last executing test programs: 2.899873245s ago: executing program 3 (id=6727): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@ptr={0xc, 0x0, 0x0, 0x2, 0x2}]}, {0x0, [0x61, 0x2e]}}, &(0x7f0000000100)=""/102, 0x28, 0x66, 0x0, 0x9, 0x0, @void, @value}, 0x28) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xa, 0x4, 0x6, 0x9, 0x0, 0x1, 0x81, '\x00', r0, r1, 0x2, 0x1, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x3ff, '\x00', r0, r1, 0x1, 0x3, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x7, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x8}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f0000000280)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x2, '\x00', r0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x4, 0x7, 0x9, 0x6}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000380)=[r2, r2, 0x1, r2, r2, r3], &(0x7f00000003c0)=[{0x0, 0x5, 0x10, 0xc}, {0x1, 0x5, 0xf, 0x2}, {0x1, 0x4, 0x7, 0x9}, {0x5, 0x4, 0x1, 0x1}, {0x5, 0x2, 0x2, 0x6}, {0x3, 0x5, 0xd}], 0x10, 0x8, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000540)='notify_on_release\x00', 0x2, 0x0) write$cgroup_int(r6, &(0x7f0000000580)=0x4, 0x12) sendmsg$inet(r5, &(0x7f0000000c00)={&(0x7f00000005c0)={0x2, 0x4e20, @private=0xa010101}, 0x10, &(0x7f0000000a00)=[{&(0x7f0000000600)="6727a98cfa179bec723fcb6fae8a68e8b2966b172f3d1e3fdd2b58aab94d2de034", 0x21}, {&(0x7f0000000640)="c2927ca9778a613f98f46602ac1a16e3cd35d09eb3016e8cdb7b15a87368a51949479b1326a0e965c20b2198ed19a7ff8ce03da0e24fa6f1e8921ddfb52cfdd620e307ea044207a43360584631784b89b411c4e2b57eddf2da8e68e0c32aaa90cdee6a6a3f6f90d0c912a2f9f83eed4f24f963096784ed18129f4433a709f0f976e7c731f6efc4caa4955bb827fd87364e2f8f599d69feaf1653b44b2b0092c50879fec9dc97c1ba5f3b822120b4ed9eb42ca8c45c8844ebf25cda2e1d841bccb415bd1a31abcb4f4bdefbb4f50e8fbb021000c37b84f16078aa5da6253953f45c88b6cf4c8e2cd411", 0xe9}, {&(0x7f0000000740)="59cc0a6339270e2c5cfcd7e28ad38a98f028ef992a8f5ddefc05f0a6a5c07f6157b856d7880ef1b0786340eb876111dd585d575c76b0fead31f466a0d4a3a05e4b2492c8f2806107fef9bf3bf8363b8277febd5e06da851ec96f189430f68cafc91304ef243c10c03622f1e061f1a38a6d47e6fb1715ae3adcfc05820a68ad2fa302546c85f999eb588511cf1e886a275184aa697af3c937e17719a59660a28797f62fedc5e36720fc9c810526928d4539a482020df0f48fa5ffcfb3f240f4f9cb051140433e5c4c1b98edcabf5f29ebedbff1d59b03d978", 0xd8}, {&(0x7f0000000840)="7ef298b8bcc55d4c0ad6927ae95cb0de2705e0fb6126ac848a4123f8b73576a0b87bc3a0bc5c4c4fa5583c112ee9b68fbbb48dd95f1ba4b6332c862057398a502fa8ef9259ffd3c6820ee2774a102829dda79bc4", 0x54}, {&(0x7f00000008c0)="df55", 0x2}, {&(0x7f0000000900)="c1b023ba5890053c53ad90840cd6aa6dc58b3328e4b567c40785f4b08cdf8e6dd347c9686ec6611fed18e316ec9c251a6249221ad2e15dd7c08e0afdc782a0e6884a976289d4c8f350a4842ab331e7b3613b4a88e1fe20102098491b9eb4210cc08c42ead3da3f205840f983364ab893ac8788690238b34058b494cd4fd1cccd6c630441b5657fd9bf", 0x89}, {&(0x7f00000009c0)="3614d1d2a90e82f1a9425b20b8237696df2faea99bbcab69b7dc6259222ada0f15cfff0c41fc13c0671d36cb60c6", 0x2e}], 0x7, &(0x7f0000000a80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r0, @private=0xa010101, @empty}}}, @ip_retopts={{0x7c, 0x0, 0x7, {[@ssrr={0x89, 0x1f, 0xdf, [@private=0xa010100, @remote, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @local, @private=0xa010102]}, @generic={0x8c, 0xd, "45a1843202eeac628c0084"}, @end, @end, @end, @timestamp_addr={0x44, 0x1c, 0x2e, 0x1, 0x7, [{@local, 0x6}, {@remote, 0x13a}, {@multicast2, 0x1}]}, @rr={0x7, 0x7, 0xf2, [@private=0xa010102]}, @ssrr={0x89, 0x13, 0xfc, [@local, @local, @private=0xa010100, @private=0xa010102]}, @generic={0x82, 0x5, "e30a15"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xba8d}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x6}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x56}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_retopts={{0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r0, @local, @rand_addr=0x64010100}}}], 0x158}, 0x80) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x202241, 0x0) r8 = ioctl$TUNGETDEVNETNS(r7, 0x54e3, 0x0) r9 = syz_clone(0x20800, &(0x7f0000000d00)="ff83871483562356209d3af0b606d413ab1057a5ef3ba0ac86647aa307d8e6029b8ac55262139c45c58a49d81fb918f004677b94a9e06be05756ba8f8014fb933f3a19e2f8ad66edb4429a5b47f40361b7fffed6f7ef567ae1d255621fd9c99f10e608a9add2bce2c3e47beae58b7ba39a7e554e20e435ad67ef4371c1efab6b89f8f7c8fcb51c5e19f9605d94bb11b56d13842a7c14d15775785277a9f2b5962a360f09da3c6287ce45fe83aa84ab1affdc71c4358486279c41382c4877a99a1c53ea21ba522447156934613d3a63db5d09fbfa3d7f", 0xd6, &(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)="d49193e8a2766c0983c1a344d63a9dae31a48a2db3ba946457e042352615ca40d74319348411208b15121cca43e4655da72d74586f33401e15e290b238fa63360b79f60ff2335b8b1822775deaef41ffc91ddf5ffd06cf89ada339a1f83f2f420128fa2c4cda8082a0602a07572d") r10 = perf_event_open(&(0x7f0000000f40)={0x2, 0x80, 0x2, 0x5, 0x3d, 0x3, 0x0, 0x80000000, 0x81068, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x400, 0x59eebeab54e68d27, @perf_bp={&(0x7f0000000f00), 0x8}, 0x1018, 0x2, 0x1, 0x5, 0x5, 0x898, 0x1, 0x0, 0x38, 0x0, 0xb82}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r11 = perf_event_open(&(0x7f0000000c80)={0x0, 0x80, 0x5, 0x6, 0x3, 0x80, 0x0, 0x7, 0x44030, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x1ff, 0xefdd}, 0x8, 0x0, 0x0, 0x8, 0xffac, 0x1, 0x8bee, 0x0, 0x0, 0x0, 0x7}, r9, 0xffffffffffffffff, r10, 0xb) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000fc0)) recvmsg(r4, &(0x7f0000002340)={&(0x7f0000001000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000001080)=""/244, 0xf4}, {&(0x7f0000001180)=""/35, 0x23}, {&(0x7f00000011c0)=""/5, 0x5}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/46, 0x2e}, {&(0x7f0000002240)=""/104, 0x68}], 0x6}, 0x0) socketpair(0x0, 0x1, 0x48c, &(0x7f0000002380)) socketpair(0x0, 0x800, 0xfff, &(0x7f00000023c0)) bpf$MAP_CREATE(0x0, &(0x7f0000002400)=@base={0x1e, 0xa0, 0xc, 0x4480, 0x4, r2, 0x6, '\x00', r0, 0xffffffffffffffff, 0x2, 0x2, 0x3, 0x0, @void, @value, @void, @value}, 0x50) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000002480), 0x8) openat$cgroup_ro(r12, &(0x7f00000024c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002540)={&(0x7f0000002500)='rpc_call_rpcerror\x00', r12, 0x0, 0x9}, 0x18) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000002580)={'c', ' *:* ', 'm\x00'}, 0x8) perf_event_open(&(0x7f0000002600)={0x3, 0x80, 0xe, 0xb, 0x4, 0x9, 0x0, 0x14, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xf3e5, 0x1, @perf_bp={&(0x7f00000025c0), 0x1}, 0x16130, 0x2, 0xfffffff8, 0x0, 0x2, 0x4, 0x0, 0x0, 0x6, 0x0, 0x7f}, r9, 0x0, r10, 0x3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000002680)={'vlan0\x00', 0x2000}) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000026c0)={'batadv0\x00', 0x20}) close(r6) sendmsg$inet(r4, &(0x7f00000028c0)={&(0x7f0000002700)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000002740), 0x0, &(0x7f0000002780)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r0, @broadcast, @rand_addr=0x64010102}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r0, @multicast2, @private=0xa010100}}}, @ip_retopts={{0x58, 0x0, 0x7, {[@timestamp={0x44, 0x10, 0x1d, 0x0, 0x4, [0x3, 0x2000000, 0x270387a5]}, @generic={0x44, 0x9, "d58df2d42b29ba"}, @end, @rr={0x7, 0x2b, 0xc3, [@rand_addr=0x64010101, @multicast2, @rand_addr=0x64010101, @multicast2, @loopback, @multicast2, @rand_addr=0x64010102, @empty, @multicast2, @loopback]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r0, @multicast1, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r0, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x110}, 0x8004) r13 = perf_event_open$cgroup(&(0x7f0000002900)={0x1, 0x80, 0x3, 0xf, 0x81, 0x50, 0x0, 0x8, 0x32602, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x100000001, 0x9}, 0x99c, 0x31, 0x9, 0x8, 0x8, 0x1, 0xffff, 0x0, 0x8, 0x0, 0xec94292}, r11, 0xec0, r12, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r13, 0x40042408, r12) 2.750175055s ago: executing program 0 (id=6733): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000140)='sys_enter\x00', r1}, 0x10) unlink(0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0xb0, 0x0, 0x3, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0)}, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, 0xfffffffffffffffd, 0xf8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe23, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x12c0, 0x0, 0x0, 0x0, 0x40001ff, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0xf5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 2.721346135s ago: executing program 0 (id=6735): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2.669639425s ago: executing program 0 (id=6736): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x19, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) 2.592232016s ago: executing program 0 (id=6737): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018600000000000000000000000776b0018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r0}, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd4d}], 0x1}, 0x0) 2.525846587s ago: executing program 0 (id=6738): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="170000000000000001000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000d847fcf980eb2b642f3c000000010000ec8100"/38], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, r4, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000500)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000010000578d000000fe0018110000", @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x105, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0x200400, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000004c0)={'pim6reg1\x00', 0x8000}) r7 = syz_clone(0x0, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000aaa3f34144e359e4ffb7030000f5f7ffffb7040000f600000085000000430000", @ANYBLOB, @ANYRESDEC=r7], 0x0, 0x340, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, @void, @value}, 0x94) write$cgroup_pid(r5, &(0x7f0000000400)=r7, 0x12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r8 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r9}, 0x10) close(r8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x10, r1}, 0x18) 2.018271979s ago: executing program 3 (id=6743): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0a00000016000000b40000007f00000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 `\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000800)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 2.017387669s ago: executing program 3 (id=6744): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/211, 0x15e, 0xd3, 0x0, 0x8, 0x0, @void, @value}, 0x28) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000140), 0x8) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000e00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="1b00"/20, @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x200, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000080)='notify_on_release\x00', 0x2, 0x0) (async) mkdirat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b0af8ff00000000bda107000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ff00000000bfa10000000000006948c863d976b864018af89207010000f8ffffffb702000008000000b70300000000000085000000060000009500000000000000"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x2a, &(0x7f0000000100)=r6, 0x4) (async) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x3, 0x10000000, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x4040040) (async) recvmsg$unix(r4, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000440)=[0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0], 0x0, 0x22, &(0x7f0000000640)=[{}, {}], 0x10, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0xe7, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000003000000020000000900000044040400", @ANYRES32=r0, @ANYBLOB="ff0100"/20, @ANYRES32=r7, @ANYRES32=r1, @ANYBLOB="3b070000040000000000000000000000085d69e1c46a7b3a61a80000"], 0x50) 2.017221899s ago: executing program 4 (id=6745): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x6, 0xb036894e47516fe4}, 0xc) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x18, 0x9, 0x19f3, 0xc, 0x40a22, r3, 0x35, '\x00', 0x0, r4, 0x4, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x50) syz_clone(0x12000400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001f40)={&(0x7f0000001d80)=ANY=[], &(0x7f0000001e40)=""/240, 0x2f, 0xf0, 0x1, 0x0, 0x0, @void, @value}, 0x28) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000140)=ANY=[], 0xfffffdef) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r6, &(0x7f0000000980), 0x20000992) 1.9933396s ago: executing program 3 (id=6746): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 1.90037771s ago: executing program 3 (id=6747): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc6, 0xc6, 0x3, [@enum={0xb, 0x2, 0x0, 0x6, 0x4, [{0x8, 0xe250}, {0xa, 0x93}]}, @datasec={0x2, 0x1, 0x0, 0xf, 0x3, [{0x4, 0x1, 0xb5e}], ' )\x00'}, @const={0x5, 0x0, 0x0, 0xa, 0x2}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x55, 0x0, 0x35, 0xf}, @datasec={0x4, 0x4, 0x0, 0xf, 0x3, [{0x1, 0x2e4e, 0x4}, {0x2, 0x10000, 0x1}, {0x3, 0x800, 0x7f}, {0x5, 0x800, 0x3}], "13fd37"}, @func={0x4, 0x0, 0x0, 0xc, 0x4}, @int={0xa, 0x0, 0x0, 0x1, 0x0, 0x53, 0x0, 0x54}, @func={0xf, 0x0, 0x0, 0xc, 0x2}, @const={0x7, 0x0, 0x0, 0xa, 0x3}]}, {0x0, [0x30]}}, &(0x7f0000000340)=""/73, 0xe3, 0x49, 0x1, 0x81, 0x0, @void, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x18, 0x4, 0x8, 0x8, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe, 0x3, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000004340)={0x6, 0xc, &(0x7f00000007c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) recvmsg(r2, 0x0, 0x2100) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r4, &(0x7f0000000540)="3dca2d2489ad950a319aba4ce66eff5443ffef835e3d4569fb95d0b9f3b9957ad3e4a4463b053a5c3f20a49dae6a1e9d07d49a3eff6072a082a8be892de78d6d0de8bf60e9c70a7df753f5d5739daa6f98b18db314bccfdde2f8ba94f62f5332251067d14d36792dd8af7889a5707f428712200f7c54e3e8bda2a919ba4f4ce69d1709c7c3f33a63b549ff25f2cb81b661d28dd83ef50e09d749e9baaaff1af95614a2f087394fdfeb5f19cd065c9f6e4e2e85aaff4e112b9b338a6be90bf8166d6151fe8d0bee72f7d8bc7ccc98c601f8f71475867920"}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.80976689s ago: executing program 2 (id=6749): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r2}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000001180)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe6c, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9b, @void, @value}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff5a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r6}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r7}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22a0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3fc00000000}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40a, 0x0, @perf_config_ext={0x9}, 0x104002, 0xa1b7, 0x0, 0x0, 0x6f00000000000, 0xffffffff, 0x0, 0x0, 0xffffbffe, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x1d}}]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r8, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="5a6e41dea43e63a3f70cff11c72b", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_subtree(r3, &(0x7f0000000180)=ANY=[@ANYBLOB='-', @ANYRESHEX=r0], 0x27) 1.458932192s ago: executing program 3 (id=6752): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_clone(0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = perf_event_open$cgroup(&(0x7f0000000200)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000280)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rxrpc_rx_done\x00', r1, 0x0, 0x9}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_int(r2, &(0x7f0000000340)='cpuset.cpus\x00', 0x2, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r5}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000ff442369dda11d24c4000000fefbdd08000000000000000000"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r8, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) syz_clone(0xc4000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.410968473s ago: executing program 2 (id=6753): r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000180)='syz0\x00', 0x1ff) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa1000000000000070100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x4, 0xac, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) close(0x3) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x6, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{r3}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x38}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (async, rerun: 32) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="160000000000000004000000ff6bcad4004df52687ae0e00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x105c34}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x18080000, &(0x7f0000000040)="e6b8eac122", 0x5, &(0x7f0000000080), &(0x7f00000001c0), &(0x7f0000000200)="7000252d204ff090fe301360") (async, rerun: 32) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async, rerun: 32) close(0x3) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280), 0x600080, 0x0) (async) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.357075323s ago: executing program 2 (id=6754): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0a00000016000000b40000007f00000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 `\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000800)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000790000000000000018000000000000000000000000000000950000000000000005000000000000009500000000000000f9e3d2fb113f53c361c3543f7b67d987480a053481c2c608d406cdeec27156b8d8a304b5632dc50faf46fc7e7d67f830178cf5478f1aba0799450e38e040300200000000000000bec422c2cc5e56be4599b03ba228fe302239966a8910c72235507355f460e1148a8521ade6ce0379a5643fc8f66dd138a02c5418352bcf6694070a1c9aa56c457cb4f97be7a2c0f6ac7e8b3e7e422c0580904e0d657a2f47310d291ea2171daf6c734fa2cf7ec5599cf24cbc1cb463ee40aaf1de8262c1dd3eccd7406fa25fed928e835fb105c7f3925a2afa9eb3283fef94aa33078da4d1e921e54da61ce3e26a"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.355767353s ago: executing program 2 (id=6755): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x8c) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x30}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x2a979d) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180)={r2}, 0x4) write$cgroup_subtree(r4, &(0x7f0000000240)={[{0x2b, 'net_cls'}, {0x2b, 'blkio'}, {0x2b, 'perf_event'}, {0x2b, 'net_cls'}, {0x2b, 'memory'}, {0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'io'}, {0x2d, 