last executing test programs: 7m41.939902331s ago: executing program 3 (id=1339): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x10328, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x19, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500), 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000000080)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0x1, 0x12) sendmsg$inet(0xffffffffffffffff, 0x0, 0x40040) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="05000000040000000400"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000400"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x17, &(0x7f0000000880)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0x76}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 7m41.795863004s ago: executing program 1 (id=1342): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x22, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x77, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x2020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x4}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0x6c0000000000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x8, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000002540)=ANY=[@ANYBLOB="611534000000000061134c0000000000bfa000000000000007000000080000002d0301000000000095000000000000006916000000000000bf67000000000000350607000fff07206706000002000000160300000ee60060bf050000000000000f650000000000006507f9ff01000000070700004ddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f674629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5480a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f815f8989d78854ca4d3116dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff139604faf0453bedf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a57ff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee15620789c524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b4dc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca87ddd9d064e081383409ed2912c811ae63f03212a5331c2a4ead000000000000000000005574d074fa7e93447a88c0fbab48660aae7cdf367ef0e4538279b6113de5b94e1056f443305145c9"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) 7m41.174488376s ago: executing program 4 (id=1346): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={0x0, r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x42100, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f00000001c0)=r0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r5}, 0x10) ioctl$TUNSETOFFLOAD(r3, 0x4004743d, 0x110e22fff6) close(r1) write$cgroup_type(r3, &(0x7f0000000280), 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='fib6_table_lookup\x00', r6}, 0x18) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="b0ff04c66b0d698cb89e2fe086dd1f74ffff06000000fe80000000000000ac14140746647b7954c4c06b580febc28eb143d0f6c0bad62c67a04402ba4125c7024f63fdb0b6c8ee826b4dfe6042a2f057c66cad677d850ea9928bcfcb47e585e427746ed3b27c40060cbd030a6d675c9926af53cd3085b24f9b7a486775c4f284f8c5a572ca115bce90c0ee9d4e7a07f5f1518092cb1f156694036f6618a59196631e6303fd5307d1112601d3641c9492f7dc3503416836b14590c53b1fc1ac149b70cc1142d6bc57fc3a76839fa2f96878b520fedfb9f64d81584a2e85ab4f6ec718b02d78f2ebf04e6b3b94610a21616181629a03c3dc0bf05e0a71f887833b81db7a10bc53259cb80716f6804934a411d424c1db98d454be1adb2776fdbb92b299d3b80af6987a871b4549fdb4c8297ee31ad925c8b0fb1a9d2589b08ed52602cbc26b56df71201bc4ea8621c56f33d251c1d4589af2dcd78fbb4e34bde02cb3920a30cee9489ee72c3e19304c16c2110e1839712d484b80abe77786a7e2ba834874a4e16b93dd07297554a06c2ad2c906f8ebb1db8730df096709184728d48f0a806696bd0d4b12d0064b933d9675353dae77fe8419451f85da63be78b70ca2a84a77f572d9f289d4313e6f6039fe756ac13a5d08838315dff44cda433cc7bc6b77449f8c", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) 7m40.718432115s ago: executing program 1 (id=1348): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x1, 0x0, 0x2, 0xffff, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000700)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x81, '\x00', 0x0, r2, 0x5, 0x1, 0x4}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x1, 0x0, 0x2, 0xffff, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x50) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000700)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x81, '\x00', 0x0, r2, 0x5, 0x1, 0x4}, 0x50) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x18) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)) (async) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00'}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) 7m40.671529476s ago: executing program 4 (id=1349): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x58, 0x4, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r3}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2}, &(0x7f00000002c0), &(0x7f0000000340)=r0}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xaf) r5 = gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x58, 0x4, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r6}, &(0x7f00000002c0), &(0x7f0000000340)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r7}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(r5, &(0x7f0000000280)='ns/user\x00') syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 7m40.557721128s ago: executing program 1 (id=1350): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) sendmsg$tipc(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) close(r2) close(r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x44) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f00000005c0)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[@ANYRESHEX=r6, @ANYRESOCT], 0x27) (async) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[@ANYRESHEX=r6, @ANYRESOCT], 0x27) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001580)={0x0, 0xffffffffffffff3c, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="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", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30d70769e229dc91037321d618e1eff4a176ea46d5cd4d5da97f80356e46d9e8166bf2d97210b631654ece218a2a204a1786ab5a60a881a7a294cd2f92438350e6e3ec4439ebe06133ff65b1e32b809ba0482783b563ec8e5778285da5211e5821135433053a7921319c544d5e797f"}, {&(0x7f00000007c0)="75c37714a0bada8343bceb64ccb6d95a2a37b020e0bf1f6a1de4584223a2f285aaca30a9554cd5cdc1659cb9fec462cc5c2220a7cd891ec3bad99fe3c06e15a109ec0fdb6aeeee5ef8e4bfc28e17984a3860b907d549492d47a447782b7357ea72f4b2c26512a6a33c0247b730a6182ea5a99aee25fcee07f9cb0a80595cd5f744fa6898fdffda5b34b19474b8e853467329e4aea36cfd0e00735d37beb0f895c5688259a8935194eefd3a96d55707133a08f03e14da563160a545396b93341f41c161c93687e28a"}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae"}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) (async) sendmsg$inet(r7, &(0x7f0000001580)={0x0, 0xffffffffffffff3c, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="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", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30d70769e229dc91037321d618e1eff4a176ea46d5cd4d5da97f80356e46d9e8166bf2d97210b631654ece218a2a204a1786ab5a60a881a7a294cd2f92438350e6e3ec4439ebe06133ff65b1e32b809ba0482783b563ec8e5778285da5211e5821135433053a7921319c544d5e797f"}, {&(0x7f00000007c0)="75c37714a0bada8343bceb64ccb6d95a2a37b020e0bf1f6a1de4584223a2f285aaca30a9554cd5cdc1659cb9fec462cc5c2220a7cd891ec3bad99fe3c06e15a109ec0fdb6aeeee5ef8e4bfc28e17984a3860b907d549492d47a447782b7357ea72f4b2c26512a6a33c0247b730a6182ea5a99aee25fcee07f9cb0a80595cd5f744fa6898fdffda5b34b19474b8e853467329e4aea36cfd0e00735d37beb0f895c5688259a8935194eefd3a96d55707133a08f03e14da563160a545396b93341f41c161c93687e28a"}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae"}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="dc010000200000001800000000000000000000000000000095000000000000008d9062820b805b34b78cd182a01ecb91883b0a35102f01324235980ad30eec31c3ef5aa5f388d90180b341fe855c2dd81ed8f08c8d0a5e7e73f550d9461d75cb56882bcd494988742cec70bccbc32951d3f9d7a335c5001048f518cc3e2ac4b79c989dd9a916d196984bd6d75f6f1a8931038fafd5a68929c34c2a263835e34e09ae067cea299ac86468ec133ab03255cd082d9d5386e5b6a48cec6913e6ea6e7c8a7df69b8e5bdeafa1a00934784c0000000000"], &(0x7f00000000c0)='GPL\x00', 0x5, 0x9c, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) recvmsg$unix(r8, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) (async) recvmsg$unix(r8, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x4, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="b700000004000000bca30000000000002403000040feffff720af0ff0000000071a4f0ff000000001f030000000000002e0a0200000000002600000008ff000e61148c00000000001d430000000000007a0a00fe00581c1f6114890000000000b503f7fff80000009500000000000000033bc065b78111c6dfa041b63af4a3912435f1a864a7aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168e5181554a090f30002af51efd601b6bf01c8e8b1fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e65440000000000000000028610643a98d9ec21ead2ed51b104d4d91af25b845b9f7d08d123deda88c658d42ecbf28bf7076c15b463bebc72f526dd70252e79166d858fcd0e06dd31af9612fa402d0b11008e59a5923906f88b53987ad1714e72ba7d06a59ff616236fd9aa58f0177184b6a89adaf17b0a6041bdef728f5089048ddff6da40f9411fe7226a40409d6e37c4f46756d31cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10076443d643649393bf52d2105bd901128c7e0ec82701c8204a1deeed4155617572652d950ad31928b0b036dc2869f478341d02d0f5ad94b081fcd507acb4b9c67382f13d000000225d85ae49cee383dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdbb9893a5de817101ab062cd54e67051d355d84ce97bb0c6b6a595e487a2cc47c0efbb2d71cde2c10f0bc6980fe78683ac5c0c31032599dd273863be9261eee52216d009f4c52048ef8c126aeef5f510a8f1aded94a129e4aec6e8d9ab06faffc3a15d91c2ea3e2e04cfe031b287539d0540059fe6c7fe7cd8697502c7596566de74e425da5e7f009602a9f61d3804b3e0a1053abdc31282dfb15eb6841bb64a1b3045024a982f3c48b936e6f9e0fcda88fe4413537528fdb6153baae244e7bf573eac34b781337ad5901a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44022a579dfc0229cc0dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc48899b212c55318294270a1ad10c80fef7c24d47afcc829ba0f85da6d888f18ea40ab959f6074ab2a40d85d1501783a7ab51380d7b4ead35a385e0b4a26b602396df7e0c1e02b88c114f244a9bf93f04bf072f0861f5c0b000000000000eedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba3401e6a52acb1188883ad2a3b1832371fe5bc621426d1ed01b389708165b9cdbae2ed9dc7358f0ebadde0b727f27feeb7464dcc536cbae2f5c7d951680f6f2f9a6a8346962a350845ffa0d82884f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010ae20e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d648532869d701723fedcbada1ee7baa19faf67256b56a41fd355b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2654026c6ea08b83b123145ab5703dad844ceb201efeb6dc5f6a9037d2283c42efc54dd84323afc4c10eff46248843187f1dd48ef0900000000000000ff0f4000000000f00700003c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538c6ee6ba65893ff1f908ba7554ba583ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738612e4fee18a22da19fcdb4c1011e32f808890205f0e6da2819d2f9e77c7c64affa54fec0136cbafa5f62e96753b639a924599c1f69219927ea5301fff0a6063d427180d61542c2571f983e96635600000554f327a3535e7c7542799493c31ac05a7b57f03ca91a01ba2a30ca99e969d6fd09dc28ebc15edb4d91675767999d146aef7799738b292fd64bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a794963442aece449a0d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2869291b7d12096833d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e637d4219ef7ec61261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ecab5d232f89fe0120f64c62e8e3ed8bcb45202c204bbec8d722824c0ebca8db1ea4a05e41f6016ab5bbe4fe7ff5d785d0128171c90d9900ca2532b0f9d01c4b45294fbba468df3e1b393cb4e62e753b4172ba7ac1f2b51c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addbc4b3093c91b8068c5adfcb0d7fd849904568916694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a881192292ffff5392ab3d1311b82432662806add87047f601fa888400000000000000000000000000006acc19808d7cf29bc974b0ea92499a41b9b9a7c2bca311a28ee4952f2d325a56397c78f12205db653a536f0100e0eda300a43a13bd1b9f3322405d1efd78e578dc6b3fb84f3738a4b6caa800000087efa51c5d95ecba4e50e529d1e8c89600e809dc3d0a2f65579e23457949a50f2d0455cf699b3746979f99f6a1527f004f37e84fb478199dc1020f4beb98b8074bf7df8b5e783637daf121f175a81cffff4ac55a4385e9a617aa6c8e10d4202c5afeb06e2f9115558ea12f92d7ae543d44086b3f03b20d546fa66a72e38207c9d20035abc46271a30f1240de52536941242d23896ab74a3c6670fdc49c14f34fc4eadd6db8d80aba439772bf60a1db18c472dafc5569adc2c406f39f82928d2a1ffe29f1a57d3f18f4edaeb5d37918e6fddcd821da67a0785585a4443440dc65600e64a4a274000000000000000000000000000000000000000000000009dd14b38f2f5426d7cf5075047c31f6ce6adddfe3ac649c0643c8bfbeb14ba1fd7a485aa893915cf81e29aaf375e904bbe52691a4120260ffcd030000006d291ebcef893e1b9ccb6797d0646fe0e7274434f28efb43e06e64f0698caca42f4e6018a455736c482a017e2b13dac4a90faa109f0e87cc94e3efb649692456463ca74aa6ad4bf50c1acb3928143be1c1023a375e528285544d0064b98646f3109e9a4942ce42c6e7ec84b664f6c2770803f10b0a1fcbfc309381aeba191950bae71f37f1eb7ceeffb3c0547ac6571603adbfde4c8b5f8d7f4b854441613633b48865b65bdc415e1e0dcf672d68cf4cebf04f4bc1eebf560a26d3b332240d450fdb0a9a69f432e277f3a0386eb2bd1305c821c64757f786b79fef54dbe64c67d73934bc80b2133fb3c04cc7ea48bf97a6243c9f95dcbddecf45f008f1822c7868e1ff5a3cff5d6b6898335792749df7b1f51e91f8c1c3b1b93b33aaa3fab69cef08a9f6f6cf39dea3d878b2ed42545421970cc426e644332bc956d1c6adefdf0ede2c5c94aa632646ae225accdf031f611d01622921f1b922a5ac887cca3136133dce8d9f5f4da7bed2ea5d94362200000000000000000000f296b0c1484e5f781ad26bff696b05ff0a5e2270e07e18b04273bd4075ea38ab463bfa6a38e7c537498ba3e4df8dfc9e8c0a0d213c3ffad44d2a376def42e41e9fc3167a257e040fa7cf32c221aaac6cfdeb33c27500001a0000000000000000000017350000c11ae694b0c69c2c03f6790044a357e785af6e153d5f1ea460af92c7cbbd6295afe740f5e154346d483e0d10522a7a945b93fb705b95b6aae27a8fab1e6984c8bdc12360627137ab6737b68ab08a1a4b94cb29a74dc36b51209cfbc87f61182bbeb2772e9d5a1ffc477179be481ffe46a4ce86be0b1f8eee42a611a3d44ca450b14586ed63dd92005c79e4a8ab8a94f0b74903580ac98708007c80d6c7d0de4614195e40d797c0348dd70f36a220e8b3710fb5358c27e90793bcb9ee6319342c4b239ca8cbc6fc83d32e6eb62ad92e43991f2447be9c2a1ae1119eafb901a43d57e885116d19aa152bfb89f8d0b2516f80120a1cddff771657f3d0288ec3899f1e3ba0151c4037148fb479de703fc52b6573349c28d1b107d859b4961324c17756dde99de1924a1d2b7095d34a55060f47f4407d89acf9f1d2156befec432e8e993c79027b7ef285b20c2e6b3d0491d0d3591b0d94713332b6b79c8297117b0d14eff64e0aca8a4b4aa773d8fba1217e9519952419bb9dd998d0ec870ff00b6d556018602738fbc6cec89d6dd13cf55b96f6fe9a137d2d"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10}, 0x94) 7m40.47129345s ago: executing program 0 (id=1352): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x100000000, 0x2}, 0x10, 0xc8, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x20, 0x0, 0x40000}, 0x0, 0x1, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000004c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r3, &(0x7f0000000580)="78975b433c218239b278b61674c42e8f78c7bb9120d895008b59d69bb333eeed35a7e272d3438fa75fa5a4208b2576355aa968b0fbb2d7768e04b3755e166e27dfa68d8e01493b415b51261c4bce436a7d6327367aadaf6326761dd3150a46d43b3ee83b946291c8ef9780234b2a494b63154bfa022de38fb5faa45262bf05b5dd881ea2804e3961749476213486866e292f95ef692f3dc7845b34174ba08e66414fad49139296bb35ec54c53e1be2e69ee24f2e89abc63d8f1ee57bce80a8984588b08c99483c43eb1f6dd467ffb446f0c178", &(0x7f0000000680)=""/224}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r4}, 0x18) r6 = perf_event_open$cgroup(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x0, 0x8, 0x6, 0x0, 0x3, 0x20010, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x80000000}, 0x0, 0x3, 0x7, 0xa, 0x1, 0xfffffff9, 0x6, 0x0, 0x365796db, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x8, r5, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_config_ext={0xff, 0x3}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9}, 0x0, 0xffffffffffffffff, r6, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[@ANYBLOB="9fedcb7968ddc36c8f263408008daa"], 0xfdef) 7m40.414277001s ago: executing program 1 (id=1353): bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'veth1_to_batadv\x00', 0x400}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x410, 0x2000001, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x4004743d, 0x110e22fff6) write$cgroup_type(r4, &(0x7f0000000280), 0xfffffeed) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8983, &(0x7f0000000080)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f00000002c0)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) 7m40.183040315s ago: executing program 2 (id=1354): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffbe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r3, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f00000009c0)="e39974795a2e0563e7a8a0aae482bc21fb4c59c9a8096321dc66a827e29238686bbd12632ae76b5368d63a2a34ecfad4eb0cc52f7a276eac4613287c2ed28b9f994397064f78d46d391de25bb568106c9d3a14a78f0d7c855ecc91cd486c2d31e8d41f825407e96d4c59ea2e804340e3a574ed74e22f0c2a257c7e8b7ffd49caad6d6f260272dd0a6e5a42736b8485af7892b5b193b6ec346326762e700bdffe52154b5c76770a53f4d8c63cd111763f401fade9", &(0x7f0000000a80)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000800000004000000bb7f1ad04d00feff000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x4c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, 0x0, 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500), 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0xb, &(0x7f0000000180)=ANY=[@ANYRESOCT=r5], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 7m39.992121939s ago: executing program 0 (id=1355): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000020000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000600459e850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r0}, 0x18) close(r0) syz_clone(0xc4201100, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) 7m39.275822263s ago: executing program 0 (id=1356): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000680)=ANY=[@ANYRES32=r0, @ANYRESOCT], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x300000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000040000004100000000", @ANYRES32=0x1, @ANYBLOB='\x00'/12, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x2121, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x3, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x58000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x2, @perf_config_ext={0x9, 0x9}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, r3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x73368d7c5c4cf1c8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x4a, 0xfc, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0x80000e82}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000600), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="000000000400352614b2f29b5d384624fc39d7ae00000000f6ff", @ANYRES32, @ANYBLOB="fdffffff00"/20, @ANYRES32=r1, @ANYRES32, @ANYBLOB="00000000fcffffff00"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020", @ANYRES16=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 7m38.972754369s ago: executing program 2 (id=1357): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x18, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r2}, &(0x7f0000000380), &(0x7f0000000200)=r3}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x13, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_val={0x18, 0x9, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x704891ca36764}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0xec8, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x8, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000380)=[{0x5, 0x2, 0x6, 0x5}, {0x3, 0x5, 0x3, 0x2}, {0x5, 0x2, 0x1, 0x7}, {0x1, 0x2, 0x3, 0xc}, {0x0, 0x4, 0xb, 0x6}, {0x3, 0x3, 0xa, 0x8}, {0x5, 0x5, 0xe, 0x9}, {0x1, 0x5, 0xd, 0x4}, {0x4, 0x3, 0xa, 0x8}, {0x1, 0x5, 0x9, 0xb}], 0x10, 0xd1}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB="0040ea7700000000000000000000e13c1fede0b1f02a04000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r4, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 7m38.303748122s ago: executing program 0 (id=1358): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc0189436, 0x2000141a) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000a80)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095", @ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') (async) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r2, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="7a437c9c3394e00e0044de29ee47d100bf0a00ff0000000071103d000000000095000000000000007008a89e314f78922ea6989e76d8711db33e808b46ffe4b8c66a91128c01fe76d049122f585b6f6bfc103ab252802ffae1c754ef23790d74286984d4c1e7bbb83e7f3d394312fe2b8e02bb78cfa93e1beaa661027f7eb54e7b070a51285d9c1e58dfa699fe2f821fab8b336a3a2302a28424e2741710b60788d98d71108aff552354c0846b3b6adad4ee727df16a231948d8ebc86ec7a9f97cbf5b04000000000000001655c83681ee7de8c372c777a9211a2d5db572461e844581b738e3c2562c5f5697f807e202000000c422c0590e3701816e9a87f0120013fd0e55ee0e95f7"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) (async) r4 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000300)={&(0x7f00000003c0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000200)=""/56, 0x38}, {&(0x7f0000000500)=""/135, 0x87}, {&(0x7f0000000680)=""/94, 0x5e}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000000280)=""/29, 0x1d}, {&(0x7f0000000700)=""/77, 0x4d}, {&(0x7f0000000780)=""/213, 0xd5}, {&(0x7f0000000880)=""/184, 0xb8}], 0x8, &(0x7f0000000a00)=""/98, 0x62}, 0x41) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYRES16=r4], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) (async, rerun: 32) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async, rerun: 32) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) close(0xffffffffffffffff) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000002c0)='ns/net\x00') bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000100, 0x7, 0x5, 0x0, 0x200000, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 7m38.187717404s ago: executing program 0 (id=1359): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x4, &(0x7f0000000b80)=ANY=[@ANYBLOB="98000000000000000000000000000000850000008700000095000000000000006f8d396eca3b1dc16357d9bd7df58f3233a727d291b13d7f2a413f1f99b6e3c8c9a12ca018fabeaceb1bf507760eff556aa791b29b958477115eebeb08d2d346253c3683fdf58efcfb03359085aa2c30e101c8c809c16a7356a7f1bb5d41fa8d6b7e5e76e2c010c25fa8bb0bd6359296b6d5c865cc67ff7b81dcdf93387ab7f2e93fb7872393ab269ec75820fb0addb08194a44288aea60758b20ef5aff862ecddf75a7904186194910993d9432d3064a5"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='timer_start\x00', r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r2}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000880), 0x12) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x19, &(0x7f0000000400)=ANY=[@ANYBLOB="180000008f000000000000000b00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000086000000bf0900000000000055090100000000009500000000000000bd0a060000000000d500f4ff0100030018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000010000006500000006000000bf91000000000000b702000003000000850000002a000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x7, 0x1000, &(0x7f0000000cc0)=""/4096, 0x41100, 0x2f}, 0x21) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r6 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x95}}}, &(0x7f0000000200)='GPL\x00', 0x2, 0xffd, &(0x7f0000001e40)=""/4093}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r5, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000901000000000000f75c4dac278b5d57", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000280)='timer_start\x00', r8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeb0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r9}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x5, 0x0, 0x1, 0x1, 0x0, 0xe73}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000940)) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xffffffff}, 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xc, 0x12, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@jmp={0x5, 0x1, 0x0, 0x1, 0x9, 0x0, 0x10}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}]}, &(0x7f0000000580)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41000, 0x43, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x2, 0x2, 0xd2d6}, 0x10, 0x0, r7, 0x8, &(0x7f0000000580), &(0x7f0000000a40)=[{0x3, 0x1, 0x0, 0xc}, {0x3, 0x1, 0x9, 0x4}, {0x3, 0x3, 0xe, 0x1}, {0x1, 0x3, 0x7, 0x9}, {0x5, 0x2, 0x9, 0x5}, {0x3, 0x5, 0x2, 0xf23bbf44a7a732de}, {0x4, 0x4, 0x8}, {0x5, 0x2, 0x2, 0xc}], 0x10, 0x8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x7, &(0x7f0000000840)=ANY=[@ANYBLOB="01000000000000000000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r11, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x94) 7m38.174197624s ago: executing program 3 (id=1360): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='cpu&00\t_&') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1400000004000000040000000100000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00XR', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/20], 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r3, &(0x7f0000000380)}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r6}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x13, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="660a00000000000061119b0000000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x20, 0x0, 0x10, 0x40, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x6}, 0x10000, 0xc8, 0x5, 0x0, 0x8, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kmem_cache_free\x00', r9}, 0x10) 7m38.000445468s ago: executing program 2 (id=1361): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0x18000000000002a0, 0x28, 0x0, &(0x7f0000000300)="d2ffdd934517f3e145f228e086dd", 0x0, 0xd5b4, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) 7m37.996520708s ago: executing program 4 (id=1362): r0 = syz_clone(0x90000000, &(0x7f0000000500)="b132ca342c0ff51dfc8734dc8617b15c6303129b527814691f031e5f186d46627d890d4b1f1f9b504d25f0e22356baeed0e1f8d349c302f357c87953e1c5bd4d3d97ece4bbda71c4c40dcd30adb17045161ed005ce6c12b7c4f4e17920f6324a467468d55ae483feb9c95eb413385c6c3f350d7d89391856d046aba7ef41a82754ba23825a969c5d55f61fbe4d2c1c5de1690d3f47466399", 0x98, &(0x7f00000005c0), &(0x7f0000000600), &(0x7f00000006c0)="a75ceb3b6f351615b6deb0e16a471f06c22db0c1dc47f9ab353c4ddc8bd8431a0746ad4b21ad9145a7f1dea778a7b29ed287e68f4c37a3ab40ad6f63df1ed2d55f1c48c0db11069071b0979097285daa50a05cae09028d8e4fa5a08d") perf_event_open(&(0x7f00000012c0)={0x2, 0x80, 0xfd, 0x4, 0x0, 0x0, 0x0, 0x200, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0xb}, 0x800, 0x6, 0xfffffffe, 0x0, 0x0, 0xb92a, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x66) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r6}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) write$cgroup_pid(r8, &(0x7f0000000140), 0x12) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f0000000080)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}], &(0x7f00000000c0)='GPL\x00', 0x2, 0xec, &(0x7f0000000240)=""/236, 0x40f00, 0x50, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x8, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[r8], &(0x7f00000001c0)=[{0x3, 0x3, 0xe}], 0x10, 0xfffffe01}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000060000000800000001"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r11}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r10}, &(0x7f0000000400), &(0x7f0000000440)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000400)={r8, r9, 0x4, r8}, 0x10) 7m37.925059919s ago: executing program 3 (id=1363): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xb, &(0x7f0000000800)=ANY=[@ANYRES64, @ANYRESHEX=r0, @ANYRESDEC, @ANYRES8, @ANYRES8, @ANYRESOCT, @ANYRESHEX, @ANYRESDEC], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='sched_switch\x00', r1, 0x0, 0x4}, 0x18) (async) r2 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000003c0)='/[\x00') (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000010000000800000008"], 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r5}, &(0x7f0000000240), &(0x7f0000000300)=r6}, 0x20) (async) write$cgroup_devices(r4, &(0x7f0000000100)=ANY=[], 0xffdd) sendmsg$tipc(r3, &(0x7f0000000080)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x3}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x140400c0}, 0x2000081) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) (async) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) (async) close(r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) 7m37.835634151s ago: executing program 3 (id=1364): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYRES16=0x0, @ANYRESDEC=0x0], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000280)='sched_switch\x00', r0}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="0b00000005000000000000eac2391f35000900000c94416de6df2c3b", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRESOCT, @ANYRES32, @ANYBLOB="0000000000000009a34e6b7b9fe6f1fe00000000000000009b7bb8e9000000000000000000730011497654a95972344c5d994115405d4c000033dcd09502ff886c5034e3e41ecd5e2b4b96af906a81bf3474531996d81e95a7cf2cd63ffe0e1f73c25eb386a4edaed3909e28600c56090141c3949abc2000e88814416dbf20d6946b00000000000000000000017b8f5ef96b4c987e10254defece38ef5adb8f9b834dff8628760ec50a981337a761520e3963c895dec399a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r2, 0x8982, 0x20000500) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r3}, 0x10) r4 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000009c0)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d030000000ea18fcb0197d2eebec70000000000000001100000008000000000000000", @ANYRESOCT=r1], 0x0, 0x4e, 0x0, 0x0, 0x7}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000900)=ANY=[@ANYRES32, @ANYBLOB="1e00004000120000005000002df0acd92e93529179c14230e8269e17d57a82f7df69650ec6c8111e5d5b08c98b35ca8c9a7964f45f0b427fa1aebf962f2796454c84b41061a29aadd10286941db10bc21cbaf827e43bffb5c0ab13370eb4651e2a00fbcf22fd9b782c4f60eb0b195e520ec100"/128, @ANYRES16=r5, @ANYRESOCT=r2], 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[@ANYBLOB="2d63707520a2fbfdbd963e6d6d64aa34d4236f3a28a3c4cecafd11885981b6388708f0789613be46592d079c548d64"], 0x5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYRESHEX=r4], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f00000003c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x24, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r9, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) 7m37.675202294s ago: executing program 2 (id=1365): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES8=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r1, 0x0, 0xfffffffffffffffc}, 0x18) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 7m37.673335594s ago: executing program 1 (id=1366): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000"], &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa10000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000011c0)='cgroup.freeze\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f00000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="9417da0bffffff00"/21], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x200000ab, &(0x7f0000000440)=ANY=[@ANYRES8, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{r1}, &(0x7f0000000040), &(0x7f0000000080)=r2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x18, 0x4, 0x1ff, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={0x0}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0300000004000000040000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000004181dcb985584a4d00000000000000"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1200000007000000020000000000000021000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"/28], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x10, 0x4, 0x1, &(0x7f0000000040)) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55, 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 7m37.616097375s ago: executing program 4 (id=1367): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYRES32=0x0, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@fallback=r0, 0xffffffffffffffff, 0x33, 0x39}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x8000, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x45, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x50) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) recvmsg(0xffffffffffffffff, &(0x7f0000001480)={&(0x7f00000003c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x40000000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000003c0)={'bridge0\x00', 0x400}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) close(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0xffffff6e) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xffbf) 7m37.538728557s ago: executing program 2 (id=1368): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x4, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000050002000000000085000000cc00000085000000000000000500feff000000009500000000000000"], &(0x7f00000003c0)='GPL\x00', 0x2, 0xff9, &(0x7f0000000a80)=""/4089}, 0x17) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000500), 0x0, 0x2f, 0xe8034000, 0x0, 0x0, 0x0, 0x0, 0x5dc}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)) 7m37.146375725s ago: executing program 0 (id=1369): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x8, 0xa, 0x4, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000a00)='\xe7 \xd2\x81o\x9c\xb2\x89b\x9bx\xe9\xb4\x8f\xabv\xab\xce\x94\x13m}\x1d\xe9\xc07\xa5p\x90\xfb\xb0M\xf5o\xeb\x1a\xa1%\xb8\x7f\a\x88\xaf\x86^\x80\x02\x01\xec\xa6a\xad\x02\xdb\x04I\x01\xcfX\xfeI\x04\xa5#\x1d\xd2\xf7\xc2FL_\xcf\x7f\x92\b\xdcr\xbd\xc5W\xf9\xec\xa0G\xab\xc2\xa5\xe7J\xf8\xef\xcd\xca\x9b\xea') r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x20) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f00000001c0)=r4) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1e03d3ffbc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x88246, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2001, 0x3, 0x0, 0x8, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r5) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80x0, &(0x7f00000007c0)=""/101, 0x65}}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bc8900000000000035090100000000009500000000000000b7080000000000007b9a00fe00000000b509000000000000c3aaf0fff1000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018220000", @ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r9, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0, 0xdc, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x1069, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000002400000024000000080000000e0000000000000b020000000700000000000a0000000000001204000000005f300000306100"], &(0x7f0000000640)=""/67, 0x44, 0x43, 0x0, 0x6}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x4, 0x0, r7, 0x800, '\x00', r10, r11, 0x1, 0x3, 0x1}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) 7m37.104424055s ago: executing program 1 (id=1370): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000540)={{}, 0x0, &(0x7f0000000500)='%pB \x00'}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x81, 0x6e57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100040, 0x8, 0x0, 0x0, 0x0, 0xffff0000, 0x0, 0x0, 0xfffffffe, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x3f}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0xc8, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xd, 0x0, &(0x7f0000000000)="b9ff03076844268cb89e14f008", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x5c, 0x0, 0x80, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x100000000}, 0x4210, 0xc8, 0x0, 0x0, 0x2000, 0x0, 0x4, 0x0, 0x1, 0x0, 0x1}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='ext4_read_block_bitmap_load\x00', r6, 0x0, 0x21ca}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 7m37.047859746s ago: executing program 2 (id=1371): perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xf72, 0xffffffffffffffff}, 0x0, 0xc8, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x12, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000feffffffffffffff7f0000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r4, 0x0, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/uts\x00') syz_open_procfs$namespace(0x0, &(0x7f00000006c0)='ns/uts\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="160000000000000004000000010000", @ANYRES8=r5, @ANYBLOB='\x00'/19, @ANYRES32, @ANYRES8=r5], 0x50) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000400)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x13, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r7}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000020c0)}], 0x4}, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r6, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) 7m37.046964816s ago: executing program 4 (id=1372): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='f2fs_filemap_fault\x00', 0xffffffffffffffff, 0x0, 0x1fffffffffff9}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) openat$ppp(0xffffffffffffff9c, 0x0, 0x305500, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="628a1bf1e9fe3f69080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/17, @ANYRES32=0x0, @ANYBLOB='\x00'/14], 0x48) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000100000000000000000071120d00000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) (async, rerun: 32) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) close(0x3) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000009100000000fe000000000000000000b90626"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000007300000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[0x0], 0x0, 0x0, 0x86, 0x0, 0x0, 0x10, &(0x7f0000000580), &(0x7f0000000080), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) (rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000001000)="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", 0x2d5}], 0x1}, 0x0) (async) setsockopt$sock_attach_bpf(r4, 0x1, 0x21, &(0x7f0000000540), 0x4) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) (async) sendmsg$tipc(r5, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) (async) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000640)={'dummy0\x00', @local}) (async) sendmsg$tipc(r4, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b4f84b4b49b8aab693d1d0c9ac8014e81f5b7f20fae4b4cff715b58688354d506e80c6b39960cc967c2481f7a410eb98a585ec9dc286bbf5e21c6038cf841334e03c5f671f461130fd2ba8d56092f0990f2fe8271be70e275b6a0dc9dc1d6516893f2cdf5f83aec9041fdc0440595"], 0x0, 0x4a}, 0x28) 7m37.017892017s ago: executing program 3 (id=1373): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sys_enter\x00'}, 0x10) gettid() r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f0000000000)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000040000000900000000000000", @ANYRES32, @ANYBLOB="00000000fff700"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00bf00040000000100"/20, @ANYRES32=r3, @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r4}, &(0x7f0000000840), &(0x7f0000000880)=r3}, 0x20) close(r3) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r4, &(0x7f0000000900)}, 0x20) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000300)={0x2, 0x80, 0xff, 0x9, 0x5, 0x0, 0x0, 0xa8cc, 0xa0481, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3acf, 0x1, @perf_config_ext={0x0, 0xa690}, 0x2022, 0x7fff, 0x7fffffff, 0x9, 0xf4, 0x6, 0x7, 0x0, 0xfffffff9, 0x0, 0x8}) sendmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000600)=[{&(0x7f00000003c0)="211d188db57e67e648cd64dad356f183b42beba85e20297f5043a5c877df51f8bb4b4e1345de13e70ea72fc799290c88fb2519bcf2402cbbb2aaa5a3978d8f7d05e9f4faa5825359cffae1b4acb69e2f4608454c", 0x54}, {&(0x7f0000000500)="3fc0ae4ae44d", 0x6}, {&(0x7f0000000ac0)="e81fb94f11475988fc3f4d030d595e31070ae42be044a70b456122492530b1ba3009ee0d589a8dec34f6b6ded711", 0x2e}], 0x3}, 0x4810) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0500000006000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000d231b9b3001aa3dd4abd197d5516930c072a495324563a0d244f6946a5dd695f5507cc9639d1aa15ca5bd5a544e257f2387dc4dd538e60018e7ff373ca215f85030f4cd81c2187dfc7cc06ec5aa3efc87b469fc092431c817ba7935b9579b016cc8f785f8a2af0d86fdc3be51434b1c024e3ad3cba2314a7255db4deb08b5de6515aaa310561ba3a075e6ef908dd0f45dbbd8658d978ce02735fbce2e030345154ff842c3569df8d12357af0cf347dce132097090f9af9325c6da02e4636a516"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x61680, 0x20, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) close(r6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) 7m37.003493428s ago: executing program 4 (id=1374): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x50, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001100)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="0202000005000000040000000000000000000040aa849addeaf8f2000000000000000300550b734529af6712bb3ed269f70cb1045e899e1c607647bc838975dc875c1ee473dbf8038fd4a56f769faed6eb84acba5bcb2f2c0c31c31c6288eaaab246b0b3be69c5dce33e"], 0x50) (async) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="0000009f9604000000080000000100000080000000008258bc3814898060e0fe2b52913626c14107acb16e37574895a454bd54d56db17639075ca078963b8ce4ae60093f81019bc4f73dc5b33430a6c6e4b6150c6753c4b1469e305ffcc38c3767eb59c0dbc324a68ea93cdf8f9c5a6a28dc97920d2134ab7eabd2323993ca92ab6c36d13f960a07fe375b4b13290cd0a7e6483f7887ad5d0524b29c876a53bae7", @ANYRES32=0x1, @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32=r5, @ANYRESOCT=r1], 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r4, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000240)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x7b, &(0x7f00000005c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000600), &(0x7f0000000680), 0x8, 0xb9, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x6, 0x18, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa2, 0x0, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x22}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @ldst={0x3, 0x2, 0x6, 0xb, 0x9, 0xfffffffffffffffc, 0x8}, @map_fd={0x18, 0x7, 0x1, 0x0, r6}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1f6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}]}, &(0x7f0000000080)='GPL\x00', 0x10001, 0xef, &(0x7f00000004c0)=""/239, 0x41000, 0x8, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0x3, 0xe192bdcd, 0xc}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r3, r3, r3, r3, r3, r3, r3, r3], 0x0, 0x10, 0x1}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3}, 0x0, &(0x7f0000000040)}, 0x20) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000009c0)={r6, &(0x7f0000001b80)="8ae00efd01aca943c907d9754894d8cfcb2041c1ef167b7fa82edc488f1e551258fe572ca709ef76729cd086a3169215efe1108b85783ff98df4ce9c73b3122d0af27e4d42ef9d01103577eda24365595cee1e56efed0e21ddb1ee29d9139369d5013fa6da7b4217ef60c4017cc97449238c4971807a68daea8ddb3abac713f1f8bde06b074b9de3fee502629efee5161906432ed6d08e993941e80c174207330158f2f1d97e9761730aeb68fda726b277083e0e19756b895c54caf2c25232c5830d0c59246c12fc1a772be1ee73fe1c72151af7e1ad098bd5edbd9efa46952766abbc332e507984663f326b9490", &(0x7f0000001c80)=""/255}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x1, 0x5, &(0x7f0000000800)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001080)=[{0x0}, {&(0x7f0000001040)="73b6f3860ce148b2cd570bb85c3344a7df2049a7fdfeab42124b05da392976fe0a4bc649770ab414fbbef74d62b85f8223cc029b3051", 0x36}], 0x2}, 0x1) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000001040)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r9}, 0x10) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x109240, 0x0, 0x0, 0x0, 0x3, 0x7}, 0x0, 0x6, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) 7m36.835738311s ago: executing program 3 (id=1375): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r2}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x1, 0x40, 0x40}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001580)={0x0, 0xffffffffffffff3c, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="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", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30d70769e229dc91037321d618e1eff4a176ea46d5cd4d5da97f80356e46d9e8166bf2d97210b631654ece218a2a204a1786ab5a60a881a7a294cd2f92438350e6e3ec4439ebe06133ff65b1e32b809ba0482783b563ec8e5778285da5211e5821135433053a7921319c544d5e797f"}, {&(0x7f00000007c0)="75c37714a0bada8343bceb64ccb6d95a2a37b020e0bf1f6a1de4584223a2f285aaca30a9554cd5cdc1659cb9fec462cc5c2220a7cd891ec3bad99fe3c06e15a109ec0fdb6aeeee5ef8e4bfc28e17984a3860b907d549492d47a447782b7357ea72f4b2c26512a6a33c0247b730a6182ea5a99aee25fcee07f9cb0a80595cd5f744fa6898fdffda5b34b19474b8e853467329e4aea36cfd0e00735d37beb0f895c5688259a8935194eefd3a96d55707133a08f03e14da563160a545396b93341f41c161c93687e28a"}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae"}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0xc, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000004000009"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r5, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x9, 0x1, 0x8c}]}, &(0x7f0000000080)='syzkaller\x00'}, 0x80) 6m52.68864806s ago: executing program 32 (id=1369): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x8, 0xa, 0x4, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000a00)='\xe7 \xd2\x81o\x9c\xb2\x89b\x9bx\xe9\xb4\x8f\xabv\xab\xce\x94\x13m}\x1d\xe9\xc07\xa5p\x90\xfb\xb0M\xf5o\xeb\x1a\xa1%\xb8\x7f\a\x88\xaf\x86^\x80\x02\x01\xec\xa6a\xad\x02\xdb\x04I\x01\xcfX\xfeI\x04\xa5#\x1d\xd2\xf7\xc2FL_\xcf\x7f\x92\b\xdcr\xbd\xc5W\xf9\xec\xa0G\xab\xc2\xa5\xe7J\xf8\xef\xcd\xca\x9b\xea') r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x20) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f00000001c0)=r4) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1e03d3ffbc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x88246, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2001, 0x3, 0x0, 0x8, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r5) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80x0, &(0x7f00000007c0)=""/101, 0x65}}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bc8900000000000035090100000000009500000000000000b7080000000000007b9a00fe00000000b509000000000000c3aaf0fff1000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018220000", @ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r9, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0, 0xdc, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x1069, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000002400000024000000080000000e0000000000000b020000000700000000000a0000000000001204000000005f300000306100"], &(0x7f0000000640)=""/67, 0x44, 0x43, 0x0, 0x6}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x4, 0x0, r7, 0x800, '\x00', r10, r11, 0x1, 0x3, 0x1}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) 6m52.674533951s ago: executing program 33 (id=1370): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000540)={{}, 0x0, &(0x7f0000000500)='%pB \x00'}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x81, 0x6e57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100040, 0x8, 0x0, 0x0, 0x0, 0xffff0000, 0x0, 0x0, 0xfffffffe, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x3f}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0xc8, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xd, 0x0, &(0x7f0000000000)="b9ff03076844268cb89e14f008", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x5c, 0x0, 0x80, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x100000000}, 0x4210, 0xc8, 0x0, 0x0, 0x2000, 0x0, 0x4, 0x0, 0x1, 0x0, 0x1}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='ext4_read_block_bitmap_load\x00', r6, 0x0, 0x21ca}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 6m52.653240241s ago: executing program 34 (id=1371): perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xf72, 0xffffffffffffffff}, 0x0, 0xc8, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x12, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000feffffffffffffff7f0000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r4, 0x0, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/uts\x00') syz_open_procfs$namespace(0x0, &(0x7f00000006c0)='ns/uts\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="160000000000000004000000010000", @ANYRES8=r5, @ANYBLOB='\x00'/19, @ANYRES32, @ANYRES8=r5], 0x50) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000400)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x13, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r7}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000020c0)}], 0x4}, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r6, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) 6m52.613307782s ago: executing program 35 (id=1375): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r2}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x1, 0x40, 0x40}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001580)={0x0, 0xffffffffffffff3c, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="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", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30d70769e229dc91037321d618e1eff4a176ea46d5cd4d5da97f80356e46d9e8166bf2d97210b631654ece218a2a204a1786ab5a60a881a7a294cd2f92438350e6e3ec4439ebe06133ff65b1e32b809ba0482783b563ec8e5778285da5211e5821135433053a7921319c544d5e797f"}, {&(0x7f00000007c0)="75c37714a0bada8343bceb64ccb6d95a2a37b020e0bf1f6a1de4584223a2f285aaca30a9554cd5cdc1659cb9fec462cc5c2220a7cd891ec3bad99fe3c06e15a109ec0fdb6aeeee5ef8e4bfc28e17984a3860b907d549492d47a447782b7357ea72f4b2c26512a6a33c0247b730a6182ea5a99aee25fcee07f9cb0a80595cd5f744fa6898fdffda5b34b19474b8e853467329e4aea36cfd0e00735d37beb0f895c5688259a8935194eefd3a96d55707133a08f03e14da563160a545396b93341f41c161c93687e28a"}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae"}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0xc, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000004000009"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r5, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x9, 0x1, 0x8c}]}, &(0x7f0000000080)='syzkaller\x00'}, 0x80) 6m52.571663383s ago: executing program 36 (id=1374): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x50, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001100)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="0202000005000000040000000000000000000040aa849addeaf8f2000000000000000300550b734529af6712bb3ed269f70cb1045e899e1c607647bc838975dc875c1ee473dbf8038fd4a56f769faed6eb84acba5bcb2f2c0c31c31c6288eaaab246b0b3be69c5dce33e"], 0x50) (async) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="0000009f9604000000080000000100000080000000008258bc3814898060e0fe2b52913626c14107acb16e37574895a454bd54d56db17639075ca078963b8ce4ae60093f81019bc4f73dc5b33430a6c6e4b6150c6753c4b1469e305ffcc38c3767eb59c0dbc324a68ea93cdf8f9c5a6a28dc97920d2134ab7eabd2323993ca92ab6c36d13f960a07fe375b4b13290cd0a7e6483f7887ad5d0524b29c876a53bae7", @ANYRES32=0x1, @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32=r5, @ANYRESOCT=r1], 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r4, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000240)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x7b, &(0x7f00000005c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000600), &(0x7f0000000680), 0x8, 0xb9, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x6, 0x18, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa2, 0x0, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x22}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @ldst={0x3, 0x2, 0x6, 0xb, 0x9, 0xfffffffffffffffc, 0x8}, @map_fd={0x18, 0x7, 0x1, 0x0, r6}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1f6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}]}, &(0x7f0000000080)='GPL\x00', 0x10001, 0xef, &(0x7f00000004c0)=""/239, 0x41000, 0x8, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0x3, 0xe192bdcd, 0xc}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r3, r3, r3, r3, r3, r3, r3, r3], 0x0, 0x10, 0x1}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3}, 0x0, &(0x7f0000000040)}, 0x20) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000009c0)={r6, &(0x7f0000001b80)="8ae00efd01aca943c907d9754894d8cfcb2041c1ef167b7fa82edc488f1e551258fe572ca709ef76729cd086a3169215efe1108b85783ff98df4ce9c73b3122d0af27e4d42ef9d01103577eda24365595cee1e56efed0e21ddb1ee29d9139369d5013fa6da7b4217ef60c4017cc97449238c4971807a68daea8ddb3abac713f1f8bde06b074b9de3fee502629efee5161906432ed6d08e993941e80c174207330158f2f1d97e9761730aeb68fda726b277083e0e19756b895c54caf2c25232c5830d0c59246c12fc1a772be1ee73fe1c72151af7e1ad098bd5edbd9efa46952766abbc332e507984663f326b9490", &(0x7f0000001c80)=""/255}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x1, 0x5, &(0x7f0000000800)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001080)=[{0x0}, {&(0x7f0000001040)="73b6f3860ce148b2cd570bb85c3344a7df2049a7fdfeab42124b05da392976fe0a4bc649770ab414fbbef74d62b85f8223cc029b3051", 0x36}], 0x2}, 0x1) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000001040)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r9}, 0x10) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x109240, 0x0, 0x0, 0x0, 0x3, 0x7}, 0x0, 0x6, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) 2.427808703s ago: executing program 9 (id=6898): bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xfdef) r2 = getpid() write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) 1.925792613s ago: executing program 6 (id=6906): perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) close(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) recvmsg$unix(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000440)=""/202, 0xca}], 0x1, &(0x7f0000000540)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}, 0x40002022) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 1.808179515s ago: executing program 8 (id=6908): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1100000004000000040000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000011f7474dd3ef1cea29ceb492b600"/41], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r1}, 0x57) 1.783627785s ago: executing program 8 (id=6909): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00'}, 0x10) r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x200000ab, &(0x7f0000000440)=ANY=[@ANYRES8, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{}, &(0x7f0000000040), &(0x7f0000000080)=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x1a, 0xc, &(0x7f0000000a00)=ANY=[@ANYBLOB="793c25d7529fb3b9fa8eb458b194a46538372fad0b7010fac41a896ab88397953eb43ea8b5bf93461bbb36deb7b65539ed029128cbbed16607febb311b740e0bc0ead4d5cb48a478a1a013b8d8d03217f65c97e0ec638a73622081203568313e3e22b372257ed8da485fecc51e986c7e2166d6fdac131ad5044caa0cd62ba7e985da7c2191d883f859aa90464ba8d5a4cfa3c2c24646", @ANYRES32=r1, @ANYRES32=r2], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/203, 0xcb, 0x0, &(0x7f0000000600)=""/83, 0x53}}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x16, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="660a00000000000061114c00000000009500000000001af2"], &(0x7f0000000000)='GPL\x00'}, 0x94) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b5181100", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x400}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000000740)='syzkaller\x00', 0x4e2d, 0xba, &(0x7f0000000780)=""/186, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000880)={0x2, 0x1, 0x6, 0x7041}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000008c0)=[r6, 0xffffffffffffffff, r6], &(0x7f0000000900)=[{0x5, 0x5, 0x6, 0x1}, {0x5, 0x2, 0x0, 0x8}], 0x10, 0xffffffff}, 0x94) unlink(&(0x7f00000006c0)='./cgroup\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r6}, &(0x7f0000000000), &(0x7f00000005c0)=r7}, 0x20) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5}, 0x48) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES16=r0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.709471787s ago: executing program 6 (id=6910): r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000900)='blkio.bfq.io_serviced\x00', 0x0, 0x0) (async, rerun: 64) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000980), 0x4) (async, rerun: 64) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x9, 0x0, 0xfd, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e, 0x1, @perf_bp={0x0}, 0x8, 0xc8, 0xfffffffe, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) (async) recvmsg$unix(r2, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180200000000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) (async) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102036c00fe08000e40000200875a65969ff57bea000000000000000000000000ac1414aa"], 0xfdef) (async, rerun: 32) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async, rerun: 64) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 64) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r10 = perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x7f, 0x8, 0x0, 0xb, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x200}, 0x0, 0xffffffffefffffff, r0, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYRES8=r10], &(0x7f00000007c0)='syzkaller\x00'}, 0x94) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x50) (async, rerun: 32) socketpair$unix(0x1, 0x1, 0x2000000, &(0x7f0000000280)) (async, rerun: 32) r14 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000b00)=ANY=[@ANYRES64=r11, @ANYRESHEX=0x0, @ANYRES64=r7, @ANYRES16=r12, @ANYRES64=r12, @ANYBLOB="9c17a305a4099510be30daa199e4f172502ad0aa232eb20c02644c9571bb38f8a28f546fb30ef7d93c4c79933546aeb032c4d4be761232f323ad1b669363afafabb5e070212f8291dccdabd05f7ecca3e1e67deec51a07b9db0adcab2a53f3e4d94b8645338bb851580d3ff1b237d6a87d6f7596339f2f2d1a62eb93d464e28aa1c8bda04edf2539f0d6952665cc47d44be4045016d8a55dc111bb5fbefddc269483e12720818675c6f944feb3aa1966663d66875d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r1}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r8, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000340)=r9}, 0x20) (async) r16 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000800)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000540)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xa9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x7}, @map_fd={0x18, 0x0, 0x1, 0x0, r8}, @map_val={0x18, 0x4, 0x2, 0x0, r13, 0x0, 0x0, 0x0, 0x4}, @map_fd={0x18, 0x4, 0x1, 0x0, r8}, @map_fd={0x18, 0x6, 0x1, 0x0, r13}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f00000005c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x34, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x10, 0x9, 0x9}, 0x10, 0x2c5b9, r14, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x15) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000940)) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r15}, &(0x7f00000003c0), &(0x7f0000000740)=r16}, 0x20) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) (async) socketpair(0x2, 0x5, 0x84, &(0x7f0000000040)) (async) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) socketpair(0x27, 0x43a9c408f1bb23e6, 0x7, &(0x7f0000000700)) 1.622910709s ago: executing program 6 (id=6912): bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, 0x0, &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f00000006c0), 0x5, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) write$cgroup_subtree(r0, 0x0, 0x66) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x2, 0x7fe2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xf, &(0x7f0000001080)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xfffffff7}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x3, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbe1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff47257f164391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d23734bcafe3b164474e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f3431f67fc65b75c202e43816e34ff41db85bacd77b25242830b788ae1e00"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x2b}]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x0, 0x6, 0x6, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r6, &(0x7f00000016c0)={&(0x7f0000001100)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001180)=""/207, 0xcf}, {&(0x7f0000001280)=""/67, 0x43}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000001300)=""/186, 0xba}, {&(0x7f00000013c0)=""/111, 0x6f}, {&(0x7f0000000600)=""/55, 0x37}, {&(0x7f0000001440)=""/188, 0xbc}, {&(0x7f0000001500)=""/16, 0x10}, {&(0x7f0000001540)=""/175, 0xaf}], 0x9}, 0x42) 1.581944849s ago: executing program 9 (id=6914): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000a50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r2}, 0x10) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) write$cgroup_devices(r3, &(0x7f0000000200)=ANY=[], 0xffdd) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x180, 0xc8, 0x400000, 0x0, 0x0, 0x4, 0x7, 0x0, 0x0, 0x0, 0x20b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa33"], 0xfdef) (async) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xffc0) 1.451288622s ago: executing program 6 (id=6916): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x1c, 0x2000000000000329, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001080)={r0, 0x58, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xfffffffffffffeb6) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000011c0)={&(0x7f00000010c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@int={0xb, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x37, 0x1}, @float={0xf, 0x0, 0x0, 0x10, 0xc}]}, {0x0, [0x51, 0x0, 0x61, 0x0]}}, 0x0, 0x3a, 0x0, 0x0, 