ebadde0b727f27feeb7464dcc536cbae2f5c7d951680f6f2f9a6a8346962a350845ffa0d82884f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010ae20e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d648532869d701723fedcbada1ee7baa19faf67256b56a41fd355b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2654026c6ea08b83b123145ab5703dad844ceb201efeb6dc5f6a9037d2283c42efc54dd84323afc4c10eff46248843187f1dd48ef0900000000000000ff0f4000000000f00700003c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538c6ee6ba65893ff1f908ba7554ba583ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738612e4fee18a22da19fcdb4c1011e32f808890205f0e6da2819d2f9e77c7c64affa54fec0136cbafa5f62e96753b639a924599c1f69219927ea5301fff0a6063d427180d61542c2571f983e96635600000554f327a3535e7c7542799493c31ac05a7b57f03ca91a01ba2a30ca99e969d6fd09dc28ebc15edb4d91675767999d146aef7799738b292fd64bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a794963442aece449a0d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2869291b7d12096833d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e637d4219ef7ec61261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ecab5d232f89fe0120f64c62e8e3ed8bcb45202c204bbec8d722824c0ebca8db1ea4a05e41f6016ab5bbe4fe7ff5d785d0128171c90d9900ca2532b0f9d01c4b45294fbba468df3e1b393cb4e62e753b4172ba7ac1f2b51c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addbc4b3093c91b8068c5adfcb0d7fd849904568916694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a881192292ffff5392ab3d1311b82432662806add87047f601fa888400000000000000000000000000006acc19808d7cf29bc974b0ea92499a41b9b9a7c2bca311a28ee4952f2d325a56397c78f12205db653a536f0100e0eda300a43a13bd1b9f3322405d1efd78e578dc6b3fb84f3738a4b6caa800000087efa51c5d95ecba4e50e529d1e8c89600e809dc3d0a2f65579e23457949a50f2d0455cf699b3746979f99f6a1527f004f37e84fb478199dc1020f4beb98b8074bf7df8b5e783637daf121f175a81cffff4ac55a4385e9a617aa6c8e10d4202c5afeb06e2f9115558ea12f92d7ae543d44086b3f03b20d546fa66a72e38207c9d20035abc46271a30f1240de52536941242d23896ab74a3c6670fdc49c14f34fc4eadd6db8d80aba439772bf60a1db18c472dafc5569adc2c406f39f82928d2a1ffe29f1a57d3f18f4edaeb5d37918e6fddcd821da67a0785585a4443440dc65600e64a4a274000000000000000000000000000000000000000000000009dd14b38f2f5426d7cf5075047c31f6ce6adddfe3ac649c0643c8bfbeb14ba1fd7a485aa893915cf81e29aaf375e904bbe52691a4120260ffcd030000006d291ebcef893e1b9ccb6797d0646fe0e7274434f28efb43e06e64f0698caca42f4e6018a455736c482a017e2b13dac4a90faa109f0e87cc94e3efb649692456463ca74aa6ad4bf50c1acb3928143be1c1023a375e528285544d0064b98646f3109e9a4942ce42c6e7ec84b664f6c2770803f10b0a1fcbfc309381aeba191950bae71f37f1eb7ceeffb3c0547ac6571603adbfde4c8b5f8d7f4b854441613633b48865b65bdc415e1e0dcf672d68cf4cebf04f4bc1eebf560a26d3b332240d450fdb0a9a69f432e277f3a0386eb2bd1305c821c64757f786b79fef54dbe64c67d73934bc80b2133fb3c04cc7ea48bf97a6243c9f95dcbddecf45f008f1822c7868e1ff5a3cff5d6b6898335792749df7b1f51e91f8c1c3b1b93b33aaa3fab69cef08a9f6f6cf39dea3d878b2ed42545421970cc426e644332bc956d1c6adefdf0ede2c5c94aa632646ae225accdf031f611d01622921f1b922a5ac887cca3136133dce8d9f5f4da7bed2ea5d94362200000000000000000000f296b0c1484e5f781ad26bff696b05ff0a5e2270e07e18b04273bd4075ea38ab463bfa6a38e7c537498ba3e4df8dfc9e8c0a0d213c3ffad44d2a376def42e41e9fc3167a257e040fa7cf32c221aaac6cfdeb33c27500001a0000000000000000000017350000c11ae694b0c69c2c03f6790044a357e785af6e153d5f1ea460af92c7cbbd6295afe740f5e154346d483e0d10522a7a945b93fb705b95b6aae27a8fab1e6984c8bdc12360627137ab6737b68ab08a1a4b94cb29a74dc36b51209cfbc87f61182bbeb2772e9d5a1ffc477179be481ffe46a4ce86be0b1f8eee42a611a3d44ca450b14586ed63dd92005c79e4a8ab8a94f0b74903580ac98708007c80d6c7d0de4614195e40d797c0348dd70f36a220e8b3710fb5358c27e90793bcb9ee6319342c4b239ca8cbc6fc83d32e6eb62ad92e43991f2447be9c2a1ae1119eafb901a43d57e885116d19aa152bfb89f8d0b2516f80120a1cddff771657f3d0288ec3899f1e3ba0151c4037148fb479de703fc52b6573349c28d1b107d859b4961324c17756dde99de1924a1d2b7095d34a55060f47f4407d89acf9f1d2156befec432e8e993c79027b7ef285b20c2e6b3d0491d0d3591b0d94713332b6b79c8297117b0d14eff64e0aca8a4b4aa773d8fba1217e9519952419bb9dd998d0ec870ff00b6d556018602738fbc6cec89d6dd13cf55b96f6fe9a137d2d6a56ad78e52c23ed080000000000002bc261a781fd14126c146a0aac4221839a4b9bbf61e4bba695a41e2109eba8e40c370267cc51ffadbd15cafc97a4d3edfdcb9b5729307c6bdaf7b69325fb05fa8a9869de0600ee477d71bf3e36d1d9019edfa27aae24b632f251df210c86a18fae731ecb8b0d48357378caf2b6789509b1bacfd4fa812dc341875cfa5e798bbf59770000000000000000c8a594ea3c3347962d9113b1fecdfad5a8da641053f02e49456f5d21674521e67a5b18ea451eccf69dd6af928d2d68da9304a296c22fdc0500000000000000b1aade386b113045033a6188d56e675564d8cb8d5b40114b0f5bf15dd64c9ece60b8588ee8777d0ea8f4713b258427c7d90f9e93348e17723ba9ab8ae790f74cc41ae5795835f3cec40dff485d2802c08611454d9ea784a205bcc07ec26f906f3cf45bb37014ab6f22af6213618e242b283ea9d3f0677ee598072ec06f7170009d92bb87d9d12c378dfd3e74ec056ee83eef666423d934fc5908c9ff98715218a5964f1e00000000426ac9588e27aefe307f49662990ee823568bbc2f89596ced7c6c52d76b8096f1848410843b93fd404f535be474f456778b5ef85abb8fc2336abd5ea64a6efea8a5aca0015499b88ae780a7bae4df603bd3c72808cf300440b1b638a6640f7de8d0d82f359ca2f779cd48cd8d3603f4f69e47f386988c9b7b5d6dd3d48a1fdca780049d7c87bea42161a4c0d7cf0125b43dc9d8845f3c05a08acda647e7143d0e0aee2949a45e28488b0522c2288072467d2afe269f589fb7e034b92d3ca245b16b71998711bfe206c9690b6d0eebb06a29349229eb45ff15c63aa2c82c56d7420738cd1b04eb16e87cb524315d7361ea3635d3799bb7fcc56aa5e1dbe031a7a12554dee6754b72f43a6fddf427f32ec3df274a88097725679769beebf1aa6eb09d5154e4900000000000d0f7160a05911d969879953d3d4702b2676c07bb0fd14020a66718378825d5ed789711b77d40dc31e0b8fc651b45559da463f0000000000000000000000000052d42124e9c26aba885015e69d42ecd710342ac597ebea576ae15fdf611356f622e831741ab15549e0d7a2bd0324e2b3b48a10551607492c19eaf58485feb4cab19c303b30ba2ddea0d792d77724c9fa4ed58b93668fc20484f141ee2b6a0029e88fdc853189b4dafd36ff23b11967090e508f45e3f10857038a52ef275cf9e3e4b5d30b12d138dfa70930c603b5e3f4b7be67be3dba3cbd8d4d143195af0697d779445d67dcfbd922d12a8b49f93eac7a72faacf80346b3b669615f2710eb8df39fc8c04d2c9c196fa6facfea613569a35cde6451f2edf55ce25c7d72ec7ea85a92458c0559ca3a94727d495bd4671a55a70bc544d71d8e0257707a31936f1adf224077310a86bf447ec92c650acca8c6b0721020894b06178c32f4472d17174d6eb2b067030c5d2c12583f46d2da7fba42d4083259c7cdc8bf1f4299c248865d3c809356c3ed"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x8000000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 6.557838264s ago: executing program 4 (id=3103): socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0xffffffffffffff0e) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d40)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_to_hsr\x00'}) syz_clone(0x42048000, &(0x7f00000002c0)="131b375b4fe710c1e4f0a04235f453718bd62af261b3db4d823dbedc848b7977de1ddcf7cda2cc98cbe44ba093b17ccd186cae247d3313ea3b23ea7272459b8c23cfe2b989e458348804020f8859159ff3b550b1bee119", 0x57, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="6ed788f233f6389350eae4fb5b7aa99f07326a8191f3c6526ea8dbae625e28e04444592063a526c4d73b7c3ee257afc070e25e95814eadc017369e8947745aa59065a61068ca45e041ad698240fd11192e908a55bf7a2c99f69b1d4a7e750060f44d9e3781e58247f0f3dd33406869dbb138f86ec01d0df8e0ffcebf39995ad29af4d6a2055ed7bd8b0d164335d5f1fee219eec37bc7bb435521e3b2af96372442fa2dbb38") socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 6.193776846s ago: executing program 2 (id=3105): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x40000000, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r1, 0x0, 0x3, 0x6, &(0x7f0000000300)="d7d9e3", &(0x7f0000000340)=""/6, 0x7fffffff, 0x0, 0x1000, 0x39, &(0x7f0000001340)="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", &(0x7f00000003c0)="0267f69896107f6c98cb8188833c08eddcadf99f25817c85d2725e815de6fe4f410a38baaf7960c306f8660fa14aeff68eee31a23eb615de3b", 0x0, 0x0, 0x5}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ioctl$TUNSETIFF(r3, 0xb701, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x1, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0xf, &(0x7f0000000840)=ANY=[@ANYBLOB="058030000100000018000000070000000000000001000000186200000900000000000008080000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703"], &(0x7f0000000400)='GPL\x00', 0x8, 0xb9, &(0x7f00000004c0)=""/185, 0x41000, 0x10, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x0, 0x6, 0x0, 0x9062d06}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x4, 0x8, 0x1040, 0xffffffffffffffff, 0x0, '\x00', r4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe00181100", @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x13, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="7a0a00ff00000000711065000000000095000000100000005e55e7009e471ad400844a795b22bd0e1b33fe875c3b52b6a4e68134fa72b27eb8b390f3242fa62ade943733f12b8b6aaa444370f5cc0220624be51cf4ad7a9031"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r5}, 0x10) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x10, r1}, 0x18) 3.597554691s ago: executing program 2 (id=3106): bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xf, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, @perf_config_ext}, 0x0, 0x0, r1, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2a979d) 2.597525226s ago: executing program 5 (id=3107): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfffffdef) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100004b028ee7000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1000000004000000080000000700000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000000000000000000000d1a992c27d73f9c028006e8aacabd5a648e3e019cb7cb212478992adf8dd7918079d3e6a8c683f6d16a0bb9f4ed270fa43d1f8a0a50d7d963fee23a1", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x10, &(0x7f0000001280), 0x4) sendmsg$inet(r3, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="d080", 0x2}], 0x1}, 0x20000801) 2.492650576s ago: executing program 2 (id=3108): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000680)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="61c699ea36c83ef38f30e58ba9e27af1955638b60590d1d25ec030c6269fa66250ea450bfbe9c7ef1d5d9bf30cd000bf0af5516a2fef", @ANYRES8=r2, @ANYRES64=r0], &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x1, 0xa, 0x0, 0x6, 0x0, 0xffffffff, 0x22040, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x2}, 0x2000, 0x2, 0x6, 0x7, 0x7, 0x9, 0x2, 0x0, 0xec, 0x0, 0x5}, r3, 0xc, r2, 0xa) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) syz_clone(0x4000200, &(0x7f0000000080), 0x0, &(0x7f0000000300), &(0x7f0000000400), &(0x7f0000000440)="c763c4b06a339476e256aadd87a24c4aff44e6881a8a3be00b2247a9af3ac59781c06067b1db5c058354c5241d5a859371eb710cc0eaf8b0e9e31fd64ca75020df0cf1ca0f79605e0089e75465e49c20e5a797c8543137a635637e526982e7c7c37328a87a1d84109aee16c76a362fe73dc7") recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x806}, 0x14068, 0xc8, 0x0, 0x1, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000000000008100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) write$cgroup_subtree(r7, &(0x7f0000000000), 0xe) 1.78832667s ago: executing program 2 (id=3109): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14}, 0x80) close(r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000d0ff0000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) close(r0) 1.697188191s ago: executing program 5 (id=3110): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x2, 0x9, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair(0xf, 0x3, 0xfffffffa, &(0x7f0000000040)) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x8fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x9fd, 0x84, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x18, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0xff, r3}, 0x38) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_type(r4, &(0x7f0000000240), 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x26}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.472075072s ago: executing program 5 (id=3111): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x5, 0x5, &(0x7f00000000c0)=@framed={{0x2e, 0xa, 0xa, 0x0, 0x0, 0x79, 0x10, 0xa8}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b10000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESDEC=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESDEC=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) (async) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) sendmsg$inet(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$inet(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) close(0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\"\x00'], 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x4008004) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x17, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe95, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 1.405034762s ago: executing program 3 (id=3112): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014800000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@typedef={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x5f, 0x2e]}}, 0x0, 0x2b, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5, 0x0, 0x0, @void, @value}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 1.262087773s ago: executing program 5 (id=3113): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014800000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c00)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0ff0000000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001010404000001007d60b7030000010000006a0a00fe00002020850000000d000000b700000001000000950000000000000075cdc4b57b0c657500639100002000000000000000ff7f0000b52f17cee19d0001000000000000000000cb04fcbb0b9bafe3ba431351a58a885ba9918d37b056b9bbd11b6b9f6cf7db6d574620260000000000008062d77e84cef4a2ab938f65aac33c4d620de2c9b7dc10d7d313f9f57606b83b994fb484510bef2e4872f5c2fe6faaf75e5cc4051adec7f41deff6df6a936b4ec3827c739bb39aad16cc75fe369258673b5df11cc2afb53611cc32a790bce5a6f087"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@typedef={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x5f, 0x2e]}}, 0x0, 0x2b, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5, 0x0, 0x0, @void, @value}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 928.688645ms ago: executing program 2 (id=3114): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 703.331526ms ago: executing program 2 (id=3115): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r6, 0x0, 0x1ff}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000011c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014800000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@typedef={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x5f, 0x2e]}}, 0x0, 0x2b, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000180)='target_cmd_complete\x00', r6, 0x0, 0x3}, 0x18) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r8, r9, 0x5, 0x0, 0x0, @void, @value}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r8}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 533.090397ms ago: executing program 3 (id=3116): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b700000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)=ANY=[], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="06000000fdffffffffffffff000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000030000000400"/28], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40b04000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x15, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000005000000000000000300000018110000", @ANYRES32=0x1, @ANYBLOB="020000000000000000b70200000914000000b7030000000000008500000083000000bf090000e40000005509010000000000b606000000000000000000000000008520000001", @ANYRES32, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000410000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x4}}, 0x0, 0xffeffbffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000100000000000000b8da5eb804c5fa657f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b000000000000800000ad76407b00000000000022bcf296e84f624f69fccd1afb10634e92a2ad14bed9eda306d551918148cd69", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 0s ago: executing program 5 (id=3117): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$TUNSETOFFLOAD(r1, 0x40047459, 0x2000000c) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000400)=ANY=[]) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000200018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000700)=ANY=[@ANYRES8], &(0x7f0000000880)=""/151, 0x5e, 0x97, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/time\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r6, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x56, &(0x7f00000002c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0x41, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) kernel console output (not intermixed with test programs): 9.390099][ T418] device bridge_slave_1 left promiscuous mode [ 29.396085][ T418] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.558960][ T418] device bridge_slave_0 left promiscuous mode [ 29.600846][ T418] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.625492][ T30] audit: type=1400 audit(1732332066.391:117): avc: denied { ioctl } for pid=427 comm="syz.0.35" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 31.966313][ T30] audit: type=1400 audit(1732332068.741:118): avc: denied { create } for pid=447 comm="syz.0.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 32.989002][ T473] device syzkaller0 entered promiscuous mode [ 33.846495][ T485] ip6_vti0: mtu greater than device maximum [ 35.173988][ T515] device syzkaller0 entered promiscuous mode [ 35.368206][ T30] audit: type=1400 audit(1732332072.151:119): avc: denied { read } for pid=519 comm="syz.4.