'rlimit'}, {0x2d, 'perf_event'}]}, 0x51) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffd15) 1.299695313s ago: executing program 1 (id=6756): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000000040000", @ANYRES32=0x0, @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00'/27], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000045b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000045b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1, 0x14, &(0x7f0000000340)=@framed={{}, [@printk={@lx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x8}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffff00}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1, 0x14, &(0x7f0000000340)=@framed={{}, [@printk={@lx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x8}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffff00}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0x0, 0x10, 0x38, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRESOCT=r6, @ANYRES16=r6, @ANYRESOCT=r4, @ANYRES32=r4], &(0x7f0000000240)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRESOCT=r6, @ANYRES16=r6, @ANYRESOCT=r4, @ANYRES32=r4], &(0x7f0000000240)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f0000000280)=0x5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r8, &(0x7f0000000140)=ANY=[], 0xfffffdef) (async) write$cgroup_subtree(r8, &(0x7f0000000140)=ANY=[], 0xfffffdef) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x8, [@const={0x3, 0x0, 0x0, 0xa, 0x2}, @enum={0xb, 0x3, 0x0, 0x6, 0x4, [{0x7, 0xfffffffd}, {0x5, 0x957}, {0x0, 0x5}]}]}, {0x0, [0x5f, 0x5f, 0x61, 0x30, 0x61, 0x0]}}, &(0x7f0000000540)=""/8, 0x50, 0x8, 0x0, 0xfffffffd, 0x10000, @value=r8}, 0x28) openat$cgroup_ro(r7, &(0x7f0000000300)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) (async) r9 = openat$cgroup_ro(r7, &(0x7f0000000300)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x15, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100)={0x0, 0xe, 0x0, 0xffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x15, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100)={0x0, 0xe, 0x0, 0xffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9, @void, @value}, 0x94) r10 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa, 0xc000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x40082406, &(0x7f0000000080)='(\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r9, &(0x7f0000000340)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x89f1, &(0x7f0000000080)) recvmsg$unix(r11, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000740)=""/207, 0xcf}], 0x1, &(0x7f0000000840)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd0}, 0x10140) 1.173767184s ago: executing program 4 (id=6757): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 977.907515ms ago: executing program 1 (id=6758): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x545b560f, 0x8}, 0x0, 0x408000000c8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000001600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000040002850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, 0x0, 0x2000fdef) 933.459435ms ago: executing program 4 (id=6759): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018600000000000000000000000776b0018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r0}, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd4d}], 0x1}, 0x0) 825.500166ms ago: executing program 1 (id=6760): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000002c0000002c0000000b00000000000000000000030000000003000000020000000000000000000000010000060400000009f900b9b42aeef3fc802daf87131366c13f00000000000000000000000000002e00"], &(0x7f0000000080)=""/159, 0x4f, 0x9f, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x5b) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x7, 0xc, 0x9, 0x6, 0x0, 0xb, 0x40, 0x10, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000300), 0x2}, 0x20, 0x401, 0x359c0fc6, 0xeac3e4f532645a90, 0xfffffffffffffff8, 0x9, 0x4d, 0x0, 0x8, 0x0, 0x21}, 0xffffffffffffffff, 0x4, r2, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800081}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_type(r6, &(0x7f00000001c0), 0x2, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYRESDEC], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000000000000000001805000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000b90600008500000004000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r8}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 796.099956ms ago: executing program 4 (id=6761): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r0}, 0x18) (async) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="04000000b883ee516ca146db040000003d543ce82091ab7864a3d9cf6ee0cac004000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x14, 0x4b, 0x4, 0x401, 0x20, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='btrfs_writepage_end_io_hook\x00', r0, 0x0, 0xffffffff}, 0x18) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r6}, 0xc) close(r7) 685.587696ms ago: executing program 4 (id=6762): r0 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x98, 0x1, 0x8, 0xcb, 0x0, 0x0, 0x80402, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x6, 0xfff}, 0x1068d0, 0x1ff, 0x1c00, 0x4, 0xc90, 0x9, 0x1, 0x0, 0x6, 0x0, 0x100000001}, 0x0, 0x9, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYRES8=r0, @ANYRESHEX=r2, @ANYBLOB="000000000010000000000000000089956bd603ff367dfc0a466e08efdc4ca9804b07dd8b8395751aeaadec2b0ad836cd6b6df9d530f687550a9cd60bfeb3675407eaa0cd51a7686053fa68c22b90fda4711e1c5ae5207eac871805457c09879fedf056a787900adeaf53b98e1b8f9bea763417828600000080fd31a778f503508ed5640f580707b0c8675c9e81e7be01b3cab74ad798286cfd90a8fea2c1cdc285fad404dcd0626f14509afcbbbfad03f365dda088dd852198927fbf51402950436c2688b0a1010001e13547cc7450c10ed1d03d71ec0beddef563859988b1ceaa", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xff90) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x7, 0x4, 0x8, 0x100, 0x20, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1428437b3c8026bdfeb6db4ee9bcb25b1811d40a203bf40b3a7da5a8a64db04ed6dd26eea2a37229c339b1f91201c2796", 0x3d}], 0x1}, 0x0) recvmsg(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) close(r5) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, r4, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000010000000000000000000000711204000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000010001000900000009000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b708000000f1ff007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 497.980467ms ago: executing program 2 (id=6763): bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB='\x00'/20, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x2000000000c8, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0xa, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r3}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) close(r2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63"], 0xfdef) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x92200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffffe}, 0x20, 0x0, 0x0, 0x6}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000723e27c100"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x3, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000005"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_clone(0x41500, 0x0, 0xd, 0xfffffffffffffffd, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r8}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000100), 0x1001) 492.988748ms ago: executing program 4 (id=6764): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000eef000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000380)={r1, r0}, 0xc) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'macvtap0\x00', 0x2}) bpf$TOKEN_CREATE(0x24, &(0x7f00000002c0)={0x0, r2}, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000fca0e3012abdf05f30487d08186231be8317f39ee2b5515bf3d173e7499f33c534ace7e87f085f353ff6cd", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x80000, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r7 = openat$cgroup_type(r6, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r7, &(0x7f0000000280), 0x9) r8 = openat$cgroup_procs(r6, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000c40), 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 425.434138ms ago: executing program 1 (id=6765): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c40)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000ac0)='kmem_cache_free\x00', r2}, 0x10) close(r1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000080000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f0, &(0x7f0000000080)) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1282, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) write$cgroup_int(r1, &(0x7f0000000040)=0x4, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000004340)={0x6, 0xc, &(0x7f00000007c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 318.801279ms ago: executing program 2 (id=6766): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r3}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000db850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000200)='percpu_alloc_percpu\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/73}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0xc0189436, 0x1ffffffe) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="ff00000000000000"], &(0x7f0000000300)='GPL\x00', 0x7, 0x1000, &(0x7f0000000b00)=""/4096, 0x40f00, 0x20, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x3, 0x5, 0x2, 0x7}, 0x10, 0x0, 0x0, 0x8, &(0x7f00000005c0)=[r0], &(0x7f00000006c0)=[{0x3, 0x4, 0xf, 0x5}, {0x5, 0x5, 0x6, 0x1}, {0x3, 0x5, 0x10, 0xb}, {0x0, 0x1, 0x5, 0x4}, {0x2, 0x5, 0xe, 0x9}, {0x3, 0x5, 0x2, 0x8}, {0x5, 0x1, 0x8, 0x3}, {0x2, 0x3, 0x2, 0x4}], 0x10, 0x40000000, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0xa, [@var={0x3, 0x0, 0x0, 0xe, 0x3}, @var={0x5, 0x0, 0x0, 0xe, 0x1}, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x61, 0x51, 0x2e, 0x5f, 0x61, 0x0]}}, &(0x7f00000004c0)=""/185, 0x86, 0xb9, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000200)='fdb_delete\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r8, 0x2405, r5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000003c0)='mm_page_alloc\x00', r9}, 0x18) syz_clone(0x410a4400, 0x0, 0xfffffffffffffd56, 0x0, 0x0, 0xffffffffffffffff) 263.771309ms ago: executing program 1 (id=6767): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xe) write$cgroup_devices(r3, &(0x7f0000000180)={'a', ' *:* ', 'wm\x00'}, 0x9) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair(0xa, 0x3, 0x40, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x6988b500, 0x0, 0x0, 0x0, 0x0, 0x0) 218.642969ms ago: executing program 1 (id=6768): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r0}, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd4d}], 0x1}, 0x0) 203.500009ms ago: executing program 32 (id=6768): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r0}, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd4d}], 0x1}, 0x0) 841.05µs ago: executing program 0 (id=6770): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1900020000c4d7000000001811590000", @ANYRES32=r0, @ANYRES64=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb6b", 0x2}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x18, 0xe, &(0x7f0000002000)=ANY=[@ANYRESDEC=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB='\n\x00\x00\x00\t@\x00\x00B\x00\x00\x00@\x00\x00\x00B\x00\x00\x00', @ANYRES32, @ANYBLOB="00000000000000010000000000000000000000009a4b19b084c88b44d1f777934ecc8a30ac794b23716312580d53330e732f3a68b95f0e749925b424cd93f3df9c7261f5d247f12f093c5248b689446cba591578e9e3e8c6d4e96f9acc50536a9d4f3fb97108ed1a0a5364e45475a12d3d832933ac50d55395956c55c206437600ccbca7bcdebe57666ce519a7db04e0bceb69fba3c661bc7af9b4498d0fa8958280fdb9f4b6bb48d3c8d83543d2e3ff4a9af585189065189065843a0ab4f751614488cfae84", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000500"/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r4, 0x0, 0xd88d02a0}, 0x38) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="040000001000541ac7edc37c1744601d2851000000000000400000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x1c, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="0000000000000000b702000001000000850000001700000018110000", @ANYRES32=r5], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r9, &(0x7f0000000100), 0x0}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x8, 0x4, &(0x7f00000008c0)=ANY=[@ANYRES64=r5], &(0x7f0000000100)='GPL\x00', 0x0, 0xfffffffffffffda6, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x13, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000008000000000000000000730136000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r10 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff}, 0x100010, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x4b49, 0x101) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r8, 0xfffff000, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000), 0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0b0000ab56a923ab1a3e88e72ed153bf2c9d9839093d97f6e037fd07b64100", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000500)=ANY=[@ANYRES32=r1, @ANYRES32=r7], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r12}, 0x10) 0s ago: executing program 33 (id=6770): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1900020000c4d7000000001811590000", @ANYRES32=r0, @ANYRES64=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb6b", 0x2}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x18, 0xe, &(0x7f0000002000)=ANY=[@ANYRESDEC=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB='\n\x00\x00\x00\t@\x00\x00B\x00\x00\x00@\x00\x00\x00B\x00\x00\x00', @ANYRES32, @ANYBLOB="00000000000000010000000000000000000000009a4b19b084c88b44d1f777934ecc8a30ac794b23716312580d53330e732f3a68b95f0e749925b424cd93f3df9c7261f5d247f12f093c5248b689446cba591578e9e3e8c6d4e96f9acc50536a9d4f3fb97108ed1a0a5364e45475a12d3d832933ac50d55395956c55c206437600ccbca7bcdebe57666ce519a7db04e0bceb69fba3c661bc7af9b4498d0fa8958280fdb9f4b6bb48d3c8d83543d2e3ff4a9af585189065189065843a0ab4f751614488cfae84", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000500"/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r4, 0x0, 0xd88d02a0}, 0x38) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="040000001000541ac7edc37c1744601d2851000000000000400000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x1c, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="0000000000000000b702000001000000850000001700000018110000", @ANYRES32=r5], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r9, &(0x7f0000000100), 0x0}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x8, 0x4, &(0x7f00000008c0)=ANY=[@ANYRES64=r5], &(0x7f0000000100)='GPL\x00', 0x0, 0xfffffffffffffda6, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x13, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000008000000000000000000730136000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r10 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff}, 0x100010, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x4b49, 0x101) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r8, 0xfffff000, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000), 0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0b0000ab56a923ab1a3e88e72ed153bf2c9d9839093d97f6e037fd07b64100", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000500)=ANY=[@ANYRES32=r1, @ANYRES32=r7], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r12}, 0x10) kernel console output (not intermixed with test programs): ontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 139.782183][ T24] audit: type=1400 audit(1731943196.370:161): avc: denied { open } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 139.913252][ T24] audit: type=1400 audit(1731943196.370:162): avc: denied { getattr } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 140.674236][ T3982] device syzkaller0 entered promiscuous mode [ 141.256574][ T4018] device syzkaller0 entered promiscuous mode [ 141.777979][ T4039] device syzkaller0 entered promiscuous mode [ 142.416762][ T4076] device syzkaller0 entered promiscuous mode [ 142.800848][ T4084] device pim6reg1 entered promiscuous mode [ 143.247722][ T4109] device syzkaller0 entered promiscuous mode [ 145.988968][ T4261] device pim6reg1 entered promiscuous mode [ 146.484017][ T4283] FAULT_INJECTION: forcing a failure. [ 146.484017][ T4283] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 146.497579][ T4283] CPU: 0 PID: 4283 Comm: syz.2.1215 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 146.508657][ T4283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 146.518548][ T4283] Call Trace: [ 146.521692][ T4283] dump_stack_lvl+0x1e2/0x24b [ 146.526194][ T4283] ? bfq_pos_tree_add_move+0x43b/0x43b [ 146.531500][ T4283] dump_stack+0x15/0x17 [ 146.535478][ T4283] should_fail+0x3c6/0x510 [ 146.539735][ T4283] should_fail_usercopy+0x1a/0x20 [ 146.544594][ T4283] _copy_to_user+0x20/0x90 [ 146.548855][ T4283] simple_read_from_buffer+0xc7/0x150 [ 146.554054][ T4283] proc_fail_nth_read+0x1a3/0x210 [ 146.558913][ T4283] ? proc_fault_inject_write+0x390/0x390 [ 146.564383][ T4283] ? security_file_permission+0x86/0xb0 [ 146.569783][ T4283] ? rw_verify_area+0x1c3/0x360 [ 146.574452][ T4283] ? proc_fault_inject_write+0x390/0x390 [ 146.579921][ T4283] vfs_read+0x200/0xba0 [ 146.583913][ T4283] ? __mutex_lock_slowpath+0xe/0x10 [ 146.588952][ T4283] ? kernel_read+0x70/0x70 [ 146.593202][ T4283] ? __kasan_check_write+0x14/0x20 [ 146.598147][ T4283] ? mutex_lock+0xa5/0x110 [ 146.602396][ T4283] ? mutex_trylock+0xa0/0xa0 [ 146.606822][ T4283] ? __fdget_pos+0x2e7/0x3a0 [ 146.611256][ T4283] ? ksys_read+0x77/0x2c0 [ 146.615414][ T4283] ksys_read+0x199/0x2c0 [ 146.619490][ T4283] ? vfs_write+0xe70/0xe70 [ 146.623745][ T4283] ? fpu__clear_all+0x20/0x20 [ 146.628265][ T4283] ? __kasan_check_read+0x11/0x20 [ 146.633115][ T4283] __x64_sys_read+0x7b/0x90 [ 146.637456][ T4283] do_syscall_64+0x34/0x70 [ 146.641708][ T4283] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 146.647433][ T4283] RIP: 0033:0x7f8b157f815c [ 146.651689][ T4283] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 146.671131][ T4283] RSP: 002b:00007f8b14451030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 146.679375][ T4283] RAX: ffffffffffffffda RBX: 00007f8b159b1058 RCX: 00007f8b157f815c [ 146.687182][ T4283] RDX: 000000000000000f RSI: 00007f8b144510a0 RDI: 0000000000000007 [ 146.694993][ T4283] RBP: 00007f8b14451090 R08: 0000000000000000 R09: 0000000000000000 [ 146.702805][ T4283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 146.710624][ T4283] R13: 0000000000000001 R14: 00007f8b159b1058 R15: 00007ffd80b5e2d8 [ 147.209245][ T4364] syz.2.1237[4364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.209292][ T4364] syz.2.1237[4364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.601905][ T4395] device pim6reg1 entered promiscuous mode [ 149.451055][ T4429] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 149.524264][ T4429] device syzkaller0 entered promiscuous mode [ 149.777415][ T4451] syz.1.1262[4451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.777469][ T4451] syz.1.1262[4451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.646442][ T4554] syz.3.1294[4554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.658097][ T4554] syz.3.1294[4554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.129633][ T4638] cgroup: fork rejected by pids controller in /syz1 [ 155.499024][ T4697] device pim6reg1 entered promiscuous mode [ 155.626984][ T4682] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.635427][ T4682] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.646310][ T4682] device bridge_slave_0 entered promiscuous mode [ 155.760221][ T4682] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.767095][ T4682] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.774294][ T4682] device bridge_slave_1 entered promiscuous mode [ 155.960439][ T542] device bridge_slave_1 left promiscuous mode [ 155.966466][ T542] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.974014][ T542] device bridge_slave_0 left promiscuous mode [ 155.980023][ T542] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.053044][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 157.088159][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 157.111065][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 157.119321][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 157.127578][ T305] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.134401][ T305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.199578][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 157.207971][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 157.215936][ T305] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.222794][ T305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.468395][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 157.528055][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 157.633261][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.646238][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 157.654290][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.672250][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 157.703309][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 157.746348][ T4682] device veth0_vlan entered promiscuous mode [ 157.931718][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 158.046794][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.086338][ T4682] device veth1_macvtap entered promiscuous mode [ 158.110246][ T4735] device syzkaller0 entered promiscuous mode [ 158.116785][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.124051][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.131637][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 158.139673][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 158.147745][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 158.611646][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 158.653238][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 158.796411][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 158.920126][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 159.018593][ T24] audit: type=1400 audit(1731943215.710:163): avc: denied { mounton } for pid=4682 comm="syz-executor" path="/root/syzkaller.r1qurh/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 159.293793][ T24] audit: type=1400 audit(1731943215.710:164): avc: denied { mount } for pid=4682 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 159.423971][ T24] audit: type=1400 audit(1731943215.730:165): avc: denied { mounton } for pid=4682 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 160.574078][ T4823] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 160.580569][ T4823] pim6reg0: linktype set to 774 [ 162.715336][ T4876] device syzkaller0 entered promiscuous mode [ 162.723071][ T4884] syz.2.1380[4884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.723145][ T4884] syz.2.1380[4884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.860021][ T4884] tap0: tun_chr_ioctl cmd 2148553947 [ 163.020040][ T4890] tap0: tun_chr_ioctl cmd 1074025692 [ 163.027164][ T4887] device syzkaller0 entered promiscuous mode [ 164.011730][ T24] audit: type=1400 audit(1731943220.700:166): avc: denied { create } for pid=4908 comm="syz.3.1388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 164.080194][ T4929] syz.4.1394[4929] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.080246][ T4929] syz.4.1394[4929] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.125446][ T4929] device syzkaller0 entered promiscuous mode [ 164.617418][ T4950] rose0: tun_chr_ioctl cmd 1074025677 [ 164.622712][ T4950] rose0: linktype set to 805 [ 166.229669][ T5027] 8ûÅ: renamed from syzkaller0 [ 166.632433][ T5033] device syzkaller0 entered promiscuous mode [ 167.227685][ T5080] device syzkaller0 entered promiscuous mode [ 167.429755][ T24] audit: type=1400 audit(1731943224.120:167): avc: denied { create } for pid=5112 comm="syz.0.1454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 168.293052][ T5155] device sit0 entered promiscuous mode [ 170.191031][ T5218] device sit0 left promiscuous mode [ 173.599589][ T5336] device pim6reg1 entered promiscuous mode [ 173.666274][ T5340] device syzkaller0 entered promiscuous mode [ 174.673016][ T5367] cgroup: fork rejected by pids controller in /syz3 [ 175.551003][ T5380] device syzkaller0 entered promiscuous mode [ 176.081440][ T5394] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.098384][ T5394] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.105700][ T5394] device bridge_slave_0 entered promiscuous mode [ 176.175675][ T5394] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.197011][ T5394] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.204342][ T5394] device bridge_slave_1 entered promiscuous mode [ 177.305063][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 177.322948][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 177.391766][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 177.400414][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 177.408518][ T111] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.415358][ T111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.422606][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 177.430964][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.438918][ T111] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.445736][ T111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.455316][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 177.463465][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 177.474072][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 177.481993][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 177.522438][ T5436] device pim6reg1 entered promiscuous mode [ 177.570543][ T5394] device veth0_vlan entered promiscuous mode [ 177.582670][ T5394] device veth1_macvtap entered promiscuous mode [ 177.597863][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 177.605463][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 177.613658][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 177.621743][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 177.630365][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 177.656820][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 177.671202][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 177.679241][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 177.687420][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 177.695590][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 177.717666][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.726581][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 177.742384][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 177.770938][ T542] device bridge_slave_1 left promiscuous mode [ 177.776891][ T542] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.861774][ T542] device bridge_slave_0 left promiscuous mode [ 177.902920][ T542] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.911030][ T542] device veth1_macvtap left promiscuous mode [ 178.916584][ T5493] FAULT_INJECTION: forcing a failure. [ 178.916584][ T5493] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 178.947089][ T5493] CPU: 0 PID: 5493 Comm: syz.2.1580 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 178.958188][ T5493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 178.968077][ T5493] Call Trace: [ 178.971217][ T5493] dump_stack_lvl+0x1e2/0x24b [ 178.975731][ T5493] ? bfq_pos_tree_add_move+0x43b/0x43b [ 178.981028][ T5493] ? __irq_exit_rcu+0x40/0x150 [ 178.985618][ T5493] ? irq_exit_rcu+0x9/0x10 [ 178.989871][ T5493] dump_stack+0x15/0x17 [ 178.993869][ T5493] should_fail+0x3c6/0x510 [ 178.998116][ T5493] should_fail_usercopy+0x1a/0x20 [ 179.002982][ T5493] _copy_from_user+0x20/0xd0 [ 179.007408][ T5493] sock_do_ioctl+0x20e/0x3a0 [ 179.011834][ T5493] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 179.017824][ T5493] ? sock_show_fdinfo+0xa0/0xa0 [ 179.022511][ T5493] ? selinux_file_ioctl+0xbb/0x540 [ 179.027455][ T5493] ? selinux_file_ioctl+0x3b4/0x540 [ 179.032491][ T5493] ? selinux_file_ioctl+0x3cc/0x540 [ 179.037546][ T5493] sock_ioctl+0x4a6/0x760 [ 179.041802][ T5493] ? sock_poll+0x340/0x340 [ 179.046053][ T5493] ? security_file_ioctl+0x84/0xb0 [ 179.050995][ T5493] ? sock_poll+0x340/0x340 [ 179.055247][ T5493] __se_sys_ioctl+0x114/0x190 [ 179.059762][ T5493] __x64_sys_ioctl+0x7b/0x90 [ 179.064182][ T5493] do_syscall_64+0x34/0x70 [ 179.068527][ T5493] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 179.074246][ T5493] RIP: 0033:0x7f8b157f9719 [ 179.078502][ T5493] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 179.097946][ T5493] RSP: 002b:00007f8b14472038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 179.106183][ T5493] RAX: ffffffffffffffda RBX: 00007f8b159b0f80 RCX: 00007f8b157f9719 [ 179.114005][ T5493] RDX: 0000000020000080 RSI: 0000000000008922 RDI: 000000000000000c [ 179.121804][ T5493] RBP: 00007f8b14472090 R08: 0000000000000000 R09: 0000000000000000 [ 179.129634][ T5493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 179.137427][ T5493] R13: 0000000000000000 R14: 00007f8b159b0f80 R15: 00007ffd80b5e2d8 [ 183.624978][ T5576] tap0: tun_chr_ioctl cmd 2147767511 [ 184.729905][ T5618] device syzkaller0 entered promiscuous mode [ 185.568222][ T5638] tap0: tun_chr_ioctl cmd 1074025677 [ 185.647072][ T5638] tap0: linktype set to 821 [ 187.168258][ T5697] device syzkaller0 entered promiscuous mode [ 187.312259][ T5720] bridge0: port 3(veth0_to_batadv) entered blocking state [ 187.327059][ T5720] bridge0: port 3(veth0_to_batadv) entered disabled state [ 187.430823][ T5720] device veth0_to_batadv entered promiscuous mode [ 187.530750][ T5720] bridge0: port 3(veth0_to_batadv) entered blocking state [ 187.537720][ T5720] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 188.752011][ T24] audit: type=1400 audit(1731943245.440:168): avc: denied { create } for pid=5787 comm="syz.2.1671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 189.671295][ T5813] device pim6reg1 entered promiscuous mode [ 189.980669][ T5823] device veth1_macvtap left promiscuous mode [ 191.011576][ T5906] syz.1.1713[5906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.011622][ T5906] syz.1.1713[5906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.763124][ T6007] syz.0.1745[6007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.817398][ T6007] syz.0.1745[6007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.211151][ T6042] FAULT_INJECTION: forcing a failure. [ 193.211151][ T6042] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 193.345253][ T6042] CPU: 1 PID: 6042 Comm: syz.1.1753 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 193.356355][ T6042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 193.366250][ T6042] Call Trace: [ 193.369369][ T6042] dump_stack_lvl+0x1e2/0x24b [ 193.373878][ T6042] ? bfq_pos_tree_add_move+0x43b/0x43b [ 193.379171][ T6042] ? wake_up_klogd+0xb8/0xf0 [ 193.383597][ T6042] ? dump_stack+0x9/0x17 [ 193.387698][ T6042] dump_stack+0x15/0x17 [ 193.391669][ T6042] should_fail+0x3c6/0x510 [ 193.395923][ T6042] should_fail_usercopy+0x1a/0x20 [ 193.400786][ T6042] strncpy_from_user+0x24/0x2d0 [ 193.405472][ T6042] getname_flags+0xf2/0x520 [ 193.409807][ T6042] do_mkdirat+0xbb/0x2c0 [ 193.413888][ T6042] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 193.419529][ T6042] ? do_mknodat+0x450/0x450 [ 193.423872][ T6042] __x64_sys_mkdirat+0x7b/0x90 [ 193.428466][ T6042] do_syscall_64+0x34/0x70 [ 193.432721][ T6042] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 193.438448][ T6042] RIP: 0033:0x7f5a5abe2719 [ 193.442730][ T6042] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 193.462140][ T6042] RSP: 002b:00007f5a5985b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 193.470388][ T6042] RAX: ffffffffffffffda RBX: 00007f5a5ad99f80 RCX: 00007f5a5abe2719 [ 193.478195][ T6042] RDX: 00000000000001ff RSI: 0000000020000000 RDI: ffffffffffffff9c [ 193.486007][ T6042] RBP: 00007f5a5985b090 R08: 0000000000000000 R09: 0000000000000000 [ 193.493817][ T6042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 193.501630][ T6042] R13: 0000000000000000 R14: 00007f5a5ad99f80 R15: 00007ffca66d05b8 [ 193.680300][ T6040] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 193.754196][ T6040] device syzkaller0 entered promiscuous mode [ 195.237795][ T6107] device syzkaller0 entered promiscuous mode [ 196.947928][ T6149] FAULT_INJECTION: forcing a failure. [ 196.947928][ T6149] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 197.052780][ T6152] device syzkaller0 entered promiscuous mode [ 197.057205][ T6149] CPU: 1 PID: 6149 Comm: syz.2.1786 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 197.069699][ T6149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 197.079573][ T6149] Call Trace: [ 197.082714][ T6149] dump_stack_lvl+0x1e2/0x24b [ 197.087234][ T6149] ? bfq_pos_tree_add_move+0x43b/0x43b [ 197.092512][ T6149] ? __check_object_size+0x73/0x3c0 [ 197.097548][ T6149] ? ___ratelimit+0xb5/0x580 [ 197.101985][ T6149] dump_stack+0x15/0x17 [ 197.106073][ T6149] should_fail+0x3c6/0x510 [ 197.110328][ T6149] should_fail_usercopy+0x1a/0x20 [ 197.115175][ T6149] _copy_to_user+0x20/0x90 [ 197.119430][ T6149] simple_read_from_buffer+0xc7/0x150 [ 197.124642][ T6149] proc_fail_nth_read+0x1a3/0x210 [ 197.129498][ T6149] ? proc_fault_inject_write+0x390/0x390 [ 197.134967][ T6149] ? security_file_permission+0x86/0xb0 [ 197.140351][ T6149] ? rw_verify_area+0x1c3/0x360 [ 197.145042][ T6149] ? filename_create+0x4ba/0x750 [ 197.149804][ T6149] ? proc_fault_inject_write+0x390/0x390 [ 197.155273][ T6149] vfs_read+0x200/0xba0 [ 197.159268][ T6149] ? kmem_cache_free+0x1c0/0x1e0 [ 197.164039][ T6149] ? kernel_read+0x70/0x70 [ 197.168304][ T6149] ? __kasan_check_write+0x14/0x20 [ 197.173242][ T6149] ? mutex_lock+0xa5/0x110 [ 197.177496][ T6149] ? mutex_trylock+0xa0/0xa0 [ 197.181926][ T6149] ? __fdget_pos+0x2e7/0x3a0 [ 197.186344][ T6149] ? ksys_read+0x77/0x2c0 [ 197.190517][ T6149] ksys_read+0x199/0x2c0 [ 197.194592][ T6149] ? kvm_sched_clock_read+0x18/0x40 [ 197.199628][ T6149] ? vfs_write+0xe70/0xe70 [ 197.203882][ T6149] ? debug_smp_processor_id+0x17/0x20 [ 197.209087][ T6149] __x64_sys_read+0x7b/0x90 [ 197.213427][ T6149] do_syscall_64+0x34/0x70 [ 197.217694][ T6149] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 197.223408][ T6149] RIP: 0033:0x7f8b157f815c [ 197.227660][ T6149] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 197.247096][ T6149] RSP: 002b:00007f8b14472030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 197.255355][ T6149] RAX: ffffffffffffffda RBX: 00007f8b159b0f80 RCX: 00007f8b157f815c [ 197.263166][ T6149] RDX: 000000000000000f RSI: 00007f8b144720a0 RDI: 0000000000000006 [ 197.270964][ T6149] RBP: 00007f8b14472090 R08: 0000000000000000 R09: 0000000000000000 [ 197.278770][ T6149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.286584][ T6149] R13: 0000000000000000 R14: 00007f8b159b0f80 R15: 00007ffd80b5e2d8 [ 197.637302][ T6188] device pim6reg1 entered promiscuous mode [ 197.647822][ T6191] device pim6reg1 entered promiscuous mode [ 197.733440][ T6190] device veth0_vlan left promiscuous mode [ 197.742514][ T6190] device veth0_vlan entered promiscuous mode [ 197.771414][ T6183] device syzkaller0 entered promiscuous mode [ 197.895758][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.904157][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªªþ€: link becomes ready [ 197.911905][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 199.030461][ T6230] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 199.037201][ T6230] pim6reg0: linktype set to 774 [ 199.187832][ T6248] device pim6reg1 entered promiscuous mode [ 200.859661][ T6295] device syzkaller0 entered promiscuous mode [ 202.629581][ T24] audit: type=1400 audit(1731943259.320:169): avc: denied { create } for pid=6350 comm="syz.2.1851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 203.545622][ T6395] device syzkaller0 entered promiscuous mode [ 203.711139][ T6412] device sit0 left promiscuous mode [ 203.792523][ T6412] device sit0 entered promiscuous mode [ 207.154079][ T24] audit: type=1400 audit(1731943263.840:170): avc: denied { create } for pid=6527 comm="syz.1.1908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 207.260511][ T6547] device pim6reg1 entered promiscuous mode [ 207.982013][ T24] audit: type=1400 audit(1731943264.670:171): avc: denied { create } for pid=6587 comm="syz.0.1930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 209.098866][ T6637] -: renamed from syzkaller0 [ 210.420077][ T6687] device syzkaller0 entered promiscuous mode [ 210.643385][ T6704] ref_ctr_offset mismatch. inode: 0x871 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 210.686245][ T24] audit: type=1400 audit(1731943267.370:172): avc: denied { create } for pid=6705 comm="syz.2.1969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 211.169073][ T6729] device veth0_vlan left promiscuous mode [ 211.275166][ T6729] device veth0_vlan entered promiscuous mode [ 211.850924][ T6760] device veth0_vlan left promiscuous mode [ 211.856687][ T6760] device veth0_vlan entered promiscuous mode [ 211.908251][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.933826][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 211.946512][ T24] audit: type=1400 audit(1731943268.640:173): avc: denied { create } for pid=6742 comm="syz.3.1982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 212.019951][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 213.420245][ T6824] device macsec0 entered promiscuous mode [ 215.968323][ T6917] syz.2.2036[6917] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.968370][ T6917] syz.2.2036[6917] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.400227][ T7003] device sit0 entered promiscuous mode [ 219.294661][ T7040] device syzkaller0 entered promiscuous mode [ 219.317850][ T7036] ÿÿÿÿÿÿ: renamed from vlan1 [ 219.466418][ T7047] device syzkaller0 left promiscuous mode [ 220.955316][ T7111] device sit0 left promiscuous mode [ 221.925096][ T7137] device syzkaller0 entered promiscuous mode [ 223.939082][ T7198] device syzkaller0 entered promiscuous mode [ 224.013997][ T7205] syz.4.2131[7205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.014056][ T7205] syz.4.2131[7205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.067150][ T7228] device syzkaller0 entered promiscuous mode [ 226.689357][ T7275] device veth0_vlan left promiscuous mode [ 226.800393][ T7275] device veth0_vlan entered promiscuous mode [ 228.480618][ T7329] device sit0 entered promiscuous mode [ 228.972313][ T7342] device veth0_vlan left promiscuous mode [ 229.077761][ T7342] device veth0_vlan entered promiscuous mode [ 230.301319][ T7388] device syzkaller0 entered promiscuous mode [ 232.564717][ T7527] €Â0: renamed from pim6reg1 [ 233.029990][ T7548] device sit0 left promiscuous mode [ 233.262993][ T7555] device sit0 entered promiscuous mode [ 233.851411][ T7586] device syzkaller0 entered promiscuous mode [ 233.941837][ T7590] device veth1_macvtap left promiscuous mode [ 234.640266][ T7633] device lo left promiscuous mode [ 234.701328][ T7633] device lo entered promiscuous mode [ 234.743958][ T7633] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 234.797693][ T7638] device syzkaller0 entered promiscuous mode [ 234.840253][ T7644] device syzkaller0 entered promiscuous mode [ 235.274188][ T7696] device wg2 left promiscuous mode [ 235.353367][ T7696] device wg2 entered promiscuous mode [ 236.524807][ T7737] device syzkaller0 entered promiscuous mode [ 236.545191][ T7737] syzkaller0: tun_net_xmit 1280 [ 236.557597][ T7737] syzkaller0: create flow: hash 1731051205 index 3 [ 236.577705][ C0] syzkaller0: tun_net_xmit 76 [ 236.649333][ T7736] syzkaller0: delete flow: hash 1731051205 index 3 [ 236.668253][ C0] syzkaller0: tun_net_xmit 76 [ 236.732403][ T7736] syzkaller0: delete flow: hash 236477189 index 1 [ 236.968896][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 241.625971][ T7872] device pim6reg1 entered promiscuous mode [ 245.166888][ T7952] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.176882][ T7952] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.397004][ T7959] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.403866][ T7959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.411087][ T7959] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.417926][ T7959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.431238][ T7964] syz.4.2380[7964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.431300][ T7964] syz.4.2380[7964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.906994][ T7959] device bridge0 entered promiscuous mode [ 247.104425][ T8033] device veth0_vlan left promiscuous mode [ 247.122159][ T8033] device veth0_vlan entered promiscuous mode [ 247.182596][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.196810][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªªþ€: link becomes ready [ 247.204716][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.453442][ T8047] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 247.616351][ T8068] bridge0: port 3(veth0_to_batadv) entered blocking state [ 247.626740][ T8068] bridge0: port 3(veth0_to_batadv) entered disabled state [ 247.671451][ T8068] device veth0_to_batadv entered promiscuous mode [ 247.686586][ T8068] bridge0: port 3(veth0_to_batadv) entered blocking state [ 247.694084][ T8068] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 248.871898][ T8126] syz.0.2433[8126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.871950][ T8126] syz.0.2433[8126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.170511][ T8132] device sit0 entered promiscuous mode [ 249.582402][ T8153] device syzkaller0 entered promiscuous mode [ 249.843747][ T8160] device veth0_vlan left promiscuous mode [ 249.887117][ T8160] device veth0_vlan entered promiscuous mode [ 250.003815][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.014767][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 250.024486][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 250.188173][ T8167] device pim6reg1 entered promiscuous mode [ 251.659349][ T8204] device sit0 left promiscuous mode [ 251.893170][ T8210] device sit0 entered promiscuous mode [ 253.167479][ T8241] device veth0_vlan left promiscuous mode [ 253.173362][ T8241] device veth0_vlan entered promiscuous mode [ 253.216950][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.225031][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 253.267279][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 255.883233][ T8307] device veth1_macvtap left promiscuous mode [ 256.028859][ T8307] device macsec0 left promiscuous mode [ 256.316540][ T8336] device syzkaller0 entered promiscuous mode [ 256.737707][ T8351] device sit0 left promiscuous mode [ 257.371422][ T8373] device sit0 entered promiscuous mode [ 257.640284][ T8396] device macsec0 entered promiscuous mode [ 257.995470][ T8408] device veth1_macvtap entered promiscuous mode [ 258.037822][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 258.141132][ T8396] device veth1_macvtap left promiscuous mode [ 258.490767][ T8425] device wg2 entered promiscuous mode [ 259.470420][ T8468] device syzkaller0 entered promiscuous mode [ 260.230194][ T8500] device veth0_vlan left promiscuous mode [ 260.289919][ T8500] device veth0_vlan entered promiscuous mode [ 260.387730][ T8500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.395876][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.408657][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 260.416824][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 260.443268][ T8519] device pim6reg1 entered promiscuous mode [ 261.303650][ T8569] device syzkaller0 entered promiscuous mode [ 261.723905][ T8612] device sit0 left promiscuous mode [ 261.918462][ T8616] device sit0 entered promiscuous mode [ 262.555741][ T8624] device pim6reg1 entered promiscuous mode [ 263.403524][ T8676] device syzkaller0 entered promiscuous mode [ 263.898182][ T8703] device pim6reg1 entered promiscuous mode [ 264.963217][ T8753] device sit0 left promiscuous mode [ 265.027061][ T8753] device sit0 entered promiscuous mode [ 265.499716][ T8776] device syzkaller0 entered promiscuous mode [ 266.198851][ T8815] device veth0_vlan left promiscuous mode [ 266.215573][ T8815] device veth0_vlan entered promiscuous mode [ 266.283880][ T8815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.332297][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.345998][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 266.386394][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªªþ€: link becomes ready [ 266.998592][ T8836] device veth0_vlan left promiscuous mode [ 267.088904][ T8836] device veth0_vlan entered promiscuous mode [ 267.096247][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 267.136559][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 267.163868][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 267.180073][ T8840] device veth1_macvtap entered promiscuous mode [ 267.225642][ T8840] device macsec0 entered promiscuous mode [ 267.249448][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 267.817230][ T8897] device syzkaller0 entered promiscuous mode [ 270.090141][ T8970] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.452855][ T8968] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.467000][ T8968] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.484472][ T8968] device bridge_slave_0 entered promiscuous mode [ 270.499079][ T8986] device veth0_vlan left promiscuous mode [ 270.531931][ T8986] device veth0_vlan entered promiscuous mode [ 270.603141][ T8986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.650033][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.661455][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 270.736123][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.777400][ T8968] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.784335][ T8968] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.792825][ T8968] device bridge_slave_1 entered promiscuous mode [ 271.132169][ T8968] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.139040][ T8968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.146138][ T8968] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.152915][ T8968] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.167204][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.174363][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.232498][ T9023] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.240734][ T9023] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.269509][ T9023] device bridge0 left promiscuous mode [ 271.333198][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 271.357992][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 271.422941][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 271.433980][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 271.442177][ T542] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.449055][ T542] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.456806][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 271.476519][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 271.485613][ T542] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.492459][ T542] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.499935][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 271.509027][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 271.516870][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 271.530735][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 271.588581][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 271.596720][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 271.604854][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 271.612986][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 271.621274][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 271.628810][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 271.639060][ T8968] device veth0_vlan entered promiscuous mode [ 271.997454][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 272.031120][ T542] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 272.089315][ T8968] device veth1_macvtap entered promiscuous mode [ 272.179224][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 272.309892][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 272.332656][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 272.413340][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 272.445894][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 272.610343][ T9] device veth0_to_batadv left promiscuous mode [ 272.616372][ T9] bridge0: port 3(veth0_to_batadv) entered disabled state [ 272.787616][ T9] device bridge_slave_1 left promiscuous mode [ 272.825402][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.835784][ T9] device bridge_slave_0 left promiscuous mode [ 272.902365][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.925220][ T9] device veth1_macvtap left promiscuous mode [ 272.954549][ T9] device veth0_vlan left promiscuous mode [ 273.300603][ T9058] device syzkaller0 entered promiscuous mode [ 273.462335][ T9080] device pim6reg1 entered promiscuous mode [ 273.472230][ T9083] device pim6reg1 entered promiscuous mode [ 274.718331][ T9124] device syzkaller0 entered promiscuous mode [ 274.944898][ T9149] device syzkaller0 entered promiscuous mode [ 275.069494][ T9166] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.076543][ T9166] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.131466][ T9163] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.138622][ T9163] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.148830][ T9163] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.155962][ T9163] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.224930][ T9163] device bridge0 entered promiscuous mode [ 275.441079][ T9188] device sit0 entered promiscuous mode [ 275.548749][ T9189] device veth1_macvtap entered promiscuous mode [ 275.631688][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 278.203133][ T9257] syz.3.2797[9257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.203188][ T9257] syz.3.2797[9257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.703962][ T24] audit: type=1400 audit(1731943335.380:174): avc: denied { ioctl } for pid=9263 comm="syz.2.2799" path="" dev="cgroup2" ino=141 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 279.525258][ T9290] device veth1_macvtap left promiscuous mode [ 279.918141][ T9313] device pim6reg1 entered promiscuous mode [ 280.923824][ T9339] bridge0: port 3(veth0_to_batadv) entered blocking state [ 281.057191][ T9339] bridge0: port 3(veth0_to_batadv) entered disabled state [ 281.172065][ T9339] device veth0_to_batadv entered promiscuous mode [ 281.209602][ T9339] bridge0: port 3(veth0_to_batadv) entered blocking state [ 281.216577][ T9339] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 281.353637][ T9342] device syzkaller0 entered promiscuous mode [ 281.620323][ T9356] device pim6reg1 entered promiscuous mode [ 282.034065][ T9366] FAULT_INJECTION: forcing a failure. [ 282.034065][ T9366] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 282.047208][ T9366] CPU: 1 PID: 9366 Comm: syz.0.2831 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 282.058299][ T9366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 282.068297][ T9366] Call Trace: [ 282.071446][ T9366] dump_stack_lvl+0x1e2/0x24b [ 282.075938][ T9366] ? bfq_pos_tree_add_move+0x43b/0x43b [ 282.081251][ T9366] dump_stack+0x15/0x17 [ 282.085236][ T9366] should_fail+0x3c6/0x510 [ 282.089483][ T9366] should_fail_usercopy+0x1a/0x20 [ 282.094338][ T9366] _copy_to_user+0x20/0x90 [ 282.098602][ T9366] simple_read_from_buffer+0xc7/0x150 [ 282.103802][ T9366] proc_fail_nth_read+0x1a3/0x210 [ 282.108676][ T9366] ? proc_fault_inject_write+0x390/0x390 [ 282.114135][ T9366] ? security_file_permission+0x86/0xb0 [ 282.119512][ T9366] ? rw_verify_area+0x1c3/0x360 [ 282.124197][ T9366] ? proc_fault_inject_write+0x390/0x390 [ 282.129664][ T9366] vfs_read+0x200/0xba0 [ 282.133660][ T9366] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 282.139298][ T9366] ? kernel_read+0x70/0x70 [ 282.143551][ T9366] ? __kasan_check_write+0x14/0x20 [ 282.148509][ T9366] ? mutex_lock+0xa5/0x110 [ 282.152752][ T9366] ? mutex_trylock+0xa0/0xa0 [ 282.157183][ T9366] ? __fdget_pos+0x2e7/0x3a0 [ 282.161601][ T9366] ? ksys_read+0x77/0x2c0 [ 282.165771][ T9366] ksys_read+0x199/0x2c0 [ 282.169849][ T9366] ? bpf_trace_run1+0x210/0x210 [ 282.174535][ T9366] ? vfs_write+0xe70/0xe70 [ 282.178805][ T9366] ? __bpf_trace_sys_enter+0x62/0x70 [ 282.183913][ T9366] __x64_sys_read+0x7b/0x90 [ 282.188248][ T9366] do_syscall_64+0x34/0x70 [ 282.192505][ T9366] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 282.198242][ T9366] RIP: 0033:0x7f67f91dc15c [ 282.202484][ T9366] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 282.221923][ T9366] RSP: 002b:00007f67f7e56030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 282.230166][ T9366] RAX: ffffffffffffffda RBX: 00007f67f9394f80 RCX: 00007f67f91dc15c [ 282.237978][ T9366] RDX: 000000000000000f RSI: 00007f67f7e560a0 RDI: 0000000000000007 [ 282.245785][ T9366] RBP: 00007f67f7e56090 R08: 0000000000000000 R09: 0000000000000000 [ 282.253609][ T9366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 282.261419][ T9366] R13: 0000000000000000 R14: 00007f67f9394f80 R15: 00007ffe998f39e8 [ 282.319038][ T9363] device wg2 left promiscuous mode [ 282.427808][ T9363] device wg2 entered promiscuous mode [ 282.601214][ T9373] device veth1_macvtap entered promiscuous mode [ 282.619223][ T9375] syz.1.2834[9375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.619280][ T9375] syz.1.2834[9375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.643414][ T9373] device macsec0 entered promiscuous mode [ 282.676934][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 283.024202][ T9392] device pim6reg1 entered promiscuous mode [ 283.890259][ T9481] device syzkaller0 entered promiscuous mode [ 283.896707][ T9472] device veth1_macvtap entered promiscuous mode [ 283.903144][ T9472] device macsec0 entered promiscuous mode [ 283.919230][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 287.105042][ T9617] device veth0_vlan left promiscuous mode [ 287.110977][ T9617] device veth0_vlan entered promiscuous mode [ 287.180816][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 287.202862][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 287.221929][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 287.555584][ T9650] syzkaller0: refused to change device tx_queue_len [ 287.727916][ T9651] device pim6reg1 entered promiscuous mode [ 288.000903][ T9678] device syzkaller0 entered promiscuous mode [ 288.141015][ T9685] device veth1_macvtap left promiscuous mode [ 288.147141][ T9685] device macsec0 left promiscuous mode [ 288.313538][ T9686] device veth1_macvtap entered promiscuous mode [ 288.411921][ T9686] device macsec0 entered promiscuous mode [ 288.596580][ T9707] syz.2.2940[9707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.596634][ T9707] syz.2.2940[9707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.599571][ T9706] syz.2.2940[9706] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.649334][ T9703] FAULT_INJECTION: forcing a failure. [ 288.649334][ T9703] name failslab, interval 1, probability 0, space 0, times 0 [ 288.672853][ T9703] CPU: 1 PID: 9703 Comm: syz.4.2939 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 288.677023][ T9706] syz.2.2940[9706] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.683942][ T9703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 288.683946][ T9703] Call Trace: [ 288.683962][ T9703] dump_stack_lvl+0x1e2/0x24b [ 288.683978][ T9703] ? bfq_pos_tree_add_move+0x43b/0x43b [ 288.717889][ T9703] dump_stack+0x15/0x17 [ 288.721873][ T9703] should_fail+0x3c6/0x510 [ 288.726128][ T9703] ? __alloc_skb+0x80/0x510 [ 288.730471][ T9703] __should_failslab+0xa4/0xe0 [ 288.735067][ T9703] should_failslab+0x9/0x20 [ 288.739412][ T9703] kmem_cache_alloc+0x3d/0x2e0 [ 288.744006][ T9703] __alloc_skb+0x80/0x510 [ 288.748182][ T9703] ? __kasan_check_write+0x14/0x20 [ 288.753118][ T9703] __napi_alloc_skb+0x15d/0x2e0 [ 288.757806][ T9703] napi_get_frags+0x6a/0x170 [ 288.762238][ T9703] tun_get_user+0xc88/0x38f0 [ 288.766672][ T9703] ? _kstrtoull+0x3a0/0x4a0 [ 288.771004][ T9703] ? tun_do_read+0x1f60/0x1f60 [ 288.775596][ T9703] ? kstrtouint_from_user+0x20a/0x2a0 [ 288.780808][ T9703] ? kstrtol_from_user+0x310/0x310 [ 288.785756][ T9703] ? avc_policy_seqno+0x1b/0x70 [ 288.790443][ T9703] ? selinux_file_permission+0x2bb/0x560 [ 288.795935][ T9703] ? fsnotify_perm+0x67/0x4e0 [ 288.800428][ T9703] tun_chr_write_iter+0x1a8/0x250 [ 288.805292][ T9703] vfs_write+0xb4c/0xe70 [ 288.809360][ T9703] ? putname+0xe7/0x140 [ 288.813366][ T9703] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 288.818995][ T9703] ? kernel_write+0x3d0/0x3d0 [ 288.823514][ T9703] ? __fdget_pos+0x209/0x3a0 [ 288.827932][ T9703] ? ksys_write+0x77/0x2c0 [ 288.832188][ T9703] ksys_write+0x199/0x2c0 [ 288.836353][ T9703] ? __ia32_sys_read+0x90/0x90 [ 288.840960][ T9703] ? debug_smp_processor_id+0x17/0x20 [ 288.846160][ T9703] __x64_sys_write+0x7b/0x90 [ 288.850591][ T9703] do_syscall_64+0x34/0x70 [ 288.854838][ T9703] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 288.860570][ T9703] RIP: 0033:0x7fea2ba72719 [ 288.864819][ T9703] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 288.884258][ T9703] RSP: 002b:00007fea2a6eb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 288.892647][ T9703] RAX: ffffffffffffffda RBX: 00007fea2bc29f80 RCX: 00007fea2ba72719 [ 288.900461][ T9703] RDX: 000000000000fdef RSI: 0000000020000440 RDI: 0000000000000003 [ 288.908266][ T9703] RBP: 00007fea2a6eb090 R08: 0000000000000000 R09: 0000000000000000 [ 288.916079][ T9703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 288.923890][ T9703] R13: 0000000000000000 R14: 00007fea2bc29f80 R15: 00007ffd4f066ab8 [ 288.935367][ T9688] device wg2 left promiscuous mode [ 288.993444][ T9718] veth0_vlan: mtu greater than device maximum [ 289.761882][ T9743] device syzkaller0 entered promiscuous mode [ 290.234143][ T9763] bridge0: port 3(veth0_to_batadv) entered disabled state [ 290.243982][ T9763] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.276459][ T9763] device veth0_to_batadv left promiscuous mode [ 290.282868][ T9763] bridge0: port 3(veth0_to_batadv) entered disabled state [ 290.292284][ T9763] device bridge_slave_1 left promiscuous mode [ 290.298579][ T9763] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.312106][ T9763] device bridge_slave_0 left promiscuous mode [ 290.318331][ T9763] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.417133][ T9810] FAULT_INJECTION: forcing a failure. [ 291.417133][ T9810] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 291.468382][ T9810] CPU: 1 PID: 9810 Comm: syz.3.2970 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 291.479578][ T9810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 291.489469][ T9810] Call Trace: [ 291.492649][ T9810] dump_stack_lvl+0x1e2/0x24b [ 291.497114][ T9810] ? bfq_pos_tree_add_move+0x43b/0x43b [ 291.502418][ T9810] ? __kasan_slab_alloc+0x63/0xe0 [ 291.507271][ T9810] ? slab_post_alloc_hook+0x61/0x2f0 [ 291.512387][ T9810] dump_stack+0x15/0x17 [ 291.516382][ T9810] should_fail+0x3c6/0x510 [ 291.520648][ T9810] should_fail_alloc_page+0x52/0x60 [ 291.525669][ T9810] __alloc_pages_nodemask+0x1b3/0xaf0 [ 291.530888][ T9810] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 291.536277][ T9810] kmalloc_order+0x4c/0x170 [ 291.540608][ T9810] kmalloc_order_trace+0x18/0x90 [ 291.545373][ T9810] ? tun_get_user+0x10a6/0x38f0 [ 291.550057][ T9810] __kmalloc_track_caller+0x1dd/0x320 [ 291.555371][ T9810] ? tun_get_user+0x10a6/0x38f0 [ 291.560040][ T9810] pskb_expand_head+0x12b/0x1180 [ 291.564812][ T9810] ? __napi_alloc_skb+0x16a/0x2e0 [ 291.569682][ T9810] tun_get_user+0x10a6/0x38f0 [ 291.574189][ T9810] ? _kstrtoull+0x3a0/0x4a0 [ 291.578537][ T9810] ? tun_do_read+0x1f60/0x1f60 [ 291.583129][ T9810] ? kstrtouint_from_user+0x20a/0x2a0 [ 291.588337][ T9810] ? kstrtol_from_user+0x310/0x310 [ 291.593281][ T9810] ? avc_policy_seqno+0x1b/0x70 [ 291.597980][ T9810] ? selinux_file_permission+0x2bb/0x560 [ 291.603434][ T9810] ? fsnotify_perm+0x67/0x4e0 [ 291.607951][ T9810] tun_chr_write_iter+0x1a8/0x250 [ 291.612811][ T9810] vfs_write+0xb4c/0xe70 [ 291.616894][ T9810] ? kernel_write+0x3d0/0x3d0 [ 291.621427][ T9810] ? __fdget_pos+0x209/0x3a0 [ 291.625830][ T9810] ? ksys_write+0x77/0x2c0 [ 291.630083][ T9810] ksys_write+0x199/0x2c0 [ 291.634248][ T9810] ? __ia32_sys_read+0x90/0x90 [ 291.638850][ T9810] ? debug_smp_processor_id+0x17/0x20 [ 291.644053][ T9810] __x64_sys_write+0x7b/0x90 [ 291.648480][ T9810] do_syscall_64+0x34/0x70 [ 291.652737][ T9810] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 291.658458][ T9810] RIP: 0033:0x7f3fdcb20719 [ 291.662712][ T9810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 291.682154][ T9810] RSP: 002b:00007f3fdb799038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 291.690404][ T9810] RAX: ffffffffffffffda RBX: 00007f3fdccd7f80 RCX: 00007f3fdcb20719 [ 291.698297][ T9810] RDX: 000000000000fdef RSI: 0000000020000440 RDI: 0000000000000003 [ 291.706112][ T9810] RBP: 00007f3fdb799090 R08: 0000000000000000 R09: 0000000000000000 [ 291.713920][ T9810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 291.721732][ T9810] R13: 0000000000000000 R14: 00007f3fdccd7f80 R15: 00007fff768ab7b8 [ 291.810395][ T9815] device syzkaller0 entered promiscuous mode [ 292.169106][ T9828] device wg2 entered promiscuous mode [ 292.564165][ T9828] device syzkaller0 entered promiscuous mode [ 292.678202][ T9858] syz.2.2984[9858] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.678249][ T9858] syz.2.2984[9858] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.869317][ T9870] device wg2 left promiscuous mode [ 293.047250][ T9873] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.054169][ T9873] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.061651][ T9873] device bridge_slave_0 entered promiscuous mode [ 293.079001][ T9873] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.092739][ T9873] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.125330][ T9873] device bridge_slave_1 entered promiscuous mode [ 293.252339][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 293.261237][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 293.269811][ T9890] bridge0: port 3(veth0_to_batadv) entered disabled state [ 293.278999][ T9890] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.286949][ T9890] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.377285][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.385850][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.400459][ T3082] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.407331][ T3082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.419920][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.428677][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.436692][ T3082] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.443550][ T3082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.450861][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 293.459035][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.496645][ T9873] device veth0_vlan entered promiscuous mode [ 293.514383][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 293.534178][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 293.559537][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 293.592903][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 293.601572][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 293.609792][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 293.617635][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 293.648904][ T9909] device sit0 left promiscuous mode [ 293.723921][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 293.731937][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 293.743421][ T9873] device veth1_macvtap entered promiscuous mode [ 293.750004][ T9913] device sit0 entered promiscuous mode [ 293.764275][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 293.775742][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 293.789583][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 293.885636][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 293.894662][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 293.936630][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 293.944844][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 294.193346][ T9938] device sit0 entered promiscuous mode [ 294.230610][ T9936] device syzkaller0 entered promiscuous mode [ 294.241450][ T305] device veth1_macvtap left promiscuous mode [ 294.413074][ T9954] device veth0_vlan left promiscuous mode [ 294.468971][ T9954] device veth0_vlan entered promiscuous mode [ 294.858247][ T9961] device pim6reg1 entered promiscuous mode [ 294.918324][ T9951] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.987623][ T9951] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.994884][ T9951] device bridge_slave_0 entered promiscuous mode [ 295.060729][ T9974] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.069489][ T9974] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.103244][ T9974] device bridge0 left promiscuous mode [ 295.208308][ T9951] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.225738][ T9951] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.287353][ T9951] device bridge_slave_1 entered promiscuous mode [ 295.670421][ T9993] device pim6reg1 entered promiscuous mode [ 295.986420][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 295.997273][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 296.038389][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 296.062510][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 296.090739][ T111] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.097621][ T111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.119639][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 296.135460][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 296.144183][ T111] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.151055][ T111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.174508][ T9951] device veth0_vlan entered promiscuous mode [ 296.188575][ T9951] device veth1_macvtap entered promiscuous mode [ 296.230186][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 296.242965][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 296.256150][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 296.263736][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 296.271119][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 296.279527][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 296.287051][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 296.294848][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.352960][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 296.440308][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 296.479607][T10022] device syzkaller0 entered promiscuous mode [ 297.867066][ T305] device veth0_to_batadv left promiscuous mode [ 297.883303][ T305] bridge0: port 3(veth0_to_batadv) entered disabled state [ 297.898464][ T305] device bridge_slave_1 left promiscuous mode [ 297.908235][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.928088][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.938360][ T305] device veth1_macvtap left promiscuous mode [ 297.944208][ T305] device veth0_vlan left promiscuous mode [ 298.204664][T10081] device pim6reg1 entered promiscuous mode [ 298.601101][T10090] device veth0_vlan left promiscuous mode [ 298.630385][T10090] device veth0_vlan entered promiscuous mode [ 298.671467][T10090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 298.727139][T10092] device sit0 left promiscuous mode [ 298.751698][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 298.767608][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 298.817361][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 298.826492][T10094] device sit0 entered promiscuous mode [ 301.247189][T10166] device syzkaller0 entered promiscuous mode [ 301.979194][T10199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 302.719655][ T24] audit: type=1400 audit(1731943359.410:175): avc: denied { create } for pid=10223 comm="syz.3.3082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 302.840520][T10225] device syzkaller0 entered promiscuous mode [ 304.185059][T10297] device syzkaller0 entered promiscuous mode [ 304.685583][T10310] device sit0 left promiscuous mode [ 304.890725][T10310] device sit0 entered promiscuous mode [ 305.916005][T10345] device sit0 left promiscuous mode [ 306.212210][T10355] device syzkaller0 entered promiscuous mode [ 306.223147][T10360] rose0: tun_chr_ioctl cmd 1074025677 [ 306.236912][T10360] rose0: linktype set to 805 [ 306.599449][T10386] device wg2 entered promiscuous mode [ 306.623966][ T24] audit: type=1400 audit(1731943363.310:176): avc: denied { create } for pid=10391 comm="syz.2.3132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 307.371862][T10423] device pim6reg1 entered promiscuous mode [ 307.416780][T10427] : renamed from ipvlan1 [ 307.845088][T10443] device syzkaller0 entered promiscuous mode [ 308.826679][T10519] device syzkaller0 entered promiscuous mode [ 309.394305][T10552] ÿÿÿÿÿÿ: renamed from vlan1 [ 310.229473][T10620] device pim6reg1 entered promiscuous mode [ 312.163616][T10685] 8ûÅ: renamed from syzkaller0 [ 313.062244][T10724] device syzkaller0 entered promiscuous mode [ 313.352403][ T94] udevd[94]: worker [6242] terminated by signal 33 (Unknown signal 33) [ 313.380240][ T94] udevd[94]: worker [6242] failed while handling '/devices/virtual/block/loop4' [ 313.607971][T10749] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.620274][T10749] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.862760][T10783] device sit0 entered promiscuous mode [ 314.707900][T10827] device veth1_macvtap left promiscuous mode [ 315.703714][T10858] device pim6reg1 entered promiscuous mode [ 316.837741][T10935] syz.4.3295[10935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.837789][T10935] syz.4.3295[10935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.857565][T10935] syz.4.3295[10935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.881196][T10935] syz.4.3295[10935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.337116][T10963] device pim6reg1 entered promiscuous mode [ 317.445744][T10972] device syzkaller0 entered promiscuous mode [ 319.004528][T11071] FAULT_INJECTION: forcing a failure. [ 319.004528][T11071] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 319.017531][T11071] CPU: 0 PID: 11071 Comm: syz.4.3340 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 319.028688][T11071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 319.038582][T11071] Call Trace: [ 319.041721][T11071] dump_stack_lvl+0x1e2/0x24b [ 319.046225][T11071] ? bfq_pos_tree_add_move+0x43b/0x43b [ 319.051517][T11071] ? 0xffffffffa0024000 [ 319.055511][T11071] ? is_bpf_text_address+0x172/0x190 [ 319.060648][T11071] dump_stack+0x15/0x17 [ 319.064626][T11071] should_fail+0x3c6/0x510 [ 319.068893][T11071] should_fail_usercopy+0x1a/0x20 [ 319.073740][T11071] _copy_from_user+0x20/0xd0 [ 319.078175][T11071] __se_sys_bpf+0x232/0x11cb0 [ 319.082681][T11071] ? stack_trace_save+0x113/0x1c0 [ 319.087550][T11071] ? terminate_walk+0x407/0x4f0 [ 319.092223][T11071] ? stack_trace_snprint+0xf0/0xf0 [ 319.097174][T11071] ? __kasan_check_write+0x14/0x20 [ 319.102124][T11071] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 319.107417][T11071] ? kmem_cache_free+0xa9/0x1e0 [ 319.112099][T11071] ? _raw_spin_lock+0x1b0/0x1b0 [ 319.116815][T11071] ? kmem_cache_free+0xa9/0x1e0 [ 319.121473][T11071] ? kasan_set_track+0x5d/0x70 [ 319.126071][T11071] ? __x64_sys_bpf+0x90/0x90 [ 319.130501][T11071] ? __kasan_slab_free+0x11/0x20 [ 319.135272][T11071] ? kmem_cache_free+0xa9/0x1e0 [ 319.139960][T11071] ? putname+0xe7/0x140 [ 319.143953][T11071] ? _kstrtoull+0x3a0/0x4a0 [ 319.148292][T11071] ? kstrtouint_from_user+0x20a/0x2a0 [ 319.153541][T11071] ? kstrtol_from_user+0x310/0x310 [ 319.158448][T11071] ? memset+0x35/0x40 [ 319.162265][T11071] ? __fsnotify_parent+0x4b9/0x6c0 [ 319.167214][T11071] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 319.173637][T11071] ? proc_fail_nth_write+0x20b/0x290 [ 319.178765][T11071] ? proc_fail_nth_read+0x210/0x210 [ 319.183787][T11071] ? security_file_permission+0x86/0xb0 [ 319.189169][T11071] ? rw_verify_area+0x1c3/0x360 [ 319.193860][T11071] ? preempt_count_add+0x92/0x1a0 [ 319.198717][T11071] ? vfs_write+0x852/0xe70 [ 319.202968][T11071] ? putname+0xe7/0x140 [ 319.206963][T11071] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 319.212621][T11071] ? kmem_cache_free+0x1c0/0x1e0 [ 319.217380][T11071] ? kernel_write+0x3d0/0x3d0 [ 319.221895][T11071] ? __kasan_check_write+0x14/0x20 [ 319.226837][T11071] ? mutex_lock+0xa5/0x110 [ 319.231092][T11071] ? mutex_trylock+0xa0/0xa0 [ 319.235519][T11071] ? __kasan_check_write+0x14/0x20 [ 319.240466][T11071] ? fput_many+0x160/0x1b0 [ 319.244749][T11071] ? debug_smp_processor_id+0x17/0x20 [ 319.249934][T11071] __x64_sys_bpf+0x7b/0x90 [ 319.254177][T11071] do_syscall_64+0x34/0x70 [ 319.258430][T11071] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 319.264156][T11071] RIP: 0033:0x7f0933799719 [ 319.268411][T11071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 319.287854][T11071] RSP: 002b:00007f0932412038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 319.296095][T11071] RAX: ffffffffffffffda RBX: 00007f0933950f80 RCX: 00007f0933799719 [ 319.303904][T11071] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 319.311716][T11071] RBP: 00007f0932412090 R08: 0000000000000000 R09: 0000000000000000 [ 319.319528][T11071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 319.327339][T11071] R13: 0000000000000000 R14: 00007f0933950f80 R15: 00007ffc7b6aad38 [ 319.363190][T11073] device pim6reg1 entered promiscuous mode [ 319.755189][T11090] device syzkaller0 entered promiscuous mode [ 