0x3}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001200)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x6, '\x00', r1, r2, 0x4, 0x0, 0x1}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', r1, @fallback=0x1a, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000eacc4dc8667fedcb7f808f97b2bc0d19144ca5bc83be35f041f859d232358218572a8ccf8f7fde7395d96e25dfaf61c16bfd06d1a7ec8ec0555e447f5fdfab7584e26aa7f6893aaca6564bec48b2b9960a8918f6ed4af2dd9af8629953dba05c0c8f393f6e0d6785b128d73eba59ee0a700b574125c27b982cefa850873bbd7b4f0061b0e11a71c39af0970ff7188caf77904d74de9046890056e195", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)="d446eae1c5207f482eaf765d840eda84bc1a796fc424c2efb4be21e08256", &(0x7f0000000200), 0x6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000580)='mm_page_alloc\x00', r3}, 0x18) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x2d, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) ioctl$TUNGETVNETLE(r5, 0x40047451, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3, 0x0, 0x2}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x38, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000004711f50000000000"], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0b00000008000000010001000900000001000000", @ANYRES32, @ANYBLOB="000000000000008732ae687f1660cef17cce0d1d3a8e00"/35, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='mm_page_free\x00', r9}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r8}, &(0x7f0000000080)=0x20, &(0x7f00000001c0)=r9}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.390969893s ago: executing program 8 (id=6918): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000700"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000700"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES32], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES32], 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x91, 0x4}, 0xe00, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ac}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x91, 0x4}, 0xe00, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ac}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000240)=0x6fa6, 0x12) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) 1.390634953s ago: executing program 9 (id=6919): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000089dbfbaca998"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) (async) recvmsg$unix(r4, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) close(r5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r3}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r8}, 0x10) (async) close(r0) 1.308381054s ago: executing program 6 (id=6921): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x7}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000318110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r2}, &(0x7f0000000080), &(0x7f00000006c0)='%-010d \x00'}, 0x20) close(r0) close(r1) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.208061787s ago: executing program 9 (id=6922): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1, 0xf, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000400000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b703000000002b528500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) unlink(&(0x7f0000000580)='./cgroup\x00') r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_freezer_state(r5, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(r6, &(0x7f0000000040)='FROZEN\x00', 0x7) r7 = openat$cgroup_procs(r5, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000180), 0x12) write$cgroup_freezer_state(r6, &(0x7f0000000080)='THAWED\x00', 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r8, &(0x7f0000000500)={&(0x7f0000000380)=@pppol2tpv3in6, 0x80, &(0x7f0000000400)=[{&(0x7f0000000740)=""/223, 0xdf}], 0x1, &(0x7f0000000840)=""/131, 0x83}, 0x2000) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x13, 0x8, 0x0, 0x0, 0x5}, 0x48) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) sendmsg$inet(r9, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 1.01588906s ago: executing program 5 (id=6924): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'virt_wifi0\x00', @broadcast}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x3) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_ext={0x1c, 0x11, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@ldst={0x2, 0x0, 0x1, 0x7, 0x2, 0x10, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xf, 0x643, 0x101}, 0x10, 0x1c99e, 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000240)=[{0x0, 0x4, 0x9, 0xc}], 0x10, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000340)={0x0, r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000002880)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f00000003c0)=""/228, 0xe4}, {&(0x7f00000004c0)=""/18, 0x12}, {&(0x7f0000000500)=""/123, 0x7b}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/143, 0x8f}, {&(0x7f0000001640)=""/233, 0xe9}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/159, 0x9f}], 0x8}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000028c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000002900)=r4, 0x4) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002940)='io.weight\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f0000002980)=0x7, 0x12) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x0, r3}, 0x18) syz_clone(0x40011000, &(0x7f0000002a40)="87144c64f601b88a5e1a746e1e4cffa7b97949c1b473305829f52ddbe37a1deb9a8fda970777883feb8f4de501c585a6b8c3e2707c854ad395c8a3d21c3863c657c9f1e7d883350d59fdffd249", 0x4d, &(0x7f0000002ac0), &(0x7f0000002b00), &(0x7f0000002b40)="3da950423a8e743103e4d3cd5caa70911c22b1b3b2a302174923fbc2bcec1a983a91c532086e092f94f3e1a24d2a79855a1fb84bd227a1fc22bfdf82d9f6a38f35af11280b5b80693264bfb0c5b9b02e2643328d57bd849559281858e0cb21ec85271be99d7b20d796d55d371a1b1dbc07c747104005403c8443791adc38cd4e47a131b6597ddfec") recvmsg$unix(r3, &(0x7f0000004080)={&(0x7f0000002c00), 0x6e, &(0x7f0000003f80)=[{&(0x7f0000002c80)=""/84, 0x54}, {&(0x7f0000002d00)=""/22, 0x16}, {&(0x7f0000002d40)=""/183, 0xb7}, {&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/4096, 0x1000}, {&(0x7f0000003ec0)=""/169, 0xa9}], 0x6, &(0x7f0000004000)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x78}, 0x2) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000040c0)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004300)={0x1, 0x58, &(0x7f0000004280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=0xffffffffffffffff, 0x4) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000004640)=@bpf_lsm={0x1d, 0x11, &(0x7f00000043c0)=@raw=[@printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}], &(0x7f0000004480)='syzkaller\x00', 0x8, 0x5d, &(0x7f00000044c0)=""/93, 0x41100, 0x20, '\x00', 0x0, 0x1b, r7, 0x8, &(0x7f0000004540)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000004580)={0x2, 0xb, 0xfffffff9, 0xbe}, 0x10, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000045c0)=[r4, r6, r8], &(0x7f0000004600)=[{0x5, 0x3, 0x7, 0x5}, {0x0, 0x4, 0xe, 0x9}], 0x10, 0x8}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000004780)={0x1f, 0x17, &(0x7f0000004100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @call={0x85, 0x0, 0x0, 0x64}, @call={0x85, 0x0, 0x0, 0xc8}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x474}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0x0, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0xba50}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x6}]}, &(0x7f00000041c0)='syzkaller\x00', 0x2, 0x67, &(0x7f0000004200)=""/103, 0x0, 0x0, '\x00', r9, @fallback=0x11, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004380)={0x0, 0x6, 0x8001, 0x6}, 0x10, 0xffffffffffffffff, r11, 0x2, &(0x7f0000004700)=[r4, r8, r8], &(0x7f0000004740)=[{0x3, 0x5, 0xf, 0x1}, {0x1, 0x2, 0x7, 0x8}], 0x10, 0x3}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000004940)={@map=0x1, 0x37, 0x0, 0x9, &(0x7f0000004840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000004880)=[0x0, 0x0, 0x0], &(0x7f00000048c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000004900)=[0x0, 0x0, 0x0], 0x0}, 0x40) r15 = bpf$ITER_CREATE(0x21, &(0x7f00000049c0)={r12}, 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000004980)={@cgroup=r15, r8, 0x11, 0x2010, r11, @value=r8, @void, @void, @void, r14}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000004a40)=@generic={&(0x7f0000004a00)='./file0\x00', r12}, 0x18) openat$cgroup_devices(r15, &(0x7f0000004a80)='devices.deny\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000004bc0)={@cgroup=r8, 0x16, 0x0, 0x8000, &(0x7f0000004ac0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000004b00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000004b40)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000004b80)=[0x0, 0x0, 0x0]}, 0x40) ioctl$TUNSETDEBUG(r15, 0x400454c9, &(0x7f0000004c00)=0x1) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000004d40)={@map=r13, 0x11, 0x0, 0x6, &(0x7f0000004c40)=[0x0], 0x1, 0x0, &(0x7f0000004c80)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000004cc0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000004d00)=[0x0, 0x0]}, 0x40) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000004d80)={'veth0_to_batadv\x00', 0x1000}) perf_event_open$cgroup(&(0x7f0000004dc0)={0x1, 0x80, 0x1b, 0x8, 0x2, 0x7, 0x0, 0xfffffffffffffffb, 0x40900, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x0, 0x513}, 0x40, 0x7, 0x9, 0x5, 0xaf, 0xb, 0x7d, 0x0, 0x1, 0x0, 0x8}, r15, 0x1, r15, 0xb) write$cgroup_int(0xffffffffffffffff, &(0x7f0000004e40)=0xf6, 0x12) 990.961571ms ago: executing program 6 (id=6925): mkdir(&(0x7f0000000580)='./file0\x00', 0xaa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000880), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="1b00000001000000fdffffff0080000000200000", @ANYRES32, @ANYBLOB="40000000000000000000000000000000db000000201ea7c974d95ce5c96eab5e6643f846df06fc31f88a220d72e9bd66a26992b5e04c9b0e946a5036f31b114c5531e733ab81f7ecc7fbf976a51b3f35194989757b65522fa867b52da003c29fb5b01dbd7f49f15154598c3f2f88616aa2449aaef14ac3e4438a01ef6f42c3fc2ea5d22cf237087db30f10bb0c2276b835ff2f15336aef3f3d45d14ba5af3f51831b157c10fcd5558eb2c169c888346db2535eabc9e8c79a1027806fb761b300"/201, @ANYRES8=r1, @ANYRES32, @ANYBLOB="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"/324], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000340)=@name={0x1e, 0x2, 0x2, {{0x40, 0x3}, 0x4}}, 0x10, &(0x7f0000000180)=[{&(0x7f00000003c0)="ad2222b995009ad9048fe817443431a7d20bcb34f79b89d2542049476c5ee281a1550a84f9b3572e2b77028d4b8c8ffbf0af82d60b88c33a85066428d5091c2bf15c8e122f86ddeb1c61f2e3c971bcb706c19e3706a9cacdf25fd6f02b3063f040404b37d00e", 0x66}, {&(0x7f00000002c0)="b457e66ab745e5f3af1ddc4d7a1822058b46b933cff8ffa3dcc5376c63b21a5869cd31b5e1418daf0ee4094d59d333dd5b3fc66c31d8dfc9612c008bbf5a29d5e248b7de70898b118483a9efffb7f813bc69c41f935dc2210fcdbdf5e0e6", 0x5e}], 0x2, &(0x7f0000000500)="74d304d5c46c49bc2dec88015a5a2cf5a22d0f71513dbf6f880cc198d5fce523ca9aeee4", 0x24, 0x4000080}, 0x2000c041) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x4004743d, 0x110e22fff6) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000bc0)=ANY=[], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r7}, 0x10) 817.288284ms ago: executing program 7 (id=6928): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r1}, 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4}, 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x14, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001bc6500850000008600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f00000000c0)=r6, 0x4) sendmsg$unix(r5, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 736.026526ms ago: executing program 7 (id=6929): r0 = gettid() r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x3d, 0x2, 0x2, 0x3, 0x0, 0x5, 0x2020, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x100, 0x5}, 0x1184, 0xe, 0x6, 0x2, 0x7fffffff, 0x4, 0x4, 0x0, 0xf33f, 0x0, 0x100}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x3, 0x2, 0x0, 0x1, 0x0, 0x8, 0x4110, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x486, 0x0, @perf_config_ext={0x2, 0xfa0}, 0x2804, 0x5, 0x3, 0x2, 0x8, 0x800, 0xc9, 0x0, 0xb5, 0x0, 0x4}, r0, 0xffffffffffffffff, r1, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) r3 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000300000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r4}, 0x10) unlink(0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x18, 0x24040010}, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r2, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b2388a84b"], 0xffdd) 733.734056ms ago: executing program 5 (id=6930): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000240)='timer_start\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 725.709966ms ago: executing program 5 (id=6931): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xc546, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x50) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_tracing={0x1a, 0x10, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x4}, {}, {}, [@generic={0x1, 0x1, 0x8, 0x81, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='syzkaller\x00', 0xb75, 0x1000, &(0x7f0000000180)=""/4096, 0x41000, 0x1, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001180)={0x5, 0x10, 0xfffffffd, 0x7}, 0x10, 0x37bb, 0xffffffffffffffff, 0x3, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x3, 0x1, 0x2, 0x5}, {0x4, 0x1, 0xf, 0x9}, {0x2, 0x2, 0x9}], 0x10, 0x400}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001340)={{r0, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000001300)=r1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001640)={r1, 0xe0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f00000013c0)=[0x0, 0x0, 0x0], &(0x7f0000001400)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x61, &(0x7f0000001440)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001480), &(0x7f00000014c0), 0x8, 0xd, 0x8, 0x8, &(0x7f0000001500)}}, 0x10) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001680)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x6, '\x00', r4, 0xffffffffffffffff, 0x3, 0x1}, 0x50) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001700)='syz0\x00', 0x200002, 0x0) r8 = openat$cgroup_freezer_state(r7, &(0x7f0000001740), 0x2, 0x0) r9 = openat$cgroup_ro(r7, &(0x7f00000018c0)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x11, 0x3, &(0x7f0000001780)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x5}, @ldst={0x0, 0x2, 0x2, 0x5, 0x7, 0x6, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f00000017c0)='syzkaller\x00', 0xd0df, 0x8c, &(0x7f0000001800)=""/140, 0x40f00, 0x28, '\x00', r4, @fallback=0x2e, r9, 0x8, &(0x7f0000001900)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001940)={0x2, 0x6, 0x6dfc, 0x7948}, 0x10, r5, 0xffffffffffffffff, 0x7, 0x0, &(0x7f0000001980)=[{0x2, 0x2, 0x9, 0xb}, {0x3, 0x3, 0xb, 0xa}, {0x5, 0x3, 0x40, 0xc}, {0x2, 0x2, 0xc, 0x9}, {0x3, 0x5, 0xf, 0x2}, {0x0, 0x3, 0xa, 0x9}, {0x4, 0x2, 0xd, 0xc}], 0x10, 0x800}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001bc0)={@fallback=r8, 0x2e, 0x0, 0x4, &(0x7f0000001ac0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000001b00)=[0x0], &(0x7f0000001b40)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001b80)=[0x0], 0x0}, 0x40) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000001c40)={0x0, 0x0}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001c00)={@ifindex=r4, r9, 0x22, 0x3024, 0x0, @void, @void, @value=r13, @void, r12}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d00)={0x1, 0x58, &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001d40)={0x2, 0x4, 0x8, 0x1, 0x80, r11, 0xfffffffa, '\x00', r14, r9, 0x5, 0x4, 0x4}, 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001dc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, r11, 0x1, 0x3, 0x2}, 0x50) ioctl$TUNSETOFFLOAD(r9, 0x400454d0, 0x0) openat$cgroup_procs(r7, &(0x7f0000001e40)='tasks\x00', 0x2, 0x0) r15 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001e80)={0x1b, 0x0, 0x0, 0x5, 0x0, r2, 0x6, '\x00', r4, r9, 0x4, 0x2}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000030c0)={&(0x7f0000001f00)="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", &(0x7f0000002f00)=""/1, &(0x7f0000002f40)="c920efa6c3c5019427b0a5216a72b7fb4ac1adde76917373c7c5e9fd66163cddd6359e78b616562d1f189ff73b32f92fd28c35d2164d19cbf82bac48dd694180b2e629ff3f067a82b2002694c48a1ab7945eeb28d6d357a38db1f6f4a6fd0234c58c4b1204320849e5d5c73ac7abd57ce66bd5fe3059e31a34b38a356323bb900c7b8de9b27de0eb85489dcd5c47b935ffe13cb482111100507af50b957965302ad135d64d89e45ded78e3c03e2dc2aa4ec071106e392f2d0c05af0a70b3432df7f8b83299b88fa51200df45293783095096afeee58cb291e87f88831ad85070a263af9cfa0e91d84b7889f9b9b9d218ba", &(0x7f0000003040)="12490de0886ce2099e94ffdbabdd3eb23404f55e9cacbdf5ff0cf19bdf605a80dcf934475a86a2c6b6b2907e9d1234162e784e06b2b5297f547ad3bfb6fa6237df6dd674", 0x4, r15, 0x4}, 0x38) ioctl$TUNGETVNETLE(r11, 0x800454dd, &(0x7f0000003100)) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000003140)=r13, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000003180)={@cgroup=r7, 0xffffffffffffffff, 0x14, 0x14, 0x0, @void, @value=r1, @void, @void, r12}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000031c0)={0x1}, 0x8) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000003200)={0x1b, 0x0, 0x0, 0x3, 0x0, r9, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1}, 0x50) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000003280)={@cgroup=r7, r1, 0x3, 0x10, 0x0, @void, @value=r1, @void, @void, r12}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000003300)={&(0x7f00000032c0)='netfs_read\x00', 0xffffffffffffffff, 0x0, 0x9}, 0x18) socketpair(0x22, 0x4, 0x5, &(0x7f0000003340)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000003480)={@map=r6, 0xc, 0x1, 0x80, &(0x7f0000003380)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000033c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000003400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000003440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r17 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000003500)={r3}, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000034c0)={@map=r6, r10, 0xf, 0xd, r9, @void, @value=r17, @void, @void, r16}, 0x20) 699.419626ms ago: executing program 5 (id=6932): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%-5lx \x00'}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], 0x0, 0xb0, &(0x7f0000000180)=[{}], 0x8, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0xd4, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x2, '\x00', r1, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x50) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x2, &(0x7f0000000440)=@raw=[@cb_func={0x18, 0x1, 0x4, 0x0, 0x4}], &(0x7f0000000480)='GPL\x00', 0x7ff, 0xca, &(0x7f00000004c0)=""/202, 0x41000, 0x4, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xe, 0xfffffffb, 0x400}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000640)=[r0, r2, r0, r2], &(0x7f0000000680)=[{0x2, 0x4, 0x1, 0x6}, {0x4, 0x2, 0x8, 0x5}, {0x2, 0x2, 0x3, 0x5}, {0x3, 0x2, 0x9, 0xb}, {0x1, 0x3, 0xa, 0x7}], 0x10, 0x1}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x9, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x97, &(0x7f0000000880)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x9b, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000ac0), 0x8) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{0x1, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000b40)=r3}, 0x20) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000e80)={&(0x7f0000000d80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x1}}]}, {0x0, [0x61, 0x61, 0x0, 0x61]}}, &(0x7f0000000dc0)=""/175, 0x36, 0xaf, 0x1, 0x101, 0x10000}, 0x28) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000f00)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x5ad9, '\x00', r1, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x1d, 0x21, &(0x7f0000000bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x461}, [@call={0x85, 0x0, 0x0, 0x5f}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @alu={0x4, 0x0, 0x6, 0x2, 0x3, 0xfffffffffffffffe, 0x8}, @ldst={0x3, 0x2, 0x0, 0x7, 0x9, 0xffffffffffffffc0, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0xb2}]}, &(0x7f0000000d00)='syzkaller\x00', 0x8efe, 0x6, &(0x7f0000000d40)=""/6, 0x41000, 0x52, '\x00', r4, @fallback=0x1e, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000ec0)={0x1, 0x4, 0x7fa, 0xffffe5bd}, 0x10, r5, 0xffffffffffffffff, 0x1, &(0x7f0000000f80)=[r0, r9], &(0x7f0000000fc0)=[{0x4, 0x2, 0x5}]}, 0x94) (async) write$cgroup_subtree(r6, &(0x7f00000010c0)={[{0x2d, 'hugetlb'}]}, 0x9) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000001100), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r11, 0x400454d0, 0x1f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001240)={@fallback=r2, 0x0, 0x1, 0x3, &(0x7f0000001140)=[0x0], 0x1, 0x0, &(0x7f0000001180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000011c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000001280)=@bloom_filter={0x1e, 0x10, 0xf, 0x2, 0x1042, r9, 0x7, '\x00', r4, r12, 0x5, 0x2, 0x1, 0x3}, 0x50) (async) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000001300)={r6}, 0x8) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001340)={0x3, 0x4, 0x4, 0xa, 0x0, r13, 0x3, '\x00', r1, r14, 0x2}, 0x50) (async) r15 = openat$cgroup_int(r12, &(0x7f00000013c0)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) write$cgroup_int(r15, &(0x7f0000001400)=0x4, 0x12) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001480)={&(0x7f0000001440)='fscache_cookie\x00', r12, 0x0, 0xffffffffffffff3a}, 0x18) (rerun: 32) ioctl$TUNGETFEATURES(r14, 0x800454cf, &(0x7f00000014c0)) (async) sendmsg$inet(r14, &(0x7f0000001700)={&(0x7f0000001500)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000001600)=[{&(0x7f0000001540)="5f979c89deb6c1ad63b3a85caf801137d2daadc4962e366e0672878efaf49e584e278e7deeb99c526d91024833d33773e99246c07bbb1c4fa5d8b0e2fec4bf35f2bfe7b5c986bf5645016b5e82cfba5cbca2a1d2809bb639eebd249ff9d51a5ebd4eadfc37b3ef4624317296099384dfc874ba3222953e339f65d61fc4ec66167746b0160c6805f745633ff4e3b76e", 0x8f}], 0x1, &(0x7f0000001640)=[@ip_retopts={{0x4c, 0x0, 0x7, {[@noop, @noop, @ssrr={0x89, 0x1b, 0x23, [@multicast2, @broadcast, @multicast1, @multicast1, @empty, @multicast2]}, @timestamp_addr={0x44, 0x1c, 0x22, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}, {@loopback, 0x8c}, {@broadcast}]}, @end]}}}, @ip_retopts={{0x34, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0xe4, 0x0, 0x0, [0x10001, 0x8, 0x4, 0x8, 0xb33, 0x5]}, @generic={0x44, 0x5, "89f1b9"}, @end]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}], 0xa0}, 0x8000) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001a00)={&(0x7f0000001740)="c81e2d4ecf9802bf11519a1111984a62ab41fe8586a9ab756247793a22f9847288f803ac37255e3794d7fe93a97467dd27138c1a9e3d9f92cdd2a6f36677849e1634504daf7951903b40444ea45f0e00280b7aa404510702a43d01da6669cf84e2619c29b29f1560d8e21727a74336ac31f3729938b01967c61fc6c0667dfe61b3aac7eb40787bbaa0e461adad76ee7f214bd525928b11cf81c0561c92d52200f4666e222575a624c1a7f43d1420e5dae254ff8962775f5f55e85fb53281d3177dd842286abd29548fe6e857e065801338863b9be7683e288ad723be3bacb0f48fa99eaf4f9d91aa0d8dce4d0910e50190b5", &(0x7f0000001840)=""/198, &(0x7f0000001940)="a895986be57ff619958e121794", &(0x7f0000001980)="64d985e05e899a80d63e4d294b4d91ae5be7fe16e90cd272829e200ac8247b297ea0b955018e2164c2092c0a942b952ffb815b07781d42ea8b296aefaafed53c1bab8867a1c92b2dfbc5b562858253fe55d26e7bbcabd2958f220018fd5378968093f79e2dd4fbd2cd1534d49c9b315b21549d34", 0x2, r14, 0x4}, 0x38) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001a40)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1, '\x00', 0x0, r14, 0x3, 0x3, 0x1}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r10) (async, rerun: 64) perf_event_open$cgroup(&(0x7f0000001ac0)={0x1, 0x80, 0xa, 0x3, 0x2, 0x34, 0x0, 0x9, 0x200, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x46, 0x95}, 0x20, 0xff, 0x7fff, 0x6, 0x4, 0x0, 0x1d8b, 0x0, 0x8}, r6, 0xe, r6, 0x6) (async, rerun: 64) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001c80)={r13, &(0x7f0000001b40)="3ff26f8133852a11d3de790bbc98cd923299535fd28c369e4c4f06cd8ce679901bf79870ab3dd1477b974fd0a8b916098df7da56978f2acf488e2760", &(0x7f0000001b80)=""/201, 0x4}, 0x20) (async, rerun: 32) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001d00)=@generic={&(0x7f0000001cc0)='./file0\x00', r6}, 0x18) (rerun: 32) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001f00)={0x1, &(0x7f0000001d40)="bc79ba21d212f46bc0aeaa0509fe2a07c347c3727017e0a38232928ff0e6679d0fa486b85e12d5c33964621599ce375593cf44fa72257199cb1982848dccd441d25c260bb01b9216b012462cd859fedf66b726fcf769cf78d59291435d38fb92f617a05555f83c4735002b71c4237052c92110056918545ba4a86f358c74faca1001c8d259d2d439ea1e7c70f3af594f4cb5bd82082675b891594bba6592ba75055334c47508c9e77afadad0407ccae03e75", &(0x7f0000001e00)=""/198, 0x4}, 0x20) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001f40)='./cgroup/syz0\x00', 0x200002, 0x0) 571.945179ms ago: executing program 5 (id=6933): r0 = perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0xfd, 0x0, 0x0, 0xd2, 0x0, 0x0, 0x60300, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x8000, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000ac0)=@bpf_ext={0x1c, 0x10, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6d6a01cd, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@jmp={0x5, 0x0, 0x8, 0x1, 0xb, 0x30, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000008c0)='syzkaller\x00', 0xf4, 0x1f, &(0x7f0000000900)=""/31, 0x40f00, 0x65, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000a00)={0x1, 0xe, 0x6, 0x3}, 0x10, 0x2266f, 0xffffffffffffffff, 0x3, &(0x7f0000000a40)=[r1, r2], &(0x7f0000000a80)=[{0x0, 0x3, 0xd, 0x2}, {0x0, 0x2, 0x5, 0xc}, {0x3, 0x2, 0xa, 0x8}], 0x10, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x8000}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd42"], 0xfdef) close(r9) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, 0x0, 0x0) r10 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000006c0)={r1, &(0x7f00000004c0)="79c7531bcf47fe5416ad144860fce65fe2a041ac88def2190ff38ede781f245a5213a9ac184fc9ffd9b9b84176e4fa078367559303496b2c50573619a6eae6d257d3e54c9c4d06578468aa3d48750cc4f1bd7d111494f5bdde4b11a1130ece5889a623951f4ede09146ff1ff4117ea5946d76a961f5fbf6a4a88df21c6224ef5a6f7d34cb81c6a31078dd9af4018ba6ca2c116f1b8857fc920f8b73712d926f7893c537c9e18053111f7a33bfbf3d31a4ea4d44e1b4cda46f25ceb17a9", &(0x7f0000000600)=""/30}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r11}, &(0x7f0000000180), &(0x7f00000001c0)=r10}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r12}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) 553.395049ms ago: executing program 8 (id=6935): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x59, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="0e000000040000000800000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000071123f000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x34) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 540.85785ms ago: executing program 7 (id=6936): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x0, 0x4, 0x1}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1}, &(0x7f0000000380), &(0x7f00000003c0)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xa, 0x4, 0xdd, 0xa}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="7a0a00ff00000000711043000000000095000000000000000b44c146b9162779ae713b31e59d22c10080dc4afd5584fe146d0167de3cd228921652b7a06f51b8dd7ecc6ac0cad2b575808aafc7ac733b456c4ce275bb8d8d3fc3f06dc161e201a1892f02888e2c2fb5b89cd940d7182358b52c4d08c6ae9dc7ebf5c8998606ff433c9eb70d5b74132eb7a14ede4462af169cd6289dba3f05ebaa775abafb3d06a5250eb3556b2978565a7cee4564de81d27770246698e3bff8"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x18) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000071122d00000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) recvmsg(r8, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) close(r8) 435.962282ms ago: executing program 5 (id=6937): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000435f8c5d1a05f1c46e653c066b46a7"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000feffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00'}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000008c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0800006b9fac4818013a6846409700cd650c00000005000020000000f9a86fa86098d796f3b3936f2ffb73f0b038fcbe1921226379593bba6b0638c2a8a361044aee0c1a1b62ec517601be98"], 0x0, 0x29}, 0x28) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800001f1a0068099b3c0000000000001860000000000000824d086bb227733218120000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000007d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000007d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair(0x1, 0x1, 0x1, &(0x7f0000000200)) (async) socketpair(0x1, 0x1, 0x1, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) (async) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$cgroup_devices(r3, &(0x7f0000000440)=ANY=[], 0xffdd) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r5}, 0x18) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) close(0x4) recvmsg$unix(r1, 0x0, 0x0) (async) recvmsg$unix(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 435.659212ms ago: executing program 7 (id=6938): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 403.398382ms ago: executing program 9 (id=6939): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) (async, rerun: 32) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x13, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="660a00000000000061119b0000000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="eef952163b8df753fad9f3f678216537832dd9ae54cdcc9d36b7b497d39a03eb9f381cdbc6f17c1f9ddee608d9", @ANYBLOB="0000060000000000b7080400000000007b8af8ff00000000bfa200000000000007020000f8ffff5700"/52], 0x0, 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x20, 0x0, 0x10, 0x40, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x6}, 0x10000, 0xc8, 0x5, 0x4, 0x8, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) (async, rerun: 64) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) r6 = gettid() (async, rerun: 64) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180), 0x10) (rerun: 64) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x9, 0x2, 0x2, 0x2, 0x0, 0x1000, 0x84200, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000002c0)}, 0x28, 0x8, 0xcf0, 0x3, 0xfffffffffffeffff, 0x7, 0xde3, 0x0, 0x80000001}, r6, 0xc, r7, 0x9) (async, rerun: 32) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r8}, 0x18) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0xec, 0x1, 0x0, 0xff, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x2}, 0x4000, 