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 37.344967][ T558] device syzkaller0 entered promiscuous mode [ 38.197567][ T577] ip6_vti0: mtu greater than device maximum [ 38.251961][ T30] audit: type=1400 audit(1732332075.031:120): avc: denied { create } for pid=579 comm="syz.2.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 38.426826][ T30] audit: type=1400 audit(1732332075.211:121): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 38.846062][ T30] audit: type=1400 audit(1732332075.621:122): avc: denied { ioctl } for pid=600 comm="syz.3.87" path="socket:[16300]" dev="sockfs" ino=16300 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 39.241024][ T610] device syzkaller0 entered promiscuous mode [ 39.547775][ T635] device pim6reg1 entered promiscuous mode [ 39.566756][ T30] audit: type=1400 audit(1732332076.351:123): avc: denied { cpu } for pid=634 comm="syz.2.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 40.770119][ T676] device sit0 entered promiscuous mode [ 41.863323][ T695] device syzkaller0 entered promiscuous mode [ 42.250687][ T30] audit: type=1400 audit(1732332079.021:124): avc: denied { create } for pid=700 comm="syz.1.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 42.372765][ T702] device veth1_macvtap left promiscuous mode [ 42.508864][ T30] audit: type=1400 audit(1732332079.281:125): avc: denied { create } for pid=703 comm="syz.3.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 42.692224][ T709] FAULT_INJECTION: forcing a failure. [ 42.692224][ T709] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 42.705961][ T709] CPU: 0 PID: 709 Comm: syz.3.121 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 42.715494][ T709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 42.725388][ T709] Call Trace: [ 42.728513][ T709] [ 42.731291][ T709] dump_stack_lvl+0x151/0x1c0 [ 42.735806][ T709] ? io_uring_drop_tctx_refs+0x190/0x190 [ 42.741271][ T709] dump_stack+0x15/0x20 [ 42.745262][ T709] should_fail+0x3c6/0x510 [ 42.749517][ T709] should_fail_alloc_page+0x5a/0x80 [ 42.754549][ T709] prepare_alloc_pages+0x15c/0x700 [ 42.759503][ T709] ? __alloc_pages+0x8f0/0x8f0 [ 42.764098][ T709] ? __alloc_pages_bulk+0xe40/0xe40 [ 42.769134][ T709] __alloc_pages+0x18c/0x8f0 [ 42.773560][ T709] ? __x64_sys_bpf+0x7c/0x90 [ 42.777984][ T709] ? prep_new_page+0x110/0x110 [ 42.782585][ T709] ? __kasan_check_write+0x14/0x20 [ 42.787534][ T709] __get_free_pages+0x10/0x30 [ 42.792050][ T709] kasan_populate_vmalloc_pte+0x39/0x130 [ 42.797515][ T709] ? __apply_to_page_range+0x8ca/0xbe0 [ 42.802818][ T709] __apply_to_page_range+0x8dd/0xbe0 [ 42.807928][ T709] ? kasan_populate_vmalloc+0x70/0x70 [ 42.813137][ T709] ? kasan_populate_vmalloc+0x70/0x70 [ 42.818352][ T709] apply_to_page_range+0x3b/0x50 [ 42.823115][ T709] kasan_populate_vmalloc+0x65/0x70 [ 42.828149][ T709] alloc_vmap_area+0x192f/0x1a80 [ 42.832934][ T709] ? vm_map_ram+0xa90/0xa90 [ 42.837264][ T709] ? kmem_cache_alloc_trace+0x115/0x210 [ 42.842652][ T709] ? __get_vm_area_node+0x117/0x360 [ 42.847678][ T709] __get_vm_area_node+0x158/0x360 [ 42.852542][ T709] __vmalloc_node_range+0xe2/0x8d0 [ 42.857488][ T709] ? htab_map_alloc+0x3ed/0x1650 [ 42.862265][ T709] bpf_map_area_alloc+0xd9/0xf0 [ 42.866946][ T709] ? htab_map_alloc+0x3ed/0x1650 [ 42.871718][ T709] htab_map_alloc+0x3ed/0x1650 [ 42.876324][ T709] map_create+0x411/0x2050 [ 42.880574][ T709] __sys_bpf+0x296/0x760 [ 42.884653][ T709] ? fput_many+0x160/0x1b0 [ 42.888904][ T709] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 42.894116][ T709] ? debug_smp_processor_id+0x17/0x20 [ 42.899322][ T709] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 42.905225][ T709] __x64_sys_bpf+0x7c/0x90 [ 42.909473][ T709] x64_sys_call+0x87f/0x9a0 [ 42.913812][ T709] do_syscall_64+0x3b/0xb0 [ 42.918065][ T709] ? clear_bhb_loop+0x35/0x90 [ 42.922580][ T709] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 42.928306][ T709] RIP: 0033:0x7fbcb1388819 [ 42.932562][ T709] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.952002][ T709] RSP: 002b:00007fbcafa01038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 42.960249][ T709] RAX: ffffffffffffffda RBX: 00007fbcb153ffa0 RCX: 00007fbcb1388819 [ 42.968057][ T709] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 42.975868][ T709] RBP: 00007fbcafa01090 R08: 0000000000000000 R09: 0000000000000000 [ 42.983679][ T709] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 42.991493][ T709] R13: 0000000000000000 R14: 00007fbcb153ffa0 R15: 00007fffe73ad7f8 [ 42.999310][ T709] [ 43.247270][ T30] audit: type=1400 audit(1732332080.031:126): avc: denied { relabelfrom } for pid=713 comm="syz.1.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 43.295436][ T30] audit: type=1400 audit(1732332080.031:127): avc: denied { relabelto } for pid=713 comm="syz.1.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 45.072453][ T751] device syzkaller0 entered promiscuous mode [ 46.834969][ T30] audit: type=1400 audit(1732332083.601:128): avc: denied { create } for pid=819 comm="syz.0.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 46.869868][ T30] audit: type=1400 audit(1732332083.601:129): avc: denied { create } for pid=819 comm="syz.0.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 48.179479][ T866] FAULT_INJECTION: forcing a failure. [ 48.179479][ T866] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 48.273652][ T866] CPU: 1 PID: 866 Comm: syz.2.175 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 48.283212][ T866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 48.293109][ T866] Call Trace: [ 48.296231][ T866] [ 48.299007][ T866] dump_stack_lvl+0x151/0x1c0 [ 48.303521][ T866] ? io_uring_drop_tctx_refs+0x190/0x190 [ 48.308991][ T866] dump_stack+0x15/0x20 [ 48.312980][ T866] should_fail+0x3c6/0x510 [ 48.317237][ T866] should_fail_alloc_page+0x5a/0x80 [ 48.322297][ T866] prepare_alloc_pages+0x15c/0x700 [ 48.327218][ T866] ? __alloc_pages_bulk+0xe40/0xe40 [ 48.332250][ T866] __alloc_pages+0x18c/0x8f0 [ 48.336680][ T866] ? prep_new_page+0x110/0x110 [ 48.341276][ T866] ? __kmalloc+0x13a/0x270 [ 48.345528][ T866] ? bpf_map_area_alloc+0x4c/0xf0 [ 48.350390][ T866] bpf_ringbuf_alloc+0xd3/0x380 [ 48.355079][ T866] ringbuf_map_alloc+0x202/0x320 [ 48.359903][ T866] map_create+0x411/0x2050 [ 48.364106][ T866] __sys_bpf+0x296/0x760 [ 48.368179][ T866] ? fput_many+0x160/0x1b0 [ 48.372440][ T866] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 48.377648][ T866] ? debug_smp_processor_id+0x17/0x20 [ 48.382855][ T866] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 48.388752][ T866] __x64_sys_bpf+0x7c/0x90 [ 48.393008][ T866] x64_sys_call+0x87f/0x9a0 [ 48.397342][ T866] do_syscall_64+0x3b/0xb0 [ 48.401685][ T866] ? clear_bhb_loop+0x35/0x90 [ 48.406202][ T866] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 48.411924][ T866] RIP: 0033:0x7f3cb162a819 [ 48.416179][ T866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 48.435623][ T866] RSP: 002b:00007f3cafca3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 48.443879][ T866] RAX: ffffffffffffffda RBX: 00007f3cb17e1fa0 RCX: 00007f3cb162a819 [ 48.451677][ T866] RDX: 0000000000000048 RSI: 00000000200007c0 RDI: 0000000000000000 [ 48.459486][ T866] RBP: 00007f3cafca3090 R08: 0000000000000000 R09: 0000000000000000 [ 48.467297][ T866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 48.475108][ T866] R13: 0000000000000000 R14: 00007f3cb17e1fa0 R15: 00007ffecb606b28 [ 48.483101][ T866] [ 48.656928][ T873] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.663953][ T873] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.081171][ T887] device veth0_vlan left promiscuous mode [ 49.139285][ T887] device veth0_vlan entered promiscuous mode [ 49.661415][ T911] device syzkaller0 entered promiscuous mode [ 50.456563][ T924] ip6_vti0: mtu greater than device maximum [ 50.881969][ T939] device veth0_vlan left promiscuous mode [ 50.937765][ T939] device veth0_vlan entered promiscuous mode [ 51.499363][ T960] ip6_vti0: mtu greater than device maximum [ 52.654727][ T999] ip6_vti0: mtu greater than device maximum [ 53.817085][ T1036] ip6_vti0: mtu greater than device maximum [ 54.420410][ T1052] device veth0_vlan left promiscuous mode [ 54.445593][ T1052] device veth0_vlan entered promiscuous mode [ 54.467173][ T1051] cgroup: fork rejected by pids controller in /syz1 [ 54.545825][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 54.553905][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 54.583151][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 55.369041][ T1168] device veth1_macvtap left promiscuous mode [ 55.737172][ T1176] ip6_vti0: mtu greater than device maximum [ 55.997153][ T30] audit: type=1400 audit(1732332092.781:130): avc: denied { create } for pid=1180 comm="syz.3.246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 56.363844][ T30] audit: type=1400 audit(1732332093.141:131): avc: denied { create } for pid=1189 comm="syz.4.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 56.553141][ T1186] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.591978][ T1186] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.599682][ T1186] device bridge_slave_0 entered promiscuous mode [ 56.687343][ T1186] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.751506][ T1186] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.817758][ T1186] device bridge_slave_1 entered promiscuous mode [ 56.884242][ T331] device bridge_slave_1 left promiscuous mode [ 56.890307][ T331] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.897818][ T331] device bridge_slave_0 left promiscuous mode [ 56.903741][ T331] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.911865][ T331] device veth0_vlan left promiscuous mode [ 57.791246][ T1208] device veth1_macvtap left promiscuous mode [ 58.170540][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.205525][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.467961][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.698329][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.812598][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.819474][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.974055][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.201635][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.221926][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.228813][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.241837][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.269213][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 59.277978][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.285781][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 59.294077][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.302183][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 59.302729][ T1221] syz.3.257 uses obsolete (PF_INET,SOCK_PACKET) [ 59.310480][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 59.324636][ T1218] ip6_vti0: mtu greater than device maximum [ 59.335661][ T1186] device veth0_vlan entered promiscuous mode [ 59.360657][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 59.377610][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.435594][ T30] audit: type=1400 audit(1732332096.211:132): avc: denied { create } for pid=1230 comm="syz.3.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 59.455583][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.556870][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.635515][ T1186] device veth1_macvtap entered promiscuous mode [ 59.696424][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 59.717661][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 59.797225][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 59.902900][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 59.927305][ T1243] syz.0.263[1243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.947551][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 60.194259][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 60.228307][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 60.284755][ T30] audit: type=1400 audit(1732332097.061:133): avc: denied { mounton } for pid=1186 comm="syz-executor" path="/root/syzkaller.GIeK2r/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 60.394074][ T30] audit: type=1400 audit(1732332097.091:134): avc: denied { mount } for pid=1186 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 60.394937][ T1252] device veth1_macvtap left promiscuous mode [ 60.431312][ T30] audit: type=1400 audit(1732332097.091:135): avc: denied { mounton } for pid=1186 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 62.259360][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 62.635190][ T1302] device veth0_vlan left promiscuous mode [ 62.703558][ T1302] device veth0_vlan entered promiscuous mode [ 64.881249][ T1327] device syzkaller0 entered promiscuous mode [ 68.549194][ T1344] bridge0: port 3(veth0) entered blocking state [ 68.555272][ T1344] bridge0: port 3(veth0) entered disabled state [ 68.977499][ T1344] device veth0 entered promiscuous mode [ 69.447925][ T1356] device syzkaller0 entered promiscuous mode [ 71.256198][ T30] audit: type=1400 audit(1732332108.031:136): avc: denied { create } for pid=1374 comm="syz.4.301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 71.553715][ T1384] device syzkaller0 entered promiscuous mode [ 71.801590][ T1385] Â: renamed from pim6reg1 [ 71.871295][ T1388] device syzkaller0 entered promiscuous mode [ 72.557080][ T30] audit: type=1400 audit(1732332109.331:137): avc: denied { create } for pid=1391 comm="syz.2.306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 73.816915][ T30] audit: type=1400 audit(1732332110.591:138): avc: denied { create } for pid=1396 comm="syz.2.307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 74.397421][ T1419] bridge0: port 3(veth0_to_batadv) entered blocking state [ 74.404365][ T1419] bridge0: port 3(veth0_to_batadv) entered disabled state [ 74.563834][ T30] audit: type=1400 audit(1732332111.331:139): avc: denied { setopt } for pid=1415 comm="syz.1.313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 74.731415][ T1419] device veth0_to_batadv entered promiscuous mode [ 74.888242][ T1419] bridge0: port 3(veth0_to_batadv) entered blocking state [ 74.895209][ T1419] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 74.952065][ T1422] device veth0_to_batadv left promiscuous mode [ 74.959048][ T1422] bridge0: port 3(veth0_to_batadv) entered disabled state [ 75.707878][ T1438] device veth1_macvtap left promiscuous mode [ 75.910609][ T1439] device veth1_macvtap entered promiscuous mode [ 75.937388][ T1439] device macsec0 entered promiscuous mode [ 75.943379][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 78.354502][ T30] audit: type=1400 audit(1732332115.131:140): avc: denied { create } for pid=1469 comm="syz.2.324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 79.744958][ T1515] device syzkaller0 entered promiscuous mode [ 80.058435][ T30] audit: type=1400 audit(1732332116.841:141): avc: denied { write } for pid=1523 comm="syz.0.340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 80.078923][ T30] audit: type=1400 audit(1732332116.861:142): avc: denied { read } for pid=1523 comm="syz.0.340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 80.121077][ T1516] Â: renamed from pim6reg1 [ 80.126101][ T1520] ip6_vti0: mtu greater than device maximum [ 80.223371][ T1530] device veth0_vlan left promiscuous mode [ 80.229957][ T1530] device veth0_vlan entered promiscuous mode [ 80.303304][ T1540] device syzkaller0 entered promiscuous mode [ 80.356726][ T1543] device pim6reg1 entered promiscuous mode [ 81.156097][ T1563] device syzkaller0 entered promiscuous mode [ 81.317241][ T1566] ip6_vti0: mtu greater than device maximum [ 81.570448][ T1593] syz.0.363[1593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.570504][ T1593] syz.0.363[1593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.660606][ T1594] syz.0.363[1594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.027554][ T1608] device pim6reg1 entered promiscuous mode [ 82.720652][ T1636] device sit0 entered promiscuous mode [ 83.017704][ T1651] device pim6reg1 entered promiscuous mode [ 83.029895][ T1647] device veth0_vlan left promiscuous mode [ 83.142063][ T1647] device veth0_vlan entered promiscuous mode [ 83.808547][ T1683] device syzkaller0 entered promiscuous mode [ 84.743118][ T1705] syz.3.398[1705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.743184][ T1705] syz.3.398[1705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.751457][ T1732] FAULT_INJECTION: forcing a failure. [ 85.751457][ T1732] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 85.807086][ T1732] CPU: 0 PID: 1732 Comm: syz.2.406 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 85.816718][ T1732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 85.826610][ T1732] Call Trace: [ 85.829734][ T1732] [ 85.832510][ T1732] dump_stack_lvl+0x151/0x1c0 [ 85.837025][ T1732] ? io_uring_drop_tctx_refs+0x190/0x190 [ 85.842492][ T1732] dump_stack+0x15/0x20 [ 85.846485][ T1732] should_fail+0x3c6/0x510 [ 85.850738][ T1732] should_fail_alloc_page+0x5a/0x80 [ 85.855779][ T1732] prepare_alloc_pages+0x15c/0x700 [ 85.860721][ T1732] ? __alloc_pages+0x8f0/0x8f0 [ 85.865322][ T1732] ? __alloc_pages_bulk+0xe40/0xe40 [ 85.870354][ T1732] __alloc_pages+0x18c/0x8f0 [ 85.874780][ T1732] ? __x64_sys_bpf+0x7c/0x90 [ 85.879204][ T1732] ? prep_new_page+0x110/0x110 [ 85.883805][ T1732] ? __kasan_check_write+0x14/0x20 [ 85.888754][ T1732] __get_free_pages+0x10/0x30 [ 85.893265][ T1732] kasan_populate_vmalloc_pte+0x39/0x130 [ 85.898733][ T1732] ? __apply_to_page_range+0x8ca/0xbe0 [ 85.904027][ T1732] __apply_to_page_range+0x8dd/0xbe0 [ 85.909150][ T1732] ? kasan_populate_vmalloc+0x70/0x70 [ 85.914357][ T1732] ? kasan_populate_vmalloc+0x70/0x70 [ 85.919565][ T1732] apply_to_page_range+0x3b/0x50 [ 85.924336][ T1732] kasan_populate_vmalloc+0x65/0x70 [ 85.929371][ T1732] alloc_vmap_area+0x192f/0x1a80 [ 85.934147][ T1732] ? vm_map_ram+0xa90/0xa90 [ 85.938485][ T1732] ? kmem_cache_alloc_trace+0x115/0x210 [ 85.943864][ T1732] ? __get_vm_area_node+0x117/0x360 [ 85.948900][ T1732] __get_vm_area_node+0x158/0x360 [ 85.953762][ T1732] __vmalloc_node_range+0xe2/0x8d0 [ 85.958708][ T1732] ? htab_map_alloc+0x3ed/0x1650 [ 85.963481][ T1732] bpf_map_area_alloc+0xd9/0xf0 [ 85.968167][ T1732] ? htab_map_alloc+0x3ed/0x1650 [ 85.972940][ T1732] htab_map_alloc+0x3ed/0x1650 [ 85.977543][ T1732] map_create+0x411/0x2050 [ 85.981794][ T1732] __sys_bpf+0x296/0x760 [ 85.985873][ T1732] ? fput_many+0x160/0x1b0 [ 85.990127][ T1732] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 85.995335][ T1732] ? debug_smp_processor_id+0x17/0x20 [ 86.000547][ T1732] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 86.006442][ T1732] __x64_sys_bpf+0x7c/0x90 [ 86.010697][ T1732] x64_sys_call+0x87f/0x9a0 [ 86.015034][ T1732] do_syscall_64+0x3b/0xb0 [ 86.019287][ T1732] ? clear_bhb_loop+0x35/0x90 [ 86.023801][ T1732] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 86.029529][ T1732] RIP: 0033:0x7f3cb162a819 [ 86.033784][ T1732] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 86.053232][ T1732] RSP: 002b:00007f3cafca3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 86.061470][ T1732] RAX: ffffffffffffffda RBX: 00007f3cb17e1fa0 RCX: 00007f3cb162a819 [ 86.069281][ T1732] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 86.077092][ T1732] RBP: 00007f3cafca3090 R08: 0000000000000000 R09: 0000000000000000 [ 86.084903][ T1732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 86.092714][ T1732] R13: 0000000000000000 R14: 00007f3cb17e1fa0 R15: 00007ffecb606b28 [ 86.100531][ T1732] [ 86.584070][ T1756] device sit0 entered promiscuous mode [ 86.993157][ T1758] device veth1_macvtap left promiscuous mode [ 87.000124][ T1758] device macsec0 left promiscuous mode [ 87.011726][ T1765] Â: renamed from pim6reg1 [ 87.749959][ T1814] device syzkaller0 entered promiscuous mode [ 87.882483][ T30] audit: type=1400 audit(1732332124.661:143): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 88.041234][ T30] audit: type=1400 audit(1732332124.661:144): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 88.146938][ T30] audit: type=1400 audit(1732332124.781:145): avc: denied { ioctl } for pid=1823 comm="syz.2.433" path="socket:[21172]" dev="sockfs" ino=21172 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 88.530030][ T1841] FAULT_INJECTION: forcing a failure. [ 88.530030][ T1841] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 88.636785][ T1841] CPU: 1 PID: 1841 Comm: syz.3.438 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 88.646419][ T1841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 88.656316][ T1841] Call Trace: [ 88.659441][ T1841] [ 88.662214][ T1841] dump_stack_lvl+0x151/0x1c0 [ 88.666728][ T1841] ? io_uring_drop_tctx_refs+0x190/0x190 [ 88.672199][ T1841] dump_stack+0x15/0x20 [ 88.676188][ T1841] should_fail+0x3c6/0x510 [ 88.680446][ T1841] should_fail_alloc_page+0x5a/0x80 [ 88.685477][ T1841] prepare_alloc_pages+0x15c/0x700 [ 88.690425][ T1841] ? __alloc_pages_bulk+0xe40/0xe40 [ 88.695462][ T1841] __alloc_pages+0x18c/0x8f0 [ 88.699884][ T1841] ? prep_new_page+0x110/0x110 [ 88.704483][ T1841] ? __kmalloc+0x13a/0x270 [ 88.708735][ T1841] ? bpf_map_area_alloc+0x4c/0xf0 [ 88.713599][ T1841] bpf_ringbuf_alloc+0xd3/0x380 [ 88.718284][ T1841] ringbuf_map_alloc+0x202/0x320 [ 88.723059][ T1841] map_create+0x411/0x2050 [ 88.727313][ T1841] __sys_bpf+0x296/0x760 [ 88.731393][ T1841] ? fput_many+0x160/0x1b0 [ 88.735644][ T1841] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 88.740854][ T1841] ? debug_smp_processor_id+0x17/0x20 [ 88.746057][ T1841] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 88.751958][ T1841] __x64_sys_bpf+0x7c/0x90 [ 88.756210][ T1841] x64_sys_call+0x87f/0x9a0 [ 88.760555][ T1841] do_syscall_64+0x3b/0xb0 [ 88.764802][ T1841] ? clear_bhb_loop+0x35/0x90 [ 88.769318][ T1841] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 88.775043][ T1841] RIP: 0033:0x7fbcb1388819 [ 88.779298][ T1841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 88.798737][ T1841] RSP: 002b:00007fbcafa01038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 88.806981][ T1841] RAX: ffffffffffffffda RBX: 00007fbcb153ffa0 RCX: 00007fbcb1388819 [ 88.814793][ T1841] RDX: 0000000000000048 RSI: 00000000200007c0 RDI: 0000000000000000 [ 88.822606][ T1841] RBP: 00007fbcafa01090 R08: 0000000000000000 R09: 0000000000000000 [ 88.830415][ T1841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 88.838226][ T1841] R13: 0000000000000000 R14: 00007fbcb153ffa0 R15: 00007fffe73ad7f8 [ 88.846043][ T1841] [ 89.086486][ T1845] device sit0 left promiscuous mode [ 91.088368][ T1885] bridge0: port 3(veth0_to_batadv) entered blocking state [ 91.106543][ T1885] bridge0: port 3(veth0_to_batadv) entered disabled state [ 91.196112][ T1885] device veth0_to_batadv entered promiscuous mode [ 91.222162][ T1885] bridge0: port 3(veth0_to_batadv) entered blocking state [ 91.230475][ T1885] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 91.294194][ T1894] device veth0_to_batadv left promiscuous mode [ 91.346534][ T1894] bridge0: port 3(veth0_to_batadv) entered disabled state [ 91.942964][ T1906] device pim6reg1 entered promiscuous mode [ 92.839819][ T1942] gretap0: refused to change device tx_queue_len [ 92.874579][ T30] audit: type=1400 audit(1732332129.651:146): avc: denied { create } for pid=1943 comm="syz.2.470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 94.349628][ T1968] device syzkaller0 entered promiscuous mode [ 96.796771][ T1998] FAULT_INJECTION: forcing a failure. [ 96.796771][ T1998] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 97.071357][ T1998] CPU: 1 PID: 1998 Comm: syz.3.489 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 97.080993][ T1998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 97.090971][ T1998] Call Trace: [ 97.094097][ T1998] [ 97.096879][ T1998] dump_stack_lvl+0x151/0x1c0 [ 97.101392][ T1998] ? io_uring_drop_tctx_refs+0x190/0x190 [ 97.106861][ T1998] dump_stack+0x15/0x20 [ 97.110848][ T1998] should_fail+0x3c6/0x510 [ 97.115104][ T1998] should_fail_alloc_page+0x5a/0x80 [ 97.120132][ T1998] prepare_alloc_pages+0x15c/0x700 [ 97.125081][ T1998] ? __alloc_pages_bulk+0xe40/0xe40 [ 97.130114][ T1998] __alloc_pages+0x18c/0x8f0 [ 97.134540][ T1998] ? prep_new_page+0x110/0x110 [ 97.139143][ T1998] ? __kmalloc+0x13a/0x270 [ 97.143392][ T1998] ? bpf_map_area_alloc+0x4c/0xf0 [ 97.148254][ T1998] bpf_ringbuf_alloc+0xd3/0x380 [ 97.152941][ T1998] ringbuf_map_alloc+0x202/0x320 [ 97.157712][ T1998] map_create+0x411/0x2050 [ 97.161966][ T1998] __sys_bpf+0x296/0x760 [ 97.166044][ T1998] ? fput_many+0x160/0x1b0 [ 97.170299][ T1998] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 97.175508][ T1998] ? debug_smp_processor_id+0x17/0x20 [ 97.180714][ T1998] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 97.186614][ T1998] __x64_sys_bpf+0x7c/0x90 [ 97.190868][ T1998] x64_sys_call+0x87f/0x9a0 [ 97.195207][ T1998] do_syscall_64+0x3b/0xb0 [ 97.199462][ T1998] ? clear_bhb_loop+0x35/0x90 [ 97.203973][ T1998] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 97.209701][ T1998] RIP: 0033:0x7fbcb1388819 [ 97.213956][ T1998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 97.233393][ T1998] RSP: 002b:00007fbcafa01038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 97.241641][ T1998] RAX: ffffffffffffffda RBX: 00007fbcb153ffa0 RCX: 00007fbcb1388819 [ 97.249457][ T1998] RDX: 0000000000000048 RSI: 00000000200007c0 RDI: 0000000000000000 [ 97.257262][ T1998] RBP: 00007fbcafa01090 R08: 0000000000000000 R09: 0000000000000000 [ 97.265076][ T1998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 97.272889][ T1998] R13: 0000000000000000 R14: 00007fbcb153ffa0 R15: 00007fffe73ad7f8 [ 97.280699][ T1998] [ 98.359481][ T2034] device veth1_macvtap left promiscuous mode [ 99.652488][ T2053] ip6_vti0: mtu greater than device maximum [ 100.979587][ T2064] ip6_vti0: mtu greater than device maximum [ 106.002717][ T2107] device pim6reg1 entered promiscuous mode [ 107.473341][ T2117] device syzkaller0 entered promiscuous mode [ 109.475734][ T2155] device syzkaller0 entered promiscuous mode [ 109.582876][ T2161] device syzkaller0 entered promiscuous mode [ 110.653883][ T2180] device syzkaller0 entered promiscuous mode [ 112.964220][ T30] audit: type=1400 audit(1732332149.741:147): avc: denied { create } for pid=2207 comm="syz.2.544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 113.098441][ T2218] device veth0_vlan left promiscuous mode [ 113.155468][ T2218] device veth0_vlan entered promiscuous mode [ 114.223024][ T2234] device syzkaller0 entered promiscuous mode [ 114.937010][ T2249] device sit0 left promiscuous mode [ 114.949857][ T2250] device sit0 entered promiscuous mode [ 120.553094][ T2326] device sit0 entered promiscuous mode [ 125.381633][ T2435] syz.4.607[2435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.381743][ T2435] syz.4.607[2435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.953787][ T2500] device syzkaller0 entered promiscuous mode [ 135.897149][ T2549] FAULT_INJECTION: forcing a failure. [ 135.897149][ T2549] name failslab, interval 1, probability 0, space 0, times 1 [ 135.909591][ T2549] CPU: 0 PID: 2549 Comm: syz.2.636 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 135.919194][ T2549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 135.929101][ T2549] Call Trace: [ 135.932211][ T2549] [ 135.934997][ T2549] dump_stack_lvl+0x151/0x1c0 [ 135.939510][ T2549] ? io_uring_drop_tctx_refs+0x190/0x190 [ 135.944969][ T2549] ? arch_stack_walk+0x101/0x140 [ 135.949748][ T2549] dump_stack+0x15/0x20 [ 135.953737][ T2549] should_fail+0x3c6/0x510 [ 135.957991][ T2549] __should_failslab+0xa4/0xe0 [ 135.962589][ T2549] ? dst_alloc+0x164/0x1e0 [ 135.966841][ T2549] should_failslab+0x9/0x20 [ 135.971182][ T2549] slab_pre_alloc_hook+0x37/0xd0 [ 135.975958][ T2549] ? dst_alloc+0x164/0x1e0 [ 135.980214][ T2549] kmem_cache_alloc+0x44/0x200 [ 135.984807][ T2549] ? ipv6_sysctl_rtcache_flush+0xf0/0xf0 [ 135.990278][ T2549] dst_alloc+0x164/0x1e0 [ 135.994361][ T2549] ip6_pol_route+0xc2a/0x14b0 [ 135.998869][ T2549] ? sock_alloc_send_pskb+0x915/0xa50 [ 136.004080][ T2549] ? fib6_table_lookup+0xaf0/0xaf0 [ 136.009026][ T2549] ? _raw_spin_unlock+0x4d/0x70 [ 136.013712][ T2549] ip6_pol_route_input+0x55/0x80 [ 136.018489][ T2549] fib6_rule_lookup+0x25a/0x620 [ 136.023173][ T2549] ? fault_around_bytes_set+0xc0/0xc0 [ 136.028379][ T2549] ? ip6_route_input_lookup+0xd0/0xd0 [ 136.033585][ T2549] ? fib6_lookup+0x3f0/0x3f0 [ 136.038012][ T2549] ? __local_bh_enable_ip+0x58/0x80 [ 136.043045][ T2549] ? local_bh_enable+0x1f/0x30 [ 136.047649][ T2549] ? ip6t_do_table+0x1662/0x1850 [ 136.052421][ T2549] ? ip6_route_input+0x245/0xb60 [ 136.057197][ T2549] ? __ipv6_addr_type+0x244/0x2f0 [ 136.062054][ T2549] ip6_route_input+0x724/0xb60 [ 136.066658][ T2549] ? ip6_multipath_l3_keys+0x610/0x610 [ 136.071953][ T2549] ? sk_setup_caps+0x430/0x430 [ 136.076548][ T2549] ip6_rcv_finish+0x150/0x350 [ 136.081061][ T2549] ipv6_rcv+0xeb/0x270 [ 136.084970][ T2549] ? ip6_rcv_finish+0x350/0x350 [ 136.089657][ T2549] ? refcount_add+0x80/0x80 [ 136.093996][ T2549] ? ip6_rcv_finish+0x350/0x350 [ 136.098682][ T2549] __netif_receive_skb+0x1c6/0x530 [ 136.103628][ T2549] ? deliver_ptype_list_skb+0x3b0/0x3b0 [ 136.109013][ T2549] ? _copy_from_iter+0x1b1/0xdc0 [ 136.113785][ T2549] netif_receive_skb+0xb0/0x480 [ 136.118470][ T2549] ? _copy_from_iter+0x34d/0xdc0 [ 136.123242][ T2549] ? netif_receive_skb_core+0x210/0x210 [ 136.128626][ T2549] tun_rx_batched+0x6d9/0x870 [ 136.133142][ T2549] ? eth_type_trans+0x2e4/0x620 [ 136.137825][ T2549] ? local_bh_enable+0x30/0x30 [ 136.142429][ T2549] tun_get_user+0x2cb7/0x3aa0 [ 136.146941][ T2549] ? __x64_sys_openat+0x230/0x290 [ 136.151798][ T2549] ? x64_sys_call+0x6bf/0x9a0 [ 136.156313][ T2549] ? _kstrtoull+0x3a0/0x4a0 [ 136.160672][ T2549] ? tun_do_read+0x2010/0x2010 [ 136.165249][ T2549] ? kstrtouint_from_user+0x20a/0x2a0 [ 136.170461][ T2549] ? kstrtol_from_user+0x310/0x310 [ 136.175407][ T2549] ? bpf_ringbuf_query+0xad/0x130 [ 136.180266][ T2549] ? avc_policy_seqno+0x1b/0x70 [ 136.184950][ T2549] ? selinux_file_permission+0x2c4/0x570 [ 136.190422][ T2549] tun_chr_write_iter+0x1e1/0x2e0 [ 136.195280][ T2549] vfs_write+0xd5d/0x1110 [ 136.199450][ T2549] ? file_end_write+0x1c0/0x1c0 [ 136.204138][ T2549] ? __fdget_pos+0x209/0x3a0 [ 136.208559][ T2549] ? ksys_write+0x77/0x2c0 [ 136.212813][ T2549] ksys_write+0x199/0x2c0 [ 136.216981][ T2549] ? __ia32_sys_read+0x90/0x90 [ 136.221580][ T2549] ? debug_smp_processor_id+0x17/0x20 [ 136.226792][ T2549] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 136.232690][ T2549] __x64_sys_write+0x7b/0x90 [ 136.237116][ T2549] x64_sys_call+0x2f/0x9a0 [ 136.241368][ T2549] do_syscall_64+0x3b/0xb0 [ 136.245620][ T2549] ? clear_bhb_loop+0x35/0x90 [ 136.250137][ T2549] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 136.255861][ T2549] RIP: 0033:0x7f3cb162a819 [ 136.260114][ T2549] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 136.279557][ T2549] RSP: 002b:00007f3cafca3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 136.287804][ T2549] RAX: ffffffffffffffda RBX: 00007f3cb17e1fa0 RCX: 00007f3cb162a819 [ 136.295613][ T2549] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 136.303424][ T2549] RBP: 00007f3cafca3090 R08: 0000000000000000 R09: 0000000000000000 [ 136.311244][ T2549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 136.319043][ T2549] R13: 0000000000000000 R14: 00007f3cb17e1fa0 R15: 00007ffecb606b28 [ 136.326862][ T2549] [ 138.850174][ T2574] device syzkaller0 entered promiscuous mode [ 140.888084][ T2587] device veth1_macvtap entered promiscuous mode [ 140.894180][ T2587] device macsec0 entered promiscuous mode [ 141.078940][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 143.968413][ T2632] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.156576][ T2682] device syzkaller0 entered promiscuous mode [ 156.330981][ T2733] device syzkaller0 entered promiscuous mode [ 161.497316][ T2788] device pim6reg1 entered promiscuous mode [ 161.873562][ T2806] ÿÿÿÿÿÿ: renamed from team_slave_1 [ 162.408964][ T30] audit: type=1400 audit(1732332199.161:148): avc: denied { create } for pid=2814 comm="syz.1.709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 162.728993][ T2832] device syzkaller0 entered promiscuous mode [ 162.789490][ T2835] device syzkaller0 entered promiscuous mode [ 163.848351][ T2848] ÿÿÿÿÿÿ: renamed from team_slave_1 [ 164.316863][ T30] audit: type=1400 audit(1732332201.101:149): avc: denied { tracepoint } for pid=2864 comm="syz.3.726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 164.813605][ T2894] FAULT_INJECTION: forcing a failure. [ 164.813605][ T2894] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 164.967369][ T2894] CPU: 1 PID: 2894 Comm: syz.3.733 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 164.977008][ T2894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 164.986900][ T2894] Call Trace: [ 164.990024][ T2894] [ 164.992801][ T2894] dump_stack_lvl+0x151/0x1c0 [ 164.997317][ T2894] ? io_uring_drop_tctx_refs+0x190/0x190 [ 165.002783][ T2894] dump_stack+0x15/0x20 [ 165.006774][ T2894] should_fail+0x3c6/0x510 [ 165.011027][ T2894] should_fail_alloc_page+0x5a/0x80 [ 165.016058][ T2894] prepare_alloc_pages+0x15c/0x700 [ 165.021011][ T2894] ? __alloc_pages_bulk+0xe40/0xe40 [ 165.026045][ T2894] __alloc_pages+0x18c/0x8f0 [ 165.030466][ T2894] ? prep_new_page+0x110/0x110 [ 165.035074][ T2894] ? __kmalloc+0x13a/0x270 [ 165.039320][ T2894] ? bpf_map_area_alloc+0x4c/0xf0 [ 165.044182][ T2894] bpf_ringbuf_alloc+0xd3/0x380 [ 165.048871][ T2894] ringbuf_map_alloc+0x202/0x320 [ 165.053646][ T2894] map_create+0x411/0x2050 [ 165.057897][ T2894] __sys_bpf+0x296/0x760 [ 165.061973][ T2894] ? fput_many+0x160/0x1b0 [ 165.066227][ T2894] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 165.071437][ T2894] ? debug_smp_processor_id+0x17/0x20 [ 165.076641][ T2894] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 165.082545][ T2894] __x64_sys_bpf+0x7c/0x90 [ 165.086798][ T2894] x64_sys_call+0x87f/0x9a0 [ 165.091135][ T2894] do_syscall_64+0x3b/0xb0 [ 165.095387][ T2894] ? clear_bhb_loop+0x35/0x90 [ 165.099903][ T2894] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 165.105629][ T2894] RIP: 0033:0x7fbcb1388819 [ 165.109884][ T2894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 165.129326][ T2894] RSP: 002b:00007fbcafa01038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 165.137567][ T2894] RAX: ffffffffffffffda RBX: 00007fbcb153ffa0 RCX: 00007fbcb1388819 [ 165.145379][ T2894] RDX: 0000000000000048 RSI: 00000000200007c0 RDI: 0000000000000000 [ 165.153192][ T2894] RBP: 00007fbcafa01090 R08: 0000000000000000 R09: 0000000000000000 [ 165.161001][ T2894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 165.168814][ T2894] R13: 0000000000000000 R14: 00007fbcb153ffa0 R15: 00007fffe73ad7f8 [ 165.176634][ T2894] [ 165.702145][ T2903] device sit0 left promiscuous mode [ 165.821898][ T2907] device sit0 entered promiscuous mode [ 166.136875][ T2917] FAULT_INJECTION: forcing a failure. [ 166.136875][ T2917] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 166.150077][ T2917] CPU: 0 PID: 2917 Comm: syz.1.740 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 166.159693][ T2917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 166.169585][ T2917] Call Trace: [ 166.172714][ T2917] [ 166.175486][ T2917] dump_stack_lvl+0x151/0x1c0 [ 166.180001][ T2917] ? io_uring_drop_tctx_refs+0x190/0x190 [ 166.185472][ T2917] dump_stack+0x15/0x20 [ 166.189459][ T2917] should_fail+0x3c6/0x510 [ 