320.240897][T11112] syz.0.3355[11112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.240947][T11112] syz.0.3355[11112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.357774][T11120] syz.0.3355[11120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.487970][T11112] device veth0_vlan left promiscuous mode [ 320.526490][T11120] syz.0.3355[11120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.625372][T11112] device veth0_vlan entered promiscuous mode [ 320.872557][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 320.894910][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 320.922300][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 320.993406][T11125] device wg2 left promiscuous mode [ 321.088601][T11126] device wg2 entered promiscuous mode [ 322.932795][T11240] device wg2 entered promiscuous mode [ 323.127058][T11255] device veth1_macvtap left promiscuous mode [ 323.132895][T11255] device macsec0 left promiscuous mode [ 324.283621][T11323] device veth0_vlan left promiscuous mode [ 324.289808][T11323] device veth0_vlan entered promiscuous mode [ 324.308280][T11326] device wg2 entered promiscuous mode [ 324.534530][T11349] device wg2 left promiscuous mode [ 324.755675][T11375] syz.3.3432[11375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.755740][T11375] syz.3.3432[11375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.815117][T11386] device pim6reg1 entered promiscuous mode [ 326.046050][T11423] dvmrp1: tun_chr_ioctl cmd 1074812117 [ 326.086810][T11429] device syzkaller0 entered promiscuous mode [ 327.531499][T11500] device veth0_vlan left promiscuous mode [ 327.570353][T11500] device veth0_vlan entered promiscuous mode [ 328.033325][T11509] device pim6reg1 entered promiscuous mode [ 328.328407][T11519] syz.0.3480[11519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.328459][T11519] syz.0.3480[11519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.629163][T11520] device veth0_vlan left promiscuous mode [ 328.696681][T11520] device veth0_vlan entered promiscuous mode [ 328.953751][T11520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.089041][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.096745][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 329.103896][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 329.122014][T11539] device pim6reg1 entered promiscuous mode [ 329.243156][T11563] device syzkaller0 entered promiscuous mode [ 329.603520][T11584] syz.3.3500[11584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.603573][T11584] syz.3.3500[11584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.997248][T11592] ªªªªªª: renamed from vlan0 [ 330.467913][T11623] device pim6reg1 entered promiscuous mode [ 330.859478][T11641] device veth0_vlan left promiscuous mode [ 330.894034][T11641] device veth0_vlan entered promiscuous mode [ 330.969511][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 330.998068][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 331.007323][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 331.103592][T11644] device sit0 entered promiscuous mode [ 331.507216][T11652] device pim6reg1 entered promiscuous mode [ 331.579212][T11654] device syzkaller0 entered promiscuous mode [ 332.158341][T11660] device syzkaller0 entered promiscuous mode [ 333.653951][T11716] device bridge_slave_1 left promiscuous mode [ 333.661239][T11716] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.842459][T11716] device bridge_slave_0 left promiscuous mode [ 333.853475][T11716] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.099000][T11724] device pim6reg1 entered promiscuous mode [ 334.610063][T11771] syz.3.3565[11771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.610150][T11771] syz.3.3565[11771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.183319][T11801] device syzkaller0 entered promiscuous mode [ 335.632172][T11827] syz.3.3580[11827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.632227][T11827] syz.3.3580[11827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.644235][T11826] syz.3.3580[11826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.655572][T11826] syz.3.3580[11826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.436609][T11869] device pim6reg1 entered promiscuous mode [ 336.923321][T11896] device syzkaller0 entered promiscuous mode [ 336.963714][T11892] device pim6reg1 entered promiscuous mode [ 338.491055][T11986] device bridge_slave_1 left promiscuous mode [ 338.498137][T11986] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.507141][T11986] device bridge_slave_0 left promiscuous mode [ 338.513411][T11986] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.735109][T11999] syz.3.3631[11999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.735155][T11999] syz.3.3631[11999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.751856][T11998] syz.3.3631[11998] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.837841][T11992] device syzkaller0 entered promiscuous mode [ 339.380912][T12020] device pim6reg1 entered promiscuous mode [ 341.660273][T12132] device pim6reg1 entered promiscuous mode [ 342.239493][ T24] audit: type=1400 audit(1731943398.930:177): avc: denied { create } for pid=12158 comm="syz.4.3687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 342.633924][T12157] device syzkaller0 entered promiscuous mode [ 345.018313][T12275] tun0: tun_chr_ioctl cmd 1074025676 [ 345.071861][T12275] tun0: owner set to 0 [ 345.450535][T12280] device veth0_vlan left promiscuous mode [ 345.467453][T12280] device veth0_vlan entered promiscuous mode [ 345.812566][T12300] syz.2.3727[12300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.812650][T12300] syz.2.3727[12300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.883454][T12302] device veth1_macvtap entered promiscuous mode [ 345.908240][T12302] device macsec0 entered promiscuous mode [ 345.971417][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 346.189652][T12319] device veth0_vlan left promiscuous mode [ 346.359058][T12319] device veth0_vlan entered promiscuous mode [ 346.649454][T12337] device syzkaller0 entered promiscuous mode [ 347.109929][T12368] device pim6reg1 entered promiscuous mode [ 347.759081][T12413] device pim6reg1 entered promiscuous mode [ 348.094942][T12415] device veth0_vlan left promiscuous mode [ 348.215320][T12415] device veth0_vlan entered promiscuous mode [ 348.454549][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 348.472043][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 348.671124][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 349.375720][T12482] device syzkaller0 entered promiscuous mode [ 350.600582][T12555] device veth0_vlan left promiscuous mode [ 350.732624][T12555] device veth0_vlan entered promiscuous mode [ 351.395784][T12578] device pim6reg1 entered promiscuous mode [ 352.172209][T12633] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 352.351528][T12661] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.495455][T12661] device bridge_slave_0 left promiscuous mode [ 352.510312][T12661] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.880954][T12682] device pim6reg1 entered promiscuous mode [ 353.111693][T12688] device pim6reg1 entered promiscuous mode [ 353.229652][T12711] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 353.254315][T12711] device syzkaller0 entered promiscuous mode [ 353.269417][T12713] device pim6reg1 entered promiscuous mode [ 353.399051][T12720] device pim6reg1 entered promiscuous mode [ 353.410401][T12723] tap0: tun_chr_ioctl cmd 1074025677 [ 353.415493][T12723] tap0: linktype set to 821 [ 354.211427][T12800] device wg2 left promiscuous mode [ 354.582414][T12817] device pim6reg1 entered promiscuous mode [ 354.806491][T12838] device syzkaller0 entered promiscuous mode [ 354.855700][T12843] device veth0_vlan left promiscuous mode [ 354.883202][T12843] device veth0_vlan entered promiscuous mode [ 355.951412][T12882] device syzkaller0 entered promiscuous mode [ 357.579585][T12937] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.586555][T12937] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.767534][T12947] device bridge_slave_1 left promiscuous mode [ 357.865658][T12947] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.897714][T12947] device bridge_slave_0 left promiscuous mode [ 357.904505][T12947] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.046276][T12948] device syzkaller0 entered promiscuous mode [ 358.103534][T12958] device sit0 left promiscuous mode [ 358.273964][T12961] device sit0 entered promiscuous mode [ 359.294582][T13036] device syzkaller0 entered promiscuous mode [ 359.347610][T13043] device macsec0 entered promiscuous mode [ 359.360636][T13048] device veth1_macvtap entered promiscuous mode [ 359.467766][T13039] device pim6reg1 entered promiscuous mode [ 359.487549][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 359.505118][T13043] device veth1_macvtap left promiscuous mode [ 359.827327][T13077] device pim6reg1 entered promiscuous mode [ 360.213390][T13097] ªªªªªª: renamed from vlan0 [ 360.414522][T13101] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 360.443424][T13101] device syzkaller0 entered promiscuous mode [ 360.733524][T13113] device syzkaller0 entered promiscuous mode [ 361.895442][T13204] device syzkaller0 entered promiscuous mode [ 361.948341][T13210] device syzkaller0 entered promiscuous mode [ 362.424406][T13261] device pim6reg1 entered promiscuous mode [ 363.057955][T13280] device syzkaller0 entered promiscuous mode [ 363.405542][T13311] device pim6reg1 entered promiscuous mode [ 363.506520][T13322] device pim6reg1 entered promiscuous mode [ 363.761743][T13357] device syzkaller0 entered promiscuous mode [ 364.370582][T13373] device syzkaller0 entered promiscuous mode [ 364.966066][T13398] tap0: tun_chr_ioctl cmd 1074025677 [ 365.090655][T13398] tap0: linktype set to 821 [ 366.661486][ T24] audit: type=1400 audit(1731943423.350:178): avc: denied { create } for pid=13453 comm="syz.0.4116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 368.098516][T13513] device veth0_vlan left promiscuous mode [ 368.107698][T13513] device veth0_vlan entered promiscuous mode [ 368.247800][T13535] device pim6reg1 entered promiscuous mode [ 368.556754][T13581] device syzkaller0 entered promiscuous mode [ 368.687020][T13613] device sit0 left promiscuous mode [ 368.759303][T13613] device sit0 entered promiscuous mode [ 368.880760][T13627] device veth0_vlan left promiscuous mode [ 368.893190][T13627] device veth0_vlan entered promiscuous mode [ 368.914511][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 368.923447][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 368.931255][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 368.953807][T13631] device syzkaller0 entered promiscuous mode [ 369.036592][T13644] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 370.307297][T13717] device syzkaller0 entered promiscuous mode [ 370.580044][T13737] syz.2.4205[13737] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.580096][T13737] syz.2.4205[13737] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.628711][T13740] device syzkaller0 entered promiscuous mode [ 370.895256][T13776] device sit0 left promiscuous mode [ 372.820903][T13814] device pim6reg1 entered promiscuous mode [ 373.013973][T13836] device veth0_vlan left promiscuous mode [ 373.019983][T13836] device veth0_vlan entered promiscuous mode [ 373.026408][T13836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 373.034146][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 373.055176][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 373.062369][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 373.113579][T13849] device sit0 left promiscuous mode [ 373.131330][T13843] device veth1_macvtap entered promiscuous mode [ 373.158040][T13843] device macsec0 entered promiscuous mode [ 373.193363][T13849] device sit0 entered promiscuous mode [ 373.553563][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 374.014861][T13902] device syzkaller0 entered promiscuous mode [ 375.146491][T13959] device syzkaller0 entered promiscuous mode [ 377.121527][T14029] device syzkaller0 entered promiscuous mode [ 377.693829][T14063] device syzkaller0 entered promiscuous mode [ 378.491528][T14131] device wg2 left promiscuous mode [ 378.596423][T14147] device syzkaller0 entered promiscuous mode [ 378.767098][T14151] device macsec0 left promiscuous mode [ 378.967366][T14151] device veth1_macvtap entered promiscuous mode [ 378.974052][T14151] device macsec0 entered promiscuous mode [ 378.992447][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 379.057283][T14163] GPL: port 1(erspan0) entered blocking state [ 379.063177][T14163] GPL: port 1(erspan0) entered disabled state [ 379.080331][T14163] device erspan0 entered promiscuous mode [ 379.094826][T14163] device erspan0 left promiscuous mode [ 379.101169][T14163] GPL: port 1(erspan0) entered disabled state [ 379.163141][T14177] device syzkaller0 entered promiscuous mode [ 391.003195][T14192] Â: renamed from pim6reg1 [ 391.687559][T14244] ÿÿÿÿÿÿ: renamed from vlan1 [ 392.260987][T14251] syz.4.4357[14251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.261044][T14251] syz.4.4357[14251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.831554][T14261] device veth1_macvtap left promiscuous mode [ 395.131904][ T24] audit: type=1400 audit(1731943451.820:179): avc: denied { create } for pid=14343 comm="syz.1.4387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 395.226729][T14342] syz.0.4384[14342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.229724][T14342] syz.0.4384[14342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.273566][T14358] device syzkaller0 entered promiscuous mode [ 398.413825][T14471] 8ûÅ: renamed from syzkaller0 [ 400.452521][T14542] syz.2.4444[14542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.452564][T14542] syz.2.4444[14542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.953001][T14549] syz.2.4446[14549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 401.008147][T14549] syz.2.4446[14549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 401.225190][T14545] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.426907][T14545] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.447362][T14545] device bridge_slave_0 entered promiscuous mode [ 401.454266][T14545] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.461287][T14545] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.468609][T14545] device bridge_slave_1 entered promiscuous mode [ 401.767735][T14545] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.774582][T14545] bridge0: port 2(bridge_slave_1) entered forwarding state [ 401.781712][T14545] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.788485][T14545] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.815233][ T111] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.857267][ T111] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.872006][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 401.880723][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 401.975115][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 401.983911][ T111] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.990777][ T111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 402.084900][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 402.117384][ T111] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.124243][ T111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 402.146559][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 402.190405][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 402.296053][T14581] device pim6reg1 entered promiscuous mode [ 402.327185][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 402.335627][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 402.438730][T14545] device veth0_vlan entered promiscuous mode [ 402.446929][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 402.455116][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 402.478849][T14545] device veth1_macvtap entered promiscuous mode [ 402.486240][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 402.500408][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 402.508729][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 402.547304][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 402.562931][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 402.612867][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 402.625439][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 402.642005][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 402.660384][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 402.716970][T14608] device pim6reg1 entered promiscuous mode [ 403.753209][ T9] device veth1_macvtap left promiscuous mode [ 403.760321][ T9] device veth0_vlan left promiscuous mode [ 405.490427][T14681] device syzkaller0 entered promiscuous mode [ 405.808096][T14690] device veth0_vlan left promiscuous mode [ 405.815582][T14690] device veth0_vlan entered promiscuous mode [ 405.967035][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 405.976473][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 405.984092][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 406.610127][T14710] : port 1(veth1) entered blocking state [ 406.618468][T14710] : port 1(veth1) entered disabled state [ 406.636318][T14710] device veth1 entered promiscuous mode [ 407.016534][T14717] bridge0: port 1(bridge_slave_0) entered blocking state [ 407.168035][T14717] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.256382][T14717] device bridge_slave_0 entered promiscuous mode [ 407.342726][T14736] device wg2 entered promiscuous mode [ 407.357371][T14717] bridge0: port 2(bridge_slave_1) entered blocking state [ 407.408614][T14717] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.415872][T14717] device bridge_slave_1 entered promiscuous mode [ 407.818542][T14717] bridge0: port 2(bridge_slave_1) entered blocking state [ 407.825411][T14717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 407.842100][T14768] GPL: port 1(erspan0) entered blocking state [ 407.848500][T14768] GPL: port 1(erspan0) entered disabled state [ 407.854980][T14768] device erspan0 entered promiscuous mode [ 407.869722][T14768] device erspan0 left promiscuous mode [ 407.875174][T14768] GPL: port 1(erspan0) entered disabled state [ 407.934556][ T111] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.977212][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 408.037586][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 408.057739][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 