0xffff}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) (async) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) close(r9) (async) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[], 0x48) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) 136.273617ms ago: executing program 9 (id=6940): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080200002104000000000000", @ANYRES32], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000800000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000800000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = getpid() perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x9, 0x5, 0x4, 0x5, 0x0, 0x8000000000000001, 0x10, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4c80, 0x4, @perf_config_ext={0x153b, 0x8}, 0x84, 0x94da, 0xfffffffa, 0x0, 0x0, 0x6, 0x1, 0x0, 0x2, 0x0, 0x5}, r4, 0x9, r2, 0x2) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x4d, 0x1, 0x3}, {0x61}, {}, {}, {0x6}]}) (async) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x4d, 0x1, 0x3}, {0x61}, {}, {}, {0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x36}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 50.233999ms ago: executing program 7 (id=6941): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000240)='timer_start\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 49.593789ms ago: executing program 8 (id=6942): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = getpid() perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) (async) syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/mnt\x00') (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000600)=r1, 0x4) (async) sendmsg$inet(r3, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 49.238999ms ago: executing program 7 (id=6943): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000bc0)={0x1a, 0x4, 0x4, 0xa, 0x0, r2, 0x7fff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) syz_clone(0xc2164000, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000022000000bfa300000000000007030000007effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000050404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf27fb6d2c643db7e2d5fb4b0936cdf827fb43a431ca711fcd0cdfa146ed3d09a6175037958e27106e225b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc525d78c07f34e4d5b3185b310efcfa89147a09000000f110026e6d2ef831ab7ea0c34f17e3ad6eecbb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b0a341a2d7cbdb9cd38bdb2ca8e0500009cb20d03e7564c35a8d36774d5e5003a14817ac61e4dd19699a13477bf7e060e3670ef0e789f65f105006704902cbe7bc04b82d2789cb132b8667c214733a18c8b6619f28d9961b626c57c2691208173656d60a17e3c184b751c51160fbcbbdb5b1e7be6148ba532e60a0ac346dfebd31a080600000002000000ff000000334d83239dd27080e71113610e10d858e8327ef01fb6c86acac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e957bc73ddc4eabba08ab1e1ad828267d4eadd3957663e88535c133f7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc190ae2ebf8aad34732181feb215139f15ea7e8cb0bae7c34d5ac5e7c805210600000000000000c3dec04b25dfc17975238345d4f71ab158c36657b7218baa0700f781c0a99bd50499ccc421ace5e845885efb5b9964ecbeba3da8223fe5308e4e65ee93e107000000f8ddebf70132a4d0175b989b8eccf707882042e716df9b57b290c661d4e85031086197bcc5cb0e221a0c34323c129102b6ff0100002e88a1940b3c02ed9c92d6f64b1282dc51bb0015982730711c599e1c72ffa11ed8be1a6830d7507005154c46bd3ca96318c570f0721fc7aa2a5836ba99fe1f86468694f22cdf550ef091a78098534f0d973059594119d06d5ea9a8d0857382ec6e2a071474cfc12346e47ad97f4ead7cf70a9d1cdac944779dc08a705414888700a30e2366c6a06b3367a389ca39059787790017b0689a173db9c24db65c1e00015c1d093dab18fd0699fe3304000000323e9c7080397bc49d70c060d57bc88fbe3bbaa058b040362ab926150363fb099408885afc2bf9a46a076b7babfcddeff8c35030669ea69f5e4be1b8e0d6697e97186f9ae97d5670dba6623279f73db9dec75070cd9ab0fda6b069ef6d2857ca3e4effcf7462710d133d541da86e0477e4a6cc999dc21c3ef408e6b178e7c9f274d7fafc8d757d33dfa35aa2000034837d365e63845f3c1092f8dde8af3904ea0f4b82649b83ed4fa0f873339c4cadecc13219ba7518aa4f7db34ead13484742067ab743c1d82a5687f2ed690000000000000000000000000000000000000000000099d4fa0000000000003f0ecdc7c82e72919c91d2039afe17e95edeeeba72205beff7771bcb293747b88486cacee403000000a2919a4bff2ed893f2c814679fa69fc7e0cf761f918725704a01c56009a9f748e5aaf30a10bd8c409b1870c1f75e26b45264e3d3f8e0048e55ae289ce2ad779ce71d4dc30cbb2cc4289d2f884d66cddc76eb7f601110ff39053c262279f4ef00fbdb8c338615a9ec84f27a9f3938ae736138b8c1ec220c1540bf3d162dc1c27fa30f0dc60b9f257db5d1c7ed2e152cb2cf06f8edb30177fead735a952ffce676a93110904d5ee2abdab2ef3ff84c4d61443f73552195c7ccfbf9f03c44432eaa3b7501d4239354da8de21eada75d3a3afb2c76ff0700007981699b6c0f0e946766f57544ff52cef0dd811bec4e3c0a30f2d7d19d26d2503a3ea376721b8eded3bc475958dd498ee2b2d6146e33fc0de1dc2e0516ac565ddb1d4ae89e6712824a85eb9ee0a3b68c9e209756623adf685dd715d68ed11e4b4d5502f5124948f8f98c615cac3666c58f785c3f758be352a71871d5c081197d37980e4f4e26b5476fb20407ff7098b7174bef66fa03a99b5c1c20b378065fac4ef9ac2d0d804b9400000060e5d3f1749f6aecf69ba83a71caa9bdddc679f1b826f54b6563a4be1fd82b73c8c2bc65f63982b951fb058fd3c7b6341c4580376b6c16bd94d2da66059de81abfa15eeeb88b6ae5882ad341032c73f1285e21fff5a1d138e061b1dc7bbda199b5fab8e0719e9cd69b47dcb52b0be6a3a73afdf328132e1d4f21065716be0c53a23940d07188b015fa341dbc92231c8b5e5717eac184f46c9f61b69f55cd2231bcf821052429a1f250e8b734be0605a15f25923d599544b319319ff0a32621019347df460a098119a6f47eb1bac47946d7a009cbc6ec74c19a93cc7c7138b28c95270116181fd5f553572548104d2ad0e10d3663488e664401453f22f0d76d2162635365258af61ae1f46f4a7862f302d91e3f7c2781f602220522e84602a939a8d5e4137ae31ccd397404dc72e06715a6503d4d865182803ee6725da7293b23daeebefd6fce7411c9624a7e8d5ba5a13e1c32adc4f32744a8c6882a72475e4280a4d9a47c003c6ed3071330c58145be813a10788a720a6b5a498ca2b42496c479a0a71e2f6f9bad8c84bc6be20281bde0b348cf2c60538a505ad4a0510eebb023e4954c9eb6cd70627f5c03d867dbf3ad5d1f1dc852064dd0efafc3df20ec8faf3d194db76127f88f284fa1b71ab964fdd2474471da76373e65e9a8bf844bdfdd348bc7d00c4c7e7afe8a1f8cde79b7a6c5aafe954b8ba37818e40c14b37c23f9f614576b689436fef2f27f8b1e756e00262e22bca49c43fd73e7e99b2fa44a8c1db99c2cf2735ad6c5fabf082e0df0f8ba7e24272165f2f5b28230c02b53d44bd84bf6770157e96bbb96b5e1f165c87e7ad68a3600b3d357fa9a7d53c281d88ebb175a4dbb82130e6970982947913110f091d21760d985afd3163f2e6880682432f9b3b97d57a9f980ede51116a3d04d58872a07d6a7e12db673acd2f7b8988d833e71943fe2c1c60100f36b955c56b55bfd3ecf0af694c71a03f2996c15b1ba971de1cb9c7e6a0000000000000014783ef54c51199317413f98dca8ff3d0bda50f6c0af58dbd6c031b1a5a7512c5896514adfa17d31429c68db50a93d88199defd3b4625fea426ff9293a28a544a6a9e2a79b55daa1b3c6b14c4ec6d164e902ce4913843d65d841973468729ea12bf6d3499036dbb66718f3497855c3baa6cc07c0fa388ec9df0617c1a28ef5a595ee267a76175b8a057e6efaf4fefe46def451f2858fe71a53e77b1a44e98843bb3a40102da3703dfb9f61bdcea2fb810b32d52e2157a150a63ea6135d1cf6f864c2e6887dd7245bc5d61dc5a114d10ffb22e76678bbfc1e3865d17d128306d1b81884a934cb00000000000000000098a4526e6468987dbc63bff7590eb388afaba43d811996333eef7e9f472bee293f0c40d434b8be07cbd52325296e22802493edb5c590ad208bac683a8b2d4c9d2d57ff846ae8c422e0b28546671f11d8157bb762c91f3fbc8b8e21589c92446ae65d408c0637ffcc2d44d715ce003dd1e12b085e186d069a55c2e96efbe5024d61a56a36d988c0f51a973a6c545b28211a92000000001501aed8972af0fcd540a9d4e293690c5e697b3a1480e46df5371bca1cfb28a57c1b3c956ec81397e81fbf870a67385fea04220423f52ad8178b9fd04bdc7e5fee4bd52db996e633792118efdb6b88023e80da74fdf723c7f05e96d738989f2c8b1e6b3a9716b6130a09e2698b12d8ae4d329f305fde3e8dec42eae3c69988ad568543a715755110c8dff124a6ba9ee1dc32ea7d17a35a420133c7df262a30cbff8790d80fd4def27ff1b268014daec1b0d1d2864bf010801f092efac0b349b86631d2a7455a72c0e7f43730b78e9beb255188acb12f3770fcc2223ba034181d9c3acef5b6d9ee77883ca12cfd68a5db88cc94c65a9fd1d070387a351905240b0b1920429109032ddc3cf9bf4ba32f594d45478bca432bdeb1a21fd5b5c2c416ed8eeabade9e2002b4e714dc3d7476fa52fedc0d0e6bed973e3aa468597810c13a8c40d9845bf0080850f309ec4dc5f88ef54b6674d8402f8ccd86d33edb1894e46b793641e9bf407b7c8b2b4b555f"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000300)=r6, 0x4) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000014000800b7030000000000088500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r11, 0x0, 0x2}, 0x18) 0s ago: executing program 8 (id=6944): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x1d}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0xe, 0xfeff, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r0, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%ps \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0xa, &(0x7f0000000180)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0xf}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xd}, @jmp={0x5, 0x1, 0x2, 0x4, 0x0, 0x2, 0x8}, @exit, @map_idx={0x18, 0x5, 0x5, 0x0, 0x2}, @exit, @ldst={0x1, 0x2, 0x4, 0x7, 0xb, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000080)='syzkaller\x00', 0x3, 0x0, 0x0, 0x810bae071ec8d9ff, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x8, 0x0, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r0, r2, r3, r0, r0], 0x0, 0x10, 0x17198f15}, 0x94) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.122' (ED25519) to the list of known hosts. [ 23.429547][ T24] audit: type=1400 audit(1758310965.720:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.431074][ T267] cgroup: Unknown subsys name 'net' [ 23.452255][ T24] audit: type=1400 audit(1758310965.720:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.480219][ T24] audit: type=1400 audit(1758310965.750:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.480475][ T267] cgroup: Unknown subsys name 'devices' [ 23.686393][ T267] cgroup: Unknown subsys name 'hugetlb' [ 23.692132][ T267] cgroup: Unknown subsys name 'rlimit' [ 23.833938][ T24] audit: type=1400 audit(1758310966.120:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.857470][ T24] audit: type=1400 audit(1758310966.120:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 23.871797][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 23.883802][ T24] audit: type=1400 audit(1758310966.130:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 23.916227][ T24] audit: type=1400 audit(1758310966.190:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.941750][ T24] audit: type=1400 audit(1758310966.190:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.941996][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.967570][ T24] audit: type=1400 audit(1758310966.210:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.002682][ T24] audit: type=1400 audit(1758310966.210:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.828384][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.835765][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.843558][ T279] device bridge_slave_0 entered promiscuous mode [ 24.850966][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.858175][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.865618][ T279] device bridge_slave_1 entered promiscuous mode [ 24.892042][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.899163][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.906598][ T275] device bridge_slave_0 entered promiscuous mode [ 24.916027][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.923083][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.930859][ T275] device bridge_slave_1 entered promiscuous mode [ 24.979693][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.987362][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.994824][ T277] device bridge_slave_0 entered promiscuous mode [ 25.002785][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.009953][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.017740][ T277] device bridge_slave_1 entered promiscuous mode [ 25.088019][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.095336][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.102866][ T278] device bridge_slave_0 entered promiscuous mode [ 25.110315][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.117597][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.125136][ T278] device bridge_slave_1 entered promiscuous mode [ 25.136272][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.143503][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.151102][ T276] device bridge_slave_0 entered promiscuous mode [ 25.160898][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.168049][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.175689][ T276] device bridge_slave_1 entered promiscuous mode [ 25.245782][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.253155][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.260806][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.268005][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.309095][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.316226][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.323779][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.330884][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.353393][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.360469][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.367755][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.374891][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.388609][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.396513][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.404869][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.412507][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.426851][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.434128][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.441472][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.449369][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.473627][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.481565][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.489630][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.498251][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.505649][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.513230][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.520649][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.527984][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.535423][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.542957][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.550245][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.570232][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.578665][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.586896][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.595851][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.604452][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.611961][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.619553][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.635890][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.643541][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.652042][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.663228][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.672472][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.679773][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.693761][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.701613][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.709914][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.717086][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.737740][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.745731][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.753220][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.763682][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.771175][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.779350][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.788348][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.795502][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.803109][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.811467][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.818782][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.826610][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.835194][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.842248][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.854576][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.863121][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.871638][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.879212][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.887772][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.896297][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.912109][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.920567][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.928836][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.938033][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.946168][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.954907][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.963305][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.970430][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.984070][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.992836][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.005844][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.014473][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.039946][ T278] device veth0_vlan entered promiscuous mode [ 26.049468][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.057636][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.066389][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.075067][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.083243][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.092069][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.100151][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.108807][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.117492][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.125871][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.134675][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.142974][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.151693][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.160114][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.168912][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.176689][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.184572][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.192298][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.201407][ T275] device veth0_vlan entered promiscuous mode [ 26.209070][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.217411][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.231335][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.240103][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.249294][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.258107][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.266654][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.274612][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.285886][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.294511][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.303421][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.312318][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.323113][ T277] device veth0_vlan entered promiscuous mode [ 26.331012][ T279] device veth0_vlan entered promiscuous mode [ 26.346114][ T275] device veth1_macvtap entered promiscuous mode [ 26.355779][ T279] device veth1_macvtap entered promiscuous mode [ 26.363584][ T278] device veth1_macvtap entered promiscuous mode [ 26.370798][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.379409][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.388083][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.397159][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.405337][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.413997][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.422500][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.436850][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.445462][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.463831][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.472955][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.481950][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.491606][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.500122][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.509114][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.524521][ T277] device veth1_macvtap entered promiscuous mode [ 26.531200][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.539769][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.548592][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.556861][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.565398][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.573842][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.582079][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.590156][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.599233][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.607870][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.616424][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.625190][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.632970][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.648799][ T276] device veth0_vlan entered promiscuous mode [ 26.664414][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.672976][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.673400][ T279] request_module fs-gadgetfs succeeded, but still no fs? [ 26.699028][ T275] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 26.701848][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.724472][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.744815][ T276] device veth1_macvtap entered promiscuous mode [ 26.772471][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.861886][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.874806][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.884123][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.884153][ C1] hrtimer: interrupt took 26930 ns [ 26.898564][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.349527][ T319] device veth1_macvtap left promiscuous mode [ 27.355714][ T319] device macsec0 entered promiscuous mode [ 27.839099][ T326] ------------[ cut here ]------------ [ 27.848543][ T326] trace type BPF program uses run-time allocation [ 27.865550][ T326] WARNING: CPU: 0 PID: 326 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 27.878969][ T326] Modules linked in: [ 27.884751][ T326] CPU: 0 PID: 326 Comm: syz.2.8 Not tainted syzkaller #0 [ 27.958090][ T326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 27.984232][ T326] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 27.991324][ T326] Code: 85 e9 14 fe ff ff e8 b9 fa ef ff 31 c0 e9 15 fe ff ff e8 ad fa ef ff c6 05 64 c4 2c 05 01 48 c7 c7 e0 77 05 85 e8 ea 84 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 28.068421][ T326] RSP: 0018:ffffc90007a07468 EFLAGS: 00010246 [ 28.075960][ T326] RAX: 257ab5ed6520a900 RBX: 0000000000000001 RCX: 0000000000080000 [ 28.084388][ T326] RDX: ffffc9000246f000 RSI: 0000000000001df0 RDI: 0000000000001df1 [ 28.092611][ T326] RBP: ffffc90007a074b0 R08: dffffc0000000000 R09: ffffed103ee0a5f8 [ 28.100883][ T326] R10: ffffed103ee0a5f8 R11: 1ffff1103ee0a5f7 R12: ffff88810d0a4000 [ 28.127546][ T326] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88810e764800 [ 28.155635][ T326] FS: 00007f51c82506c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 28.249912][ T326] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 28.290522][ T326] CR2: 0000000100000000 CR3: 0000000128873000 CR4: 00000000003506b0 [ 28.290891][ T347] cgroup: syz.0.14 (347) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 28.320941][ T326] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 28.321231][ T347] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 28.344635][ T326] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 28.369226][ T326] Call Trace: [ 28.409679][ T326] ? __fdget+0x1a1/0x230 [ 28.414078][ T326] resolve_pseudo_ldimm64+0x526/0x1020 [ 28.428967][ T345] device syzkaller0 entered promiscuous mode [ 28.450544][ T326] ? bpf_check+0xd680/0xd680 [ 28.461091][ T326] ? kvmalloc_node+0x88/0x130 [ 28.466055][ T326] bpf_check+0x8d4b/0xd680 [ 28.474381][ T326] ? bpf_get_btf_vmlinux+0x60/0x60 [ 28.479710][ T326] ? is_bpf_text_address+0x177/0x190 [ 28.485430][ T326] ? selinux_bpf_prog_alloc+0x51/0x140 [ 28.491020][ T326] ? __kernel_text_address+0xa0/0x100 [ 28.498555][ T326] ? unwind_get_return_address+0x4d/0x90 [ 28.504435][ T326] ? stack_trace_save+0xe0/0xe0 [ 28.509426][ T326] ? arch_stack_walk+0xee/0x140 [ 28.514827][ T326] ? stack_trace_save+0x98/0xe0 [ 28.519851][ T326] ? stack_trace_snprint+0xf0/0xf0 [ 28.525451][ T326] ? __kasan_slab_alloc+0x69/0xf0 [ 28.530596][ T326] ? pcpu_block_update+0x1ce/0x900 [ 28.535981][ T326] ? selinux_bpf_prog_alloc+0x51/0x140 [ 28.541598][ T326] ? __kasan_kmalloc+0xec/0x110 [ 28.546587][ T326] ? __kasan_kmalloc+0xda/0x110 [ 28.551815][ T326] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 28.552359][ T349] device wg2 entered promiscuous mode [ 28.558557][ T326] ? selinux_bpf_prog_alloc+0x51/0x140 [ 28.558572][ T326] ? security_bpf_prog_alloc+0x62/0x90 [ 28.558584][ T326] ? bpf_prog_load+0x949/0x1420 [ 28.558596][ T326] ? __se_sys_bpf+0x442/0x680 [ 28.558606][ T326] ? __x64_sys_bpf+0x7b/0x90 [ 28.558618][ T326] ? do_syscall_64+0x31/0x40 [ 28.558633][ T326] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 28.558661][ T326] ? memset+0x35/0x40 [ 28.558675][ T326] ? bpf_obj_name_cpy+0x193/0x1e0 [ 28.558687][ T326] bpf_prog_load+0xf5a/0x1420 [ 28.558702][ T326] ? map_freeze+0x320/0x320 [ 28.558719][ T326] ? selinux_bpf+0xc7/0xf0 [ 28.558731][ T326] ? security_bpf+0x82/0xa0 [ 28.558743][ T326] __se_sys_bpf+0x442/0x680 [ 28.558753][ T326] ? __x64_sys_bpf+0x90/0x90 [ 28.558771][ T326] ? __kasan_check_read+0x11/0x20 [ 28.558782][ T326] __x64_sys_bpf+0x7b/0x90 [ 28.558794][ T326] do_syscall_64+0x31/0x40 [ 28.558807][ T326] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 28.558818][ T326] RIP: 0033:0x7f51c97e7c29 [ 28.558839][ T326] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 28.558847][ T326] RSP: 002b:00007f51c8250038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 28.586223][ T24] kauditd_printk_skb: 40 callbacks suppressed [ 28.586238][ T24] audit: type=1400 audit(1758310970.870:114): avc: denied { relabelfrom } for pid=350 comm="syz.4.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.594108][ T326] RAX: ffffffffffffffda RBX: 00007f51c9a2efa0 RCX: 00007f51c97e7c29 [ 28.601768][ T24] audit: type=1400 audit(1758310970.870:115): avc: denied { relabelto } for pid=350 comm="syz.4.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.605470][ T326] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 28.753383][ T326] RBP: 00007f51c986ae41 R08: 0000000000000000 R09: 0000000000000000 [ 28.761866][ T326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 28.770027][ T326] R13: 00007f51c9a2f038 R14: 00007f51c9a2efa0 R15: 00007ffd62064ff8 [ 28.778308][ T326] ---[ end trace 25c6406be3a9bad6 ]--- [ 28.906275][ T24] audit: type=1400 audit(1758310971.200:116): avc: denied { create } for pid=359 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 29.055687][ T372] device wg2 left promiscuous mode [ 29.103352][ T371] device syzkaller0 entered promiscuous mode [ 29.288376][ T24] audit: type=1400 audit(1758310971.580:117): avc: denied { write } for pid=384 comm="syz.3.26" name="cgroup.subtree_control" dev="cgroup2" ino=129 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 29.319553][ T24] audit: type=1400 audit(1758310971.580:118): avc: denied { open } for pid=384 comm="syz.3.26" path="" dev="cgroup2" ino=129 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 29.355087][ T24] audit: type=1400 audit(1758310971.640:119): avc: denied { write } for pid=394 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 29.376889][ T24] audit: type=1400 audit(1758310971.670:120): avc: denied { ioctl } for pid=384 comm="syz.3.26" path="" dev="cgroup2" ino=129 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 29.563989][ T402] device wg2 entered promiscuous mode [ 29.591377][ T412] device syzkaller0 entered promiscuous mode [ 30.169135][ T24] audit: type=1400 audit(1758310972.460:121): avc: denied { read } for pid=427 comm="syz.3.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.653322][ T456] device veth1_macvtap left promiscuous mode [ 30.714831][ T460] device veth1_macvtap entered promiscuous mode [ 30.721182][ T460] device macsec0 entered promiscuous mode [ 31.202986][ T24] audit: type=1400 audit(1758310973.490:122): avc: denied { create } for pid=475 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 31.256100][ T474] device veth1_macvtap left promiscuous mode [ 31.267820][ T474] device macsec0 entered promiscuous mode [ 31.441744][ T24] audit: type=1400 audit(1758310973.730:123): avc: denied { create } for pid=475 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 31.482237][ T477] device veth0_vlan left promiscuous mode [ 31.524730][ T477] device veth0_vlan entered promiscuous mode [ 32.270965][ T520] device pim6reg1 entered promiscuous mode [ 32.874374][ T543] device veth0_vlan left promiscuous mode [ 32.904913][ T543] device veth0_vlan entered promiscuous mode [ 34.430816][ T593] device syzkaller0 entered promiscuous mode [ 35.044468][ T665] device pim6reg1 entered promiscuous mode [ 35.365999][ T24] kauditd_printk_skb: 1 callbacks suppressed [ 35.366011][ T24] audit: type=1400 audit(1758310977.660:125): avc: denied { create } for pid=675 comm="syz.4.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 35.767056][ T686] device wg2 entered promiscuous mode [ 35.884220][ T24] audit: type=1400 audit(1758310978.170:126): avc: denied { create } for pid=700 comm="syz.2.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 35.987653][ T24] audit: type=1400 audit(1758310978.200:127): avc: denied { create } for pid=700 comm="syz.2.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 36.024098][ T710] device veth0_to_team entered promiscuous mode [ 36.290910][ T24] audit: type=1400 audit(1758310978.580:128): avc: denied { create } for pid=722 comm="syz.2.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 36.771200][ T744] device pim6reg1 entered promiscuous mode [ 38.133896][ T760] device pim6reg1 entered promiscuous mode [ 38.251431][ T776] device veth0_vlan left promiscuous mode [ 38.259830][ T776] device veth0_vlan entered promiscuous mode [ 38.276646][ T760] @ÿ: renamed from bond_slave_0 [ 38.318063][ T24] audit: type=1400 audit(1758310980.610:129): avc: denied { create } for pid=784 comm="syz.1.