166.193779][ T2917] should_fail_usercopy+0x1a/0x20 [ 166.198573][ T2917] _copy_from_user+0x20/0xd0 [ 166.202999][ T2917] sock_do_ioctl+0x229/0x5a0 [ 166.207429][ T2917] ? sock_show_fdinfo+0xa0/0xa0 [ 166.212113][ T2917] ? __check_object_size+0x73/0x3d0 [ 166.217146][ T2917] ? strncpy_from_user+0x2b1/0x2d0 [ 166.222097][ T2917] ? selinux_file_ioctl+0x3cc/0x540 [ 166.227134][ T2917] sock_ioctl+0x455/0x740 [ 166.231296][ T2917] ? sock_poll+0x400/0x400 [ 166.235550][ T2917] ? __fget_files+0x31e/0x380 [ 166.240061][ T2917] ? security_file_ioctl+0x84/0xb0 [ 166.245007][ T2917] ? sock_poll+0x400/0x400 [ 166.249261][ T2917] __se_sys_ioctl+0x114/0x190 [ 166.253774][ T2917] __x64_sys_ioctl+0x7b/0x90 [ 166.258202][ T2917] x64_sys_call+0x98/0x9a0 [ 166.262451][ T2917] do_syscall_64+0x3b/0xb0 [ 166.266704][ T2917] ? clear_bhb_loop+0x35/0x90 [ 166.271217][ T2917] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 166.276946][ T2917] RIP: 0033:0x7fa945d04819 [ 166.281201][ T2917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 166.300640][ T2917] RSP: 002b:00007fa94437d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 166.308884][ T2917] RAX: ffffffffffffffda RBX: 00007fa945ebbfa0 RCX: 00007fa945d04819 [ 166.316694][ T2917] RDX: 0000000020000080 RSI: 0000000000008922 RDI: 000000000000000a [ 166.324507][ T2917] RBP: 00007fa94437d090 R08: 0000000000000000 R09: 0000000000000000 [ 166.332319][ T2917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 166.340126][ T2917] R13: 0000000000000000 R14: 00007fa945ebbfa0 R15: 00007ffd7183ade8 [ 166.347945][ T2917] [ 166.352548][ T2910] device pim6reg1 entered promiscuous mode [ 166.790376][ T2930] bridge0: port 4(veth0_to_batadv) entered blocking state [ 166.816460][ T2930] bridge0: port 4(veth0_to_batadv) entered disabled state [ 166.852799][ T2930] device veth0_to_batadv entered promiscuous mode [ 168.763164][ T2964] device wg2 entered promiscuous mode [ 170.180082][ T2987] FAULT_INJECTION: forcing a failure. [ 170.180082][ T2987] name failslab, interval 1, probability 0, space 0, times 0 [ 170.277832][ T2987] CPU: 1 PID: 2987 Comm: syz.0.762 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 170.287464][ T2987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 170.297358][ T2987] Call Trace: [ 170.300481][ T2987] [ 170.303263][ T2987] dump_stack_lvl+0x151/0x1c0 [ 170.307772][ T2987] ? io_uring_drop_tctx_refs+0x190/0x190 [ 170.313240][ T2987] ? avc_denied+0x1b0/0x1b0 [ 170.317583][ T2987] dump_stack+0x15/0x20 [ 170.321570][ T2987] should_fail+0x3c6/0x510 [ 170.325829][ T2987] __should_failslab+0xa4/0xe0 [ 170.330425][ T2987] ? __alloc_skb+0xbe/0x550 [ 170.334768][ T2987] should_failslab+0x9/0x20 [ 170.339104][ T2987] slab_pre_alloc_hook+0x37/0xd0 [ 170.344070][ T2987] ? __alloc_skb+0xbe/0x550 [ 170.348404][ T2987] kmem_cache_alloc+0x44/0x200 [ 170.353004][ T2987] __alloc_skb+0xbe/0x550 [ 170.357169][ T2987] alloc_skb_with_frags+0xa6/0x680 [ 170.362116][ T2987] ? 0xffffffffa0018b98 [ 170.366110][ T2987] ? is_bpf_text_address+0x172/0x190 [ 170.371232][ T2987] sock_alloc_send_pskb+0x915/0xa50 [ 170.376268][ T2987] ? sock_kzfree_s+0x60/0x60 [ 170.380689][ T2987] ? stack_trace_save+0x113/0x1c0 [ 170.385550][ T2987] ? stack_trace_snprint+0xf0/0xf0 [ 170.390498][ T2987] tun_get_user+0xf1b/0x3aa0 [ 170.394925][ T2987] ? __x64_sys_openat+0x230/0x290 [ 170.399783][ T2987] ? x64_sys_call+0x6bf/0x9a0 [ 170.404299][ T2987] ? _kstrtoull+0x3a0/0x4a0 [ 170.408637][ T2987] ? tun_do_read+0x2010/0x2010 [ 170.413233][ T2987] ? kstrtouint_from_user+0x20a/0x2a0 [ 170.418445][ T2987] ? kstrtol_from_user+0x310/0x310 [ 170.423396][ T2987] ? avc_policy_seqno+0x1b/0x70 [ 170.428076][ T2987] ? selinux_file_permission+0x2c4/0x570 [ 170.433547][ T2987] tun_chr_write_iter+0x1e1/0x2e0 [ 170.438406][ T2987] vfs_write+0xd5d/0x1110 [ 170.442572][ T2987] ? putname+0xfa/0x150 [ 170.446565][ T2987] ? file_end_write+0x1c0/0x1c0 [ 170.451262][ T2987] ? __fdget_pos+0x209/0x3a0 [ 170.455675][ T2987] ? ksys_write+0x77/0x2c0 [ 170.459932][ T2987] ksys_write+0x199/0x2c0 [ 170.464096][ T2987] ? __ia32_sys_read+0x90/0x90 [ 170.468699][ T2987] ? debug_smp_processor_id+0x17/0x20 [ 170.473903][ T2987] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 170.479808][ T2987] __x64_sys_write+0x7b/0x90 [ 170.484232][ T2987] x64_sys_call+0x2f/0x9a0 [ 170.488484][ T2987] do_syscall_64+0x3b/0xb0 [ 170.492735][ T2987] ? clear_bhb_loop+0x35/0x90 [ 170.497254][ T2987] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 170.502977][ T2987] RIP: 0033:0x7f99132c3819 [ 170.507229][ T2987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 170.526670][ T2987] RSP: 002b:00007f991193c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 170.534915][ T2987] RAX: ffffffffffffffda RBX: 00007f991347afa0 RCX: 00007f99132c3819 [ 170.542728][ T2987] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 170.550539][ T2987] RBP: 00007f991193c090 R08: 0000000000000000 R09: 0000000000000000 [ 170.558352][ T2987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 170.566160][ T2987] R13: 0000000000000000 R14: 00007f991347afa0 R15: 00007ffde5a744b8 [ 170.573977][ T2987] [ 176.561110][ T3036] FAULT_INJECTION: forcing a failure. [ 176.561110][ T3036] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 176.746878][ T3036] CPU: 0 PID: 3036 Comm: syz.2.776 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 176.756510][ T3036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 176.766404][ T3036] Call Trace: [ 176.769526][ T3036] [ 176.772304][ T3036] dump_stack_lvl+0x151/0x1c0 [ 176.776821][ T3036] ? io_uring_drop_tctx_refs+0x190/0x190 [ 176.782288][ T3036] dump_stack+0x15/0x20 [ 176.786277][ T3036] should_fail+0x3c6/0x510 [ 176.790530][ T3036] should_fail_alloc_page+0x5a/0x80 [ 176.795565][ T3036] prepare_alloc_pages+0x15c/0x700 [ 176.800516][ T3036] ? __alloc_pages_bulk+0xe40/0xe40 [ 176.805547][ T3036] __alloc_pages+0x18c/0x8f0 [ 176.809977][ T3036] ? prep_new_page+0x110/0x110 [ 176.814575][ T3036] ? __kmalloc+0x13a/0x270 [ 176.818826][ T3036] ? bpf_map_area_alloc+0x4c/0xf0 [ 176.823687][ T3036] bpf_ringbuf_alloc+0xd3/0x380 [ 176.828373][ T3036] ringbuf_map_alloc+0x202/0x320 [ 176.833145][ T3036] map_create+0x411/0x2050 [ 176.837399][ T3036] __sys_bpf+0x296/0x760 [ 176.841478][ T3036] ? fput_many+0x160/0x1b0 [ 176.845730][ T3036] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 176.850942][ T3036] ? debug_smp_processor_id+0x17/0x20 [ 176.856144][ T3036] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 176.862048][ T3036] __x64_sys_bpf+0x7c/0x90 [ 176.866301][ T3036] x64_sys_call+0x87f/0x9a0 [ 176.870641][ T3036] do_syscall_64+0x3b/0xb0 [ 176.874898][ T3036] ? clear_bhb_loop+0x35/0x90 [ 176.879408][ T3036] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 176.885133][ T3036] RIP: 0033:0x7f3cb162a819 [ 176.889387][ T3036] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 176.908829][ T3036] RSP: 002b:00007f3cafca3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 176.917073][ T3036] RAX: ffffffffffffffda RBX: 00007f3cb17e1fa0 RCX: 00007f3cb162a819 [ 176.924884][ T3036] RDX: 0000000000000048 RSI: 00000000200007c0 RDI: 0000000000000000 [ 176.932698][ T3036] RBP: 00007f3cafca3090 R08: 0000000000000000 R09: 0000000000000000 [ 176.940511][ T3036] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 176.948319][ T3036] R13: 0000000000000000 R14: 00007f3cb17e1fa0 R15: 00007ffecb606b28 [ 176.956139][ T3036] [ 183.310997][ T3103] device sit0 left promiscuous mode [ 183.673373][ T3102] device sit0 entered promiscuous mode [ 188.967851][ T30] audit: type=1400 audit(1732332225.751:150): avc: denied { create } for pid=3129 comm="syz.0.798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 189.384397][ T3133] device syzkaller0 entered promiscuous mode [ 195.510190][ T3180] device veth1_macvtap left promiscuous mode [ 195.596840][ T3180] device macsec0 left promiscuous mode [ 208.457667][ T3274] device syzkaller0 entered promiscuous mode [ 209.664984][ T3288] device sit0 left promiscuous mode [ 209.806071][ T3293] device sit0 entered promiscuous mode [ 226.250496][ T3423] device pim6reg1 entered promiscuous mode [ 236.877567][ T3499] device syzkaller0 entered promiscuous mode [ 241.075456][ T30] audit: type=1400 audit(1732332277.851:151): avc: denied { attach_queue } for pid=3541 comm="syz.0.900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 244.335028][ T30] audit: type=1400 audit(1732332281.111:152): avc: denied { create } for pid=3557 comm="syz.0.904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 245.730254][ T3569] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.738731][ T3569] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.676423][ T3708] device sit0 left promiscuous mode [ 260.770655][ T3710] device sit0 entered promiscuous mode [ 279.928073][ T3857] device sit0 entered promiscuous mode [ 286.760633][ T30] audit: type=1400 audit(1732332323.461:153): avc: denied { create } for pid=3918 comm="syz.2.996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 297.158348][ T3979] device pim6reg1 entered promiscuous mode [ 297.501823][ T3979] device syzkaller0 entered promiscuous mode [ 298.312252][ T3991] device sit0 entered promiscuous mode [ 299.159558][ T3998] device syzkaller0 entered promiscuous mode [ 299.647337][ T4012] device veth1_macvtap entered promiscuous mode [ 299.670084][ T4012] device macsec0 entered promiscuous mode [ 299.804619][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 309.460478][ T4190] tap0: tun_chr_ioctl cmd 1074025677 [ 309.517354][ T4190] tap0: linktype set to 6 [ 310.180810][ T4202] device veth1_macvtap left promiscuous mode [ 310.229519][ T4202] device macsec0 left promiscuous mode [ 313.816706][ T4271] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 313.827824][ T4271] syzkaller0: linktype set to 768 [ 326.841157][ T30] audit: type=1400 audit(1732332363.621:154): avc: denied { create } for pid=4545 comm="syz.2.1207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 329.153205][ T4615] ip6_vti0: mtu greater than device maximum [ 330.893945][ T4658] ref_ctr_offset mismatch. inode: 0x562 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 336.557541][ T4783] device syzkaller0 entered promiscuous mode [ 344.757462][ T4966] device pim6reg1 entered promiscuous mode [ 350.044680][ T5075] device pim6reg1 entered promiscuous mode [ 360.543510][ T5270] FAULT_INJECTION: forcing a failure. [ 360.543510][ T5270] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 360.897188][ T5270] CPU: 1 PID: 5270 Comm: syz.1.1466 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 360.906909][ T5270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 360.916803][ T5270] Call Trace: [ 360.919929][ T5270] [ 360.922708][ T5270] dump_stack_lvl+0x151/0x1c0 [ 360.927219][ T5270] ? io_uring_drop_tctx_refs+0x190/0x190 [ 360.932692][ T5270] dump_stack+0x15/0x20 [ 360.936681][ T5270] should_fail+0x3c6/0x510 [ 360.940935][ T5270] should_fail_alloc_page+0x5a/0x80 [ 360.945970][ T5270] prepare_alloc_pages+0x15c/0x700 [ 360.950916][ T5270] ? __alloc_pages_bulk+0xe40/0xe40 [ 360.955949][ T5270] __alloc_pages+0x18c/0x8f0 [ 360.960374][ T5270] ? prep_new_page+0x110/0x110 [ 360.964975][ T5270] ? __kmalloc+0x13a/0x270 [ 360.969231][ T5270] ? bpf_map_area_alloc+0x4c/0xf0 [ 360.974089][ T5270] bpf_ringbuf_alloc+0xd3/0x380 [ 360.978774][ T5270] ringbuf_map_alloc+0x202/0x320 [ 360.983548][ T5270] map_create+0x411/0x2050 [ 360.987803][ T5270] __sys_bpf+0x296/0x760 [ 360.991879][ T5270] ? fput_many+0x160/0x1b0 [ 360.996131][ T5270] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 361.001344][ T5270] ? debug_smp_processor_id+0x17/0x20 [ 361.006550][ T5270] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 361.012452][ T5270] __x64_sys_bpf+0x7c/0x90 [ 361.016702][ T5270] x64_sys_call+0x87f/0x9a0 [ 361.021041][ T5270] do_syscall_64+0x3b/0xb0 [ 361.025295][ T5270] ? clear_bhb_loop+0x35/0x90 [ 361.029810][ T5270] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 361.035535][ T5270] RIP: 0033:0x7fa945d04819 [ 361.039788][ T5270] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 361.059228][ T5270] RSP: 002b:00007fa94437d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 361.067474][ T5270] RAX: ffffffffffffffda RBX: 00007fa945ebbfa0 RCX: 00007fa945d04819 [ 361.075283][ T5270] RDX: 0000000000000048 RSI: 00000000200007c0 RDI: 0000000000000000 [ 361.083095][ T5270] RBP: 00007fa94437d090 R08: 0000000000000000 R09: 0000000000000000 [ 361.090906][ T5270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 361.098718][ T5270] R13: 0000000000000000 R14: 00007fa945ebbfa0 R15: 00007ffd7183ade8 [ 361.106533][ T5270] [ 365.890969][ T5382] ip6_vti0: mtu greater than device maximum [ 367.320277][ T5404] device syzkaller0 entered promiscuous mode [ 367.752291][ T5413] device veth1_macvtap entered promiscuous mode [ 367.760753][ T5413] device macsec0 entered promiscuous mode [ 367.866185][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 368.189207][ T5425] FAULT_INJECTION: forcing a failure. [ 368.189207][ T5425] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 368.375862][ T5425] CPU: 1 PID: 5425 Comm: syz.3.1518 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 368.385585][ T5425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 368.395480][ T5425] Call Trace: [ 368.398603][ T5425] [ 368.401379][ T5425] dump_stack_lvl+0x151/0x1c0 [ 368.405895][ T5425] ? io_uring_drop_tctx_refs+0x190/0x190 [ 368.411371][ T5425] ? __kasan_check_write+0x14/0x20 [ 368.416308][ T5425] dump_stack+0x15/0x20 [ 368.420300][ T5425] should_fail+0x3c6/0x510 [ 368.424554][ T5425] should_fail_usercopy+0x1a/0x20 [ 368.429416][ T5425] _copy_from_user+0x20/0xd0 [ 368.433845][ T5425] sock_do_ioctl+0x229/0x5a0 [ 368.438270][ T5425] ? sock_show_fdinfo+0xa0/0xa0 [ 368.442953][ T5425] ? selinux_file_ioctl+0x3cc/0x540 [ 368.447987][ T5425] sock_ioctl+0x455/0x740 [ 368.452152][ T5425] ? sock_poll+0x400/0x400 [ 368.456404][ T5425] ? __fget_files+0x31e/0x380 [ 368.460925][ T5425] ? security_file_ioctl+0x84/0xb0 [ 368.465867][ T5425] ? sock_poll+0x400/0x400 [ 368.470122][ T5425] __se_sys_ioctl+0x114/0x190 [ 368.474634][ T5425] __x64_sys_ioctl+0x7b/0x90 [ 368.479060][ T5425] x64_sys_call+0x98/0x9a0 [ 368.483311][ T5425] do_syscall_64+0x3b/0xb0 [ 368.487564][ T5425] ? clear_bhb_loop+0x35/0x90 [ 368.492075][ T5425] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 368.497807][ T5425] RIP: 0033:0x7fbcb1388819 [ 368.502057][ T5425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 368.521503][ T5425] RSP: 002b:00007fbcaf9e0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 368.529743][ T5425] RAX: ffffffffffffffda RBX: 00007fbcb1540080 RCX: 00007fbcb1388819 [ 368.537560][ T5425] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 000000000000000a [ 368.545371][ T5425] RBP: 00007fbcaf9e0090 R08: 0000000000000000 R09: 0000000000000000 [ 368.553182][ T5425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 368.560990][ T5425] R13: 0000000000000000 R14: 00007fbcb1540080 R15: 00007fffe73ad7f8 [ 368.568807][ T5425] [ 375.611653][ T5566] device syzkaller0 entered promiscuous mode [ 383.478787][ T5725] FAULT_INJECTION: forcing a failure. [ 383.478787][ T5725] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 383.580097][ T5725] CPU: 0 PID: 5725 Comm: syz.4.1614 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 383.589818][ T5725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 383.599717][ T5725] Call Trace: [ 383.602833][ T5725] [ 383.605614][ T5725] dump_stack_lvl+0x151/0x1c0 [ 383.610127][ T5725] ? io_uring_drop_tctx_refs+0x190/0x190 [ 383.615598][ T5725] dump_stack+0x15/0x20 [ 383.619585][ T5725] should_fail+0x3c6/0x510 [ 383.623840][ T5725] should_fail_usercopy+0x1a/0x20 [ 383.628700][ T5725] _copy_to_user+0x20/0x90 [ 383.632953][ T5725] simple_read_from_buffer+0xc7/0x150 [ 383.638160][ T5725] proc_fail_nth_read+0x1a3/0x210 [ 383.643022][ T5725] ? proc_fault_inject_write+0x390/0x390 [ 383.648490][ T5725] ? fsnotify_perm+0x269/0x5b0 [ 383.653089][ T5725] ? security_file_permission+0x86/0xb0 [ 383.658468][ T5725] ? proc_fault_inject_write+0x390/0x390 [ 383.663937][ T5725] vfs_read+0x27d/0xd40 [ 383.667931][ T5725] ? kernel_read+0x1f0/0x1f0 [ 383.672354][ T5725] ? __kasan_check_write+0x14/0x20 [ 383.677302][ T5725] ? mutex_lock+0xb6/0x1e0 [ 383.681555][ T5725] ? wait_for_completion_killable_timeout+0x10/0x10 [ 383.687983][ T5725] ? __fdget_pos+0x2e7/0x3a0 [ 383.692403][ T5725] ? ksys_read+0x77/0x2c0 [ 383.696570][ T5725] ksys_read+0x199/0x2c0 [ 383.700653][ T5725] ? vfs_write+0x1110/0x1110 [ 383.705078][ T5725] ? debug_smp_processor_id+0x17/0x20 [ 383.710286][ T5725] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 383.716188][ T5725] __x64_sys_read+0x7b/0x90 [ 383.720525][ T5725] x64_sys_call+0x28/0x9a0 [ 383.724778][ T5725] do_syscall_64+0x3b/0xb0 [ 383.729030][ T5725] ? clear_bhb_loop+0x35/0x90 [ 383.733545][ T5725] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 383.739271][ T5725] RIP: 0033:0x7f97a07f625c [ 383.743526][ T5725] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 383.762970][ T5725] RSP: 002b:00007f979ee70030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 383.771213][ T5725] RAX: ffffffffffffffda RBX: 00007f97a09aefa0 RCX: 00007f97a07f625c [ 383.779027][ T5725] RDX: 000000000000000f RSI: 00007f979ee700a0 RDI: 0000000000000006 [ 383.786834][ T5725] RBP: 00007f979ee70090 R08: 0000000000000000 R09: 0000000000000000 [ 383.794647][ T5725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 383.802456][ T5725] R13: 0000000000000000 R14: 00007f97a09aefa0 R15: 00007ffe4f080c98 [ 383.810275][ T5725] [ 393.825906][ T5881] device syzkaller0 entered promiscuous mode [ 393.992738][ T5878] device syzkaller0 entered promiscuous mode [ 394.865157][ T5913] ip6_vti0: mtu greater than device maximum [ 395.544357][ T5946] FAULT_INJECTION: forcing a failure. [ 395.544357][ T5946] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 395.557200][ T5946] CPU: 1 PID: 5946 Comm: syz.0.1681 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 395.566922][ T5946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 395.576809][ T5946] Call Trace: [ 395.579933][ T5946] [ 395.582719][ T5946] dump_stack_lvl+0x151/0x1c0 [ 395.587229][ T5946] ? io_uring_drop_tctx_refs+0x190/0x190 [ 395.592692][ T5946] ? __update_load_avg_cfs_rq+0xb1/0x2f0 [ 395.598158][ T5946] dump_stack+0x15/0x20 [ 395.602148][ T5946] should_fail+0x3c6/0x510 [ 395.606405][ T5946] should_fail_usercopy+0x1a/0x20 [ 395.611261][ T5946] strncpy_from_user+0x24/0x2d0 [ 395.615976][ T5946] strncpy_from_user_nofault+0x73/0x150 [ 395.621338][ T5946] bpf_probe_read_compat_str+0xec/0x180 [ 395.626715][ T5946] bpf_prog_c1796171ffc7efef+0x35/0xd7c [ 395.632093][ T5946] bpf_trace_run3+0x11e/0x250 [ 395.636606][ T5946] ? bpf_trace_run2+0x210/0x210 [ 395.641292][ T5946] ? __this_cpu_preempt_check+0x13/0x20 [ 395.646676][ T5946] ? tracing_record_taskinfo_sched_switch+0x84/0x390 [ 395.653185][ T5946] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 395.659347][ T5946] __bpf_trace_sched_switch+0xb/0x10 [ 395.664466][ T5946] __traceiter_sched_switch+0x85/0xc0 [ 395.669674][ T5946] __schedule+0x134b/0x1590 [ 395.674016][ T5946] ? release_firmware_map_entry+0x190/0x190 [ 395.679745][ T5946] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 395.685387][ T5946] ? prepare_to_wait_event+0x3e6/0x420 [ 395.690676][ T5946] schedule+0x11f/0x1e0 [ 395.694670][ T5946] synchronize_rcu_expedited+0x49d/0x600 [ 395.700138][ T5946] ? synchronize_rcu+0x120/0x120 [ 395.704929][ T5946] ? ____kasan_kmalloc+0xed/0x110 [ 395.709771][ T5946] ? ____kasan_kmalloc+0xdb/0x110 [ 395.714632][ T5946] ? __kasan_kmalloc+0x9/0x10 [ 395.719144][ T5946] ? __kmalloc+0x13a/0x270 [ 395.723397][ T5946] ? bpf_map_area_alloc+0x4c/0xf0 [ 395.728265][ T5946] ? sock_map_alloc+0x1f7/0x310 [ 395.732946][ T5946] ? map_create+0x411/0x2050 [ 395.737372][ T5946] ? rcu_exp_handler+0x360/0x360 [ 395.742147][ T5946] ? io_schedule+0x120/0x120 [ 395.746572][ T5946] synchronize_rcu+0x88/0x120 [ 395.751088][ T5946] ? schedule_delayed_monitor_work+0x160/0x160 [ 395.757074][ T5946] ? __fget_files+0x31e/0x380 [ 395.761587][ T5946] ? __kasan_kmalloc+0x9/0x10 [ 395.766101][ T5946] sock_map_free+0x241/0x2b0 [ 395.770526][ T5946] map_create+0x1a3a/0x2050 [ 395.774865][ T5946] __sys_bpf+0x296/0x760 [ 395.778947][ T5946] ? fput_many+0x160/0x1b0 [ 395.783198][ T5946] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 395.788406][ T5946] ? debug_smp_processor_id+0x17/0x20 [ 395.793613][ T5946] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 395.799515][ T5946] __x64_sys_bpf+0x7c/0x90 [ 395.803767][ T5946] x64_sys_call+0x87f/0x9a0 [ 395.808109][ T5946] do_syscall_64+0x3b/0xb0 [ 395.812360][ T5946] ? clear_bhb_loop+0x35/0x90 [ 395.816874][ T5946] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 395.822601][ T5946] RIP: 0033:0x7f99132c3819 [ 395.826857][ T5946] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 395.846295][ T5946] RSP: 002b:00007f991193c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 395.854541][ T5946] RAX: ffffffffffffffda RBX: 00007f991347afa0 RCX: 00007f99132c3819 [ 395.862353][ T5946] RDX: 0000000000000050 RSI: 0000000020000200 RDI: 0000000000000000 [ 395.870163][ T5946] RBP: 00007f991193c090 R08: 0000000000000000 R09: 0000000000000000 [ 395.877978][ T5946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 395.885785][ T5946] R13: 0000000000000000 R14: 00007f991347afa0 R15: 00007ffde5a744b8 [ 395.893602][ T5946] [ 397.911936][ T5999] FAULT_INJECTION: forcing a failure. [ 397.911936][ T5999] name failslab, interval 1, probability 0, space 0, times 0 [ 397.924721][ T5999] CPU: 1 PID: 5999 Comm: syz.3.1698 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 397.934410][ T5999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 397.944302][ T5999] Call Trace: [ 397.947431][ T5999] [ 397.950202][ T5999] dump_stack_lvl+0x151/0x1c0 [ 397.954724][ T5999] ? io_uring_drop_tctx_refs+0x190/0x190 [ 397.960186][ T5999] dump_stack+0x15/0x20 [ 397.964176][ T5999] should_fail+0x3c6/0x510 [ 397.968435][ T5999] __should_failslab+0xa4/0xe0 [ 397.973029][ T5999] should_failslab+0x9/0x20 [ 397.977367][ T5999] slab_pre_alloc_hook+0x37/0xd0 [ 397.982143][ T5999] __kmalloc+0x6d/0x270 [ 397.986134][ T5999] ? kvmalloc_node+0x1f0/0x4d0 [ 397.990734][ T5999] kvmalloc_node+0x1f0/0x4d0 [ 397.995161][ T5999] ? vm_mmap+0xb0/0xb0 [ 397.999069][ T5999] ? __kasan_check_write+0x14/0x20 [ 398.004013][ T5999] pfifo_fast_init+0x110/0x7a0 [ 398.008613][ T5999] qdisc_create_dflt+0x144/0x3e0 [ 398.013390][ T5999] mq_init+0x2c8/0x6b0 [ 398.017295][ T5999] ? local_bh_enable+0x30/0x30 [ 398.021893][ T5999] ? __kasan_check_write+0x14/0x20 [ 398.026840][ T5999] ? qdisc_alloc+0x5a1/0x770 [ 398.031267][ T5999] qdisc_create_dflt+0x144/0x3e0 [ 398.036041][ T5999] ? _raw_spin_lock+0xa4/0x1b0 [ 398.040640][ T5999] dev_activate+0x127/0x1140 [ 398.045069][ T5999] ? dev_set_rx_mode+0x245/0x2e0 [ 398.049841][ T5999] __dev_open+0x3bf/0x4e0 [ 398.054007][ T5999] ? dev_open+0x260/0x260 [ 398.058171][ T5999] ? _raw_spin_unlock_bh+0x51/0x60 [ 398.063118][ T5999] ? dev_set_rx_mode+0x245/0x2e0 [ 398.067892][ T5999] ? __kasan_check_read+0x11/0x20 [ 398.072755][ T5999] __dev_change_flags+0x1db/0x6e0 [ 398.077614][ T5999] ? dev_get_flags+0x1e0/0x1e0 [ 398.082215][ T5999] dev_change_flags+0x8c/0x1a0 [ 398.086818][ T5999] dev_ifsioc+0x147/0x10c0 [ 398.091066][ T5999] ? dev_ioctl+0xe70/0xe70 [ 398.095318][ T5999] ? mutex_lock+0x135/0x1e0 [ 398.099660][ T5999] ? wait_for_completion_killable_timeout+0x10/0x10 [ 398.106085][ T5999] dev_ioctl+0x54d/0xe70 [ 398.110176][ T5999] sock_do_ioctl+0x34f/0x5a0 [ 398.114590][ T5999] ? sock_show_fdinfo+0xa0/0xa0 [ 398.119279][ T5999] ? selinux_file_ioctl+0x3cc/0x540 [ 398.124308][ T5999] sock_ioctl+0x455/0x740 [ 398.128476][ T5999] ? sock_poll+0x400/0x400 [ 398.132729][ T5999] ? __fget_files+0x31e/0x380 [ 398.137242][ T5999] ? security_file_ioctl+0x84/0xb0 [ 398.142186][ T5999] ? sock_poll+0x400/0x400 [ 398.146441][ T5999] __se_sys_ioctl+0x114/0x190 [ 398.150956][ T5999] __x64_sys_ioctl+0x7b/0x90 [ 398.155382][ T5999] x64_sys_call+0x98/0x9a0 [ 398.159634][ T5999] do_syscall_64+0x3b/0xb0 [ 398.163884][ T5999] ? clear_bhb_loop+0x35/0x90 [ 398.168402][ T5999] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 398.174129][ T5999] RIP: 0033:0x7fbcb1388819 [ 398.178383][ T5999] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 398.197829][ T5999] RSP: 002b:00007fbcafa01038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 398.206068][ T5999] RAX: ffffffffffffffda RBX: 00007fbcb153ffa0 RCX: 00007fbcb1388819 [ 398.213877][ T5999] RDX: 0000000020002280 RSI: 0000000000008914 RDI: 0000000000000006 [ 398.221688][ T5999] RBP: 00007fbcafa01090 R08: 0000000000000000 R09: 0000000000000000 [ 398.229500][ T5999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 398.237312][ T5999] R13: 0000000000000000 R14: 00007fbcb153ffa0 R15: 00007fffe73ad7f8 [ 398.245128][ T5999] [ 398.257551][ T6007] bond_slave_1: mtu greater than device maximum [ 398.365860][ T6016] device syzkaller0 entered promiscuous mode [ 398.844435][ T6039] device syzkaller0 entered promiscuous mode [ 399.224669][ T6037] device syzkaller0 entered promiscuous mode [ 401.162038][ T6114] device syzkaller0 entered promiscuous mode [ 401.643792][ T6120] tap0: tun_chr_ioctl cmd 1074812118 [ 401.717182][ T6122] device syzkaller0 entered promiscuous mode [ 402.409895][ T6130] FAULT_INJECTION: forcing a failure. [ 402.409895][ T6130] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 402.422741][ T6130] CPU: 1 PID: 6130 Comm: syz.4.1746 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 402.432458][ T6130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 402.442360][ T6130] Call Trace: [ 402.445478][ T6130] [ 402.448255][ T6130] dump_stack_lvl+0x151/0x1c0 [ 402.452774][ T6130] ? io_uring_drop_tctx_refs+0x190/0x190 [ 402.458237][ T6130] ? bad_area_nosemaphore+0x2d/0x40 [ 402.463277][ T6130] dump_stack+0x15/0x20 [ 402.467260][ T6130] should_fail+0x3c6/0x510 [ 402.471512][ T6130] should_fail_usercopy+0x1a/0x20 [ 402.476371][ T6130] strncpy_from_user+0x24/0x2d0 [ 402.481061][ T6130] strncpy_from_user_nofault+0x73/0x150 [ 402.486439][ T6130] bpf_probe_read_compat_str+0xec/0x180 [ 402.491825][ T6130] bpf_prog_c1796171ffc7efef+0x35/0xd64 [ 402.497214][ T6130] bpf_trace_run3+0x11e/0x250 [ 402.501718][ T6130] ? bpf_trace_run2+0x210/0x210 [ 402.506407][ T6130] ? __this_cpu_preempt_check+0x13/0x20 [ 402.511782][ T6130] ? tracing_record_taskinfo_sched_switch+0x84/0x390 [ 402.518295][ T6130] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 402.524454][ T6130] __bpf_trace_sched_switch+0xb/0x10 [ 402.529577][ T6130] __traceiter_sched_switch+0x85/0xc0 [ 402.534782][ T6130] __schedule+0x134b/0x1590 [ 402.539127][ T6130] ? release_firmware_map_entry+0x190/0x190 [ 402.544852][ T6130] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 402.550493][ T6130] ? try_to_wake_up+0x697/0x1160 [ 402.555267][ T6130] ? preempt_schedule+0xd9/0xe0 [ 402.559955][ T6130] preempt_schedule_common+0x9b/0xf0 [ 402.565073][ T6130] preempt_schedule+0xd9/0xe0 [ 402.569588][ T6130] ? schedule_preempt_disabled+0x20/0x20 [ 402.575055][ T6130] ? __kasan_check_write+0x14/0x20 [ 402.580002][ T6130] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 402.585297][ T6130] ? _raw_spin_lock+0x1b0/0x1b0 [ 402.589986][ T6130] ? _raw_spin_lock+0x1b0/0x1b0 [ 402.594670][ T6130] preempt_schedule_thunk+0x16/0x18 [ 402.599707][ T6130] _raw_spin_unlock_irqrestore+0x71/0x80 [ 402.605177][ T6130] kthread_queue_work+0xb4/0xe0 [ 402.609857][ T6130] synchronize_rcu_expedited+0x3e1/0x600 [ 402.615327][ T6130] ? synchronize_rcu+0x120/0x120 [ 402.620104][ T6130] ? ____kasan_kmalloc+0xed/0x110 [ 402.624960][ T6130] ? ____kasan_kmalloc+0xdb/0x110 [ 402.629821][ T6130] ? __kasan_kmalloc+0x9/0x10 [ 402.634336][ T6130] ? __kmalloc+0x13a/0x270 [ 402.638587][ T6130] ? bpf_map_area_alloc+0x4c/0xf0 [ 402.643449][ T6130] ? sock_map_alloc+0x1f7/0x310 [ 402.648133][ T6130] ? map_create+0x411/0x2050 [ 402.652564][ T6130] ? rcu_exp_handler+0x360/0x360 [ 402.657338][ T6130] ? io_schedule+0x120/0x120 [ 402.661762][ T6130] synchronize_rcu+0x88/0x120 [ 402.666274][ T6130] ? schedule_delayed_monitor_work+0x160/0x160 [ 402.672262][ T6130] ? __fget_files+0x31e/0x380 [ 402.676777][ T6130] ? __kasan_kmalloc+0x9/0x10 [ 402.681292][ T6130] sock_map_free+0x241/0x2b0 [ 402.685718][ T6130] map_create+0x1a3a/0x2050 [ 402.690059][ T6130] __sys_bpf+0x296/0x760 [ 402.694135][ T6130] ? fput_many+0x160/0x1b0 [ 402.698386][ T6130] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 402.703598][ T6130] ? debug_smp_processor_id+0x17/0x20 [ 402.708800][ T6130] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 402.714704][ T6130] __x64_sys_bpf+0x7c/0x90 [ 402.718959][ T6130] x64_sys_call+0x87f/0x9a0 [ 402.723297][ T6130] do_syscall_64+0x3b/0xb0 [ 402.727549][ T6130] ? clear_bhb_loop+0x35/0x90 [ 402.732068][ T6130] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 402.737791][ T6130] RIP: 0033:0x7f97a07f7819 [ 402.742047][ T6130] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 402.761485][ T6130] RSP: 002b:00007f979ee70038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 402.769731][ T6130] RAX: ffffffffffffffda RBX: 00007f97a09aefa0 RCX: 00007f97a07f7819 [ 402.777542][ T6130] RDX: 0000000000000050 RSI: 0000000020000200 RDI: 0000000000000000 [ 402.785354][ T6130] RBP: 00007f979ee70090 R08: 0000000000000000 R09: 0000000000000000 [ 402.793166][ T6130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 402.800975][ T6130] R13: 0000000000000000 R14: 00007f97a09aefa0 R15: 00007ffe4f080c98 [ 402.808793][ T6130] [ 406.905397][ T6202] device wg2 entered promiscuous mode [ 406.921096][ T6217] device veth1_macvtap entered promiscuous mode [ 406.929534][ T6217] device macsec0 entered promiscuous mode [ 406.955511][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 407.074031][ T30] audit: type=1400 audit(1732332443.851:155): avc: denied { append } for pid=6228 comm="syz.0.1779" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 407.446456][ T30] audit: type=1400 audit(1732332443.901:156): avc: denied { write } for pid=6226 comm="syz.3.1780" name="cgroup.subtree_control" dev="cgroup2" ino=309 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 407.776946][ T30] audit: type=1400 audit(1732332443.911:157): avc: denied { open } for pid=6226 comm="syz.3.1780" path="" dev="cgroup2" ino=309 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 408.109178][ T30] audit: type=1400 audit(1732332444.231:158): avc: denied { read } for pid=6226 comm="syz.3.1780" name="cgroup.subtree_control" dev="cgroup2" ino=309 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 425.589266][ T6476] device sit0 left promiscuous mode [ 429.505758][ T6535] device pim6reg1 entered promiscuous mode [ 432.155550][ T6563] bridge0: port 3(veth0_to_batadv) entered blocking state [ 432.186998][ T6563] bridge0: port 3(veth0_to_batadv) entered disabled state [ 432.298481][ T6563] device veth0_to_batadv entered promiscuous mode [ 432.326912][ T6563] bridge0: port 3(veth0_to_batadv) entered blocking state [ 432.335572][ T6563] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 438.224673][ T6653] device syzkaller0 entered promiscuous mode [ 439.991383][ T6691] device sit0 left promiscuous mode [ 442.633883][ T6725] device syzkaller0 entered promiscuous mode [ 444.417418][ T6760] ip6_vti0: mtu greater than device maximum [ 445.959612][ T6792] ÿÿÿÿÿÿ: renamed from vlan1 [ 446.139638][ T6797] ip6_vti0: mtu greater than device maximum [ 447.361273][ T6817] device sit0 entered promiscuous mode [ 449.261739][ T6843] device veth1_macvtap left promiscuous mode [ 449.279665][ T6843] device macsec0 left promiscuous mode [ 452.706357][ T6905] ip6_vti0: mtu greater than device maximum [ 455.637441][ T6952] ip6_vti0: mtu greater than device maximum [ 458.287801][ T6998] ip6_vti0: mtu greater than device maximum [ 459.186705][ T7003] device pim6reg1 entered promiscuous mode [ 460.627141][ T7019] : renamed from ipvlan1 [ 461.829911][ T7037] ip6_vti0: mtu greater than device maximum [ 465.690495][ T7122] device syzkaller0 entered promiscuous mode [ 474.797037][ T7252] ip6_vti0: mtu greater than device maximum [ 475.543782][ T7281] ip6_vti0: mtu greater than device maximum [ 476.421025][ T7311] ip6_vti0: mtu greater than device maximum [ 479.517645][ T7351] ip6_vti0: mtu greater than device maximum [ 481.215549][ T7369] nr0: tun_chr_ioctl cmd 1074025677 [ 481.245818][ T7369] nr0: linktype set to 823 [ 482.277071][ T7384] ip6_vti0: mtu greater than device maximum [ 486.290349][ T7433] ip6_vti0: mtu greater than device maximum [ 502.435031][ T7578] device bridge_slave_1 left promiscuous mode [ 502.609762][ T7578] bridge0: port 2(bridge_slave_1) entered disabled state [ 502.778089][ T7578] device bridge_slave_0 left promiscuous mode [ 502.859391][ T7578] bridge0: port 1(bridge_slave_0) entered disabled state [ 522.470262][ T7816] device syzkaller0 entered promiscuous mode [ 522.593390][ T7817] device syzkaller0 left promiscuous mode [ 539.337411][ T7951] FAULT_INJECTION: forcing a failure. [ 539.337411][ T7951] name failslab, interval 1, probability 0, space 0, times 0 [ 539.436569][ T7951] CPU: 1 PID: 7951 Comm: syz.0.2301 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 539.446290][ T7951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 539.456187][ T7951] Call Trace: [ 539.459307][ T7951] [ 539.462085][ T7951] dump_stack_lvl+0x151/0x1c0 [ 539.466599][ T7951] ? io_uring_drop_tctx_refs+0x190/0x190 [ 539.472068][ T7951] dump_stack+0x15/0x20 [ 539.476058][ T7951] should_fail+0x3c6/0x510 [ 539.480309][ T7951] __should_failslab+0xa4/0xe0 [ 539.484909][ T7951] should_failslab+0x9/0x20 [ 539.489248][ T7951] slab_pre_alloc_hook+0x37/0xd0 [ 539.494021][ T7951] ? tipc_msg_create+0x4c/0x530 [ 539.498711][ T7951] __kmalloc_track_caller+0x6c/0x260 [ 539.503834][ T7951] ? tipc_msg_create+0x4c/0x530 [ 539.508516][ T7951] ? tipc_msg_create+0x4c/0x530 [ 539.513205][ T7951] __alloc_skb+0x10c/0x550 [ 539.517456][ T7951] tipc_msg_create+0x4c/0x530 [ 539.521971][ T7951] tipc_sk_send_ack+0x119/0x630 [ 539.526657][ T7951] ? tsk_advance_rx_queue+0x10a/0x260 [ 539.531868][ T7951] tipc_recvmsg+0xc88/0x13b0 [ 539.536296][ T7951] ? tipc_send_packet+0xa0/0xa0 [ 539.540978][ T7951] ? do_sys_openat2+0x1fc/0x820 [ 539.545667][ T7951] ? security_socket_recvmsg+0x87/0xb0 [ 539.550960][ T7951] ? tipc_send_packet+0xa0/0xa0 [ 539.555647][ T7951] ____sys_recvmsg+0x286/0x530 [ 539.560247][ T7951] ? __sys_recvmsg_sock+0x50/0x50 [ 539.565108][ T7951] ? import_iovec+0xe5/0x120 [ 539.569538][ T7951] ___sys_recvmsg+0x1ec/0x690 [ 539.574048][ T7951] ? __sys_recvmsg+0x260/0x260 [ 539.578652][ T7951] ? __fdget+0x1bc/0x240 [ 539.582727][ T7951] __x64_sys_recvmsg+0x1dc/0x2b0 [ 539.587500][ T7951] ? ___sys_recvmsg+0x690/0x690 [ 539.592189][ T7951] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 539.598089][ T7951] ? exit_to_user_mode_prepare+0x39/0xa0 [ 539.603556][ T7951] x64_sys_call+0x171/0x9a0 [ 539.607894][ T7951] do_syscall_64+0x3b/0xb0 [ 539.612147][ T7951] ? clear_bhb_loop+0x35/0x90 [ 539.616660][ T7951] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 539.622389][ T7951] RIP: 0033:0x7f99132c3819 [ 539.626650][ T7951] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 539.646085][ T7951] RSP: 002b:00007f991193c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 539.654331][ T7951] RAX: ffffffffffffffda RBX: 00007f991347afa0 RCX: 00007f99132c3819 [ 539.662141][ T7951] RDX: 0000000000000000 RSI: 0000000020001380 RDI: 0000000000000005 [ 