408.066051][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 408.074091][ T111] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.080953][ T111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.090290][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 408.106735][ T111] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.113606][ T111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.173896][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 408.237110][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 408.252870][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 408.261223][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 408.420187][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 408.492608][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 408.610234][T14717] device veth0_vlan entered promiscuous mode [ 408.631933][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 408.639719][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 408.649047][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 408.656311][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 408.666715][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 408.674738][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 408.695099][T14717] device veth1_macvtap entered promiscuous mode [ 408.704040][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 408.712111][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 408.720125][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 408.733589][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 408.741780][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 409.517977][ T9] device veth1_macvtap left promiscuous mode [ 409.523813][ T9] device veth0_vlan left promiscuous mode [ 409.688083][T14859] syz.0.4536[14859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.688141][T14859] syz.0.4536[14859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.669440][T14921] device syzkaller0 entered promiscuous mode [ 413.007706][T14942] device veth0_vlan left promiscuous mode [ 413.032965][T14942] device veth0_vlan entered promiscuous mode [ 413.152786][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 413.174753][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 413.248375][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 414.776684][T14994] device veth1_macvtap left promiscuous mode [ 414.854387][T14994] device macsec0 left promiscuous mode [ 415.064592][T15002] device veth1_macvtap entered promiscuous mode [ 415.115058][T15002] device macsec0 entered promiscuous mode [ 415.660498][T15027] device wg2 left promiscuous mode [ 415.873182][T15032] device wg2 entered promiscuous mode [ 417.495547][T15156] device syzkaller0 entered promiscuous mode [ 417.579374][T15169] : renamed from ipvlan1 [ 417.712774][T15191] : renamed from ipvlan1 [ 418.607457][T15248] device syzkaller0 entered promiscuous mode [ 418.848455][T15265] device veth0_vlan left promiscuous mode [ 418.854649][T15265] device veth0_vlan entered promiscuous mode [ 418.942805][T15271] syz.2.4661[15271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.942885][T15271] syz.2.4661[15271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.401505][T15287] device veth0_vlan left promiscuous mode [ 419.500399][T15287] device veth0_vlan entered promiscuous mode [ 419.649917][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 419.659689][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 419.671692][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 419.955506][T15315] device veth0_vlan left promiscuous mode [ 420.050359][T15315] device veth0_vlan entered promiscuous mode [ 420.220506][T15315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 420.257108][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 420.330567][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 420.408024][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 420.624206][T15322] device pim6reg1 entered promiscuous mode [ 420.788115][T15342] device veth0_vlan left promiscuous mode [ 420.906256][T15342] device veth0_vlan entered promiscuous mode [ 420.998724][T15353] tap0: tun_chr_ioctl cmd 2148553947 [ 421.278094][T15391] device wg2 left promiscuous mode [ 421.378295][T15391] device wg2 entered promiscuous mode [ 422.318704][T15440] device wg2 entered promiscuous mode [ 422.532342][T15439] device wg2 left promiscuous mode [ 422.730837][T15470] device syzkaller0 entered promiscuous mode [ 423.332194][T15515] tap0: tun_chr_ioctl cmd 2147767511 [ 429.776967][T15559] device pim6reg1 entered promiscuous mode [ 429.951916][T15565] device syzkaller0 entered promiscuous mode [ 430.575272][T15590] device pim6reg1 entered promiscuous mode [ 430.883464][T15606] device syzkaller0 entered promiscuous mode [ 431.167199][T15632] syz.0.4764[15632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.167249][T15632] syz.0.4764[15632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.718391][T15631] syz.0.4764[15631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.733996][T15631] syz.0.4764[15631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 432.173625][T15686] syz.2.4781[15686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 432.211978][T15686] syz.2.4781[15686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 432.328603][T15700] device veth0_vlan left promiscuous mode [ 432.450292][T15700] device veth0_vlan entered promiscuous mode [ 432.526634][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 432.543395][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 432.648735][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 432.990112][T15724] device veth0_vlan left promiscuous mode [ 433.059028][T15724] device veth0_vlan entered promiscuous mode [ 433.622080][T15783] device syzkaller0 entered promiscuous mode [ 433.746919][T15807] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 433.752466][T15807] pim6reg0: linktype set to 776 [ 433.759358][T15810] device sit0 left promiscuous mode [ 433.825217][T15810] device sit0 entered promiscuous mode [ 434.974635][T15868] device sit0 entered promiscuous mode [ 437.163510][T15966] device syzkaller0 entered promiscuous mode [ 437.778651][T15985] device sit0 entered promiscuous mode [ 437.974655][T15995] device pim6reg1 entered promiscuous mode [ 438.006658][T16002] device sit0 left promiscuous mode [ 438.046899][T16006] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.058608][T16006] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.300928][T16009] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.307786][T16009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 438.314880][T16009] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.321668][T16009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 438.329115][T16009] device bridge0 entered promiscuous mode [ 438.500611][T16016] device veth0_vlan left promiscuous mode [ 438.520407][T16016] device veth0_vlan entered promiscuous mode [ 438.595951][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 438.655430][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 438.724468][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 438.798105][T16022] ÿÿÿÿÿÿ: renamed from vlan1 [ 438.940085][T16039] syz.0.4884[16039] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.940125][T16039] syz.0.4884[16039] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.978460][T16038] GPL: port 1(erspan0) entered blocking state [ 439.157055][T16038] GPL: port 1(erspan0) entered disabled state [ 439.163408][T16038] device erspan0 entered promiscuous mode [ 439.360164][T16033] device erspan0 left promiscuous mode [ 439.365609][T16033] GPL: port 1(erspan0) entered disabled state [ 440.395349][T16074] device sit0 left promiscuous mode [ 440.527955][T16088] syz.1.4901[16088] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 440.527997][T16088] syz.1.4901[16088] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 440.880731][T16082] device syzkaller0 entered promiscuous mode [ 441.322692][T16101] device syzkaller0 entered promiscuous mode [ 441.377012][T16103] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 441.387396][T16103] syzkaller0: linktype set to 804 [ 442.023025][T16118] device syzkaller0 entered promiscuous mode [ 442.233181][T16127] device syzkaller0 entered promiscuous mode [ 442.328738][T16133] device pim6reg1 entered promiscuous mode [ 442.554141][T16143] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.591770][T16143] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.598689][T16143] bridge0: port 1(bridge_slave_0) entered forwarding state [ 442.693810][T16146] device sit0 entered promiscuous mode [ 443.031061][T16163] device pim6reg1 entered promiscuous mode [ 444.046916][T16222] device sit0 left promiscuous mode [ 444.109244][T16224] device wg2 left promiscuous mode [ 445.500509][T16247] device pim6reg1 entered promiscuous mode [ 446.756278][T16312] device syzkaller0 entered promiscuous mode [ 446.785828][T16311] device pim6reg1 entered promiscuous mode [ 447.037587][T16337] device pim6reg1 entered promiscuous mode [ 447.176431][T16349] device veth0_vlan left promiscuous mode [ 447.215773][T16349] device veth0_vlan entered promiscuous mode [ 447.326271][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 447.335259][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 447.342735][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 449.423469][T16455] device pim6reg1 entered promiscuous mode [ 449.900787][T16486] device pim6reg1 entered promiscuous mode [ 450.117753][T16499] device pim6reg1 entered promiscuous mode [ 451.384075][T16530] device pim6reg1 entered promiscuous mode [ 451.410997][T16539] ÿÿÿÿÿÿ: renamed from vlan1 [ 451.544819][T16543] device syzkaller0 entered promiscuous mode [ 451.736547][T16561] device syzkaller0 entered promiscuous mode [ 451.760408][T16557] device pim6reg1 entered promiscuous mode [ 452.708116][T16622] device syzkaller0 entered promiscuous mode [ 454.092792][T16760] device pim6reg1 entered promiscuous mode [ 454.709559][T16782] device syzkaller0 entered promiscuous mode [ 455.121297][ T24] audit: type=1400 audit(1731943511.810:180): avc: denied { attach_queue } for pid=16811 comm="syz.3.5120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 455.340191][T16823] syz.0.5123[16823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.344766][T16823] syz.0.5123[16823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.977092][T16851] syz.2.5131[16851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.006979][T16851] syz.2.5131[16851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.568958][T16884] device syzkaller0 entered promiscuous mode [ 457.400595][T16908] bridge0: port 2(bridge_slave_1) entered disabled state [ 457.411254][T16908] bridge0: port 1(bridge_slave_0) entered disabled state [ 458.624261][T16951] €Â0: renamed from pim6reg1 [ 459.779800][T16978] device syzkaller0 entered promiscuous mode [ 460.619925][T16997] device syzkaller0 entered promiscuous mode [ 461.016188][T17002] device pim6reg1 entered promiscuous mode [ 461.080810][T17004] €Â0: renamed from pim6reg1 [ 461.788073][T17036] batadv_slave_1: mtu less than device minimum [ 461.980257][T17045] device sit0 entered promiscuous mode [ 462.069603][T17051] syz.2.5203[17051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 462.069645][T17051] syz.2.5203[17051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 462.412639][T17076] device wg2 entered promiscuous mode [ 463.051475][T17086] device syzkaller0 entered promiscuous mode [ 464.414743][T17225] device pim6reg1 entered promiscuous mode [ 465.286447][T17295] device pim6reg1 entered promiscuous mode [ 466.195482][T17318] device veth0_vlan left promiscuous mode [ 466.230321][T17318] device veth0_vlan entered promiscuous mode [ 466.281311][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 466.290371][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 466.321379][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 466.366345][T17326] device veth1_macvtap entered promiscuous mode [ 466.380928][T17326] device macsec0 entered promiscuous mode [ 466.397416][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 466.425213][T17335] device sit0 entered promiscuous mode [ 466.992865][T17337] device veth0_vlan left promiscuous mode [ 467.010342][T17337] device veth0_vlan entered promiscuous mode [ 467.063462][T17355] device syzkaller0 entered promiscuous mode [ 468.432656][T17415] device vxcan1 entered promiscuous mode [ 469.063082][T17431] device syzkaller0 entered promiscuous mode [ 469.419810][T17431] device veth0_vlan left promiscuous mode [ 469.464157][T17431] device veth0_vlan entered promiscuous mode [ 469.613559][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 469.697423][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 469.801464][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 470.236311][T17462] device syzkaller0 entered promiscuous mode [ 471.717758][T17523] device sit0 entered promiscuous mode [ 471.775349][T17525] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.782274][T17525] bridge0: port 1(bridge_slave_0) entered disabled state [ 471.789346][T17525] device bridge0 left promiscuous mode [ 472.225296][T17544] ÿÿÿÿÿÿ: renamed from vlan1 [ 473.854033][T17606] device syzkaller0 entered promiscuous mode [ 474.314686][T17652] device veth0_vlan left promiscuous mode [ 474.346995][T17652] device veth0_vlan entered promiscuous mode [ 474.450231][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 474.467532][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 474.479800][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 474.511535][T17659] device wg2 entered promiscuous mode [ 474.730272][T17676] device veth0_vlan left promiscuous mode [ 474.745158][T17676] device veth0_vlan entered promiscuous mode [ 474.790638][T17685] device pim6reg1 entered promiscuous mode [ 474.971543][T17700] device pim6reg1 entered promiscuous mode [ 475.339765][T17712] device veth0_vlan left promiscuous mode [ 475.381397][T17712] device veth0_vlan entered promiscuous mode [ 475.411511][T17712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 475.440360][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 475.448070][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 475.455352][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 477.219257][T17799] device veth1_macvtap left promiscuous mode [ 477.225372][T17799] device macsec0 left promiscuous mode [ 477.341779][T17807] device veth1_macvtap entered promiscuous mode [ 477.348864][T17807] device macsec0 entered promiscuous mode [ 477.599597][T17821] device veth0_vlan left promiscuous mode [ 477.618577][T17821] device veth0_vlan entered promiscuous mode [ 477.639433][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 477.650040][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 477.709180][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 478.395463][T17861] device syzkaller0 entered promiscuous mode [ 478.946162][T17874] device sit0 left promiscuous mode [ 479.023429][T17876] device sit0 entered promiscuous mode [ 479.661131][T17891] device syzkaller0 entered promiscuous mode [ 479.683882][T17891] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 481.788094][ T3082] device bridge_slave_1 left promiscuous mode [ 481.794044][ T3082] bridge0: port 2(bridge_slave_1) entered disabled state [ 481.837032][ T3082] device bridge_slave_0 left promiscuous mode [ 481.842975][ T3082] bridge0: port 1(bridge_slave_0) entered disabled state [ 481.898810][ T3082] device veth1_macvtap left promiscuous mode [ 481.904729][ T3082] device veth0_vlan left promiscuous mode [ 490.106524][T17954] bridge0: port 1(bridge_slave_0) entered blocking state [ 490.132378][T17954] bridge0: port 1(bridge_slave_0) entered disabled state [ 490.152187][T17954] device bridge_slave_0 entered promiscuous mode [ 490.159450][T17954] bridge0: port 2(bridge_slave_1) entered blocking state [ 490.166287][T17954] bridge0: port 2(bridge_slave_1) entered disabled state [ 490.173750][T17954] device bridge_slave_1 entered promiscuous mode [ 490.257650][T17985] Â: renamed from pim6reg1 [ 490.335453][T17954] bridge0: port 2(bridge_slave_1) entered blocking state [ 490.342429][T17954] bridge0: port 2(bridge_slave_1) entered forwarding state [ 490.469464][T17999] device wg2 left promiscuous mode [ 490.531488][T18001] device wg2 entered promiscuous mode [ 490.649623][ T3082] bridge0: port 2(bridge_slave_1) entered disabled state [ 490.665826][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 490.716494][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 490.773231][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 490.795516][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 490.837877][ T3082] bridge0: port 1(bridge_slave_0) entered blocking state [ 490.844856][ T3082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 490.852196][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 490.860389][ T3082] bridge0: port 2(bridge_slave_1) entered blocking state [ 490.867341][ T3082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 490.874610][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 490.893006][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 491.014898][T17954] device veth0_vlan entered promiscuous mode [ 491.052535][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 491.112636][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 491.138443][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 491.145765][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 491.162431][T17954] device veth1_macvtap entered promiscuous mode [ 491.217571][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 491.267817][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 491.321020][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 491.328542][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 491.336717][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 491.345115][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 491.353331][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 492.277084][T18060] device syzkaller0 entered promiscuous mode [ 492.939309][T18073] device pim6reg1 entered promiscuous mode [ 493.573939][T18095] device syzkaller0 entered promiscuous mode [ 493.798853][T18099] ªªªªªª: renamed from vlan0 [ 494.311350][T18123] device wg2 left promiscuous mode [ 494.417882][T18123] device wg2 entered promiscuous mode [ 496.405335][T18191] device syzkaller0 entered promiscuous mode [ 496.461607][T18197] device veth0_vlan left promiscuous mode [ 496.502948][T18197] device veth0_vlan entered promiscuous mode [ 497.133461][T18239] bridge0: port 2(bridge_slave_1) entered disabled state [ 497.142440][T18239] bridge0: port 1(bridge_slave_0) entered disabled state [ 497.272024][T18249] device bridge_slave_1 left promiscuous mode [ 497.284560][T18249] bridge0: port 2(bridge_slave_1) entered disabled state [ 497.314877][T18249] bridge0: port 1(bridge_slave_0) entered disabled state [ 506.926240][T18292] syz.2.5579[18292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 506.926296][T18292] syz.2.5579[18292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 507.540332][T18328] device wg2 entered promiscuous mode [ 508.284130][T18358] device pim6reg1 entered promiscuous mode [ 509.459123][T18402] device syzkaller0 entered promiscuous mode [ 509.720158][T18419] device sit0 left promiscuous mode [ 509.766709][T18419] device sit0 entered promiscuous mode [ 512.631888][T18544] device syzkaller0 entered promiscuous mode [ 513.040652][T18571] device veth0_vlan left promiscuous mode [ 513.189124][T18571] device veth0_vlan entered promiscuous mode [ 514.945474][T18667] device pim6reg1 entered promiscuous mode [ 515.527357][ T94] udevd[94]: worker [18279] terminated by signal 33 (Unknown signal 33) [ 515.535534][ T94] udevd[94]: worker [18279] failed while handling '/devices/virtual/block/loop1' [ 515.668920][T18718] device wg2 entered promiscuous mode [ 516.045078][T18746] device veth0_vlan left promiscuous mode [ 516.062711][T18746] device veth0_vlan entered promiscuous mode [ 516.137218][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 516.146431][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 516.158297][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 516.170341][T18751] device veth0_vlan left promiscuous mode [ 516.178725][T18751] device veth0_vlan entered promiscuous mode [ 516.190592][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 516.207392][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 516.215008][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 516.264797][T18775] pim6reg0: tun_chr_ioctl cmd 1074025680 [ 517.959523][T18829] syz.1.5743[18829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 517.959566][T18829] syz.1.5743[18829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 518.008658][T18832] syz.4.5744[18832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 518.036849][T18832] syz.4.5744[18832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 518.706221][T18844] device veth1_macvtap left promiscuous mode [ 518.871941][T18844] device veth1_macvtap entered promiscuous mode [ 518.899555][T18844] device macsec0 entered promiscuous mode [ 519.059572][T18857] device pim6reg1 entered promiscuous mode [ 519.459204][T18883] syz.3.5761[18883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 519.459252][T18883] syz.3.5761[18883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 521.289560][T18914] ªªªªªª: renamed from vlan0 [ 521.732697][T18969] device pim6reg1 entered promiscuous mode [ 521.823647][T18969] syz.4.5789[18969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 521.823697][T18969] syz.4.5789[18969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 521.860864][T18964] syz.4.5789[18964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 521.966698][T18964] syz.4.5789[18964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 522.304375][T18988] device veth0_vlan left promiscuous mode [ 522.370640][T18988] device veth0_vlan entered promiscuous mode [ 522.534994][T19001] device syzkaller0 entered promiscuous mode [ 522.865845][T19039] device pim6reg1 entered promiscuous mode [ 523.423918][T19064] device syzkaller0 entered promiscuous mode [ 524.608417][T19141] device veth1_macvtap left promiscuous mode [ 526.521472][T19204] device veth0_vlan left promiscuous mode [ 526.548949][T19204] device veth0_vlan entered promiscuous mode [ 526.561435][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 526.587814][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 526.600051][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 526.726833][T19218] bpf_get_probe_write_proto: 4 callbacks suppressed [ 526.726843][T19218] syz.0.5866[19218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 526.803320][T19214] : renamed from ipvlan1 [ 526.932543][T19203] device pim6reg1 entered promiscuous mode [ 529.819310][T19318] device veth0_vlan left promiscuous mode [ 529.828060][T19318] device veth0_vlan entered promiscuous mode [ 529.894912][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 529.903079][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 529.910479][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 531.053383][T19411] device syzkaller0 entered promiscuous mode [ 531.586499][T19467] device wg2 entered promiscuous mode [ 531.657760][T19449] device pim6reg1 entered promiscuous mode [ 532.176251][T19507] device syzkaller0 entered promiscuous mode [ 533.465045][T19566] syz.3.5981[19566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.465081][T19566] syz.3.5981[19566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 535.212633][T19637] device veth0_vlan left promiscuous mode [ 535.232910][T19637] device veth0_vlan entered promiscuous mode [ 535.265566][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 535.282625][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 535.359331][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 536.396824][T19677] device syzkaller0 entered promiscuous mode [ 537.211831][T19716] device veth0_vlan left promiscuous mode [ 537.224809][T19716] device veth0_vlan entered promiscuous mode [ 537.293498][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 537.303044][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 537.316470][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 538.372904][T19806] device pim6reg1 entered promiscuous mode [ 539.514394][T19842] device sit0 left promiscuous mode [ 540.114772][T19877] 8ûÅ: renamed from syzkaller0 [ 540.986216][T19961] device pim6reg1 entered promiscuous mode [ 541.397471][T19980] device pim6reg1 entered promiscuous mode [ 541.805371][T20016] device sit0 entered promiscuous mode [ 541.877858][T20042] syz.3.6138[20042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 541.877904][T20042] syz.3.6138[20042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 542.129890][T20028] cgroup: fork rejected by pids controller in /syz0 [ 542.620934][T20110] bridge0: port 1(bridge_slave_0) entered blocking state [ 542.628201][T20110] bridge0: port 1(bridge_slave_0) entered disabled state [ 542.637355][T20110] device bridge_slave_0 entered promiscuous mode [ 542.644213][T20110] bridge0: port 2(bridge_slave_1) entered blocking state [ 542.651410][T20110] bridge0: port 2(bridge_slave_1) entered disabled state [ 542.661249][T20110] device bridge_slave_1 entered promiscuous mode [ 542.884326][T20126] device syzkaller0 entered promiscuous mode [ 542.922154][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 542.929602][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 542.937038][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 542.945060][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 542.953449][ T305] bridge0: port 1(bridge_slave_0) entered blocking state [ 542.960302][ T305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 542.969058][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 542.980914][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 542.989274][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 542.997259][ T305] bridge0: port 2(bridge_slave_1) entered blocking state [ 543.004082][ T305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 543.034996][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 543.043716][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 543.053354][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 543.062101][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 543.182533][T20145] device sit0 left promiscuous mode [ 543.428929][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 543.439396][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 543.450927][T20153] device sit0 entered promiscuous mode [ 543.463548][T20151] device pim6reg1 entered promiscuous mode [ 543.482949][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 543.497077][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 543.510244][T20110] device veth0_vlan entered promiscuous mode [ 543.516475][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 543.524033][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 543.553698][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 543.561941][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 543.585227][T20158] device syzkaller0 entered promiscuous mode [ 543.607454][T20110] device veth1_macvtap entered promiscuous mode [ 543.659169][T20158] device pim6reg1 entered promiscuous mode [ 543.683994][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 543.692191][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 543.700282][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 543.708935][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 543.717169][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 543.757943][T20167] syz.2.6162[20167] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 543.757997][T20167] syz.2.6162[20167] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 543.982878][T20168] ªªªªªª: renamed from vlan0 [ 544.712534][T20210] device sit0 entered promiscuous mode [ 545.382713][ T111] device veth0_vlan left promiscuous mode [ 545.620258][T20232] device wg2 left promiscuous mode [ 545.684421][T20256] device syzkaller0 entered promiscuous mode [ 545.806846][T20268] device sit0 entered promiscuous mode [ 545.999654][T20287] syz.2.6200[20287] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 545.999707][T20287] syz.2.6200[20287] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 546.360958][T20321] device pim6reg1 entered promiscuous mode [ 546.607925][T20352] device veth1_to_team entered promiscuous mode [ 547.071052][T20367] device syzkaller0 entered promiscuous mode [ 549.808889][T20477] device sit0 left promiscuous mode [ 550.094703][T20492] bridge0: port 1(bridge_slave_0) entered blocking state [ 550.101876][T20492] bridge0: port 1(bridge_slave_0) entered disabled state [ 550.112186][T20492] device bridge_slave_0 entered promiscuous mode [ 550.134134][T20492] bridge0: port 2(bridge_slave_1) entered blocking state [ 550.193022][T20492] bridge0: port 2(bridge_slave_1) entered disabled state [ 550.200637][T20492] device bridge_slave_1 entered promiscuous mode [ 550.264051][T20495] device veth0_vlan left promiscuous mode [ 550.293243][T20495] device veth0_vlan entered promiscuous mode [ 550.512656][T20505] device veth1_macvtap left promiscuous mode [ 550.524720][T20505] device macsec0 left promiscuous mode [ 550.705277][T20492] bridge0: port 2(bridge_slave_1) entered blocking state [ 550.712170][T20492] bridge0: port 2(bridge_slave_1) entered forwarding state [ 550.719252][T20492] bridge0: port 1(bridge_slave_0) entered blocking state [ 550.726020][T20492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 550.766994][ T111] bridge0: port 1(bridge_slave_0) entered disabled state [ 550.785468][ T111] bridge0: port 2(bridge_slave_1) entered disabled state [ 550.839023][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 550.846380][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 550.913247][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 550.921850][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 550.932311][ T111] bridge0: port 1(bridge_slave_0) entered blocking state [ 550.939158][ T111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 550.974033][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 550.987297][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 551.001342][ T111] bridge0: port 2(bridge_slave_1) entered blocking state [ 551.008279][ T111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 551.053820][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 551.069587][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 551.095275][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 551.119304][T20568] syz.4.6299[20568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 551.119353][T20568] syz.4.6299[20568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 551.132518][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 551.208055][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 551.216239][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 551.243966][T20583] device wg2 left promiscuous mode [ 551.254341][T20583] device wg2 entered promiscuous mode [ 551.266560][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 551.297555][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 551.307046][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 551.314793][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 551.354284][T20492] device veth0_vlan entered promiscuous mode [ 551.405307][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 551.415182][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 551.519657][T20492] device veth1_macvtap entered promiscuous mode [ 551.639515][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 551.667207][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 551.675542][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 551.684148][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 551.692688][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 551.931490][ T305] device veth1 left promiscuous mode [ 551.936669][ T305] : port 1(veth1) entered disabled state [ 552.015820][ T305] device veth1_macvtap left promiscuous mode [ 552.092199][ T305] device veth0_vlan left promiscuous mode [ 552.395493][T20669] device sit0 left promiscuous mode [ 552.413859][T20669] device sit0 entered promiscuous mode [ 552.594873][T20679] device sit0 left promiscuous mode [ 552.605660][T20682] device sit0 entered promiscuous mode [ 553.232402][T20710] device pim6reg1 entered promiscuous mode [ 553.942404][T20753] syz.4.6351[20753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 553.942451][T20753] syz.4.6351[20753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 555.751622][T20867] device syzkaller0 entered promiscuous mode [ 556.622501][T20925] bridge0: port 2(bridge_slave_1) entered disabled state [ 556.635378][T20925] bridge0: port 1(bridge_slave_0) entered disabled state [ 556.706216][T20929] device bridge_slave_1 left promiscuous mode [ 556.712427][T20929] bridge0: port 2(bridge_slave_1) entered disabled state [ 556.720202][T20929] device bridge_slave_0 left promiscuous mode [ 556.727897][T20929] bridge0: port 1(bridge_slave_0) entered disabled state [ 556.852273][T20932] device pim6reg1 entered promiscuous mode [ 557.212925][T20960] device veth0_vlan left promiscuous mode [ 557.222012][T20960] device veth0_vlan entered promiscuous mode [ 557.271036][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 557.283795][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 557.291260][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 557.344120][T20970] device syzkaller0 entered promiscuous mode [ 557.572193][T20994] device syzkaller0 entered promiscuous mode [ 558.856817][T21085] device veth0_vlan left promiscuous mode [ 558.911444][T21085] device veth0_vlan entered promiscuous mode [ 560.537775][T21216] device syzkaller0 entered promiscuous mode [ 560.558846][T21217] device pim6reg1 entered promiscuous mode [ 560.570508][T21204] device lo entered promiscuous mode [ 562.105706][T21265] device pim6reg1 entered promiscuous mode [ 562.271448][T21279] device sit0 entered promiscuous mode [ 564.380071][T21384] geneve1: tun_chr_ioctl cmd 1074025677 [ 564.385441][T21384] geneve1: linktype set to 6 [ 564.447582][T21389] Â: renamed from pim6reg1 [ 566.078889][T21481] device pim6reg1 entered promiscuous mode [ 566.391488][T21516] syz.1.6611[21516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 566.391552][T21516] syz.1.6611[21516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 569.761494][T21690] device pim6reg1 entered promiscuous mode [ 569.941531][T21717] device syzkaller0 entered promiscuous mode [ 569.962598][T21722] device syzkaller0 entered promiscuous mode [ 570.233239][T21756] device sit0 left promiscuous mode [ 570.270294][T21760] syz.2.6697[21760] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 570.270371][T21760] syz.2.6697[21760] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 572.280125][T21863] device pim6reg1 entered promiscuous mode [ 573.077946][T21889] bridge0: port 3(gretap0) entered blocking state [ 573.084321][T21889] bridge0: port 3(gretap0) entered disabled state [ 573.097457][T21889] device gretap0 entered promiscuous mode [ 573.106904][T21889] bridge0: port 3(gretap0) entered blocking state [ 573.113248][T21889] bridge0: port 3(gretap0) entered forwarding state [ 573.196954][T21903] device veth0_vlan left promiscuous mode [ 573.274860][T21903] device veth0_vlan entered promiscuous mode [ 573.447910][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 573.464909][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 573.523179][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready SYZFAIL: repeatedly failed to execute the program proc=5 req=6769 state=1 status=7 (errno 9: Bad file descriptor) [ 576.269091][ T111] bridge0: port 3(gretap0) entered disabled state [ 576.278762][ T111] device gretap0 left promiscuous mode [ 576.284026][ T111] bridge0: port 3(gretap0) entered disabled state [ 576.467997][ T111] device bridge_slave_1 left promiscuous mode [ 576.473992][ T111] bridge0: port 2(bridge_slave_1) entered disabled state [ 576.481178][ T111] bridge0: port 1(bridge_slave_0) entered disabled state [ 576.488625][ T111] device bridge_slave_1 left promiscuous mode [ 576.494510][ T111] bridge0: port 2(bridge_slave_1) entered disabled state [ 576.501725][ T111] device bridge_slave_0 left promiscuous mode [ 576.507868][ T111] bridge0: port 1(bridge_slave_0) entered disabled state [ 576.515388][ T111] device bridge_slave_1 left promiscuous mode [ 576.521354][ T111] bridge0: port 2(bridge_slave_1) entered disabled state [ 576.528761][ T111] device bridge_slave_0 left promiscuous mode [ 576.534650][ T111] bridge0: port 1(bridge_slave_0) entered disabled state [ 576.543216][ T111] device veth0_vlan left promiscuous mode [ 576.548971][ T111] device veth1_macvtap left promiscuous mode [ 576.554751][ T111] device veth0_vlan left promiscuous mode [ 576.560583][ T111] device veth1_macvtap left promiscuous mode [ 576.566433][ T111] device veth1_macvtap left promiscuous mode [ 576.572207][ T111] device veth0_vlan left promiscuous mode