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 38.532888][ T812] A6±ÿ: renamed from team_slave_1 [ 38.669999][ T24] audit: type=1400 audit(1758310980.960:130): avc: denied { ioctl } for pid=820 comm="syz.4.142" path="socket:[16925]" dev="sockfs" ino=16925 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 39.954736][ T889] device pim6reg1 entered promiscuous mode [ 40.551800][ T24] audit: type=1400 audit(1758310982.840:131): avc: denied { create } for pid=919 comm="syz.4.170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 40.721010][ T927] device wg2 entered promiscuous mode [ 42.481693][ T24] audit: type=1400 audit(1758310984.770:132): avc: denied { create } for pid=973 comm="syz.1.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 42.656090][ T24] audit: type=1400 audit(1758310984.950:133): avc: denied { create } for pid=989 comm="syz.3.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 42.752443][ T1006] syz.2.198[1006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.752555][ T1006] syz.2.198[1006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.887932][ T24] audit: type=1400 audit(1758310985.180:134): avc: denied { create } for pid=1005 comm="syz.2.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 42.973680][ T1023] device pim6reg1 entered promiscuous mode [ 43.224009][ T1035] device veth0_vlan left promiscuous mode [ 43.280615][ T1035] device veth0_vlan entered promiscuous mode [ 43.495111][ T24] audit: type=1400 audit(1758310985.790:135): avc: denied { create } for pid=1074 comm="syz.3.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 43.940468][ T1088] device pim6reg1 entered promiscuous mode [ 44.266786][ T1103] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.274282][ T1103] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.222387][ T1145] device macsec0 left promiscuous mode [ 45.504010][ T1165] device syzkaller0 entered promiscuous mode [ 45.825926][ T1175] ÿÿÿÿÿÿ: renamed from vlan1 [ 46.634770][ T1218] syz.3.262[1218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.634875][ T1218] syz.3.262[1218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.678205][ T1221] device wg2 left promiscuous mode [ 46.951321][ T24] audit: type=1400 audit(1758310989.240:136): avc: denied { create } for pid=1229 comm="syz.4.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 47.323660][ T1258] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 47.433065][ T1258] device syzkaller0 entered promiscuous mode [ 47.673980][ T1265] device syzkaller0 entered promiscuous mode [ 47.710403][ T1278] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.717741][ T1278] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.743135][ T1278] device bridge_slave_1 left promiscuous mode [ 47.755903][ T1278] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.773450][ T1278] device bridge_slave_0 left promiscuous mode [ 47.780611][ T1278] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.932912][ T1288] device sit0 entered promiscuous mode [ 48.079697][ T1298] device pim6reg1 entered promiscuous mode [ 48.177575][ T1313] device pim6reg1 entered promiscuous mode [ 48.217435][ T1310] device bridge_slave_1 left promiscuous mode [ 48.225927][ T1310] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.242452][ T1310] device bridge_slave_0 left promiscuous mode [ 48.255402][ T1310] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.632341][ T24] audit: type=1400 audit(1758310990.920:137): avc: denied { create } for pid=1358 comm="syz.0.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 49.298176][ T95] udevd[95]: worker [297] terminated by signal 33 (Unknown signal 33) [ 49.309411][ T95] udevd[95]: worker [297] failed while handling '/devices/virtual/block/loop4' [ 49.424804][ T1400] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 49.650332][ T1399] device syzkaller0 entered promiscuous mode [ 49.708427][ T1410] device syzkaller0 entered promiscuous mode [ 49.973884][ T1439] device sit0 entered promiscuous mode [ 50.682269][ T1467] device pim6reg1 entered promiscuous mode [ 50.857838][ T1484] device syzkaller0 entered promiscuous mode [ 51.238355][ T1514] device syzkaller0 entered promiscuous mode [ 52.115934][ T24] audit: type=1400 audit(1758310994.410:138): avc: denied { create } for pid=1557 comm="syz.2.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 52.738442][ T1590] syz.0.366 uses obsolete (PF_INET,SOCK_PACKET) [ 52.778966][ T1593] device sit0 left promiscuous mode [ 52.826357][ T1591] device sit0 entered promiscuous mode [ 54.164374][ T1672] device lo entered promiscuous mode [ 54.594018][ T1694] device pim6reg1 entered promiscuous mode [ 56.048224][ T1758] device wg2 left promiscuous mode [ 56.362833][ T1764] device wg2 entered promiscuous mode [ 56.369731][ T24] audit: type=1400 audit(1758310998.650:139): avc: denied { create } for pid=1766 comm="syz.0.412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 56.626646][ T24] audit: type=1400 audit(1758310998.920:140): avc: denied { create } for pid=1761 comm="syz.2.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 57.271450][ T1795] device syzkaller0 entered promiscuous mode [ 57.920922][ T24] audit: type=1400 audit(1758311000.210:141): avc: denied { tracepoint } for pid=1836 comm="syz.4.432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 58.141008][ T1845] device syzkaller0 entered promiscuous mode [ 58.754645][ T1898] syz.2.450[1898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.754716][ T1898] syz.2.450[1898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.834826][ T1904] syz.2.450[1904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.893787][ T1904] syz.2.450[1904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.958152][ T24] audit: type=1400 audit(1758311001.250:142): avc: denied { create } for pid=1897 comm="syz.2.450" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 59.378468][ T1898] device wg2 entered promiscuous mode [ 59.489550][ T24] audit: type=1400 audit(1758311001.780:143): avc: denied { create } for pid=1924 comm="syz.0.459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 61.300193][ T2017] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 61.754163][ T24] audit: type=1400 audit(1758311004.040:144): avc: denied { create } for pid=2035 comm="syz.0.492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 62.087833][ T24] audit: type=1400 audit(1758311004.380:145): avc: denied { create } for pid=2051 comm="syz.1.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 62.137922][ T2057] device wg2 left promiscuous mode [ 62.234741][ T2065] device GPL entered promiscuous mode [ 62.330296][ T2067] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 62.750511][ T24] audit: type=1400 audit(1758311005.040:146): avc: denied { create } for pid=2107 comm="syz.1.515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 63.252791][ T2140] device sit0 left promiscuous mode [ 63.716961][ T2175] device bridge0 entered promiscuous mode [ 64.396756][ T2227] device wg2 left promiscuous mode [ 64.534188][ T2233] device syzkaller0 entered promiscuous mode [ 64.550833][ T2232] device wg2 entered promiscuous mode [ 64.785756][ T2253] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 64.792403][ T2253] syzkaller0: linktype set to 1 [ 64.798226][ T2253] syzkaller0: tun_chr_ioctl cmd 35108 [ 64.804450][ T2253] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 64.887503][ T2255] device pim6reg1 entered promiscuous mode [ 65.038991][ T2280] syz.1.567[2280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.054306][ T2280] syz.1.567[2280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.343186][ T24] audit: type=1400 audit(1758311007.630:147): avc: denied { create } for pid=2293 comm="syz.2.570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 65.484309][ T2280] device syzkaller0 entered promiscuous mode [ 65.603189][ T2312] GPL: port 1(erspan0) entered blocking state [ 65.609404][ T2312] GPL: port 1(erspan0) entered disabled state [ 65.620705][ T2312] device erspan0 entered promiscuous mode [ 66.805694][ T2396] device veth1_to_team entered promiscuous mode [ 66.907126][ T2415] device wg2 entered promiscuous mode [ 67.048880][ T2419] device veth0_vlan left promiscuous mode [ 67.058044][ T2419] device veth0_vlan entered promiscuous mode [ 67.090472][ T2425] device syzkaller0 entered promiscuous mode [ 67.100558][ T2424] device macsec0 left promiscuous mode [ 67.147260][ T24] audit: type=1400 audit(1758311009.440:148): avc: denied { create } for pid=2426 comm="syz.0.612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 67.210670][ T2424] device veth1_macvtap entered promiscuous mode [ 67.219962][ T2424] device macsec0 entered promiscuous mode [ 67.269387][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 67.340342][ T2452] syz.2.620[2452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.340428][ T2452] syz.2.620[2452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.354981][ T2452] syz.2.620[2452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.368164][ T2452] syz.2.620[2452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.394064][ T2455] syz.4.621[2455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.458569][ T2468] device wg2 left promiscuous mode [ 67.470234][ T2455] syz.4.621[2455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.487846][ T2468] device wg2 entered promiscuous mode [ 68.415338][ T2507] device syzkaller0 entered promiscuous mode [ 69.083158][ T2557] FAULT_INJECTION: forcing a failure. [ 69.083158][ T2557] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 69.111847][ T2557] CPU: 1 PID: 2557 Comm: syz.4.651 Tainted: G W syzkaller #0 [ 69.120747][ T2557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 69.122279][ T2561] syz.3.653[2561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.130907][ T2557] Call Trace: [ 69.130936][ T2557] __dump_stack+0x21/0x24 [ 69.130947][ T2557] dump_stack_lvl+0x169/0x1d8 [ 69.130968][ T2557] ? show_regs_print_info+0x18/0x18 [ 69.159993][ T2557] dump_stack+0x15/0x1c [ 69.164219][ T2557] should_fail+0x3c1/0x510 [ 69.168712][ T2557] should_fail_usercopy+0x1a/0x20 [ 69.173859][ T2557] _copy_from_user+0x20/0xd0 [ 69.178576][ T2557] sock_do_ioctl+0x1b2/0x330 [ 69.183180][ T2557] ? __kasan_slab_free+0x11/0x20 [ 69.183659][ T2561] syz.3.653[2561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.188228][ T2557] ? sock_show_fdinfo+0xa0/0xa0 [ 69.188244][ T2557] ? selinux_file_ioctl+0x377/0x480 [ 69.188269][ T2557] ? mutex_trylock+0xa0/0xa0 [ 69.215451][ T2557] ? __fget_files+0x2c4/0x320 [ 69.220478][ T2557] sock_ioctl+0x504/0x710 [ 69.224941][ T2557] ? sock_poll+0x360/0x360 [ 69.230271][ T2557] ? __fget_files+0x2c4/0x320 [ 69.235054][ T2557] ? security_file_ioctl+0x84/0xa0 [ 69.240174][ T2557] ? sock_poll+0x360/0x360 [ 69.244609][ T2557] __se_sys_ioctl+0x121/0x1a0 [ 69.249284][ T2557] __x64_sys_ioctl+0x7b/0x90 [ 69.253872][ T2557] do_syscall_64+0x31/0x40 [ 69.258380][ T2557] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 69.264393][ T2557] RIP: 0033:0x7f03891b6c29 [ 69.268821][ T2557] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 69.288909][ T2557] RSP: 002b:00007f0387c1f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 69.297339][ T2557] RAX: ffffffffffffffda RBX: 00007f03893fdfa0 RCX: 00007f03891b6c29 [ 69.305399][ T2557] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000009 [ 69.313367][ T2557] RBP: 00007f0387c1f090 R08: 0000000000000000 R09: 0000000000000000 [ 69.321473][ T2557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 69.329820][ T2557] R13: 00007f03893fe038 R14: 00007f03893fdfa0 R15: 00007ffd22850668 [ 70.274069][ T2605] FAULT_INJECTION: forcing a failure. [ 70.274069][ T2605] name failslab, interval 1, probability 0, space 0, times 1 [ 70.304204][ T2605] CPU: 0 PID: 2605 Comm: syz.1.667 Tainted: G W syzkaller #0 [ 70.313038][ T2605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 70.323297][ T2605] Call Trace: [ 70.326728][ T2605] __dump_stack+0x21/0x24 [ 70.331200][ T2605] dump_stack_lvl+0x169/0x1d8 [ 70.335902][ T2605] ? show_regs_print_info+0x18/0x18 [ 70.341407][ T2605] ? 0xffffffffa0014184 [ 70.345803][ T2605] dump_stack+0x15/0x1c [ 70.349984][ T2605] should_fail+0x3c1/0x510 [ 70.354738][ T2605] ? __alloc_skb+0x9e/0x520 [ 70.359363][ T2605] __should_failslab+0xa4/0xe0 [ 70.364496][ T2605] should_failslab+0x9/0x20 [ 70.369101][ T2605] kmem_cache_alloc+0x3d/0x2e0 [ 70.373985][ T2605] ? br_get_rx_handler+0x20/0x20 [ 70.378947][ T2605] __alloc_skb+0x9e/0x520 [ 70.383398][ T2605] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 70.388726][ T2605] rtnetlink_event+0xd2/0x1a0 [ 70.393438][ T2605] raw_notifier_call_chain+0x90/0x100 [ 70.398939][ T2605] dev_set_mac_address+0x318/0x420 [ 70.404299][ T2605] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 70.410785][ T2605] dev_set_mac_address_user+0x31/0x50 [ 70.416387][ T2605] dev_ifsioc+0x65c/0xa50 [ 70.421125][ T2605] ? dev_ioctl+0xb80/0xb80 [ 70.425678][ T2605] dev_ioctl+0x550/0xb80 [ 70.430227][ T2605] sock_do_ioctl+0x235/0x330 [ 70.435130][ T2605] ? __kasan_slab_free+0x11/0x20 [ 70.440189][ T2605] ? sock_show_fdinfo+0xa0/0xa0 [ 70.445073][ T2605] ? selinux_file_ioctl+0x377/0x480 [ 70.450322][ T2605] ? mutex_trylock+0xa0/0xa0 [ 70.455105][ T2605] ? __fget_files+0x2c4/0x320 [ 70.459913][ T2605] sock_ioctl+0x504/0x710 [ 70.464594][ T2605] ? sock_poll+0x360/0x360 [ 70.469344][ T2605] ? __fget_files+0x2c4/0x320 [ 70.474235][ T2605] ? security_file_ioctl+0x84/0xa0 [ 70.479736][ T2605] ? sock_poll+0x360/0x360 [ 70.484703][ T2605] __se_sys_ioctl+0x121/0x1a0 [ 70.489404][ T2605] __x64_sys_ioctl+0x7b/0x90 [ 70.494191][ T2605] do_syscall_64+0x31/0x40 [ 70.498668][ T2605] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 70.504835][ T2605] RIP: 0033:0x7fd594122c29 [ 70.509272][ T2605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 70.528898][ T2605] RSP: 002b:00007fd592b8b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 70.537938][ T2605] RAX: ffffffffffffffda RBX: 00007fd594369fa0 RCX: 00007fd594122c29 [ 70.546046][ T2605] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000009 [ 70.554141][ T2605] RBP: 00007fd592b8b090 R08: 0000000000000000 R09: 0000000000000000 [ 70.562136][ T2605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 70.570387][ T2605] R13: 00007fd59436a038 R14: 00007fd594369fa0 R15: 00007fff36144028 [ 70.598135][ T2602] device syzkaller0 entered promiscuous mode [ 71.250949][ T2649] FAULT_INJECTION: forcing a failure. [ 71.250949][ T2649] name failslab, interval 1, probability 0, space 0, times 0 [ 71.322485][ T2649] CPU: 0 PID: 2649 Comm: syz.3.679 Tainted: G W syzkaller #0 [ 71.331310][ T2649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 71.341382][ T2649] Call Trace: [ 71.344694][ T2649] __dump_stack+0x21/0x24 [ 71.349054][ T2649] dump_stack_lvl+0x169/0x1d8 [ 71.353759][ T2649] ? thaw_kernel_threads+0x220/0x220 [ 71.359070][ T2649] ? show_regs_print_info+0x18/0x18 [ 71.364304][ T2649] dump_stack+0x15/0x1c [ 71.368570][ T2649] should_fail+0x3c1/0x510 [ 71.373012][ T2649] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 71.378495][ T2649] __should_failslab+0xa4/0xe0 [ 71.383280][ T2649] should_failslab+0x9/0x20 [ 71.388013][ T2649] __kmalloc_track_caller+0x5f/0x320 [ 71.393445][ T2649] ? kmem_cache_alloc+0x165/0x2e0 [ 71.398490][ T2649] ? __alloc_skb+0x9e/0x520 [ 71.403282][ T2649] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 71.408812][ T2649] __alloc_skb+0xdc/0x520 [ 71.413300][ T2649] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 71.418614][ T2649] rtnetlink_event+0xd2/0x1a0 [ 71.423835][ T2649] raw_notifier_call_chain+0x90/0x100 [ 71.429276][ T2649] dev_set_mac_address+0x318/0x420 [ 71.434523][ T2649] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 71.440446][ T2649] dev_set_mac_address_user+0x31/0x50 [ 71.445846][ T2649] dev_ifsioc+0x65c/0xa50 [ 71.450291][ T2649] ? dev_ioctl+0xb80/0xb80 [ 71.454839][ T2649] dev_ioctl+0x550/0xb80 [ 71.459286][ T2649] sock_do_ioctl+0x235/0x330 [ 71.463879][ T2649] ? sock_show_fdinfo+0xa0/0xa0 [ 71.468818][ T2649] ? selinux_file_ioctl+0x377/0x480 [ 71.474011][ T2649] ? mutex_trylock+0xa0/0xa0 [ 71.478603][ T2649] ? __fget_files+0x2c4/0x320 [ 71.483378][ T2649] sock_ioctl+0x504/0x710 [ 71.487914][ T2649] ? sock_poll+0x360/0x360 [ 71.492588][ T2649] ? __fget_files+0x2c4/0x320 [ 71.497373][ T2649] ? security_file_ioctl+0x84/0xa0 [ 71.502475][ T2649] ? sock_poll+0x360/0x360 [ 71.506958][ T2649] __se_sys_ioctl+0x121/0x1a0 [ 71.511679][ T2649] __x64_sys_ioctl+0x7b/0x90 [ 71.516354][ T2649] do_syscall_64+0x31/0x40 [ 71.520776][ T2649] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 71.526694][ T2649] RIP: 0033:0x7f8142affc29 [ 71.531152][ T2649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 71.551209][ T2649] RSP: 002b:00007f8141568038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 71.559629][ T2649] RAX: ffffffffffffffda RBX: 00007f8142d46fa0 RCX: 00007f8142affc29 [ 71.567727][ T2649] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000009 [ 71.575783][ T2649] RBP: 00007f8141568090 R08: 0000000000000000 R09: 0000000000000000 [ 71.583759][ T2649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 71.591900][ T2649] R13: 00007f8142d47038 R14: 00007f8142d46fa0 R15: 00007ffd4e3c5828 [ 71.929413][ T2667] device pim6reg1 entered promiscuous mode [ 72.247096][ T24] audit: type=1400 audit(1758311014.540:149): avc: denied { create } for pid=2678 comm="syz.2.688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 72.675305][ T2702] FAULT_INJECTION: forcing a failure. [ 72.675305][ T2702] name failslab, interval 1, probability 0, space 0, times 0 [ 72.688005][ T2702] CPU: 1 PID: 2702 Comm: syz.1.693 Tainted: G W syzkaller #0 [ 72.696789][ T2702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 72.707175][ T2702] Call Trace: [ 72.710495][ T2702] __dump_stack+0x21/0x24 [ 72.715145][ T2702] dump_stack_lvl+0x169/0x1d8 [ 72.720183][ T2702] ? show_regs_print_info+0x18/0x18 [ 72.725418][ T2702] dump_stack+0x15/0x1c [ 72.729691][ T2702] should_fail+0x3c1/0x510 [ 72.734128][ T2702] ? __alloc_skb+0x9e/0x520 [ 72.738779][ T2702] __should_failslab+0xa4/0xe0 [ 72.743588][ T2702] should_failslab+0x9/0x20 [ 72.748261][ T2702] kmem_cache_alloc+0x3d/0x2e0 [ 72.753056][ T2702] ? bpf_trace_run1+0x200/0x200 [ 72.758052][ T2702] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 72.763635][ T2702] __alloc_skb+0x9e/0x520 [ 72.768335][ T2702] ? ____kasan_slab_free+0x130/0x160 [ 72.773753][ T2702] fdb_notify+0x78/0x130 [ 72.778118][ T2702] fdb_delete+0x893/0xb00 [ 72.782924][ T2702] fdb_delete_local+0x3c5/0x480 [ 72.788036][ T2702] br_fdb_changeaddr+0x1b3/0x1c0 [ 72.793072][ T2702] br_device_event+0x335/0x790 [ 72.798325][ T2702] ? br_boolopt_multi_get+0xb0/0xb0 [ 72.803535][ T2702] ? packet_notifier+0x8b2/0x8d0 [ 72.808787][ T2702] ? addrconf_notify+0x37b/0xe90 [ 72.813873][ T2702] ? ipv6_mc_netdev_event+0x80/0x300 [ 72.819190][ T2702] raw_notifier_call_chain+0x90/0x100 [ 72.824688][ T2702] dev_set_mac_address+0x318/0x420 [ 72.830431][ T2702] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 72.836345][ T2702] dev_set_mac_address_user+0x31/0x50 [ 72.841783][ T2702] dev_ifsioc+0x65c/0xa50 [ 72.846225][ T2702] ? dev_ioctl+0xb80/0xb80 [ 72.850672][ T2702] dev_ioctl+0x550/0xb80 [ 72.855005][ T2702] sock_do_ioctl+0x235/0x330 [ 72.859711][ T2702] ? __kasan_slab_free+0x11/0x20 [ 72.864678][ T2702] ? sock_show_fdinfo+0xa0/0xa0 [ 72.869560][ T2702] ? selinux_file_ioctl+0x377/0x480 [ 72.874778][ T2702] ? mutex_trylock+0xa0/0xa0 [ 72.879389][ T2702] ? __fget_files+0x2c4/0x320 [ 72.884213][ T2702] sock_ioctl+0x504/0x710 [ 72.888553][ T2702] ? sock_poll+0x360/0x360 [ 72.893087][ T2702] ? __fget_files+0x2c4/0x320 [ 72.898201][ T2702] ? security_file_ioctl+0x84/0xa0 [ 72.903309][ T2702] ? sock_poll+0x360/0x360 [ 72.908122][ T2702] __se_sys_ioctl+0x121/0x1a0 [ 72.912835][ T2702] __x64_sys_ioctl+0x7b/0x90 [ 72.917496][ T2702] do_syscall_64+0x31/0x40 [ 72.921942][ T2702] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 72.928050][ T2702] RIP: 0033:0x7fd594122c29 [ 72.932469][ T2702] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 72.952262][ T2702] RSP: 002b:00007fd592b8b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 72.960681][ T2702] RAX: ffffffffffffffda RBX: 00007fd594369fa0 RCX: 00007fd594122c29 [ 72.968844][ T2702] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000009 [ 72.976938][ T2702] RBP: 00007fd592b8b090 R08: 0000000000000000 R09: 0000000000000000 [ 72.985010][ T2702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 72.992981][ T2702] R13: 00007fd59436a038 R14: 00007fd594369fa0 R15: 00007fff36144028 [ 73.349731][ T2722] device sit0 left promiscuous mode [ 73.780877][ T2754] device syzkaller0 entered promiscuous mode [ 73.787995][ T2755] FAULT_INJECTION: forcing a failure. [ 73.787995][ T2755] name failslab, interval 1, probability 0, space 0, times 0 [ 73.801257][ T2755] CPU: 1 PID: 2755 Comm: syz.1.709 Tainted: G W syzkaller #0 [ 73.810039][ T2755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 73.820469][ T2755] Call Trace: [ 73.823988][ T2755] __dump_stack+0x21/0x24 [ 73.828337][ T2755] dump_stack_lvl+0x169/0x1d8 [ 73.833056][ T2755] ? show_regs_print_info+0x18/0x18 [ 73.838497][ T2755] dump_stack+0x15/0x1c [ 73.842885][ T2755] should_fail+0x3c1/0x510 [ 73.847583][ T2755] ? __alloc_skb+0x9e/0x520 [ 73.852198][ T2755] __should_failslab+0xa4/0xe0 [ 73.856997][ T2755] should_failslab+0x9/0x20 [ 73.861545][ T2755] kmem_cache_alloc+0x3d/0x2e0 [ 73.866450][ T2755] ? bpf_trace_run1+0x200/0x200 [ 73.871319][ T2755] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 73.876797][ T2755] __alloc_skb+0x9e/0x520 [ 73.881507][ T2755] ? ____kasan_slab_free+0x130/0x160 [ 73.886809][ T2755] fdb_notify+0x78/0x130 [ 73.891253][ T2755] fdb_delete+0x893/0xb00 [ 73.895951][ T2755] fdb_delete_local+0x3c5/0x480 [ 73.901022][ T2755] br_fdb_changeaddr+0x1b3/0x1c0 [ 73.905982][ T2755] br_device_event+0x335/0x790 [ 73.911022][ T2755] ? br_boolopt_multi_get+0xb0/0xb0 [ 73.916241][ T2755] ? packet_notifier+0x8b2/0x8d0 [ 73.921175][ T2755] ? addrconf_notify+0x37b/0xe90 [ 73.926251][ T2755] ? ipv6_mc_netdev_event+0x80/0x300 [ 73.931700][ T2755] raw_notifier_call_chain+0x90/0x100 [ 73.937087][ T2755] dev_set_mac_address+0x318/0x420 [ 73.942624][ T2755] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 73.948547][ T2755] dev_set_mac_address_user+0x31/0x50 [ 73.954007][ T2755] dev_ifsioc+0x65c/0xa50 [ 73.958666][ T2755] ? dev_ioctl+0xb80/0xb80 [ 73.963178][ T2755] dev_ioctl+0x550/0xb80 [ 73.967445][ T2755] sock_do_ioctl+0x235/0x330 [ 73.972051][ T2755] ? sock_show_fdinfo+0xa0/0xa0 [ 73.976917][ T2755] ? selinux_file_ioctl+0x377/0x480 [ 73.982127][ T2755] ? mutex_trylock+0xa0/0xa0 [ 73.986745][ T2755] ? __fget_files+0x2c4/0x320 [ 73.991427][ T2755] sock_ioctl+0x504/0x710 [ 73.995755][ T2755] ? sock_poll+0x360/0x360 [ 74.000169][ T2755] ? __fget_files+0x2c4/0x320 [ 74.004861][ T2755] ? security_file_ioctl+0x84/0xa0 [ 74.010066][ T2755] ? sock_poll+0x360/0x360 [ 74.014481][ T2755] __se_sys_ioctl+0x121/0x1a0 [ 74.019248][ T2755] __x64_sys_ioctl+0x7b/0x90 [ 74.023950][ T2755] do_syscall_64+0x31/0x40 [ 74.028472][ T2755] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 74.034377][ T2755] RIP: 0033:0x7fd594122c29 [ 74.038951][ T2755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 74.059023][ T2755] RSP: 002b:00007fd592b8b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 74.068052][ T2755] RAX: ffffffffffffffda RBX: 00007fd594369fa0 RCX: 00007fd594122c29 [ 74.076037][ T2755] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000009 [ 74.084224][ T2755] RBP: 00007fd592b8b090 R08: 0000000000000000 R09: 0000000000000000 [ 74.092202][ T2755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 74.100742][ T2755] R13: 00007fd59436a038 R14: 00007fd594369fa0 R15: 00007fff36144028 [ 74.242980][ T2766] bpf_get_probe_write_proto: 2 callbacks suppressed [ 74.242990][ T2766] syz.0.715[2766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.254535][ T2766] syz.0.715[2766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.001291][ T2795] FAULT_INJECTION: forcing a failure. [ 75.001291][ T2795] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 75.048281][ T2795] CPU: 1 PID: 2795 Comm: syz.3.721 Tainted: G W syzkaller #0 [ 75.057667][ T2795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 75.068327][ T2795] Call Trace: [ 75.071645][ T2795] __dump_stack+0x21/0x24 [ 75.076010][ T2795] dump_stack_lvl+0x169/0x1d8 [ 75.080710][ T2795] ? show_regs_print_info+0x18/0x18 [ 75.086018][ T2795] dump_stack+0x15/0x1c [ 75.090275][ T2795] should_fail+0x3c1/0x510 [ 75.094864][ T2795] should_fail_usercopy+0x1a/0x20 [ 75.100005][ T2795] _copy_from_user+0x20/0xd0 [ 75.104654][ T2795] kstrtouint_from_user+0xbe/0x200 [ 75.110120][ T2795] ? debug_smp_processor_id+0x17/0x20 [ 75.115649][ T2795] ? kstrtol_from_user+0x260/0x260 [ 75.120886][ T2795] ? irq_exit_rcu+0x9/0x10 [ 75.125331][ T2795] ? avc_policy_seqno+0x1b/0x70 [ 75.130296][ T2795] ? selinux_file_permission+0x2a5/0x510 [ 75.136340][ T2795] proc_fail_nth_write+0x85/0x1f0 [ 75.141614][ T2795] ? proc_fail_nth_read+0x210/0x210 [ 75.147757][ T2795] ? rw_verify_area+0x1c0/0x360 [ 75.154123][ T2795] ? proc_fail_nth_read+0x210/0x210 [ 75.163399][ T2795] vfs_write+0x32d/0xd60 [ 75.167785][ T2795] ? kernel_write+0x3c0/0x3c0 [ 75.173850][ T2795] ? bpf_send_signal_common+0x2b2/0x420 [ 75.180272][ T2795] ? __kasan_check_write+0x14/0x20 [ 75.185483][ T2795] ? mutex_lock+0x8c/0xe0 [ 75.190238][ T2795] ? mutex_trylock+0xa0/0xa0 [ 75.195159][ T2795] ? __fget_files+0x2c4/0x320 [ 75.199924][ T2795] ? __fdget_pos+0x2d2/0x380 [ 75.204692][ T2795] ? ksys_write+0x71/0x240 [ 75.209196][ T2795] ksys_write+0x140/0x240 [ 75.213520][ T2795] ? __ia32_sys_read+0x90/0x90 [ 75.218367][ T2795] ? debug_smp_processor_id+0x17/0x20 [ 75.223839][ T2795] __x64_sys_write+0x7b/0x90 [ 75.228846][ T2795] do_syscall_64+0x31/0x40 [ 75.233930][ T2795] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 75.240007][ T2795] RIP: 0033:0x7f8142afe6df [ 75.244562][ T2795] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 75.264716][ T2795] RSP: 002b:00007f8141568030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 75.273131][ T2795] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8142afe6df [ 75.281214][ T2795] RDX: 0000000000000001 RSI: 00007f81415680a0 RDI: 000000000000000a [ 75.289293][ T2795] RBP: 00007f8141568090 R08: 0000000000000000 R09: 0000000000000000 [ 75.297285][ T2795] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 75.305641][ T2795] R13: 00007f8142d47038 R14: 00007f8142d46fa0 R15: 00007ffd4e3c5828 [ 77.287198][ T2948] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 77.322292][ T2948] device syzkaller0 entered promiscuous mode [ 77.346154][ T2969] device sit0 entered promiscuous mode [ 77.511536][ T2982] device veth1_macvtap left promiscuous mode [ 77.517843][ T2982] device macsec0 left promiscuous mode [ 77.582173][ T2986] device veth1_macvtap entered promiscuous mode [ 77.642601][ T2986] device macsec0 entered promiscuous mode [ 78.614146][ T3054] device pim6reg1 entered promiscuous mode [ 78.947379][ T24] audit: type=1400 audit(1758311021.240:150): avc: denied { create } for pid=3080 comm="syz.4.