539.669952][ T7951] RBP: 00007f991193c090 R08: 0000000000000000 R09: 0000000000000000 [ 539.677759][ T7951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 539.685574][ T7951] R13: 0000000000000000 R14: 00007f991347afa0 R15: 00007ffde5a744b8 [ 539.693391][ T7951] [ 543.032757][ T6329] device bridge_slave_1 left promiscuous mode [ 543.038880][ T6329] bridge0: port 2(bridge_slave_1) entered disabled state [ 543.285611][ T6329] device bridge_slave_0 left promiscuous mode [ 543.383312][ T6329] bridge0: port 1(bridge_slave_0) entered disabled state [ 543.725451][ T7975] bridge0: port 1(bridge_slave_0) entered blocking state [ 543.963980][ T7975] bridge0: port 1(bridge_slave_0) entered disabled state [ 544.202632][ T7975] device bridge_slave_0 entered promiscuous mode [ 544.398211][ T7975] bridge0: port 2(bridge_slave_1) entered blocking state [ 544.405065][ T7975] bridge0: port 2(bridge_slave_1) entered disabled state [ 544.472319][ T7975] device bridge_slave_1 entered promiscuous mode [ 545.258348][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 545.265709][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 545.275689][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 545.284179][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 545.292571][ T6329] bridge0: port 1(bridge_slave_0) entered blocking state [ 545.299427][ T6329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 545.414864][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 545.577121][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 545.585307][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 545.766936][ T6329] bridge0: port 2(bridge_slave_1) entered blocking state [ 545.773812][ T6329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 545.885490][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 545.894387][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 546.053732][ T7975] device veth0_vlan entered promiscuous mode [ 546.245425][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 546.315508][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 546.432680][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 546.511407][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 546.648790][ T7975] device veth1_macvtap entered promiscuous mode [ 546.746836][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 546.766936][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 546.816915][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 546.908360][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 546.916665][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 547.009168][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 547.110101][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 547.226150][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 547.362261][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 554.649805][ T8146] FAULT_INJECTION: forcing a failure. [ 554.649805][ T8146] name failslab, interval 1, probability 0, space 0, times 0 [ 554.662265][ T8146] CPU: 0 PID: 8146 Comm: syz.5.2362 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 554.671952][ T8146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 554.681848][ T8146] Call Trace: [ 554.684974][ T8146] [ 554.687750][ T8146] dump_stack_lvl+0x151/0x1c0 [ 554.692262][ T8146] ? io_uring_drop_tctx_refs+0x190/0x190 [ 554.697728][ T8146] ? arch_stack_walk+0x101/0x140 [ 554.702505][ T8146] dump_stack+0x15/0x20 [ 554.706496][ T8146] should_fail+0x3c6/0x510 [ 554.710748][ T8146] __should_failslab+0xa4/0xe0 [ 554.715350][ T8146] ? dst_alloc+0x164/0x1e0 [ 554.719600][ T8146] should_failslab+0x9/0x20 [ 554.723939][ T8146] slab_pre_alloc_hook+0x37/0xd0 [ 554.728714][ T8146] ? dst_alloc+0x164/0x1e0 [ 554.732970][ T8146] kmem_cache_alloc+0x44/0x200 [ 554.737566][ T8146] ? ipv6_sysctl_rtcache_flush+0xf0/0xf0 [ 554.743035][ T8146] dst_alloc+0x164/0x1e0 [ 554.747118][ T8146] ip6_pol_route+0xc2a/0x14b0 [ 554.751630][ T8146] ? sock_alloc_send_pskb+0x915/0xa50 [ 554.756840][ T8146] ? fib6_table_lookup+0xaf0/0xaf0 [ 554.761783][ T8146] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 554.767079][ T8146] ? _raw_spin_unlock+0x4d/0x70 [ 554.771767][ T8146] ip6_pol_route_input+0x55/0x80 [ 554.776537][ T8146] fib6_rule_lookup+0x25a/0x620 [ 554.781224][ T8146] ? fault_around_bytes_set+0xc0/0xc0 [ 554.786431][ T8146] ? ip6_route_input_lookup+0xd0/0xd0 [ 554.791639][ T8146] ? fib6_lookup+0x3f0/0x3f0 [ 554.796064][ T8146] ? __local_bh_enable_ip+0x58/0x80 [ 554.801099][ T8146] ? local_bh_enable+0x1f/0x30 [ 554.805699][ T8146] ? ip6t_do_table+0x1662/0x1850 [ 554.810475][ T8146] ? ip6_route_input+0x245/0xb60 [ 554.815247][ T8146] ? __ipv6_addr_type+0x15e/0x2f0 [ 554.820111][ T8146] ip6_route_input+0x724/0xb60 [ 554.824712][ T8146] ? ip6_multipath_l3_keys+0x610/0x610 [ 554.830007][ T8146] ? sk_setup_caps+0x430/0x430 [ 554.834601][ T8146] ip6_rcv_finish+0x150/0x350 [ 554.839116][ T8146] ipv6_rcv+0xeb/0x270 [ 554.843019][ T8146] ? ip6_rcv_finish+0x350/0x350 [ 554.847710][ T8146] ? refcount_add+0x80/0x80 [ 554.852049][ T8146] ? ip6_rcv_finish+0x350/0x350 [ 554.856733][ T8146] __netif_receive_skb+0x1c6/0x530 [ 554.861681][ T8146] ? deliver_ptype_list_skb+0x3b0/0x3b0 [ 554.867064][ T8146] ? _copy_from_iter+0x1b1/0xdc0 [ 554.871857][ T8146] netif_receive_skb+0xb0/0x480 [ 554.876519][ T8146] ? _copy_from_iter+0x34d/0xdc0 [ 554.881294][ T8146] ? netif_receive_skb_core+0x210/0x210 [ 554.886677][ T8146] tun_rx_batched+0x6d9/0x870 [ 554.891189][ T8146] ? eth_type_trans+0x2e4/0x620 [ 554.895876][ T8146] ? local_bh_enable+0x30/0x30 [ 554.900475][ T8146] tun_get_user+0x2cb7/0x3aa0 [ 554.904992][ T8146] ? _kstrtoull+0x3a0/0x4a0 [ 554.909329][ T8146] ? tun_do_read+0x2010/0x2010 [ 554.913927][ T8146] ? kstrtouint_from_user+0x20a/0x2a0 [ 554.919135][ T8146] ? kstrtol_from_user+0x310/0x310 [ 554.924084][ T8146] ? avc_policy_seqno+0x1b/0x70 [ 554.928770][ T8146] ? selinux_file_permission+0x2c4/0x570 [ 554.934237][ T8146] tun_chr_write_iter+0x1e1/0x2e0 [ 554.939098][ T8146] vfs_write+0xd5d/0x1110 [ 554.943261][ T8146] ? __traceiter_kmem_cache_free+0x32/0x50 [ 554.948906][ T8146] ? file_end_write+0x1c0/0x1c0 [ 554.953593][ T8146] ? __fdget_pos+0x209/0x3a0 [ 554.958017][ T8146] ? ksys_write+0x77/0x2c0 [ 554.962274][ T8146] ksys_write+0x199/0x2c0 [ 554.966439][ T8146] ? __ia32_sys_read+0x90/0x90 [ 554.971037][ T8146] ? debug_smp_processor_id+0x17/0x20 [ 554.976243][ T8146] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 554.982147][ T8146] __x64_sys_write+0x7b/0x90 [ 554.986575][ T8146] x64_sys_call+0x2f/0x9a0 [ 554.990825][ T8146] do_syscall_64+0x3b/0xb0 [ 554.995076][ T8146] ? clear_bhb_loop+0x35/0x90 [ 554.999593][ T8146] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 555.005320][ T8146] RIP: 0033:0x7f2a3cfe3819 [ 555.009573][ T8146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 555.029015][ T8146] RSP: 002b:00007f2a3b65c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 555.037257][ T8146] RAX: ffffffffffffffda RBX: 00007f2a3d19afa0 RCX: 00007f2a3cfe3819 [ 555.045070][ T8146] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 555.052881][ T8146] RBP: 00007f2a3b65c090 R08: 0000000000000000 R09: 0000000000000000 [ 555.060692][ T8146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 555.068504][ T8146] R13: 0000000000000000 R14: 00007f2a3d19afa0 R15: 00007ffe430e0c58 [ 555.076319][ T8146] [ 557.203472][ T8166] ip6_vti0: mtu greater than device maximum [ 557.387862][ T30] audit: type=1400 audit(1732332594.171:159): avc: denied { unlink } for pid=83 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 565.288928][ T30] audit: type=1400 audit(1732332602.061:160): avc: denied { create } for pid=8294 comm="syz.3.2408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 566.044522][ T8312] FAULT_INJECTION: forcing a failure. [ 566.044522][ T8312] name failslab, interval 1, probability 0, space 0, times 0 [ 566.145394][ T8312] CPU: 0 PID: 8312 Comm: syz.2.2414 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 566.155121][ T8312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 566.165012][ T8312] Call Trace: [ 566.168137][ T8312] [ 566.170919][ T8312] dump_stack_lvl+0x151/0x1c0 [ 566.175428][ T8312] ? io_uring_drop_tctx_refs+0x190/0x190 [ 566.180898][ T8312] dump_stack+0x15/0x20 [ 566.184886][ T8312] should_fail+0x3c6/0x510 [ 566.189145][ T8312] __should_failslab+0xa4/0xe0 [ 566.193739][ T8312] should_failslab+0x9/0x20 [ 566.198080][ T8312] slab_pre_alloc_hook+0x37/0xd0 [ 566.202854][ T8312] __kmalloc+0x6d/0x270 [ 566.206848][ T8312] ? kvmalloc_node+0x1f0/0x4d0 [ 566.211447][ T8312] kvmalloc_node+0x1f0/0x4d0 [ 566.215873][ T8312] ? vm_mmap+0xb0/0xb0 [ 566.219779][ T8312] ? __kasan_check_write+0x14/0x20 [ 566.224724][ T8312] pfifo_fast_init+0x110/0x7a0 [ 566.229328][ T8312] qdisc_create_dflt+0x144/0x3e0 [ 566.234099][ T8312] mq_init+0x2c8/0x6b0 [ 566.238008][ T8312] ? local_bh_enable+0x30/0x30 [ 566.242604][ T8312] ? __kasan_check_write+0x14/0x20 [ 566.247553][ T8312] ? qdisc_alloc+0x5a1/0x770 [ 566.251978][ T8312] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 566.257622][ T8312] qdisc_create_dflt+0x144/0x3e0 [ 566.262392][ T8312] ? _raw_spin_lock+0xa4/0x1b0 [ 566.266993][ T8312] dev_activate+0x127/0x1140 [ 566.271422][ T8312] ? dev_set_rx_mode+0x245/0x2e0 [ 566.276204][ T8312] __dev_open+0x3bf/0x4e0 [ 566.280357][ T8312] ? dev_open+0x260/0x260 [ 566.284523][ T8312] ? _raw_spin_unlock_bh+0x51/0x60 [ 566.289469][ T8312] ? dev_set_rx_mode+0x245/0x2e0 [ 566.294245][ T8312] ? __kasan_check_read+0x11/0x20 [ 566.299108][ T8312] __dev_change_flags+0x1db/0x6e0 [ 566.303966][ T8312] ? dev_get_flags+0x1e0/0x1e0 [ 566.308566][ T8312] ? _kstrtoull+0x3a0/0x4a0 [ 566.312907][ T8312] dev_change_flags+0x8c/0x1a0 [ 566.317505][ T8312] dev_ifsioc+0x147/0x10c0 [ 566.321757][ T8312] ? dev_ioctl+0xe70/0xe70 [ 566.326010][ T8312] ? mutex_lock+0xb6/0x1e0 [ 566.330274][ T8312] ? wait_for_completion_killable_timeout+0x10/0x10 [ 566.336791][ T8312] dev_ioctl+0x54d/0xe70 [ 566.340865][ T8312] sock_do_ioctl+0x34f/0x5a0 [ 566.345290][ T8312] ? sock_show_fdinfo+0xa0/0xa0 [ 566.349978][ T8312] ? selinux_file_ioctl+0x3cc/0x540 [ 566.355011][ T8312] sock_ioctl+0x455/0x740 [ 566.359179][ T8312] ? sock_poll+0x400/0x400 [ 566.363431][ T8312] ? __fget_files+0x31e/0x380 [ 566.367946][ T8312] ? security_file_ioctl+0x84/0xb0 [ 566.372889][ T8312] ? sock_poll+0x400/0x400 [ 566.377142][ T8312] __se_sys_ioctl+0x114/0x190 [ 566.381657][ T8312] __x64_sys_ioctl+0x7b/0x90 [ 566.386082][ T8312] x64_sys_call+0x98/0x9a0 [ 566.390335][ T8312] do_syscall_64+0x3b/0xb0 [ 566.394589][ T8312] ? clear_bhb_loop+0x35/0x90 [ 566.399101][ T8312] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 566.404828][ T8312] RIP: 0033:0x7f3cb162a819 [ 566.409084][ T8312] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 566.428525][ T8312] RSP: 002b:00007f3cafca3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 566.436768][ T8312] RAX: ffffffffffffffda RBX: 00007f3cb17e1fa0 RCX: 00007f3cb162a819 [ 566.444580][ T8312] RDX: 0000000020002280 RSI: 0000000000008914 RDI: 0000000000000006 [ 566.452392][ T8312] RBP: 00007f3cafca3090 R08: 0000000000000000 R09: 0000000000000000 [ 566.460203][ T8312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 566.468014][ T8312] R13: 0000000000000000 R14: 00007f3cb17e1fa0 R15: 00007ffecb606b28 [ 566.475834][ T8312] [ 568.210344][ T8362] device syzkaller0 entered promiscuous mode [ 568.543700][ T8369] bond_slave_1: mtu greater than device maximum [ 569.938760][ T8390] device wg2 entered promiscuous mode [ 576.380287][ T8485] syz.3.2470[8485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 576.380364][ T8485] syz.3.2470[8485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 578.250760][ T8528] device veth0_vlan left promiscuous mode [ 578.467183][ T8528] device veth0_vlan entered promiscuous mode [ 578.498219][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 578.541307][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 578.648035][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 580.087873][ T8564] FAULT_INJECTION: forcing a failure. [ 580.087873][ T8564] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 580.345311][ T8564] CPU: 1 PID: 8564 Comm: syz.2.2495 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 580.355033][ T8564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 580.364925][ T8564] Call Trace: [ 580.368050][ T8564] [ 580.370831][ T8564] dump_stack_lvl+0x151/0x1c0 [ 580.375341][ T8564] ? io_uring_drop_tctx_refs+0x190/0x190 [ 580.380810][ T8564] dump_stack+0x15/0x20 [ 580.384800][ T8564] should_fail+0x3c6/0x510 [ 580.389057][ T8564] should_fail_usercopy+0x1a/0x20 [ 580.393913][ T8564] _copy_from_user+0x20/0xd0 [ 580.398341][ T8564] __sys_bpf+0x1e9/0x760 [ 580.402418][ T8564] ? fput_many+0x160/0x1b0 [ 580.406674][ T8564] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 580.411883][ T8564] ? debug_smp_processor_id+0x17/0x20 [ 580.417086][ T8564] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 580.422992][ T8564] __x64_sys_bpf+0x7c/0x90 [ 580.427242][ T8564] x64_sys_call+0x87f/0x9a0 [ 580.431583][ T8564] do_syscall_64+0x3b/0xb0 [ 580.435835][ T8564] ? clear_bhb_loop+0x35/0x90 [ 580.440348][ T8564] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 580.446079][ T8564] RIP: 0033:0x7f3cb162a819 [ 580.450332][ T8564] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 580.469771][ T8564] RSP: 002b:00007f3cafca3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 580.478016][ T8564] RAX: ffffffffffffffda RBX: 00007f3cb17e1fa0 RCX: 00007f3cb162a819 [ 580.485826][ T8564] RDX: 0000000000000048 RSI: 0000000020000200 RDI: 0000000000000005 [ 580.493638][ T8564] RBP: 00007f3cafca3090 R08: 0000000000000000 R09: 0000000000000000 [ 580.501450][ T8564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 580.509261][ T8564] R13: 0000000000000001 R14: 00007f3cb17e1fa0 R15: 00007ffecb606b28 [ 580.517082][ T8564] [ 580.910865][ T8577] device pim6reg1 entered promiscuous mode [ 585.496249][ T8657] FAULT_INJECTION: forcing a failure. [ 585.496249][ T8657] name failslab, interval 1, probability 0, space 0, times 0 [ 585.521933][ T8657] CPU: 1 PID: 8657 Comm: syz.4.2521 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 585.531656][ T8657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 585.541547][ T8657] Call Trace: [ 585.544670][ T8657] [ 585.547450][ T8657] dump_stack_lvl+0x151/0x1c0 [ 585.551962][ T8657] ? io_uring_drop_tctx_refs+0x190/0x190 [ 585.557435][ T8657] dump_stack+0x15/0x20 [ 585.561421][ T8657] should_fail+0x3c6/0x510 [ 585.565675][ T8657] __should_failslab+0xa4/0xe0 [ 585.570277][ T8657] should_failslab+0x9/0x20 [ 585.574615][ T8657] slab_pre_alloc_hook+0x37/0xd0 [ 585.579388][ T8657] __kmalloc+0x6d/0x270 [ 585.583379][ T8657] ? kvmalloc_node+0x1f0/0x4d0 [ 585.587983][ T8657] kvmalloc_node+0x1f0/0x4d0 [ 585.592407][ T8657] ? vm_mmap+0xb0/0xb0 [ 585.596315][ T8657] ? __kasan_check_write+0x14/0x20 [ 585.601263][ T8657] pfifo_fast_init+0x110/0x7a0 [ 585.605862][ T8657] qdisc_create_dflt+0x144/0x3e0 [ 585.610635][ T8657] mq_init+0x2c8/0x6b0 [ 585.614541][ T8657] ? local_bh_enable+0x30/0x30 [ 585.619140][ T8657] ? __kasan_check_write+0x14/0x20 [ 585.624100][ T8657] ? qdisc_alloc+0x5a1/0x770 [ 585.628511][ T8657] qdisc_create_dflt+0x144/0x3e0 [ 585.633284][ T8657] ? _raw_spin_lock+0xa4/0x1b0 [ 585.637889][ T8657] dev_activate+0x127/0x1140 [ 585.642311][ T8657] ? dev_set_rx_mode+0x245/0x2e0 [ 585.647084][ T8657] __dev_open+0x3bf/0x4e0 [ 585.651249][ T8657] ? dev_open+0x260/0x260 [ 585.655415][ T8657] ? _raw_spin_unlock_bh+0x51/0x60 [ 585.660362][ T8657] ? dev_set_rx_mode+0x245/0x2e0 [ 585.665136][ T8657] ? __kasan_check_read+0x11/0x20 [ 585.670000][ T8657] __dev_change_flags+0x1db/0x6e0 [ 585.674858][ T8657] ? dev_get_flags+0x1e0/0x1e0 [ 585.679459][ T8657] ? _kstrtoull+0x3a0/0x4a0 [ 585.683802][ T8657] dev_change_flags+0x8c/0x1a0 [ 585.688399][ T8657] dev_ifsioc+0x147/0x10c0 [ 585.692652][ T8657] ? dev_ioctl+0xe70/0xe70 [ 585.696902][ T8657] ? mutex_lock+0xb6/0x1e0 [ 585.701156][ T8657] ? wait_for_completion_killable_timeout+0x10/0x10 [ 585.707580][ T8657] dev_ioctl+0x54d/0xe70 [ 585.711659][ T8657] sock_do_ioctl+0x34f/0x5a0 [ 585.716085][ T8657] ? sock_show_fdinfo+0xa0/0xa0 [ 585.720773][ T8657] ? selinux_file_ioctl+0x3cc/0x540 [ 585.725804][ T8657] sock_ioctl+0x455/0x740 [ 585.729972][ T8657] ? sock_poll+0x400/0x400 [ 585.734225][ T8657] ? __fget_files+0x31e/0x380 [ 585.738739][ T8657] ? security_file_ioctl+0x84/0xb0 [ 585.743684][ T8657] ? sock_poll+0x400/0x400 [ 585.747938][ T8657] __se_sys_ioctl+0x114/0x190 [ 585.752450][ T8657] __x64_sys_ioctl+0x7b/0x90 [ 585.756876][ T8657] x64_sys_call+0x98/0x9a0 [ 585.761129][ T8657] do_syscall_64+0x3b/0xb0 [ 585.765381][ T8657] ? clear_bhb_loop+0x35/0x90 [ 585.769896][ T8657] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 585.775621][ T8657] RIP: 0033:0x7f97a07f7819 [ 585.779881][ T8657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 585.799322][ T8657] RSP: 002b:00007f979ee70038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 585.807562][ T8657] RAX: ffffffffffffffda RBX: 00007f97a09aefa0 RCX: 00007f97a07f7819 [ 585.815375][ T8657] RDX: 0000000020002280 RSI: 0000000000008914 RDI: 0000000000000006 [ 585.823185][ T8657] RBP: 00007f979ee70090 R08: 0000000000000000 R09: 0000000000000000 [ 585.830997][ T8657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 585.838807][ T8657] R13: 0000000000000000 R14: 00007f97a09aefa0 R15: 00007ffe4f080c98 [ 585.846625][ T8657] [ 586.012831][ T8664] device pim6reg1 entered promiscuous mode [ 600.126587][ T8874] device veth0_to_batadv left promiscuous mode [ 600.227656][ T8874] bridge0: port 4(veth0_to_batadv) entered disabled state [ 602.937963][ T8902] device syzkaller0 entered promiscuous mode [ 604.325615][ T8922] device