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 79.245261][ T3106] device pim6reg1 entered promiscuous mode [ 82.229041][ T3256] device syzkaller0 entered promiscuous mode [ 82.982404][ T3325] device veth0_vlan left promiscuous mode [ 83.004970][ T3325] device veth0_vlan entered promiscuous mode [ 84.673161][ T3416] ±ÿ: renamed from team_slave_1 [ 84.897303][ T3433] device syzkaller0 entered promiscuous mode [ 85.037155][ T3447] device syzkaller0 entered promiscuous mode [ 85.169565][ T3456] device veth1_macvtap left promiscuous mode [ 86.269549][ T3505] ÿÿÿÿÿÿ: renamed from vlan1 [ 86.373225][ T3506] device pim6reg1 entered promiscuous mode [ 87.736738][ T3567] device syzkaller0 entered promiscuous mode [ 89.521706][ T3636] device syzkaller0 entered promiscuous mode [ 90.749270][ T3685] device pim6reg1 entered promiscuous mode [ 90.998254][ T3687] device syzkaller0 entered promiscuous mode [ 91.562614][ T24] audit: type=1400 audit(1758311033.850:151): avc: denied { create } for pid=3731 comm="syz.4.966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 91.740040][ T3746] device wg2 left promiscuous mode [ 91.746916][ T3746] device veth1_to_team entered promiscuous mode [ 93.130220][ T3813] device veth1_to_team entered promiscuous mode [ 93.140138][ T3816] syzkaller0: tun_chr_ioctl cmd 2148553947 [ 93.221863][ T3812] device wg2 entered promiscuous mode [ 93.736996][ T3856] syz.2.1004[3856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.737055][ T3856] syz.2.1004[3856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.881940][ T3863] device syzkaller0 entered promiscuous mode [ 95.340488][ T3930] device veth0_vlan left promiscuous mode [ 95.347006][ T3930] device veth0_vlan entered promiscuous mode [ 95.398583][ T3943] device pim6reg1 entered promiscuous mode [ 95.447172][ T3949] device pim6reg1 entered promiscuous mode [ 95.583877][ T3963] syz.4.1032[3963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.583964][ T3963] syz.4.1032[3963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.621464][ T3965] device syzkaller0 entered promiscuous mode [ 95.643392][ T3963] device veth1_macvtap entered promiscuous mode [ 95.652984][ T3963] device macsec0 entered promiscuous mode [ 95.663613][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 96.147888][ T3992] device sit0 entered promiscuous mode [ 100.403968][ T3999] device syzkaller0 entered promiscuous mode [ 100.768696][ T4025] device syzkaller0 entered promiscuous mode [ 101.050435][ T4035] device sit0 entered promiscuous mode [ 101.275470][ T4048] p: renamed from pim6reg1 [ 102.931327][ T4152] device syzkaller0 entered promiscuous mode [ 103.940645][ T4180] device sit0 left promiscuous mode [ 103.963000][ T4177] €Â0: renamed from pim6reg1 [ 103.968599][ T4185] device sit0 entered promiscuous mode [ 104.301492][ T4206] device pim6reg1 entered promiscuous mode [ 105.599302][ T4263] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.607055][ T4263] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.696433][ T4263] device bridge_slave_1 left promiscuous mode [ 105.714970][ T4263] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.734593][ T4263] device bridge_slave_0 left promiscuous mode [ 105.740915][ T4263] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.636337][ T4317] device syzkaller0 entered promiscuous mode [ 106.764095][ T24] audit: type=1400 audit(1758311049.050:152): avc: denied { create } for pid=4322 comm="syz.4.1138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 107.159461][ T4345] device syzkaller0 entered promiscuous mode [ 107.991947][ T24] audit: type=1400 audit(1758311050.280:153): avc: denied { create } for pid=4372 comm="syz.0.1153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 108.352615][ T4384] device sit0 left promiscuous mode [ 108.465895][ T4386] device veth1_macvtap left promiscuous mode [ 108.477192][ T4386] device macsec0 left promiscuous mode [ 108.520498][ T4391] device veth1_macvtap entered promiscuous mode [ 108.527246][ T4391] device macsec0 entered promiscuous mode [ 108.533549][ T4391] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 108.567985][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 110.609435][ T24] audit: type=1400 audit(1758311052.900:154): avc: denied { create } for pid=4470 comm="syz.4.1185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 110.622150][ T4471] device syzkaller0 entered promiscuous mode [ 115.657111][ T4640] device veth0_vlan left promiscuous mode [ 115.751556][ T4640] device veth0_vlan entered promiscuous mode [ 115.824699][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.848333][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.876455][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 116.617851][ T4663] device sit0 entered promiscuous mode [ 117.004851][ T4677] device pim6reg1 entered promiscuous mode [ 118.097463][ T4718] device veth0_vlan left promiscuous mode [ 118.140355][ T4718] device veth0_vlan entered promiscuous mode [ 118.861951][ T4743] device syzkaller0 entered promiscuous mode [ 119.441715][ T4774] device veth0_vlan left promiscuous mode [ 119.458214][ T4774] device veth0_vlan entered promiscuous mode [ 119.477550][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 119.500426][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 119.523262][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 119.984859][ T24] audit: type=1400 audit(1758311062.280:155): avc: denied { create } for pid=4802 comm="syz.3.1280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 120.343851][ T4821] device veth0_vlan left promiscuous mode [ 120.405470][ T4821] device veth0_vlan entered promiscuous mode [ 120.647310][ T24] audit: type=1400 audit(1758311062.880:156): avc: denied { create } for pid=4827 comm="syz.4.1289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 121.686553][ T4873] device wg2 left promiscuous mode [ 121.855034][ T4873] device wg2 entered promiscuous mode [ 122.049544][ T4885] device sit0 left promiscuous mode [ 122.117125][ T4886] device sit0 entered promiscuous mode [ 123.222944][ T4934] syz.2.1317[4934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.223003][ T4934] syz.2.1317[4934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.284926][ T4939] syz.2.1317[4939] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.318744][ T4939] syz.2.1317[4939] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.321986][ T24] audit: type=1400 audit(1758311065.610:157): avc: denied { create } for pid=4940 comm="syz.1.1321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 123.502054][ T4954] device pim6reg1 entered promiscuous mode [ 124.434761][ T24] audit: type=1400 audit(1758311066.730:158): avc: denied { read } for pid=4983 comm="syz.3.1330" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 124.554289][ T24] audit: type=1400 audit(1758311066.750:159): avc: denied { open } for pid=4983 comm="syz.3.1330" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 124.910830][ T4996] device pim6reg1 entered promiscuous mode [ 125.165171][ T5001] device pim6reg1 entered promiscuous mode [ 126.465098][ T5043] device sit0 left promiscuous mode [ 126.519028][ T5047] device sit0 entered promiscuous mode [ 130.085259][ T5121] device sit0 left promiscuous mode [ 130.125963][ T5121] device sit0 entered promiscuous mode [ 174.753831][ T5149] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.761161][ T5149] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.768938][ T5149] device bridge_slave_0 entered promiscuous mode [ 174.776870][ T5149] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.783923][ T5149] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.791581][ T5149] device bridge_slave_1 entered promiscuous mode [ 174.929966][ T5148] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.937413][ T5148] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.945304][ T5148] device bridge_slave_0 entered promiscuous mode [ 174.954840][ T5150] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.961892][ T5150] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.969614][ T5150] device bridge_slave_0 entered promiscuous mode [ 174.977943][ T5150] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.985284][ T5150] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.993418][ T5150] device bridge_slave_1 entered promiscuous mode [ 175.005229][ T5148] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.012502][ T5148] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.020161][ T5148] device bridge_slave_1 entered promiscuous mode [ 175.036421][ T375] device erspan0 left promiscuous mode [ 175.042984][ T375] GPL: port 1(erspan0) entered disabled state [ 175.062603][ T24] audit: type=1400 audit(1758311117.350:160): avc: denied { write } for pid=5149 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 175.084139][ T24] audit: type=1400 audit(1758311117.350:161): avc: denied { read } for pid=5149 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 175.112013][ T5152] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.119108][ T5152] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.126937][ T5152] device bridge_slave_0 entered promiscuous mode [ 175.136021][ T5151] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.143262][ T5151] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.151105][ T5151] device bridge_slave_0 entered promiscuous mode [ 175.164346][ T5152] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.171719][ T5152] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.179758][ T5152] device bridge_slave_1 entered promiscuous mode [ 175.199547][ T5151] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.208388][ T5151] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.216290][ T5151] device bridge_slave_1 entered promiscuous mode [ 175.248746][ T5149] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.255948][ T5149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.263600][ T5149] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.270921][ T5149] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.348289][ T375] device veth1_macvtap left promiscuous mode [ 175.457884][ T5148] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.465262][ T5148] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.472850][ T5148] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.481038][ T5148] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.501665][ T5150] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.509576][ T5150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.519544][ T5150] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.527978][ T5150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.538112][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.548159][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.559194][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.567675][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.576957][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.585932][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.593396][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.664350][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.673970][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.681278][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.689719][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.698868][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.706412][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.715335][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.723645][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.751824][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.764554][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.797885][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.807549][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.818492][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.828584][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.837295][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.847104][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.855960][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.863319][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.871771][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.880576][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.889568][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.898449][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.933204][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.942588][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.952735][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.961283][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.970867][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.981446][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.990156][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.997680][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.005761][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 176.016290][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.028073][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 176.036640][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.045967][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.058275][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.067332][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.076264][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.084248][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 176.092369][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.101153][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.109623][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.118798][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.125975][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.133487][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.142301][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.151252][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.159309][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.167165][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.176943][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.188232][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.196229][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.205741][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.215917][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.226966][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.234851][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.248945][ T5149] device veth0_vlan entered promiscuous mode [ 176.266756][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 176.276855][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.285851][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 176.297828][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.306260][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.315021][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.323291][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.332334][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.340646][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 176.349413][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.357891][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.365780][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.385217][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.393350][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.417735][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.426987][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 176.435616][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 176.459983][ T5149] device veth1_macvtap entered promiscuous mode [ 176.475225][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.487186][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 176.498869][ T5152] device veth0_vlan entered promiscuous mode [ 176.506732][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.516002][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.525140][ T5151] device veth0_vlan entered promiscuous mode [ 176.537368][ T5150] device veth0_vlan entered promiscuous mode [ 176.547367][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.555552][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.563464][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.571658][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.580415][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 176.589872][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.598772][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 176.606918][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.615941][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.623899][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.639553][ T5152] device veth1_macvtap entered promiscuous mode [ 176.664785][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 176.674529][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 176.684884][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.693604][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 176.702460][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 176.712810][ T5151] device veth1_macvtap entered promiscuous mode [ 176.726231][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 176.735414][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 176.745786][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 176.755138][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 176.770929][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 176.779510][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.805415][ T5148] device veth0_vlan entered promiscuous mode [ 176.817809][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.826379][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.834825][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 176.843671][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 176.852679][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 176.862227][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 176.871093][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 176.880080][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 176.915750][ T5150] device veth1_macvtap entered promiscuous mode [ 176.925195][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 176.940639][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 176.949300][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 176.986067][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 176.995855][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 177.007767][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 177.017944][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.027311][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 177.043005][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 177.071556][ T5174] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.082654][ T5174] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.142456][ T5148] device veth1_macvtap entered promiscuous mode [ 177.185007][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 177.193125][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 177.201945][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 177.221206][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 177.231808][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.245921][ T5174] device bridge_slave_1 left promiscuous mode [ 177.282129][ T5174] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.335840][ T5174] device bridge_slave_0 left promiscuous mode [ 177.354059][ T5174] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.678424][ T375] device bridge_slave_1 left promiscuous mode [ 178.684680][ T375] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.715780][ T375] device bridge_slave_0 left promiscuous mode [ 178.729490][ T375] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.776597][ T375] device bridge_slave_1 left promiscuous mode [ 178.782773][ T375] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.884752][ T375] device bridge_slave_0 left promiscuous mode [ 178.903590][ T375] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.924928][ T375] device veth0_vlan left promiscuous mode [ 178.940909][ T375] device veth1_macvtap left promiscuous mode [ 178.957300][ T375] device veth1_macvtap left promiscuous mode [ 178.974176][ T375] device veth0_vlan left promiscuous mode [ 178.980795][ T375] device veth1_macvtap left promiscuous mode [ 178.987070][ T375] device veth0_vlan left promiscuous mode [ 179.575524][ T5223] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 182.231519][ T5262] device pim6reg1 entered promiscuous mode [ 182.372670][ T5271] device pim6reg1 entered promiscuous mode [ 182.702367][ T5274] device wg2 entered promiscuous mode [ 184.432515][ T5329] device pim6reg1 entered promiscuous mode [ 185.020822][ T5356] syz.6.1425[5356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.020885][ T5356] syz.6.1425[5356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.037852][ T5423] syz.7.1448[5423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.094885][ T5423] syz.7.1448[5423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.808056][ T5490] syz.9.1463[5490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.983807][ T5484] device pim6reg1 entered promiscuous mode [ 188.058571][ T5490] syz.9.1463[5490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.316484][ T5493] device veth0_vlan left promiscuous mode [ 188.430617][ T5493] device veth0_vlan entered promiscuous mode [ 188.660493][ T5521] device pim6reg1 entered promiscuous mode [ 189.045576][ T24] audit: type=1400 audit(1758311131.340:162): avc: denied { create } for pid=5547 comm="syz.6.1475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 190.694708][ T5633] device syzkaller0 entered promiscuous mode [ 191.207341][ T5663] syz.5.1504[5663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.212870][ T5663] syz.5.1504[5663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.999831][ T5688] device wg2 entered promiscuous mode [ 192.470928][ T5704] p: renamed from pim6reg1 [ 194.091984][ T5757] device syzkaller0 entered promiscuous mode [ 195.770299][ T5858] device syzkaller0 entered promiscuous mode [ 195.924638][ T5861] @ÿ: renamed from bond_slave_0 [ 195.960896][ T5869] syz.7.1563[5869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.960972][ T5869] syz.7.1563[5869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.440066][ T5897] device pim6reg1 entered promiscuous mode [ 196.552391][ T5896] device sit0 entered promiscuous mode [ 196.854979][ T24] audit: type=1400 audit(1758311139.150:163): avc: denied { create } for pid=5903 comm="syz.8.1574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 197.280443][ T5917] device pim6reg1 entered promiscuous mode [ 198.418267][ T5946] device veth1_macvtap left promiscuous mode [ 198.431282][ T5946] device veth1_macvtap entered promiscuous mode [ 198.456361][ T5946] device macsec0 entered promiscuous mode [ 200.172513][ T6000] device veth1_to_team entered promiscuous mode [ 200.412304][ T5995] device wg2 entered promiscuous mode [ 201.008193][ T6026] device wg2 entered promiscuous mode [ 202.796715][ T6080] device syzkaller0 entered promiscuous mode [ 202.983595][ T6088] device sit0 left promiscuous mode [ 203.282197][ T6105] syz.7.1630[6105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.282259][ T6105] syz.7.1630[6105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.388192][ T24] audit: type=1400 audit(1758311145.680:164): avc: denied { create } for pid=6113 comm="syz.5.1633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 203.549133][ T24] audit: type=1400 audit(1758311145.840:165): avc: denied { create } for pid=6126 comm="syz.8.1638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 204.312508][ T6145] device syzkaller0 entered promiscuous mode [ 204.415183][ T6153] device veth1_macvtap left promiscuous mode [ 205.645247][ T6213] device syzkaller0 entered promiscuous mode [ 206.665919][ T6253] device macsec0 entered promiscuous mode [ 207.910554][ T6296] device pim6reg1 entered promiscuous mode [ 208.587758][ T6325] device wg2 left promiscuous mode [ 209.058769][ T6344] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 209.117684][ T6354] device veth0_vlan left promiscuous mode [ 209.134439][ T6354] device veth0_vlan entered promiscuous mode [ 209.144485][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 209.153454][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 209.161289][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 210.988271][ T6420] device wg2 entered promiscuous mode [ 211.297737][ T6434] device syzkaller0 entered promiscuous mode [ 212.387924][ T6478] tap0: tun_chr_ioctl cmd 1074025698 [ 212.518609][ T6480] tap0: tun_chr_ioctl cmd 1074025698 [ 213.444779][ T6525] syz.8.1751[6525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.444843][ T6525] syz.8.1751[6525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.587310][ T6606] device sit0 entered promiscuous mode [ 215.964524][ T6625] device pim6reg1 entered promiscuous mode [ 216.578589][ T6649] device pim6reg1 entered promiscuous mode [ 219.333684][ T6782] device wg2 left promiscuous mode [ 219.419687][ T6782] device veth1_to_team entered promiscuous mode [ 219.499258][ T6782] device wg2 entered promiscuous mode [ 220.272313][ T6837] device wg2 left promiscuous mode [ 220.602900][ T6846] device syzkaller0 entered promiscuous mode [ 220.961223][ T6879] tap0: tun_chr_ioctl cmd 2148553947 [ 221.406664][ T6882] device syzkaller0 entered promiscuous mode [ 222.359124][ T24] audit: type=1400 audit(1758311164.650:166): avc: denied { create } for pid=6934 comm="syz.8.1864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 222.492249][ T6942] device syzkaller0 entered promiscuous mode [ 222.595360][ T6951] bridge0: port 3(veth1) entered blocking state [ 222.629540][ T6951] bridge0: port 3(veth1) entered disabled state [ 222.707953][ T6951] device veth1 entered promiscuous mode [ 222.767718][ T6951] bridge0: port 3(veth1) entered blocking state [ 222.774607][ T6951] bridge0: port 3(veth1) entered forwarding state [ 222.988941][ T6974] device wg2 left promiscuous mode [ 223.006807][ T6974] device wg2 entered promiscuous mode [ 223.013581][ T6975] device sit0 entered promiscuous mode [ 223.072211][ T6963] device wg2 entered promiscuous mode [ 223.217695][ T6990] device syzkaller0 entered promiscuous mode [ 223.287467][ T6996] bridge0: port 3(veth1) entered blocking state [ 223.307013][ T6996] bridge0: port 3(veth1) entered disabled state [ 223.329398][ T6996] device veth1 entered promiscuous mode [ 223.356380][ T6996] bridge0: port 3(veth1) entered blocking state [ 223.362986][ T6996] bridge0: port 3(veth1) entered forwarding state [ 223.636943][ T7016] device wg2 left promiscuous mode [ 225.680235][ T7125] device sit0 left promiscuous mode [ 225.692750][ T7127] device sit0 entered promiscuous mode [ 226.654462][ T7152] device syzkaller0 entered promiscuous mode [ 226.921298][ T7158] device pim6reg1 entered promiscuous mode [ 227.130987][ T24] audit: type=1400 audit(1758311169.420:167): avc: denied { create } for pid=7179 comm="syz.6.1935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 227.132907][ T7177] device sit0 entered promiscuous mode [ 229.387342][ T7293] device pim6reg1 entered promiscuous mode [ 230.241110][ T7340] device sit0 left promiscuous mode [ 230.298752][ T7340] device sit0 entered promiscuous mode [ 230.418592][ T7351] device wg2 left promiscuous mode [ 230.718059][ T7358] ªªªªªª: renamed from vlan0 [ 230.826095][ T7368] @0Ù: renamed from bond_slave_1 [ 233.276937][ T7493] device syzkaller0 entered promiscuous mode [ 233.334788][ T7498] device wg2 left promiscuous mode [ 233.356845][ T7498] device wg2 entered promiscuous mode [ 233.389399][ T7508] device syzkaller0 entered promiscuous mode [ 234.093780][ T7546] device pim6reg1 entered promiscuous mode [ 234.905157][ T7568] device syzkaller0 entered promiscuous mode [ 235.136587][ T7576] device macsec0 entered promiscuous mode [ 235.881329][ T7592] device pim6reg1 entered promiscuous mode [ 235.994509][ T7598] ÿÿÿÿÿÿ: renamed from vlan1 [ 237.456239][ T7704] device sit0 left promiscuous mode [ 238.501158][ T7738] device pim6reg1 entered promiscuous mode [ 238.870490][ T7746] device veth0_vlan left promiscuous mode [ 238.898725][ T7746] device veth0_vlan entered promiscuous mode [ 238.938241][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.947376][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.956496][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.977293][ T7749] device pim6reg1 entered promiscuous mode [ 239.651251][ T7779] device pim6reg1 entered promiscuous mode [ 240.825047][ T7855] device pim6reg1 entered promiscuous mode [ 242.773324][ T7929] device syzkaller0 entered promiscuous mode [ 245.087447][ T7975] device wg2 left promiscuous mode [ 246.339732][ T8036] cgroup: fork rejected by pids controller in /syz5 [ 246.348850][ T8030] device pim6reg1 entered promiscuous mode [ 247.445270][ T24] audit: type=1400 audit(1758311189.740:168): avc: denied { mounton } for pid=8183 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 247.777942][ T8183] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.785696][ T8183] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.793297][ T8183] device bridge_slave_0 entered promiscuous mode [ 247.851910][ T8183] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.919303][ T8183] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.971123][ T8183] device bridge_slave_1 entered promiscuous mode [ 248.185901][ T300] device veth1 left promiscuous mode [ 248.194212][ T300] bridge0: port 3(veth1) entered disabled state [ 248.208946][ T300] device bridge_slave_1 left promiscuous mode [ 248.226042][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.279678][ T300] device bridge_slave_0 left promiscuous mode [ 248.327468][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.345201][ T300] device veth1_macvtap left promiscuous mode [ 249.121190][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.135573][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.241922][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.251608][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.275917][ T1922] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.285676][ T1922] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.364248][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.426354][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.447271][ T1922] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.455623][ T1922] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.502442][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 249.547414][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 249.569708][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 249.579894][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 249.599015][ T8183] device veth0_vlan entered promiscuous mode [ 249.617632][ T8183] device veth1_macvtap entered promiscuous mode [ 249.635036][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 249.644163][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 249.653612][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 249.662916][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 249.684699][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 249.762648][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 249.774846][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 249.790109][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 249.809809][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 249.839827][ T24] audit: type=1400 audit(1758311192.130:169): avc: denied { unmount } for pid=8183 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 250.192659][ T8272] device syzkaller0 entered promiscuous mode [ 250.889369][ T8293] device syzkaller0 entered promiscuous mode [ 251.290132][ T8321] device syzkaller0 entered promiscuous mode [ 251.516444][ T8335] syz.6.2233[8335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.516509][ T8335] syz.6.2233[8335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.794651][ T8322] device syzkaller0 entered promiscuous mode [ 251.857344][ T8342] device sit0 entered promiscuous mode [ 252.659297][ T8370] device pim6reg1 entered promiscuous mode [ 253.886482][ T8442] device sit0 entered promiscuous mode [ 254.487517][ T8464] device syzkaller0 entered promiscuous mode [ 256.315987][ T8570] device sit0 left promiscuous mode [ 256.353191][ T8570] device sit0 entered promiscuous mode [ 256.988229][ T8594] device syzkaller0 entered promiscuous mode [ 257.599810][ T8625] device veth1_macvtap left promiscuous mode [ 257.949028][ T8639] device syzkaller0 entered promiscuous mode [ 258.018914][ T8640] device wg2 entered promiscuous mode [ 258.312860][ T8668] device veth0_vlan left promiscuous mode [ 258.334667][ T8668] device veth0_vlan entered promiscuous mode [ 258.341889][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 258.363968][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 258.383979][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 258.615333][ T8682] device syzkaller0 entered promiscuous mode [ 259.180826][ T8711] device syzkaller0 entered promiscuous mode [ 259.228517][ T8715] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 259.974711][ T8763] ±: renamed from pim6reg1 [ 261.395306][ T8813] device veth1_macvtap left promiscuous mode [ 261.402739][ T8813] device macsec0 entered promiscuous mode [ 262.979094][ T8864] syz.9.2388[8864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.979173][ T8864] syz.9.2388[8864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.134807][ T8873] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.153550][ T8873] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.299818][ T8879] device veth0_vlan left promiscuous mode [ 263.329218][ T8879] device veth0_vlan entered promiscuous mode [ 263.365433][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 263.375280][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 263.383636][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 263.392470][ T8873] device bridge_slave_1 left promiscuous mode [ 263.403769][ T8873] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.422193][ T8873] device bridge_slave_0 left promiscuous mode [ 263.429867][ T8873] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.510449][ T8881] device pim6reg1 entered promiscuous mode [ 264.474622][ T8936] device pim6reg1 entered promiscuous mode [ 264.910601][ T8949] device veth0_vlan left promiscuous mode [ 264.987932][ T8949] device veth0_vlan entered promiscuous mode [ 267.568110][ T9084] device sit0 left promiscuous mode [ 267.644570][ T9085] device sit0 entered promiscuous mode [ 267.901577][ T9095] syz.7.2448[9095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.901636][ T9095] syz.7.2448[9095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.904598][ T9096] syz.7.2448[9096] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.931683][ T9096] syz.7.2448[9096] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.448412][ T9124] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 269.088816][ T9167] syz.6.2471[9167] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.088879][ T9167] syz.6.2471[9167] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.102072][ T9167] syz.6.2471[9167] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.114742][ T9167] syz.6.2471[9167] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.356474][ T24] audit: type=1400 audit(1758311212.650:170): avc: denied { create } for pid=9226 comm="syz.7.2489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 270.883723][ T9244] device veth0_vlan left promiscuous mode [ 270.900672][ T9244] device veth0_vlan entered promiscuous mode [ 271.041074][ T9267] device sit0 left promiscuous mode [ 271.338280][ T9295] syz.6.2507[9295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.338342][ T9295] syz.6.2507[9295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.942703][ T9383] device pim6reg1 entered promiscuous mode [ 273.992616][ T9418] syz.6.2544 (9418) used obsolete PPPIOCDETACH ioctl [ 275.030417][ T9470] device syzkaller0 entered promiscuous mode [ 275.037416][ T24] audit: type=1400 audit(1758311217.330:171): avc: denied { setattr } for pid=9480 comm="syz.9.2565" path="/dev/net/tun" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 275.088944][ T9484] syz.9.2565[9484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.089036][ T9484] syz.9.2565[9484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.626810][ T9514] tun0: tun_chr_ioctl cmd 1074025673 [ 275.654178][ T9513] tun0: tun_chr_ioctl cmd 1074025676 [ 275.665927][ T9513] tun0: owner set to 0 [ 275.742925][ T9520] device sit0 left promiscuous mode [ 278.444220][ T9614] device syzkaller0 entered promiscuous mode [ 278.500246][ T9622] : port 1(erspan0) entered blocking state [ 278.506657][ T9622] : port 1(erspan0) entered disabled state [ 278.513040][ T9622] device erspan0 entered promiscuous mode [ 278.520997][ T9616] : port 1(erspan0) entered blocking state [ 278.527116][ T9616] : port 1(erspan0) entered forwarding state [ 279.188504][ T9669] device sit0 left promiscuous mode [ 279.411165][ T9676] device sit0 entered promiscuous mode [ 279.771557][ T9705] device sit0 left promiscuous mode [ 279.832106][ T9705] device sit0 entered promiscuous mode [ 280.556106][ T9734] €Â0: renamed from pim6reg1 [ 281.147857][ T9754] tap0: tun_chr_ioctl cmd 1074025698 [ 281.285372][ T9764] syz.7.2639[9764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.285436][ T9764] syz.7.2639[9764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.297542][ T9763] syz.7.2639[9763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.324452][ T9763] syz.7.2639[9763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.518790][ T9798] device syzkaller0 entered promiscuous mode [ 283.476460][ T9832] device syzkaller0 entered promiscuous mode [ 284.078847][ T9857] device wg2 left promiscuous mode [ 284.445267][ T9885] device syzkaller0 entered promiscuous mode [ 285.248106][ T9933] device macsec0 entered promiscuous mode [ 285.471462][ T9941] device pim6reg1 entered promiscuous mode [ 285.598237][ T24] audit: type=1400 audit(1758311227.890:172): avc: denied { append } for pid=9948 comm="syz.7.2692" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 285.959666][ T9973] device macsec0 left promiscuous mode [ 285.995244][ T9973] device sit0 left promiscuous mode [ 286.023412][ T9973] device sit0 entered promiscuous mode [ 287.577091][T10063] device syzkaller0 entered promiscuous mode [ 292.260152][T10259] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.270978][T10259] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.667695][T10325] device syzkaller0 entered promiscuous mode [ 293.754720][T10319] device veth0_vlan left promiscuous mode [ 293.795134][T10319] device veth0_vlan entered promiscuous mode [ 293.892972][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 293.901660][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 293.928201][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 295.781820][T10388] syz.9.2822[10388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.783987][T10388] syz.9.2822[10388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.206713][T10428] device syzkaller0 entered promiscuous mode [ 296.295294][ T24] audit: type=1400 audit(1758311238.590:173): avc: denied { associate } for pid=10439 comm="syz.7.2837" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 296.883015][T10493] device veth0_vlan left promiscuous mode [ 296.912740][T10493] device veth0_vlan entered promiscuous mode [ 296.982739][T10501] device syzkaller0 entered promiscuous mode [ 297.478790][T10534] device syzkaller0 entered promiscuous mode [ 297.979463][T10562] device veth1_macvtap left promiscuous mode [ 298.045965][T10562] device macsec0 left promiscuous mode [ 298.082613][T10564] device veth1_macvtap entered promiscuous mode [ 298.114187][T10564] device macsec0 entered promiscuous mode [ 299.059772][T10606] device sit0 entered promiscuous mode [ 299.941253][T10640] bridge0: port 3(veth1) entered blocking state [ 300.014382][T10640] bridge0: port 3(veth1) entered disabled state [ 300.117549][T10640] device veth1 entered promiscuous mode [ 300.221309][T10641] device sit0 entered promiscuous mode [ 301.312084][T10675] device pim6reg1 entered promiscuous mode [ 302.526186][T10697] device veth1_macvtap left promiscuous mode [ 302.532234][T10697] device macsec0 left promiscuous mode [ 302.937154][T10705] device pim6reg1 entered promiscuous mode [ 303.104367][T10718] 7B’ç÷ï: renamed from syzkaller0 [ 303.432891][T10730] ±ÿ: renamed from team_slave_1 [ 303.498885][T10728] device veth0_vlan left promiscuous mode [ 303.586516][T10728] device veth0_vlan entered promiscuous mode [ 307.439448][ T24] audit: type=1400 audit(1758311249.730:174): avc: denied { ioctl } for pid=10910 comm="syz.6.2968" path="net:[4026532361]" dev="nsfs" ino=4026532361 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 308.640958][T10962] device syzkaller0 entered promiscuous mode [ 308.772317][T10957] ±ÿ: renamed from team_slave_1 [ 309.068581][T10974] device sit0 left promiscuous mode [ 309.208637][T10975] device sit0 entered promiscuous mode [ 309.510141][T10995] device pim6reg1 entered promiscuous mode [ 309.699849][T11005] device veth1_macvtap left promiscuous mode [ 309.716090][T11005] device macsec0 left promiscuous mode [ 310.050107][T11013] device pim6reg1 entered promiscuous mode [ 310.147620][T11018] device sit0 left promiscuous mode [ 310.723096][T11048] device syzkaller0 entered promiscuous mode [ 311.641615][T11061] device syzkaller0 entered promiscuous mode [ 312.914276][T11131] device sit0 left promiscuous mode [ 312.963315][T11131] device sit0 entered promiscuous mode [ 314.219081][T11191] device syzkaller0 entered promiscuous mode [ 314.231919][T11198] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 314.239033][T11198] syzkaller0: Linktype set failed because interface is up [ 314.552428][T11218] device macsec0 left promiscuous mode [ 315.027939][T11246] device sit0 entered promiscuous mode [ 315.442719][T11266] device sit0 left promiscuous mode [ 315.460279][T11268] device sit0 entered promiscuous mode [ 317.413006][T11334] device syzkaller0 entered promiscuous mode [ 319.319054][T11510] device sit0 left promiscuous mode [ 319.439011][T11511] device sit0 entered promiscuous mode [ 319.488235][T11525] device sit0 left promiscuous mode [ 319.995468][T11543] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.007799][T11543] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.034661][T11543] device bridge_slave_0 entered promiscuous mode [ 320.042381][T11543] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.049981][T11543] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.058015][T11543] device bridge_slave_1 entered promiscuous mode [ 320.415033][T11543] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.422538][T11543] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.431309][T11543] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.438972][T11543] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.740479][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 320.748972][ T375] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.757513][ T375] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.768857][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 320.782650][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.797567][ T375] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.804953][ T375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.892350][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 320.906321][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.973888][ T375] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.981580][ T375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.054224][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 321.066460][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 321.078217][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 321.086659][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 321.193881][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 321.206744][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 321.466109][T11608] device macsec0 entered promiscuous mode [ 321.528451][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 321.537254][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 321.558919][T11543] device veth0_vlan entered promiscuous mode [ 321.579360][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 321.612840][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 321.653520][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 321.675989][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 321.705108][T11543] device veth1_macvtap entered promiscuous mode [ 321.764305][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 321.852273][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 321.876982][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 321.913572][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 321.928536][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 322.120452][T11634] device pim6reg1 entered promiscuous mode [ 322.163681][T11634] dvmrp1: tun_chr_ioctl cmd 1074812118 [ 322.448601][T11647] device syzkaller0 entered promiscuous mode [ 322.515841][ T1922] device veth0_vlan left promiscuous mode [ 322.836281][T11677] ÿÿÿÿÿÿ: renamed from vlan1 [ 322.936609][T11686] device wg2 entered promiscuous mode [ 323.705816][T11714] device syzkaller0 entered promiscuous mode [ 323.902797][T11733] device sit0 left promiscuous mode [ 324.818919][T11782] device wg2 left promiscuous mode [ 324.827148][T11782] device wg2 entered promiscuous mode [ 325.137685][T11800] device pim6reg1 entered promiscuous mode [ 325.459346][T11824] device wg2 left promiscuous mode [ 325.585797][T11824] device wg2 entered promiscuous mode [ 326.777786][T11861] device pim6reg1 entered promiscuous mode [ 327.749995][T11927] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.757510][T11927] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.779791][T11927] device bridge_slave_1 left promiscuous mode [ 327.787233][T11927] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.795789][T11927] device bridge_slave_0 left promiscuous mode [ 327.802454][T11927] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.027158][T11941] device pim6reg1 entered promiscuous mode [ 328.673447][T11973] device syzkaller0 entered promiscuous mode [ 329.312323][T12015] tap0: tun_chr_ioctl cmd 1074025673 [ 329.550723][T12042] syz.6.3272[12042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.550838][T12042] syz.6.3272[12042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.867581][T12060] syz.8.3280[12060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.915781][T12060] syz.8.3280[12060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.278116][T12129] ªªªªªª: renamed from vlan0 [ 331.772077][T12142] device pim6reg1 entered promiscuous mode [ 332.987681][T12197] device pim6reg1 entered promiscuous mode [ 333.781185][T12233] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.804993][T12233] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.823054][T12233] device bridge_slave_0 entered promiscuous mode [ 333.830857][T12233] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.838581][T12233] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.846916][T12233] device bridge_slave_1 entered promiscuous mode [ 333.990548][T12257] device macsec0 entered promiscuous mode [ 334.198724][T12233] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.206377][T12233] bridge0: port 2(bridge_slave_1) entered forwarding state [ 334.216013][T12233] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.224407][T12233] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.465108][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.484754][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.772604][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 334.786067][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 334.849263][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 334.893358][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 334.966032][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.973312][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 335.055779][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 335.114548][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 335.164461][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.171964][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 335.259052][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 335.295897][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 335.351393][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 335.385252][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 335.436592][ T49] device veth1_macvtap left promiscuous mode [ 335.442961][ T49] device veth0_vlan left promiscuous mode [ 336.083115][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 336.145228][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 336.200579][T12233] device veth0_vlan entered promiscuous mode [ 336.295438][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 336.311781][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 336.362249][T12233] device veth1_macvtap entered promiscuous mode [ 336.395705][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 336.425718][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 336.454560][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 336.484609][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 336.506739][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 336.559863][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 336.586104][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 336.626141][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 336.685387][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 337.365748][T12305] GPL: port 1(vlan0) entered blocking state [ 337.442008][T12305] GPL: port 1(vlan0) entered disabled state [ 337.485449][T12305] device vlan0 entered promiscuous mode [ 338.158721][T12342] device pim6reg1 entered promiscuous mode [ 339.069560][T12407] device sit0 entered promiscuous mode [ 340.788139][T12463] device wg2 left promiscuous mode [ 341.047394][T12475] device syzkaller0 entered promiscuous mode [ 341.622654][T12483] device syzkaller0 entered promiscuous mode [ 345.074674][T12636] device wg2 left promiscuous mode [ 345.196454][T12644] device syzkaller0 entered promiscuous mode [ 348.419525][T12767] device syzkaller0 entered promiscuous mode [ 349.067634][T12796] cgroup: fork rejected by pids controller in /syz7 [ 349.620120][T12827] device sit0 left promiscuous mode [ 350.043072][T12848] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.050567][T12848] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.058439][T12848] device bridge_slave_0 entered promiscuous mode [ 350.065882][T12848] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.072949][T12848] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.080843][T12848] device bridge_slave_1 entered promiscuous mode [ 350.139786][T12848] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.147169][T12848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.154785][T12848] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.162304][T12848] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.216779][T12848] device veth0_vlan entered promiscuous mode [ 350.283711][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 350.302085][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 350.314586][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 350.322671][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 350.354261][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 350.363625][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 350.372229][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 350.380822][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 350.389058][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 350.397360][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 350.410750][T12848] device veth1_macvtap entered promiscuous mode [ 350.433086][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 350.459642][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 350.493663][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 351.056201][ T1922] : port 1(erspan0) entered disabled state [ 351.075031][ T1922] device erspan0 left promiscuous mode [ 351.089292][ T1922] : port 1(erspan0) entered disabled state [ 351.136397][T12912] device wg2 entered promiscuous mode [ 351.180155][T12923] device pim6reg1 entered promiscuous mode [ 351.272319][T12926] device syzkaller0 entered promiscuous mode [ 351.512862][ T1922] device bridge_slave_1 left promiscuous mode [ 351.538981][ T1922] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.552768][ T1922] device bridge_slave_0 left promiscuous mode [ 351.562057][ T1922] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.045588][T12953] device syzkaller0 entered promiscuous mode [ 352.289584][T12959] device pim6reg1 entered promiscuous mode [ 352.585532][T12994] device syzkaller0 entered promiscuous mode [ 354.512675][T13067] device syzkaller0 entered promiscuous mode [ 354.984590][T13081] device pim6reg1 entered promiscuous mode [ 355.288156][T13100] device pim6reg1 entered promiscuous mode [ 356.122550][T13147] device pim6reg1 entered promiscuous mode [ 356.667363][T13166] device pim6reg1 entered promiscuous mode [ 357.358548][ T24] audit: type=1400 audit(1758311299.640:175): avc: denied { create } for pid=13208 comm="syz.7.3610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 357.386476][T13219] tap0: tun_chr_ioctl cmd 1074025698 [ 357.950885][T13243] device syzkaller0 entered promiscuous mode [ 358.754133][T13284] device sit0 entered promiscuous mode [ 359.350824][T13335] device pim6reg1 entered promiscuous mode [ 359.551978][T13353] cgroup: fork rejected by pids controller in /syz6 [ 359.766076][T13327] device pim6reg1 entered promiscuous mode [ 359.969223][T13369] device syzkaller0 entered promiscuous mode [ 360.292552][T13400] device pim6reg1 entered promiscuous mode [ 360.440041][T13398] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.464124][T13398] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.494839][T13398] device bridge_slave_0 entered promiscuous mode [ 360.520371][T13398] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.531955][T13398] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.563108][T13398] device bridge_slave_1 entered promiscuous mode [ 360.721101][T13398] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.728247][T13398] bridge0: port 2(bridge_slave_1) entered forwarding state [ 360.735684][T13398] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.743010][T13398] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.826867][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 360.839801][ T1922] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.859853][ T1922] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.882385][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 360.896648][ T1922] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.903955][ T1922] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.921661][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 360.939975][ T1922] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.947303][ T1922] bridge0: port 2(bridge_slave_1) entered forwarding state [ 360.979522][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 360.997123][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 361.030152][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 361.048426][T13398] device veth0_vlan entered promiscuous mode [ 361.061393][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 361.079395][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 361.087383][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 361.119912][T13398] device veth1_macvtap entered promiscuous mode [ 361.128233][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 361.143240][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 361.178851][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 361.300393][T13471] device syzkaller0 entered promiscuous mode [ 361.362018][T13472] device wg2 entered promiscuous mode [ 361.936761][ T7] device veth1 left promiscuous mode [ 361.943660][ T7] bridge0: port 3(veth1) entered disabled state [ 361.997570][ T7] device bridge_slave_1 left promiscuous mode [ 362.023277][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.092033][ T7] device bridge_slave_0 left promiscuous mode [ 362.103128][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.156508][T13524] device veth1_to_bond entered promiscuous mode [ 363.248706][T13530] device syzkaller0 entered promiscuous mode [ 365.461390][T13625] syz.9.3729[13625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.461452][T13625] syz.9.3729[13625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.695941][T13632] Â: renamed from pim6reg1 [ 366.663662][T13688] device syzkaller0 entered promiscuous mode [ 367.872508][T13726] device pim6reg1 entered promiscuous mode [ 367.957346][T13734] batadv0: tun_chr_ioctl cmd 2147767521 [ 367.981319][T13734] batadv0: tun_chr_ioctl cmd 1074025692 [ 368.041824][T13738] device veth1_macvtap left promiscuous mode [ 368.181654][T13738] device veth1_macvtap entered promiscuous mode [ 368.205798][T13738] device macsec0 entered promiscuous mode [ 368.786741][T13750] device syzkaller0 entered promiscuous mode [ 368.988265][T13769] device syzkaller0 entered promiscuous mode [ 373.438632][T13903] device sit0 left promiscuous mode [ 373.487456][T13903] device sit0 entered promiscuous mode [ 373.898765][T13922] device syzkaller0 entered promiscuous mode [ 374.045728][T13927] syz.5.3821[13927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.045794][T13927] syz.5.3821[13927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.250579][T13929] device syzkaller0 entered promiscuous mode [ 375.762458][T14008] device pim6reg1 entered promiscuous mode [ 376.023815][T14015] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.031133][T14015] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.165694][T14017] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.172850][T14017] bridge0: port 2(bridge_slave_1) entered forwarding state [ 376.180311][T14017] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.187374][T14017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 376.369749][T14017] device bridge0 entered promiscuous mode [ 377.024842][T14062] device wg2 left promiscuous mode [ 377.234203][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 378.141824][T14163] device pim6reg1 entered promiscuous mode [ 378.162964][T14171] device syzkaller0 entered promiscuous mode [ 378.415565][T14170] device syzkaller0 entered promiscuous mode [ 379.056623][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 379.094838][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 379.227908][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 379.342574][T14205] device pim6reg1 entered promiscuous mode [ 379.869435][T14243] device wg2 entered promiscuous mode [ 380.126288][T14247] device veth0_vlan left promiscuous mode [ 380.148082][T14247] device veth0_vlan entered promiscuous mode [ 380.211516][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 380.228554][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 380.287015][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 382.772313][T14343] device pim6reg1 entered promiscuous mode [ 383.035672][T14357] device wg2 left promiscuous mode [ 383.214424][T14361] device wg2 entered promiscuous mode [ 384.918799][T14451] Q±6ã×\b‹¡Y­4: renamed from lo [ 385.831712][T14483] syz.9.3983[14483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.831801][T14483] syz.9.3983[14483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.131105][T14493] device sit0 entered promiscuous mode [ 386.704361][T14512] device veth0_vlan left promiscuous mode [ 386.727498][T14512] device veth0_vlan entered promiscuous mode [ 386.874650][T14520] device syzkaller0 entered promiscuous mode [ 388.250710][T14578] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.258150][T14578] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.894264][T14615] device syzkaller0 entered promiscuous mode [ 389.543605][T14666] device wg2 left promiscuous mode [ 389.560959][T14667] device wg2 entered promiscuous mode [ 390.345442][T14685] device syzkaller0 entered promiscuous mode [ 390.952037][T14722] device veth1_macvtap left promiscuous mode [ 391.741335][T14741] device syzkaller0 entered promiscuous mode [ 391.915034][T14750] device syzkaller0 entered promiscuous mode [ 393.417494][T14834] device veth0_vlan left promiscuous mode [ 393.433685][T14834] device veth0_vlan entered promiscuous mode [ 394.564419][T14897] FAULT_INJECTION: forcing a failure. [ 394.564419][T14897] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 394.577804][T14897] CPU: 1 PID: 14897 Comm: syz.5.4115 Tainted: G W syzkaller #0 [ 394.586671][T14897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 394.596833][T14897] Call Trace: [ 394.600145][T14897] __dump_stack+0x21/0x24 [ 394.604504][T14897] dump_stack_lvl+0x169/0x1d8 [ 394.609490][T14897] ? thaw_kernel_threads+0x220/0x220 [ 394.614979][T14897] ? show_regs_print_info+0x18/0x18 [ 394.620207][T14897] dump_stack+0x15/0x1c [ 394.624384][T14897] should_fail+0x3c1/0x510 [ 394.628833][T14897] should_fail_usercopy+0x1a/0x20 [ 394.634247][T14897] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 394.640941][T14897] generic_perform_write+0x326/0x510 [ 394.646269][T14897] ? grab_cache_page_write_begin+0xb0/0xb0 [ 394.652091][T14897] ? file_remove_privs+0x580/0x580 [ 394.657325][T14897] ? __fsnotify_parent+0x5f5/0x6c0 [ 394.662696][T14897] ? __kasan_check_write+0x14/0x20 [ 394.667922][T14897] ? down_write+0xac/0x110 [ 394.672380][T14897] __generic_file_write_iter+0x24b/0x480 [ 394.678097][T14897] ? generic_write_checks+0x3d4/0x480 [ 394.683773][T14897] generic_file_write_iter+0xa9/0x1d0 [ 394.689254][T14897] vfs_write+0x725/0xd60 [ 394.693705][T14897] ? kernel_write+0x3c0/0x3c0 [ 394.698477][T14897] ? mutex_trylock+0xa0/0xa0 [ 394.703172][T14897] ? __fget_files+0x2c4/0x320 [ 394.708065][T14897] ? __fdget_pos+0x2d2/0x380 [ 394.712882][T14897] ? ksys_write+0x71/0x240 [ 394.717311][T14897] ksys_write+0x140/0x240 [ 394.721656][T14897] ? __ia32_sys_read+0x90/0x90 [ 394.726439][T14897] ? debug_smp_processor_id+0x17/0x20 [ 394.731857][T14897] __x64_sys_write+0x7b/0x90 [ 394.736827][T14897] do_syscall_64+0x31/0x40 [ 394.741614][T14897] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 394.748116][T14897] RIP: 0033:0x7fc5daab8c29 [ 394.752845][T14897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 394.772764][T14897] RSP: 002b:00007fc5d9521038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 394.781473][T14897] RAX: ffffffffffffffda RBX: 00007fc5dacfffa0 RCX: 00007fc5daab8c29 [ 394.789721][T14897] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 394.798021][T14897] RBP: 00007fc5d9521090 R08: 0000000000000000 R09: 0000000000000000 [ 394.806990][T14897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 394.815323][T14897] R13: 00007fc5dad00038 R14: 00007fc5dacfffa0 R15: 00007ffdaa39e2f8 [ 395.111900][T14918] syz.8.4117[14918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.600779][T14943] FAULT_INJECTION: forcing a failure. [ 395.600779][T14943] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 395.626130][T14943] CPU: 1 PID: 14943 Comm: syz.6.4130 Tainted: G W syzkaller #0 [ 395.635909][T14943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 395.647722][T14943] Call Trace: [ 395.651679][T14943] __dump_stack+0x21/0x24 [ 395.656292][T14943] dump_stack_lvl+0x169/0x1d8 [ 395.661007][T14943] ? thaw_kernel_threads+0x220/0x220 [ 395.666929][T14943] ? show_regs_print_info+0x18/0x18 [ 395.672926][T14943] dump_stack+0x15/0x1c [ 395.677624][T14943] should_fail+0x3c1/0x510 [ 395.682085][T14943] should_fail_usercopy+0x1a/0x20 [ 395.687370][T14943] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 395.694193][T14943] generic_perform_write+0x326/0x510 [ 395.699704][T14943] ? grab_cache_page_write_begin+0xb0/0xb0 [ 395.705549][T14943] ? file_remove_privs+0x580/0x580 [ 395.710766][T14943] ? __kasan_check_read+0x11/0x20 [ 395.715986][T14943] ? __kasan_check_write+0x14/0x20 [ 395.721297][T14943] ? down_write+0xac/0x110 [ 395.725835][T14943] __generic_file_write_iter+0x24b/0x480 [ 395.731664][T14943] ? generic_write_checks+0x3d4/0x480 [ 395.737631][T14943] generic_file_write_iter+0xa9/0x1d0 [ 395.743029][T14943] vfs_write+0x725/0xd60 [ 395.747478][T14943] ? __bpf_get_stackid+0x6b4/0x960 [ 395.752789][T14943] ? kernel_write+0x3c0/0x3c0 [ 395.757484][T14943] ? mutex_trylock+0xa0/0xa0 [ 395.762275][T14943] ? __fget_files+0x2c4/0x320 [ 395.767085][T14943] ? __fdget_pos+0x2d2/0x380 [ 395.772233][T14943] ? ksys_write+0x71/0x240 [ 