pim6reg1 entered promiscuous mode [ 611.653526][ T331] device veth0 left promiscuous mode [ 611.662825][ T331] bridge0: port 3(veth0) entered disabled state [ 611.700406][ T331] device bridge_slave_1 left promiscuous mode [ 611.708880][ T331] bridge0: port 2(bridge_slave_1) entered disabled state [ 611.897769][ T331] device bridge_slave_0 left promiscuous mode [ 611.945459][ T331] bridge0: port 1(bridge_slave_0) entered disabled state [ 612.547167][ T9040] bridge0: port 1(bridge_slave_0) entered blocking state [ 612.594834][ T9040] bridge0: port 1(bridge_slave_0) entered disabled state [ 612.674691][ T9040] device bridge_slave_0 entered promiscuous mode [ 612.777283][ T9040] bridge0: port 2(bridge_slave_1) entered blocking state [ 612.784133][ T9040] bridge0: port 2(bridge_slave_1) entered disabled state [ 612.921236][ T9040] device bridge_slave_1 entered promiscuous mode [ 614.109740][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 614.138425][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 614.225878][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 614.345498][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 614.503289][ T929] bridge0: port 1(bridge_slave_0) entered blocking state [ 614.510183][ T929] bridge0: port 1(bridge_slave_0) entered forwarding state [ 614.802436][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 614.863057][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 614.917067][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 615.118016][ T929] bridge0: port 2(bridge_slave_1) entered blocking state [ 615.124874][ T929] bridge0: port 2(bridge_slave_1) entered forwarding state [ 615.455745][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 615.496770][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 615.616946][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 615.708209][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 615.762195][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 615.891747][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 615.933899][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 615.957175][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 616.018876][ T9040] device veth0_vlan entered promiscuous mode [ 616.037297][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 616.068493][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 616.126553][ T9125] ip6_vti0: mtu greater than device maximum [ 616.159270][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 616.201414][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 616.328574][ T9040] device veth1_macvtap entered promiscuous mode [ 616.473901][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 616.567057][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 616.722843][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 616.901269][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 617.033036][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 635.867361][ T9305] FAULT_INJECTION: forcing a failure. [ 635.867361][ T9305] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 636.035568][ T9305] CPU: 1 PID: 9305 Comm: syz.0.2710 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 636.045295][ T9305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 636.055184][ T9305] Call Trace: [ 636.058303][ T9305] [ 636.061084][ T9305] dump_stack_lvl+0x151/0x1c0 [ 636.065595][ T9305] ? io_uring_drop_tctx_refs+0x190/0x190 [ 636.071065][ T9305] dump_stack+0x15/0x20 [ 636.075054][ T9305] should_fail+0x3c6/0x510 [ 636.079312][ T9305] should_fail_usercopy+0x1a/0x20 [ 636.084174][ T9305] _copy_from_user+0x20/0xd0 [ 636.088595][ T9305] __sys_bpf+0x1e9/0x760 [ 636.092673][ T9305] ? fput_many+0x160/0x1b0 [ 636.096927][ T9305] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 636.102139][ T9305] ? debug_smp_processor_id+0x17/0x20 [ 636.107340][ T9305] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 636.113244][ T9305] __x64_sys_bpf+0x7c/0x90 [ 636.117500][ T9305] x64_sys_call+0x87f/0x9a0 [ 636.121834][ T9305] do_syscall_64+0x3b/0xb0 [ 636.126089][ T9305] ? clear_bhb_loop+0x35/0x90 [ 636.130600][ T9305] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 636.136331][ T9305] RIP: 0033:0x7f99132c3819 [ 636.140614][ T9305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 636.160027][ T9305] RSP: 002b:00007f991193c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 636.168270][ T9305] RAX: ffffffffffffffda RBX: 00007f991347afa0 RCX: 00007f99132c3819 [ 636.176080][ T9305] RDX: 0000000000000020 RSI: 00000000200000c0 RDI: 0000000000000005 [ 636.183891][ T9305] RBP: 00007f991193c090 R08: 0000000000000000 R09: 0000000000000000 [ 636.191705][ T9305] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 636.199518][ T9305] R13: 0000000000000000 R14: 00007f991347afa0 R15: 00007ffde5a744b8 [ 636.207330][ T9305] [ 653.176990][ T9367] bridge0: port 1(bridge_slave_0) entered blocking state [ 653.183846][ T9367] bridge0: port 1(bridge_slave_0) entered disabled state [ 653.579133][ T9367] device bridge_slave_0 entered promiscuous mode [ 653.655542][ T9367] bridge0: port 2(bridge_slave_1) entered blocking state [ 653.662475][ T9367] bridge0: port 2(bridge_slave_1) entered disabled state [ 653.669667][ T9367] device bridge_slave_1 entered promiscuous mode [ 655.290826][ T6329] device veth0_to_batadv left promiscuous mode [ 655.316517][ T6329] bridge0: port 3(veth0_to_batadv) entered disabled state [ 655.404826][ T6329] device bridge_slave_1 left promiscuous mode [ 655.486464][ T6329] bridge0: port 2(bridge_slave_1) entered disabled state [ 655.613348][ T6329] device bridge_slave_0 left promiscuous mode [ 655.670307][ T6329] bridge0: port 1(bridge_slave_0) entered disabled state [ 655.678660][ T6329] device veth1_macvtap left promiscuous mode [ 655.684480][ T6329] device veth0_vlan left promiscuous mode [ 656.468054][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 656.475335][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 656.926707][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 656.959334][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 657.054707][ T331] bridge0: port 1(bridge_slave_0) entered blocking state [ 657.061596][ T331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 657.068818][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 657.077138][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 657.085111][ T331] bridge0: port 2(bridge_slave_1) entered blocking state [ 657.091961][ T331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 657.099359][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 657.107812][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 657.115651][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 657.123791][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 657.131808][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 657.211135][ T9367] device veth0_vlan entered promiscuous mode [ 657.222889][ T9367] device veth1_macvtap entered promiscuous mode [ 657.242203][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 657.259462][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 657.267881][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 657.275604][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 657.283819][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 657.292127][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 657.357733][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 657.468898][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 657.546640][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 657.800347][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 657.896970][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 658.160410][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 658.169011][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 659.072220][ T9415] device pim6reg1 entered promiscuous mode [ 674.890870][ T9561] ip6_vti0: mtu greater than device maximum [ 675.904477][ T9576] ip6_vti0: mtu greater than device maximum [ 684.310909][ T9775] bond_slave_1: mtu less than device minimum [ 685.009501][ T9798] FAULT_INJECTION: forcing a failure. [ 685.009501][ T9798] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 685.145050][ T9798] CPU: 0 PID: 9798 Comm: syz.4.2860 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 685.154776][ T9798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 685.164669][ T9798] Call Trace: [ 685.167792][ T9798] [ 685.170574][ T9798] dump_stack_lvl+0x151/0x1c0 [ 685.175082][ T9798] ? io_uring_drop_tctx_refs+0x190/0x190 [ 685.180560][ T9798] dump_stack+0x15/0x20 [ 685.184542][ T9798] should_fail+0x3c6/0x510 [ 685.188797][ T9798] should_fail_usercopy+0x1a/0x20 [ 685.193656][ T9798] _copy_from_user+0x20/0xd0 [ 685.198082][ T9798] __sys_bpf+0x1e9/0x760 [ 685.202160][ T9798] ? fput_many+0x160/0x1b0 [ 685.206419][ T9798] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 685.211626][ T9798] ? debug_smp_processor_id+0x17/0x20 [ 685.216831][ T9798] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 685.222736][ T9798] __x64_sys_bpf+0x7c/0x90 [ 685.226984][ T9798] x64_sys_call+0x87f/0x9a0 [ 685.231323][ T9798] do_syscall_64+0x3b/0xb0 [ 685.235576][ T9798] ? clear_bhb_loop+0x35/0x90 [ 685.240090][ T9798] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 685.245818][ T9798] RIP: 0033:0x7f97a07f7819 [ 685.250074][ T9798] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 685.269515][ T9798] RSP: 002b:00007f979ee70038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 685.277758][ T9798] RAX: ffffffffffffffda RBX: 00007f97a09aefa0 RCX: 00007f97a07f7819 [ 685.285568][ T9798] RDX: 0000000000000020 RSI: 00000000200000c0 RDI: 0000000000000005 [ 685.293379][ T9798] RBP: 00007f979ee70090 R08: 0000000000000000 R09: 0000000000000000 [ 685.301196][ T9798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 685.309006][ T9798] R13: 0000000000000000 R14: 00007f97a09aefa0 R15: 00007ffe4f080c98 [ 685.316822][ T9798] [ 689.868792][ T9855] device syzkaller0 entered promiscuous mode [ 695.279078][ T9939] FAULT_INJECTION: forcing a failure. [ 695.279078][ T9939] name failslab, interval 1, probability 0, space 0, times 0 [ 695.356822][ T9939] CPU: 0 PID: 9939 Comm: syz.3.2901 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 695.366546][ T9939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 695.376439][ T9939] Call Trace: [ 695.379562][ T9939] [ 695.382339][ T9939] dump_stack_lvl+0x151/0x1c0 [ 695.386853][ T9939] ? io_uring_drop_tctx_refs+0x190/0x190 [ 695.392321][ T9939] dump_stack+0x15/0x20 [ 695.396313][ T9939] should_fail+0x3c6/0x510 [ 695.400571][ T9939] __should_failslab+0xa4/0xe0 [ 695.405166][ T9939] should_failslab+0x9/0x20 [ 695.409507][ T9939] slab_pre_alloc_hook+0x37/0xd0 [ 695.414278][ T9939] kmem_cache_alloc_trace+0x48/0x210 [ 695.419399][ T9939] ? __get_vm_area_node+0x117/0x360 [ 695.424433][ T9939] ? __kasan_slab_free+0x11/0x20 [ 695.429211][ T9939] __get_vm_area_node+0x117/0x360 [ 695.434071][ T9939] __vmalloc_node_range+0xe2/0x8d0 [ 695.439016][ T9939] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 695.444396][ T9939] ? selinux_capset+0xf0/0xf0 [ 695.448907][ T9939] ? kstrtouint_from_user+0x20a/0x2a0 [ 695.454117][ T9939] ? kstrtol_from_user+0x310/0x310 [ 695.459066][ T9939] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 695.464445][ T9939] __vmalloc+0x7a/0x90 [ 695.468361][ T9939] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 695.473732][ T9939] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 695.478939][ T9939] ? bpf_prog_alloc+0x15/0x1e0 [ 695.483539][ T9939] bpf_prog_alloc+0x1f/0x1e0 [ 695.487970][ T9939] bpf_prog_load+0x800/0x1b50 [ 695.492480][ T9939] ? map_freeze+0x370/0x370 [ 695.496823][ T9939] ? selinux_bpf+0xcb/0x100 [ 695.501160][ T9939] ? security_bpf+0x82/0xb0 [ 695.505501][ T9939] __sys_bpf+0x4bc/0x760 [ 695.509577][ T9939] ? fput_many+0x160/0x1b0 [ 695.513831][ T9939] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 695.519044][ T9939] ? debug_smp_processor_id+0x17/0x20 [ 695.524247][ T9939] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 695.530151][ T9939] __x64_sys_bpf+0x7c/0x90 [ 695.534406][ T9939] x64_sys_call+0x87f/0x9a0 [ 695.538741][ T9939] do_syscall_64+0x3b/0xb0 [ 695.542990][ T9939] ? clear_bhb_loop+0x35/0x90 [ 695.547504][ T9939] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 695.553232][ T9939] RIP: 0033:0x7f9be466c819 [ 695.557572][ T9939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 695.577013][ T9939] RSP: 002b:00007f9be2ce5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 695.585259][ T9939] RAX: ffffffffffffffda RBX: 00007f9be4823fa0 RCX: 00007f9be466c819 [ 695.593068][ T9939] RDX: 0000000000000020 RSI: 00000000200000c0 RDI: 0000000000000005 [ 695.600882][ T9939] RBP: 00007f9be2ce5090 R08: 0000000000000000 R09: 0000000000000000 [ 695.608692][ T9939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 695.616504][ T9939] R13: 0000000000000000 R14: 00007f9be4823fa0 R15: 00007ffdc5851a88 [ 695.624320][ T9939] [ 695.716195][ T9939] syz.3.2901: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz3,mems_allowed=0 [ 695.735188][ T9939] CPU: 1 PID: 9939 Comm: syz.3.2901 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 695.744895][ T9939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 695.754794][ T9939] Call Trace: [ 695.757915][ T9939] [ 695.760690][ T9939] dump_stack_lvl+0x151/0x1c0 [ 695.765206][ T9939] ? io_uring_drop_tctx_refs+0x190/0x190 [ 695.770672][ T9939] ? pr_cont_kernfs_name+0xf0/0x100 [ 695.775707][ T9939] dump_stack+0x15/0x20 [ 695.779700][ T9939] warn_alloc+0x21a/0x390 [ 695.783865][ T9939] ? zone_watermark_ok_safe+0x270/0x270 [ 695.789248][ T9939] ? kmem_cache_alloc_trace+0x115/0x210 [ 695.794626][ T9939] ? __get_vm_area_node+0x117/0x360 [ 695.799661][ T9939] ? __get_vm_area_node+0x347/0x360 [ 695.804698][ T9939] __vmalloc_node_range+0x2c1/0x8d0 [ 695.809729][ T9939] ? selinux_capset+0xf0/0xf0 [ 695.814240][ T9939] ? kstrtouint_from_user+0x20a/0x2a0 [ 695.819451][ T9939] ? kstrtol_from_user+0x310/0x310 [ 695.824398][ T9939] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 695.829777][ T9939] __vmalloc+0x7a/0x90 [ 695.833686][ T9939] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 695.839065][ T9939] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 695.844271][ T9939] ? bpf_prog_alloc+0x15/0x1e0 [ 695.848876][ T9939] bpf_prog_alloc+0x1f/0x1e0 [ 695.853299][ T9939] bpf_prog_load+0x800/0x1b50 [ 695.857817][ T9939] ? map_freeze+0x370/0x370 [ 695.862154][ T9939] ? selinux_bpf+0xcb/0x100 [ 695.866494][ T9939] ? security_bpf+0x82/0xb0 [ 695.870834][ T9939] __sys_bpf+0x4bc/0x760 [ 695.874908][ T9939] ? fput_many+0x160/0x1b0 [ 695.879161][ T9939] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 695.884369][ T9939] ? debug_smp_processor_id+0x17/0x20 [ 695.889575][ T9939] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 695.895478][ T9939] __x64_sys_bpf+0x7c/0x90 [ 695.899731][ T9939] x64_sys_call+0x87f/0x9a0 [ 695.904072][ T9939] do_syscall_64+0x3b/0xb0 [ 695.908326][ T9939] ? clear_bhb_loop+0x35/0x90 [ 695.912838][ T9939] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 695.918564][ T9939] RIP: 0033:0x7f9be466c819 [ 695.922818][ T9939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 695.942260][ T9939] RSP: 002b:00007f9be2ce5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 695.950501][ T9939] RAX: ffffffffffffffda RBX: 00007f9be4823fa0 RCX: 00007f9be466c819 [ 695.958314][ T9939] RDX: 0000000000000020 RSI: 00000000200000c0 RDI: 0000000000000005 [ 695.966125][ T9939] RBP: 00007f9be2ce5090 R08: 0000000000000000 R09: 0000000000000000 [ 695.973936][ T9939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 695.981748][ T9939] R13: 0000000000000000 R14: 00007f9be4823fa0 R15: 00007ffdc5851a88 [ 695.989566][ T9939] [ 697.609771][ T9939] Mem-Info: [ 697.612761][ T9939] active_anon:102 inactive_anon:5205 isolated_anon:0 [ 697.612761][ T9939] active_file:21651 inactive_file:7214 isolated_file:0 [ 697.612761][ T9939] unevictable:0 dirty:172 writeback:0 [ 697.612761][ T9939] slab_reclaimable:7862 slab_unreclaimable:78305 [ 697.612761][ T9939] mapped:28999 shmem:230 pagetables:608 bounce:0 [ 697.612761][ T9939] kernel_misc_reclaimable:0 [ 697.612761][ T9939] free:1534419 free_pcp:22424 free_cma:0 [ 697.698362][ T9939] Node 0 active_anon:408kB inactive_anon:20820kB active_file:86604kB inactive_file:28856kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:115996kB dirty:688kB writeback:0kB shmem:920kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4312kB pagetables:2432kB all_unreclaimable? no [ 697.802123][ T9939] DMA32 free:2974676kB min:62568kB low:78208kB high:93848kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2978964kB mlocked:0kB bounce:0kB free_pcp:4288kB local_pcp:0kB free_cma:0kB [ 697.899712][ T9939] lowmem_reserve[]: 0 3941 3941 [ 697.904819][ T9939] Normal free:3163000kB min:84884kB low:106104kB high:127324kB reserved_highatomic:0KB active_anon:408kB inactive_anon:21020kB active_file:86612kB inactive_file:28856kB unevictable:0kB writepending:720kB present:5242880kB managed:4035584kB mlocked:0kB bounce:0kB free_pcp:84992kB local_pcp:52760kB free_cma:0kB [ 698.199270][ T9939] lowmem_reserve[]: 0 0 0 [ 698.246111][ T9939] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 723*4096kB (M) = 2974676kB [ 698.366488][ T9939] Normal: 1922*4kB (UM) 684*8kB (UM) 194*16kB (UME) 39*32kB (UM) 11*64kB (UM) 74*128kB (UM) 22*256kB (UM) 14*512kB (UME) 5*1024kB (U) 4*2048kB (UM) 759*4096kB (UM) = 3162664kB [ 698.586695][ T9939] 29097 total pagecache pages [ 698.591218][ T9939] 0 pages in swap cache [ 698.595184][ T9939] Swap cache stats: add 0, delete 0, find 0/0 [ 698.688036][ T9939] Free swap = 124996kB [ 698.692014][ T9939] Total swap = 124996kB [ 698.696006][ T9939] 2097051 pages RAM [ 698.700161][ T9939] 0 pages HighMem/MovableOnly [ 698.704701][ T9939] 343414 pages reserved [ 698.708855][ T9939] 0 pages cma reserved [ 698.733394][ T9964] device syzkaller0 entered promiscuous mode [ 704.780018][T10025] device veth1_macvtap left promiscuous mode [ 704.924858][T10028] device veth1_macvtap entered promiscuous mode [ 704.955765][T10028] device macsec0 entered promiscuous mode [ 705.609559][T10038] device veth0_vlan left promiscuous mode [ 705.759207][T10038] device veth0_vlan entered promiscuous mode [ 706.008517][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 706.064597][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 706.155038][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 714.394884][T10071] device syzkaller0 entered promiscuous mode [ 717.159005][T10112] device pim6reg1 entered promiscuous mode [ 720.041450][T10161] syz.2.2961[10161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 720.041522][T10161] syz.2.2961[10161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 723.803263][T10181] bridge0: port 1(bridge_slave_0) entered blocking state [ 723.821396][T10181] bridge0: port 1(bridge_slave_0) entered disabled state [ 723.829015][T10181] device bridge_slave_0 entered promiscuous mode [ 723.835854][T10181] bridge0: port 2(bridge_slave_1) entered blocking state [ 723.843279][T10181] bridge0: port 2(bridge_slave_1) entered disabled state [ 723.850681][T10181] device bridge_slave_1 entered promiscuous mode [ 724.401963][ T10] device veth0_vlan left promiscuous mode [ 725.684571][T10209] device wg2 entered promiscuous mode [ 726.096296][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 726.206954][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 726.390893][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 726.503982][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 726.570357][ T929] bridge0: port 1(bridge_slave_0) entered blocking state [ 726.577239][ T929] bridge0: port 1(bridge_slave_0) entered forwarding state [ 726.584444][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 726.598522][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 726.670475][ T929] bridge0: port 2(bridge_slave_1) entered blocking state [ 726.677359][ T929] bridge0: port 2(bridge_slave_1) entered forwarding state [ 726.731724][T10181] device veth0_vlan entered promiscuous mode [ 726.740479][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 726.747975][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 726.756017][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 726.763884][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 726.772190][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 726.780509][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 726.788756][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 726.797075][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 726.804824][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 726.841489][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 726.849074][ T929] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 726.884726][T10181] device veth1_macvtap entered promiscuous mode [ 726.907589][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 726.987304][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 727.164082][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 727.417833][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 727.615133][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 727.895335][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 728.036994][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 736.094897][T10294] device syzkaller0 entered promiscuous mode [ 737.718284][T10287] bridge0: port 1(bridge_slave_0) entered blocking state [ 737.725135][T10287] bridge0: port 1(bridge_slave_0) entered disabled state [ 737.945532][T10287] device bridge_slave_0 entered promiscuous mode [ 738.113050][T10287] bridge0: port 2(bridge_slave_1) entered blocking state [ 738.144542][T10287] bridge0: port 2(bridge_slave_1) entered disabled state [ 738.151832][T10287] device bridge_slave_1 entered promiscuous mode [ 738.440339][ T929] device veth0_vlan left promiscuous mode [ 741.646324][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 741.764171][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 742.006877][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 742.116620][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 742.166902][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 742.173751][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 742.180982][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 742.189211][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 742.197417][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 742.204245][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 742.231117][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 742.238528][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 742.246269][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 742.254090][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 742.262110][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 742.626661][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 742.635182][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 742.855753][T10287] device veth0_vlan entered promiscuous mode [ 742.909751][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 743.046787][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 743.237035][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 743.416780][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 743.625334][T10287] device veth1_macvtap entered promiscuous mode [ 743.726907][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 743.757414][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 743.962712][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 744.286968][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 744.386692][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 744.476986][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 744.597079][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 759.509149][T10430] device wg2 entered promiscuous mode [ 762.634574][T10459] device veth0_vlan left promiscuous mode [ 762.647357][T10459] device veth0_vlan entered promiscuous mode [ 763.090952][T10467] Â: renamed from pim6reg1 [ 764.889833][T10497] device syzkaller0 entered promiscuous mode [ 768.086744][T10542] device syzkaller0 entered promiscuous mode [ 768.206757][T10543] device pim6reg1 entered promiscuous mode [ 770.181855][T10557] device veth0_vlan left promiscuous mode [ 770.352075][T10557] device veth0_vlan entered promiscuous mode [ 770.711627][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 770.747470][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 770.754835][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 772.371222][T10587] device syzkaller0 entered promiscuous mode [ 776.094252][T10620] device veth0_vlan left promiscuous mode [ 776.186405][T10620] device veth0_vlan entered promiscuous mode [ 776.453187][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 776.567662][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 776.774792][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 776.782617][ T30] audit: type=1400 audit(1732332813.561:161): avc: denied { setattr } for pid=10626 comm="syz.3.3087" path="/dev/net/tun" dev="devtmpfs" ino=147 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 788.327526][T10730] ================================================================== [ 788.335419][T10730] BUG: KASAN: use-after-free in sk_psock_verdict_data_ready+0xc2/0x1a0 [ 788.343581][T10730] Read of size 8 at addr ffff8881286c2020 by task syz.2.3115/10730 [ 788.351308][T10730] [ 788.353478][T10730] CPU: 1 PID: 10730 Comm: syz.2.3115 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 788.363284][T10730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 788.373179][T10730] Call Trace: [ 788.376303][T10730] [ 788.379081][T10730] dump_stack_lvl+0x151/0x1c0 [ 788.383594][T10730] ? io_uring_drop_tctx_refs+0x190/0x190 [ 788.389064][T10730] ? panic+0x760/0x760 [ 788.392976][T10730] print_address_description+0x87/0x3b0 [ 788.398350][T10730] kasan_report+0x179/0x1c0 [ 788.402692][T10730] ? kasan_check_range+0x82/0x2a0 [ 788.407547][T10730] ? sk_psock_verdict_data_ready+0xc2/0x1a0 [ 788.413283][T10730] ? sk_psock_verdict_data_ready+0xc2/0x1a0 [ 788.419007][T10730] __asan_report_load8_noabort+0x14/0x20 [ 788.424473][T10730] sk_psock_verdict_data_ready+0xc2/0x1a0 [ 788.430027][T10730] ? sk_psock_start_verdict+0xc0/0xc0 [ 788.435236][T10730] ? _raw_spin_lock+0xa4/0x1b0 [ 788.439835][T10730] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 788.445479][T10730] ? skb_queue_tail+0xfb/0x120 [ 788.450080][T10730] unix_stream_sendmsg+0x8fd/0x1060 [ 788.455111][T10730] ? unix_stream_sendmsg+0x8b1/0x1060 [ 788.460322][T10730] ? unix_show_fdinfo+0xa0/0xa0 [ 788.465007][T10730] ? check_stack_object+0x114/0x130 [ 788.470039][T10730] ? security_socket_sendmsg+0x82/0xb0 [ 788.475334][T10730] ? unix_show_fdinfo+0xa0/0xa0 [ 788.480019][T10730] ____sys_sendmsg+0x59e/0x8f0 [ 788.484622][T10730] ? __sys_sendmsg_sock+0x40/0x40 [ 788.489486][T10730] ? import_iovec+0xe5/0x120 [ 788.493909][T10730] ___sys_sendmsg+0x252/0x2e0 [ 788.498423][T10730] ? __sys_sendmsg+0x260/0x260 [ 788.503021][T10730] ? kfree+0xc8/0x220 [ 788.506841][T10730] ? ____kasan_slab_free+0x131/0x160 [ 788.511970][T10730] ? kvfree+0x35/0x40 [ 788.515782][T10730] ? __fdget+0x1bc/0x240 [ 788.519860][T10730] __se_sys_sendmsg+0x19a/0x260 [ 788.524549][T10730] ? __x64_sys_sendmsg+0x90/0x90 [ 788.529326][T10730] ? __kasan_check_write+0x14/0x20 [ 788.534265][T10730] ? switch_fpu_return+0x15f/0x2e0 [ 788.539214][T10730] __x64_sys_sendmsg+0x7b/0x90 [ 788.543813][T10730] x64_sys_call+0x16a/0x9a0 [ 788.548154][T10730] do_syscall_64+0x3b/0xb0 [ 788.552406][T10730] ? clear_bhb_loop+0x35/0x90 [ 788.556920][T10730] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 788.562650][T10730] RIP: 0033:0x7fe56eef2819 [ 788.566902][T10730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 788.586342][T10730] RSP: 002b:00007fe56d56b038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 788.594590][T10730] RAX: ffffffffffffffda RBX: 00007fe56f0a9fa0 RCX: 00007fe56eef2819 [ 788.602397][T10730] RDX: 0000000000000003 RSI: 0000000020000980 RDI: 0000000000000003 [ 788.610207][T10730] RBP: 00007fe56ef6575e R08: 0000000000000000 R09: 0000000000000000 [ 788.618020][T10730] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 788.625829][T10730] R13: 0000000000000000 R14: 00007fe56f0a9fa0 R15: 00007fff3535ad38 [ 788.633653][T10730] [ 788.636507][T10730] [ 788.638681][T10730] Allocated by task 10730: [ 788.642930][T10730] __kasan_slab_alloc+0xb1/0xe0 [ 788.647620][T10730] slab_post_alloc_hook+0x53/0x2c0 [ 788.652565][T10730] kmem_cache_alloc+0xf5/0x200 [ 788.657162][T10730] sock_alloc_inode+0x1b/0xb0 [ 788.661677][T10730] new_inode_pseudo+0x64/0x220 [ 788.666280][T10730] __sock_create+0x132/0x7e0 [ 788.670702][T10730] __sys_socketpair+0x313/0x6e0 [ 788.675390][T10730] __x64_sys_socketpair+0x9b/0xb0 [ 788.680251][T10730] x64_sys_call+0x19b/0x9a0 [ 788.684626][T10730] do_syscall_64+0x3b/0xb0 [ 788.688841][T10730] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 788.694569][T10730] [ 788.696745][T10730] Freed by task 9795: [ 788.700561][T10730] kasan_set_track+0x4b/0x70 [ 788.704986][T10730] kasan_set_free_info+0x23/0x40 [ 788.709765][T10730] ____kasan_slab_free+0x126/0x160 [ 788.714705][T10730] __kasan_slab_free+0x11/0x20 [ 788.719307][T10730] slab_free_freelist_hook+0xbd/0x190 [ 788.724513][T10730] kmem_cache_free+0x116/0x2e0 [ 788.729113][T10730] sock_free_inode+0x20/0x30 [ 788.733543][T10730] i_callback+0x4b/0x70 [ 788.737533][T10730] rcu_do_batch+0x57a/0xc10 [ 788.741876][T10730] rcu_core+0x517/0x1020 [ 788.745956][T10730] rcu_core_si+0x9/0x10 [ 788.749948][T10730] handle_softirqs+0x25e/0x5c0 [ 788.754545][T10730] __irq_exit_rcu+0x52/0xf0 [ 788.758889][T10730] irq_exit_rcu+0x9/0x10 [ 788.762968][T10730] sysvec_apic_timer_interrupt+0xa9/0xc0 [ 788.768431][T10730] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 788.774247][T10730] [ 788.776416][T10730] Last potentially related work creation: [ 788.781974][T10730] kasan_save_stack+0x3b/0x60 [ 788.786485][T10730] __kasan_record_aux_stack+0xd3/0xf0 [ 788.791690][T10730] kasan_record_aux_stack_noalloc+0xb/0x10 [ 788.797333][T10730] call_rcu+0x123/0x10b0 [ 788.801413][T10730] evict+0x87d/0x930 [ 788.805145][T10730] iput+0x63b/0x7e0 [ 788.808791][T10730] dentry_unlink_inode+0x34e/0x430 [ 788.813737][T10730] __dentry_kill+0x447/0x660 [ 788.818161][T10730] dentry_kill+0xc0/0x2a0 [ 788.822334][T10730] dput+0x45/0x80 [ 788.825801][T10730] __fput+0x59d/0x8c0 [ 788.829622][T10730] ____fput+0x15/0x20 [ 788.833444][T10730] task_work_run+0x129/0x190 [ 788.837866][T10730] exit_to_user_mode_loop+0xc4/0xe0 [ 788.842902][T10730] exit_to_user_mode_prepare+0x5a/0xa0 [ 788.848196][T10730] syscall_exit_to_user_mode+0x26/0x160 [ 788.853577][T10730] do_syscall_64+0x47/0xb0 [ 788.857829][T10730] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 788.863556][T10730] [ 788.865725][T10730] Second to last potentially related work creation: [ 788.872148][T10730] kasan_save_stack+0x3b/0x60 [ 788.876661][T10730] __kasan_record_aux_stack+0xd3/0xf0 [ 788.881868][T10730] kasan_record_aux_stack_noalloc+0xb/0x10 [ 788.887513][T10730] call_rcu+0x123/0x10b0 [ 788.891594][T10730] evict+0x87d/0x930 [ 788.895324][T10730] iput+0x63b/0x7e0 [ 788.898967][T10730] dentry_unlink_inode+0x34e/0x430 [ 788.903922][T10730] __dentry_kill+0x447/0x660 [ 788.908338][T10730] dentry_kill+0xc0/0x2a0 [ 788.912505][T10730] dput+0x45/0x80 [ 788.915977][T10730] __fput+0x59d/0x8c0 [ 788.919799][T10730] ____fput+0x15/0x20 [ 788.923616][T10730] task_work_run+0x129/0x190 [ 788.928043][T10730] exit_to_user_mode_loop+0xc4/0xe0 [ 788.933077][T10730] exit_to_user_mode_prepare+0x5a/0xa0 [ 788.938370][T10730] syscall_exit_to_user_mode+0x26/0x160 [ 788.943752][T10730] do_syscall_64+0x47/0xb0 [ 788.948003][T10730] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 788.953731][T10730] [ 788.955902][T10730] The buggy address belongs to the object at ffff8881286c2000 [ 788.955902][T10730] which belongs to the cache sock_inode_cache of size 896 [ 788.970225][T10730] The buggy address is located 32 bytes inside of [ 788.970225][T10730] 896-byte region [ffff8881286c2000, ffff8881286c2380) [ 788.983245][T10730] The buggy address belongs to the page: [ 788.988726][T10730] page:ffffea0004a1b000 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1286c0 [ 788.998779][T10730] head:ffffea0004a1b000 order:2 compound_mapcount:0 compound_pincount:0 [ 789.006939][T10730] flags: 0x4000000000010200(slab|head|zone=1) [ 789.012848][T10730] raw: 4000000000010200 dead000000000100 dead000000000122 ffff8881081ab380 [ 789.021264][T10730] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 789.029681][T10730] page dumped because: kasan: bad access detected [ 789.035933][T10730] page_owner tracks the page as allocated [ 789.041482][T10730] page last allocated via order 2, migratetype Reclaimable, gfp_mask 0x1d20d0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL|__GFP_RECLAIMABLE), pid 9367, ts 656320491398, free_ts 554472671734 [ 789.063701][T10730] post_alloc_hook+0x1a3/0x1b0 [ 789.068298][T10730] prep_new_page+0x1b/0x110 [ 789.072647][T10730] get_page_from_freelist+0x3550/0x35d0 [ 789.078023][T10730] __alloc_pages+0x27e/0x8f0 [ 789.082447][T10730] new_slab+0x9a/0x4e0 [ 789.086352][T10730] ___slab_alloc+0x39e/0x830 [ 789.090778][T10730] __slab_alloc+0x4a/0x90 [ 789.094942][T10730] kmem_cache_alloc+0x134/0x200 [ 789.099633][T10730] sock_alloc_inode+0x1b/0xb0 [ 789.104144][T10730] new_inode_pseudo+0x64/0x220 [ 789.108746][T10730] __sock_create+0x132/0x7e0 [ 789.113170][T10730] __sys_socket+0x132/0x370 [ 789.117510][T10730] __x64_sys_socket+0x7a/0x90 [ 789.122024][T10730] x64_sys_call+0x147/0x9a0 [ 789.126362][T10730] do_syscall_64+0x3b/0xb0 [ 789.130617][T10730] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 789.136346][T10730] page last free stack trace: [ 789.140859][T10730] free_unref_page_prepare+0x7c8/0x7d0 [ 789.146150][T10730] free_unref_page+0xe8/0x750 [ 789.150664][T10730] __free_pages+0x61/0xf0 [ 789.154829][T10730] __free_slab+0xec/0x1d0 [ 789.159001][T10730] __unfreeze_partials+0x165/0x1a0 [ 789.163947][T10730] put_cpu_partial+0xc4/0x120 [ 789.168461][T10730] __slab_free+0x1c8/0x290 [ 789.172709][T10730] ___cache_free+0x109/0x120 [ 789.177137][T10730] qlink_free+0x4d/0x90 [ 789.181128][T10730] qlist_free_all+0x44/0xb0 [ 789.185468][T10730] kasan_quarantine_reduce+0x15a/0x180 [ 789.190762][T10730] __kasan_slab_alloc+0x2f/0xe0 [ 789.195448][T10730] slab_post_alloc_hook+0x53/0x2c0 [ 789.200397][T10730] kmem_cache_alloc+0xf5/0x200 [ 789.204997][T10730] getname_flags+0xba/0x520 [ 789.209337][T10730] user_path_at_empty+0x2d/0x1a0 [ 789.214112][T10730] [ 789.216279][T10730] Memory state around the buggy address: [ 789.221753][T10730] ffff8881286c1f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 789.229656][T10730] ffff8881286c1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 789.237548][T10730] >ffff8881286c2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 789.245442][T10730] ^ [ 789.250394][T10730] ffff8881286c2080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 789.258290][T10730] ffff8881286c2100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 789.266187][T10730] ================================================================== [ 789.274086][T10730] Disabling lock debugging due to kernel taint [ 789.791491][T10735] device sit0 entered promiscuous mode