395.776730][T14943] ksys_write+0x140/0x240 [ 395.781060][T14943] ? __ia32_sys_read+0x90/0x90 [ 395.786621][T14943] ? __traceiter_sys_enter+0x2e/0x50 [ 395.792217][T14943] __x64_sys_write+0x7b/0x90 [ 395.796967][T14943] do_syscall_64+0x31/0x40 [ 395.803407][T14943] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 395.810360][T14943] RIP: 0033:0x7fe209359c29 [ 395.814888][T14943] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 395.835400][T14943] RSP: 002b:00007fe207dc2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 395.844446][T14943] RAX: ffffffffffffffda RBX: 00007fe2095a0fa0 RCX: 00007fe209359c29 [ 395.852697][T14943] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 395.860724][T14943] RBP: 00007fe207dc2090 R08: 0000000000000000 R09: 0000000000000000 [ 395.868883][T14943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 395.884680][T14943] R13: 00007fe2095a1038 R14: 00007fe2095a0fa0 R15: 00007ffd83e8bcb8 [ 396.320454][T14982] FAULT_INJECTION: forcing a failure. [ 396.320454][T14982] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 396.333738][T14982] CPU: 1 PID: 14982 Comm: syz.7.4145 Tainted: G W syzkaller #0 [ 396.342607][T14982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 396.352861][T14982] Call Trace: [ 396.356193][T14982] __dump_stack+0x21/0x24 [ 396.360543][T14982] dump_stack_lvl+0x169/0x1d8 [ 396.365516][T14982] ? thaw_kernel_threads+0x220/0x220 [ 396.370825][T14982] ? show_regs_print_info+0x18/0x18 [ 396.376290][T14982] dump_stack+0x15/0x1c [ 396.380560][T14982] should_fail+0x3c1/0x510 [ 396.385006][T14982] should_fail_usercopy+0x1a/0x20 [ 396.390330][T14982] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 396.396423][T14982] generic_perform_write+0x326/0x510 [ 396.402129][T14982] ? grab_cache_page_write_begin+0xb0/0xb0 [ 396.408153][T14982] ? file_remove_privs+0x580/0x580 [ 396.413675][T14982] ? __fsnotify_parent+0x5f5/0x6c0 [ 396.418895][T14982] ? __kasan_check_write+0x14/0x20 [ 396.424107][T14982] ? down_write+0xac/0x110 [ 396.428637][T14982] __generic_file_write_iter+0x24b/0x480 [ 396.434291][T14982] ? generic_write_checks+0x3d4/0x480 [ 396.439690][T14982] generic_file_write_iter+0xa9/0x1d0 [ 396.445064][T14982] vfs_write+0x725/0xd60 [ 396.449421][T14982] ? __bpf_trace_kmem_free+0x6f/0x90 [ 396.454804][T14982] ? kernel_write+0x3c0/0x3c0 [ 396.459739][T14982] ? mutex_trylock+0xa0/0xa0 [ 396.464421][T14982] ? __fget_files+0x2c4/0x320 [ 396.469591][T14982] ? __fdget_pos+0x2d2/0x380 [ 396.474626][T14982] ? ksys_write+0x71/0x240 [ 396.479087][T14982] ksys_write+0x140/0x240 [ 396.483431][T14982] ? __ia32_sys_read+0x90/0x90 [ 396.488375][T14982] ? debug_smp_processor_id+0x17/0x20 [ 396.494208][T14982] __x64_sys_write+0x7b/0x90 [ 396.498968][T14982] do_syscall_64+0x31/0x40 [ 396.504033][T14982] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 396.510702][T14982] RIP: 0033:0x7f70f70d7c29 [ 396.515129][T14982] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 396.535025][T14982] RSP: 002b:00007f70f5b40038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 396.543796][T14982] RAX: ffffffffffffffda RBX: 00007f70f731efa0 RCX: 00007f70f70d7c29 [ 396.552003][T14982] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 396.560172][T14982] RBP: 00007f70f5b40090 R08: 0000000000000000 R09: 0000000000000000 [ 396.568329][T14982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 396.576585][T14982] R13: 00007f70f731f038 R14: 00007f70f731efa0 R15: 00007ffed2193078 [ 397.266097][T15016] device syzkaller0 entered promiscuous mode [ 397.712727][T15028] FAULT_INJECTION: forcing a failure. [ 397.712727][T15028] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 397.726358][T15028] CPU: 1 PID: 15028 Comm: syz.5.4158 Tainted: G W syzkaller #0 [ 397.735284][T15028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 397.745843][T15028] Call Trace: [ 397.749153][T15028] __dump_stack+0x21/0x24 [ 397.753493][T15028] dump_stack_lvl+0x169/0x1d8 [ 397.758493][T15028] ? thaw_kernel_threads+0x220/0x220 [ 397.763970][T15028] ? show_regs_print_info+0x18/0x18 [ 397.769206][T15028] dump_stack+0x15/0x1c [ 397.773416][T15028] should_fail+0x3c1/0x510 [ 397.777976][T15028] should_fail_usercopy+0x1a/0x20 [ 397.783053][T15028] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 397.789156][T15028] generic_perform_write+0x326/0x510 [ 397.794466][T15028] ? grab_cache_page_write_begin+0xb0/0xb0 [ 397.800308][T15028] ? file_remove_privs+0x580/0x580 [ 397.805638][T15028] ? __fsnotify_parent+0x5f5/0x6c0 [ 397.810761][T15028] ? __kasan_check_write+0x14/0x20 [ 397.815886][T15028] ? down_write+0xac/0x110 [ 397.820321][T15028] __generic_file_write_iter+0x24b/0x480 [ 397.825989][T15028] ? generic_write_checks+0x3d4/0x480 [ 397.831670][T15028] generic_file_write_iter+0xa9/0x1d0 [ 397.837288][T15028] vfs_write+0x725/0xd60 [ 397.841642][T15028] ? kernel_write+0x3c0/0x3c0 [ 397.846458][T15028] ? mutex_trylock+0xa0/0xa0 [ 397.851159][T15028] ? __fget_files+0x2c4/0x320 [ 397.855851][T15028] ? __fdget_pos+0x2d2/0x380 [ 397.860553][T15028] ? ksys_write+0x71/0x240 [ 397.865082][T15028] ksys_write+0x140/0x240 [ 397.869759][T15028] ? __ia32_sys_read+0x90/0x90 [ 397.874724][T15028] ? debug_smp_processor_id+0x17/0x20 [ 397.880349][T15028] __x64_sys_write+0x7b/0x90 [ 397.884961][T15028] do_syscall_64+0x31/0x40 [ 397.889389][T15028] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 397.895286][T15028] RIP: 0033:0x7fc5daab8c29 [ 397.899707][T15028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 397.919310][T15028] RSP: 002b:00007fc5d9521038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 397.927869][T15028] RAX: ffffffffffffffda RBX: 00007fc5dacfffa0 RCX: 00007fc5daab8c29 [ 397.935866][T15028] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 397.943834][T15028] RBP: 00007fc5d9521090 R08: 0000000000000000 R09: 0000000000000000 [ 397.951988][T15028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 397.959973][T15028] R13: 00007fc5dad00038 R14: 00007fc5dacfffa0 R15: 00007ffdaa39e2f8 [ 398.408077][T15076] FAULT_INJECTION: forcing a failure. [ 398.408077][T15076] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 398.421336][T15076] CPU: 0 PID: 15076 Comm: syz.6.4172 Tainted: G W syzkaller #0 [ 398.430367][T15076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 398.440641][T15076] Call Trace: [ 398.443955][T15076] __dump_stack+0x21/0x24 [ 398.448307][T15076] dump_stack_lvl+0x169/0x1d8 [ 398.453052][T15076] ? thaw_kernel_threads+0x220/0x220 [ 398.458565][T15076] ? show_regs_print_info+0x18/0x18 [ 398.464290][T15076] dump_stack+0x15/0x1c [ 398.468584][T15076] should_fail+0x3c1/0x510 [ 398.473208][T15076] should_fail_usercopy+0x1a/0x20 [ 398.478427][T15076] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 398.484701][T15076] generic_perform_write+0x326/0x510 [ 398.490092][T15076] ? grab_cache_page_write_begin+0xb0/0xb0 [ 398.496216][T15076] ? file_remove_privs+0x580/0x580 [ 398.501478][T15076] ? __fsnotify_parent+0x5f5/0x6c0 [ 398.506615][T15076] ? __kasan_check_write+0x14/0x20 [ 398.511744][T15076] ? down_write+0xac/0x110 [ 398.516299][T15076] __generic_file_write_iter+0x24b/0x480 [ 398.522032][T15076] ? generic_write_checks+0x3d4/0x480 [ 398.527445][T15076] generic_file_write_iter+0xa9/0x1d0 [ 398.533072][T15076] vfs_write+0x725/0xd60 [ 398.537337][T15076] ? kernel_write+0x3c0/0x3c0 [ 398.542024][T15076] ? mutex_trylock+0xa0/0xa0 [ 398.546648][T15076] ? __fget_files+0x2c4/0x320 [ 398.551378][T15076] ? __fdget_pos+0x2d2/0x380 [ 398.556075][T15076] ? ksys_write+0x71/0x240 [ 398.560526][T15076] ksys_write+0x140/0x240 [ 398.564951][T15076] ? __ia32_sys_read+0x90/0x90 [ 398.569714][T15076] ? debug_smp_processor_id+0x17/0x20 [ 398.575190][T15076] __x64_sys_write+0x7b/0x90 [ 398.579896][T15076] do_syscall_64+0x31/0x40 [ 398.584415][T15076] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 398.590327][T15076] RIP: 0033:0x7fe209359c29 [ 398.594851][T15076] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 398.614558][T15076] RSP: 002b:00007fe207dc2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 398.622983][T15076] RAX: ffffffffffffffda RBX: 00007fe2095a0fa0 RCX: 00007fe209359c29 [ 398.631102][T15076] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 398.639180][T15076] RBP: 00007fe207dc2090 R08: 0000000000000000 R09: 0000000000000000 [ 398.647158][T15076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 398.655232][T15076] R13: 00007fe2095a1038 R14: 00007fe2095a0fa0 R15: 00007ffd83e8bcb8 [ 399.415144][T15123] FAULT_INJECTION: forcing a failure. [ 399.415144][T15123] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 399.428292][T15123] CPU: 1 PID: 15123 Comm: syz.6.4183 Tainted: G W syzkaller #0 [ 399.437510][T15123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 399.448062][T15123] Call Trace: [ 399.451578][T15123] __dump_stack+0x21/0x24 [ 399.455939][T15123] dump_stack_lvl+0x169/0x1d8 [ 399.460639][T15123] ? thaw_kernel_threads+0x220/0x220 [ 399.466124][T15123] ? show_regs_print_info+0x18/0x18 [ 399.471362][T15123] dump_stack+0x15/0x1c [ 399.475612][T15123] should_fail+0x3c1/0x510 [ 399.480376][T15123] should_fail_usercopy+0x1a/0x20 [ 399.485426][T15123] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 399.491629][T15123] generic_perform_write+0x326/0x510 [ 399.496940][T15123] ? grab_cache_page_write_begin+0xb0/0xb0 [ 399.502855][T15123] ? file_remove_privs+0x580/0x580 [ 399.508106][T15123] ? __fsnotify_parent+0x5f5/0x6c0 [ 399.513752][T15123] ? __kasan_check_write+0x14/0x20 [ 399.518975][T15123] ? down_write+0xac/0x110 [ 399.523493][T15123] __generic_file_write_iter+0x24b/0x480 [ 399.529148][T15123] ? generic_write_checks+0x3d4/0x480 [ 399.534732][T15123] generic_file_write_iter+0xa9/0x1d0 [ 399.540192][T15123] vfs_write+0x725/0xd60 [ 399.544461][T15123] ? __bpf_trace_kmem_free+0x6f/0x90 [ 399.549845][T15123] ? kernel_write+0x3c0/0x3c0 [ 399.554518][T15123] ? mutex_trylock+0xa0/0xa0 [ 399.559276][T15123] ? __fget_files+0x2c4/0x320 [ 399.563951][T15123] ? __fdget_pos+0x2d2/0x380 [ 399.568637][T15123] ? ksys_write+0x71/0x240 [ 399.573053][T15123] ksys_write+0x140/0x240 [ 399.577383][T15123] ? __ia32_sys_read+0x90/0x90 [ 399.582143][T15123] ? debug_smp_processor_id+0x17/0x20 [ 399.587514][T15123] __x64_sys_write+0x7b/0x90 [ 399.592103][T15123] do_syscall_64+0x31/0x40 [ 399.596516][T15123] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 399.602484][T15123] RIP: 0033:0x7fe209359c29 [ 399.606984][T15123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 399.626710][T15123] RSP: 002b:00007fe207dc2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 399.635146][T15123] RAX: ffffffffffffffda RBX: 00007fe2095a0fa0 RCX: 00007fe209359c29 [ 399.643137][T15123] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 399.651301][T15123] RBP: 00007fe207dc2090 R08: 0000000000000000 R09: 0000000000000000 [ 399.659503][T15123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 399.667490][T15123] R13: 00007fe2095a1038 R14: 00007fe2095a0fa0 R15: 00007ffd83e8bcb8 [ 400.138776][T15171] FAULT_INJECTION: forcing a failure. [ 400.138776][T15171] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 400.152079][T15171] CPU: 1 PID: 15171 Comm: syz.9.4204 Tainted: G W syzkaller #0 [ 400.161000][T15171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 400.171161][T15171] Call Trace: [ 400.174472][T15171] __dump_stack+0x21/0x24 [ 400.178807][T15171] dump_stack_lvl+0x169/0x1d8 [ 400.183585][T15171] ? thaw_kernel_threads+0x220/0x220 [ 400.188931][T15171] ? show_regs_print_info+0x18/0x18 [ 400.194235][T15171] dump_stack+0x15/0x1c [ 400.198420][T15171] should_fail+0x3c1/0x510 [ 400.202849][T15171] should_fail_usercopy+0x1a/0x20 [ 400.207887][T15171] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 400.213967][T15171] generic_perform_write+0x326/0x510 [ 400.219370][T15171] ? atime_needs_update+0x5b0/0x5b0 [ 400.224570][T15171] ? grab_cache_page_write_begin+0xb0/0xb0 [ 400.230478][T15171] ? file_remove_privs+0x580/0x580 [ 400.235587][T15171] ? __fsnotify_parent+0x5f5/0x6c0 [ 400.240692][T15171] ? __kasan_check_write+0x14/0x20 [ 400.245838][T15171] ? down_write+0xac/0x110 [ 400.250343][T15171] __generic_file_write_iter+0x24b/0x480 [ 400.255966][T15171] ? generic_write_checks+0x3d4/0x480 [ 400.261341][T15171] generic_file_write_iter+0xa9/0x1d0 [ 400.266743][T15171] vfs_write+0x725/0xd60 [ 400.270983][T15171] ? kernel_write+0x3c0/0x3c0 [ 400.275753][T15171] ? mutex_trylock+0xa0/0xa0 [ 400.280423][T15171] ? __fget_files+0x2c4/0x320 [ 400.285098][T15171] ? __fdget_pos+0x2d2/0x380 [ 400.289817][T15171] ? ksys_write+0x71/0x240 [ 400.294315][T15171] ksys_write+0x140/0x240 [ 400.298732][T15171] ? __ia32_sys_read+0x90/0x90 [ 400.303508][T15171] ? debug_smp_processor_id+0x17/0x20 [ 400.309138][T15171] __x64_sys_write+0x7b/0x90 [ 400.314073][T15171] do_syscall_64+0x31/0x40 [ 400.318486][T15171] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 400.324370][T15171] RIP: 0033:0x7f012d400c29 [ 400.328835][T15171] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 400.348625][T15171] RSP: 002b:00007f012be69038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 400.357036][T15171] RAX: ffffffffffffffda RBX: 00007f012d647fa0 RCX: 00007f012d400c29 [ 400.365236][T15171] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 400.373312][T15171] RBP: 00007f012be69090 R08: 0000000000000000 R09: 0000000000000000 [ 400.381399][T15171] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 400.389369][T15171] R13: 00007f012d648038 R14: 00007f012d647fa0 R15: 00007ffde85e3d58 [ 400.523790][T15182] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 400.544090][T15182] syzkaller0: linktype set to 1 [ 400.574384][T15182] syzkaller0: tun_chr_ioctl cmd 35108 [ 400.685270][T15182] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 401.050651][T15211] device syzkaller0 entered promiscuous mode [ 401.540964][T15218] device syzkaller0 entered promiscuous mode [ 401.860587][T15234] FAULT_INJECTION: forcing a failure. [ 401.860587][T15234] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 401.873811][T15234] CPU: 1 PID: 15234 Comm: syz.5.4222 Tainted: G W syzkaller #0 [ 401.882769][T15234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 401.893221][T15234] Call Trace: [ 401.896547][T15234] __dump_stack+0x21/0x24 [ 401.900918][T15234] dump_stack_lvl+0x169/0x1d8 [ 401.905646][T15234] ? thaw_kernel_threads+0x220/0x220 [ 401.910925][T15234] ? show_regs_print_info+0x18/0x18 [ 401.916209][T15234] dump_stack+0x15/0x1c [ 401.920371][T15234] should_fail+0x3c1/0x510 [ 401.924984][T15234] should_fail_usercopy+0x1a/0x20 [ 401.930002][T15234] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 401.936158][T15234] generic_perform_write+0x326/0x510 [ 401.941438][T15234] ? grab_cache_page_write_begin+0xb0/0xb0 [ 401.947280][T15234] ? file_remove_privs+0x580/0x580 [ 401.952383][T15234] ? __fsnotify_parent+0x5f5/0x6c0 [ 401.957488][T15234] ? __kasan_check_write+0x14/0x20 [ 401.962608][T15234] ? down_write+0xac/0x110 [ 401.967020][T15234] __generic_file_write_iter+0x24b/0x480 [ 401.972669][T15234] ? generic_write_checks+0x3d4/0x480 [ 401.978042][T15234] generic_file_write_iter+0xa9/0x1d0 [ 401.983609][T15234] vfs_write+0x725/0xd60 [ 401.988157][T15234] ? kernel_write+0x3c0/0x3c0 [ 401.993197][T15234] ? mutex_trylock+0xa0/0xa0 [ 401.997882][T15234] ? __fget_files+0x2c4/0x320 [ 402.002791][T15234] ? __fdget_pos+0x2d2/0x380 [ 402.007572][T15234] ? ksys_write+0x71/0x240 [ 402.012061][T15234] ksys_write+0x140/0x240 [ 402.016453][T15234] ? __ia32_sys_read+0x90/0x90 [ 402.021263][T15234] ? __bpf_trace_sys_enter+0x62/0x70 [ 402.026552][T15234] __x64_sys_write+0x7b/0x90 [ 402.031158][T15234] do_syscall_64+0x31/0x40 [ 402.035668][T15234] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 402.041564][T15234] RIP: 0033:0x7fc5daab8c29 [ 402.046082][T15234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 402.066374][T15234] RSP: 002b:00007fc5d9521038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 402.074970][T15234] RAX: ffffffffffffffda RBX: 00007fc5dacfffa0 RCX: 00007fc5daab8c29 [ 402.082941][T15234] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 402.091105][T15234] RBP: 00007fc5d9521090 R08: 0000000000000000 R09: 0000000000000000 [ 402.099248][T15234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 402.107216][T15234] R13: 00007fc5dad00038 R14: 00007fc5dacfffa0 R15: 00007ffdaa39e2f8 [ 402.538523][T15275] device pim6reg1 entered promiscuous mode [ 402.638658][T15277] FAULT_INJECTION: forcing a failure. [ 402.638658][T15277] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 402.651919][T15277] CPU: 1 PID: 15277 Comm: syz.8.4237 Tainted: G W syzkaller #0 [ 402.660891][T15277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 402.671046][T15277] Call Trace: [ 402.674356][T15277] __dump_stack+0x21/0x24 [ 402.679022][T15277] dump_stack_lvl+0x169/0x1d8 [ 402.683737][T15277] ? thaw_kernel_threads+0x220/0x220 [ 402.689211][T15277] ? show_regs_print_info+0x18/0x18 [ 402.694526][T15277] dump_stack+0x15/0x1c [ 402.698714][T15277] should_fail+0x3c1/0x510 [ 402.703238][T15277] should_fail_usercopy+0x1a/0x20 [ 402.708381][T15277] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 402.714473][T15277] generic_perform_write+0x326/0x510 [ 402.719780][T15277] ? atime_needs_update+0x5b0/0x5b0 [ 402.725002][T15277] ? grab_cache_page_write_begin+0xb0/0xb0 [ 402.730978][T15277] ? file_remove_privs+0x580/0x580 [ 402.736116][T15277] ? __fsnotify_parent+0x5f5/0x6c0 [ 402.741340][T15277] ? __kasan_check_write+0x14/0x20 [ 402.746640][T15277] ? down_write+0xac/0x110 [ 402.751875][T15277] __generic_file_write_iter+0x24b/0x480 [ 402.757618][T15277] ? generic_write_checks+0x3d4/0x480 [ 402.763211][T15277] generic_file_write_iter+0xa9/0x1d0 [ 402.768599][T15277] vfs_write+0x725/0xd60 [ 402.773002][T15277] ? __kasan_slab_free+0x11/0x20 [ 402.777960][T15277] ? kernel_write+0x3c0/0x3c0 [ 402.783024][T15277] ? mutex_trylock+0xa0/0xa0 [ 402.787749][T15277] ? __fget_files+0x2c4/0x320 [ 402.792647][T15277] ? __fdget_pos+0x2d2/0x380 [ 402.797529][T15277] ? ksys_write+0x71/0x240 [ 402.802245][T15277] ksys_write+0x140/0x240 [ 402.806965][T15277] ? __ia32_sys_read+0x90/0x90 [ 402.811830][T15277] ? debug_smp_processor_id+0x17/0x20 [ 402.817316][T15277] __x64_sys_write+0x7b/0x90 [ 402.822019][T15277] do_syscall_64+0x31/0x40 [ 402.826485][T15277] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 402.832601][T15277] RIP: 0033:0x7f158cffac29 [ 402.837032][T15277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 402.856983][T15277] RSP: 002b:00007f158ba63038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 402.865561][T15277] RAX: ffffffffffffffda RBX: 00007f158d241fa0 RCX: 00007f158cffac29 [ 402.873769][T15277] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 402.881770][T15277] RBP: 00007f158ba63090 R08: 0000000000000000 R09: 0000000000000000 [ 402.889974][T15277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 402.898184][T15277] R13: 00007f158d242038 R14: 00007f158d241fa0 R15: 00007ffd55235ce8 [ 403.733547][T15318] FAULT_INJECTION: forcing a failure. [ 403.733547][T15318] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 403.747554][T15318] CPU: 0 PID: 15318 Comm: syz.7.4250 Tainted: G W syzkaller #0 [ 403.756935][T15318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 403.767127][T15318] Call Trace: [ 403.770441][T15318] __dump_stack+0x21/0x24 [ 403.774875][T15318] dump_stack_lvl+0x169/0x1d8 [ 403.779832][T15318] ? thaw_kernel_threads+0x220/0x220 [ 403.785241][T15318] ? show_regs_print_info+0x18/0x18 [ 403.790503][T15318] dump_stack+0x15/0x1c [ 403.794680][T15318] should_fail+0x3c1/0x510 [ 403.799234][T15318] should_fail_usercopy+0x1a/0x20 [ 403.804365][T15318] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 403.810686][T15318] generic_perform_write+0x326/0x510 [ 403.816206][T15318] ? atime_needs_update+0x5b0/0x5b0 [ 403.821635][T15318] ? grab_cache_page_write_begin+0xb0/0xb0 [ 403.827656][T15318] ? file_remove_privs+0x580/0x580 [ 403.832796][T15318] ? __fsnotify_parent+0x5f5/0x6c0 [ 403.837929][T15318] ? __kasan_check_write+0x14/0x20 [ 403.843060][T15318] ? down_write+0xac/0x110 [ 403.847506][T15318] __generic_file_write_iter+0x24b/0x480 [ 403.853160][T15318] ? generic_write_checks+0x3d4/0x480 [ 403.858657][T15318] generic_file_write_iter+0xa9/0x1d0 [ 403.864150][T15318] vfs_write+0x725/0xd60 [ 403.868541][T15318] ? __bpf_trace_kmem_free+0x6f/0x90 [ 403.873843][T15318] ? kernel_write+0x3c0/0x3c0 [ 403.878927][T15318] ? mutex_trylock+0xa0/0xa0 [ 403.883630][T15318] ? __fget_files+0x2c4/0x320 [ 403.888333][T15318] ? __fdget_pos+0x2d2/0x380 [ 403.892953][T15318] ? ksys_write+0x71/0x240 [ 403.897436][T15318] ksys_write+0x140/0x240 [ 403.901782][T15318] ? __ia32_sys_read+0x90/0x90 [ 403.906627][T15318] ? debug_smp_processor_id+0x17/0x20 [ 403.912134][T15318] __x64_sys_write+0x7b/0x90 [ 403.916754][T15318] do_syscall_64+0x31/0x40 [ 403.921188][T15318] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 403.927125][T15318] RIP: 0033:0x7f70f70d7c29 [ 403.931729][T15318] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 403.951692][T15318] RSP: 002b:00007f70f5b40038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 403.960103][T15318] RAX: ffffffffffffffda RBX: 00007f70f731efa0 RCX: 00007f70f70d7c29 [ 403.968213][T15318] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 403.976283][T15318] RBP: 00007f70f5b40090 R08: 0000000000000000 R09: 0000000000000000 [ 403.984343][T15318] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 403.992854][T15318] R13: 00007f70f731f038 R14: 00007f70f731efa0 R15: 00007ffed2193078 [ 404.135753][T15335] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.142947][T15335] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.172791][T15335] device bridge0 left promiscuous mode [ 404.421943][T15343] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.430464][T15343] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.440797][T15343] device bridge_slave_0 entered promiscuous mode [ 404.476205][T15343] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.483510][T15343] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.535128][T15343] device bridge_slave_1 entered promiscuous mode [ 405.058345][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 405.086608][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 405.180614][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 405.190185][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 405.203391][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.210536][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 405.239373][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 405.248363][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 405.257381][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.264482][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 405.323041][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 405.331251][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 405.342189][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 405.384540][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 405.433646][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 405.456233][T15412] device pim6reg1 entered promiscuous mode [ 405.510763][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 405.522753][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 405.538890][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 405.548173][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 405.557480][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 405.565279][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 405.574655][T15343] device veth0_vlan entered promiscuous mode [ 405.589319][T15343] device veth1_macvtap entered promiscuous mode [ 405.601417][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 405.611184][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 405.620373][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 405.647541][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 405.656379][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 405.673861][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 405.682786][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 406.298453][T15446] device syzkaller0 entered promiscuous mode [ 406.643283][T15460] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 406.680742][T15460] device syzkaller0 entered promiscuous mode [ 406.994995][T15493] bridge0: port 2(bridge_slave_1) entered blocking state [ 407.002300][T15493] bridge0: port 2(bridge_slave_1) entered forwarding state [ 407.009925][T15493] bridge0: port 1(bridge_slave_0) entered blocking state [ 407.017495][T15493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 407.026350][T15493] device bridge0 entered promiscuous mode [ 407.165411][T15504] FAULT_INJECTION: forcing a failure. [ 407.165411][T15504] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 407.178773][T15504] CPU: 0 PID: 15504 Comm: syz.8.4304 Tainted: G W syzkaller #0 [ 407.187663][T15504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 407.197839][T15504] Call Trace: [ 407.201251][T15504] __dump_stack+0x21/0x24 [ 407.205637][T15504] dump_stack_lvl+0x169/0x1d8 [ 407.210348][T15504] ? thaw_kernel_threads+0x220/0x220 [ 407.215667][T15504] ? show_regs_print_info+0x18/0x18 [ 407.220887][T15504] dump_stack+0x15/0x1c [ 407.225047][T15504] should_fail+0x3c1/0x510 [ 407.229470][T15504] should_fail_usercopy+0x1a/0x20 [ 407.234507][T15504] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 407.240675][T15504] generic_perform_write+0x326/0x510 [ 407.246153][T15504] ? grab_cache_page_write_begin+0xb0/0xb0 [ 407.251971][T15504] ? file_remove_privs+0x580/0x580 [ 407.257188][T15504] ? __fsnotify_parent+0x5f5/0x6c0 [ 407.262305][T15504] ? __kasan_check_write+0x14/0x20 [ 407.267503][T15504] ? down_write+0xac/0x110 [ 407.271920][T15504] __generic_file_write_iter+0x24b/0x480 [ 407.277551][T15504] ? generic_write_checks+0x3d4/0x480 [ 407.282941][T15504] generic_file_write_iter+0xa9/0x1d0 [ 407.288332][T15504] vfs_write+0x725/0xd60 [ 407.292587][T15504] ? kernel_write+0x3c0/0x3c0 [ 407.297285][T15504] ? mutex_trylock+0xa0/0xa0 [ 407.302262][T15504] ? __fget_files+0x2c4/0x320 [ 407.307049][T15504] ? __fdget_pos+0x2d2/0x380 [ 407.311831][T15504] ? ksys_write+0x71/0x240 [ 407.316241][T15504] ksys_write+0x140/0x240 [ 407.320569][T15504] ? __ia32_sys_read+0x90/0x90 [ 407.325434][T15504] ? __traceiter_sys_enter+0x2e/0x50 [ 407.330715][T15504] __x64_sys_write+0x7b/0x90 [ 407.335496][T15504] do_syscall_64+0x31/0x40 [ 407.340019][T15504] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 407.345916][T15504] RIP: 0033:0x7f158cffac29 [ 407.350442][T15504] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 407.370380][T15504] RSP: 002b:00007f158ba63038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 407.378894][T15504] RAX: ffffffffffffffda RBX: 00007f158d241fa0 RCX: 00007f158cffac29 [ 407.386949][T15504] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 407.395009][T15504] RBP: 00007f158ba63090 R08: 0000000000000000 R09: 0000000000000000 [ 407.402975][T15504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 407.411153][T15504] R13: 00007f158d242038 R14: 00007f158d241fa0 R15: 00007ffd55235ce8 [ 407.838433][T15538] FAULT_INJECTION: forcing a failure. [ 407.838433][T15538] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 407.852105][T15538] CPU: 0 PID: 15538 Comm: syz.9.4315 Tainted: G W syzkaller #0 [ 407.860969][T15538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 407.871262][T15538] Call Trace: [ 407.874596][T15538] __dump_stack+0x21/0x24 [ 407.878955][T15538] dump_stack_lvl+0x169/0x1d8 [ 407.883825][T15538] ? thaw_kernel_threads+0x220/0x220 [ 407.889401][T15538] ? show_regs_print_info+0x18/0x18 [ 407.894707][T15538] dump_stack+0x15/0x1c [ 407.898988][T15538] should_fail+0x3c1/0x510 [ 407.903427][T15538] should_fail_usercopy+0x1a/0x20 [ 407.908529][T15538] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 407.914796][T15538] generic_perform_write+0x326/0x510 [ 407.920115][T15538] ? atime_needs_update+0x5b0/0x5b0 [ 407.925338][T15538] ? grab_cache_page_write_begin+0xb0/0xb0 [ 407.931169][T15538] ? file_remove_privs+0x580/0x580 [ 407.936282][T15538] ? __fsnotify_parent+0x5f5/0x6c0 [ 407.941476][T15538] ? __kasan_check_write+0x14/0x20 [ 407.946589][T15538] ? down_write+0xac/0x110 [ 407.951000][T15538] __generic_file_write_iter+0x24b/0x480 [ 407.956651][T15538] ? generic_write_checks+0x3d4/0x480 [ 407.962044][T15538] generic_file_write_iter+0xa9/0x1d0 [ 407.967497][T15538] vfs_write+0x725/0xd60 [ 407.971734][T15538] ? __kasan_slab_free+0x11/0x20 [ 407.976673][T15538] ? kernel_write+0x3c0/0x3c0 [ 407.981348][T15538] ? mutex_trylock+0xa0/0xa0 [ 407.986221][T15538] ? __fget_files+0x2c4/0x320 [ 407.991140][T15538] ? __fdget_pos+0x2d2/0x380 [ 407.996599][T15538] ? ksys_write+0x71/0x240 [ 408.001294][T15538] ksys_write+0x140/0x240 [ 408.005640][T15538] ? __ia32_sys_read+0x90/0x90 [ 408.010415][T15538] ? debug_smp_processor_id+0x17/0x20 [ 408.015975][T15538] __x64_sys_write+0x7b/0x90 [ 408.020559][T15538] do_syscall_64+0x31/0x40 [ 408.025057][T15538] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 408.031120][T15538] RIP: 0033:0x7f411d089c29 [ 408.035554][T15538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 408.055417][T15538] RSP: 002b:00007f411baf2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 408.063845][T15538] RAX: ffffffffffffffda RBX: 00007f411d2d0fa0 RCX: 00007f411d089c29 [ 408.071899][T15538] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 408.079879][T15538] RBP: 00007f411baf2090 R08: 0000000000000000 R09: 0000000000000000 [ 408.087878][T15538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 408.095850][T15538] R13: 00007f411d2d1038 R14: 00007f411d2d0fa0 R15: 00007ffc94d0fe68 [ 408.118607][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 408.583470][T15564] device syzkaller0 entered promiscuous mode [ 408.641764][T15570] FAULT_INJECTION: forcing a failure. [ 408.641764][T15570] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 408.655243][T15570] CPU: 0 PID: 15570 Comm: syz.7.4326 Tainted: G W syzkaller #0 [ 408.664286][T15570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 408.674393][T15570] Call Trace: [ 408.677713][T15570] __dump_stack+0x21/0x24 [ 408.682068][T15570] dump_stack_lvl+0x169/0x1d8 [ 408.686872][T15570] ? thaw_kernel_threads+0x220/0x220 [ 408.692342][T15570] ? show_regs_print_info+0x18/0x18 [ 408.697555][T15570] dump_stack+0x15/0x1c [ 408.702413][T15570] should_fail+0x3c1/0x510 [ 408.706956][T15570] should_fail_usercopy+0x1a/0x20 [ 408.712032][T15570] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 408.718317][T15570] generic_perform_write+0x326/0x510 [ 408.724142][T15570] ? atime_needs_update+0x5b0/0x5b0 [ 408.729480][T15570] ? grab_cache_page_write_begin+0xb0/0xb0 [ 408.735337][T15570] ? file_remove_privs+0x580/0x580 [ 408.740551][T15570] ? __fsnotify_parent+0x5f5/0x6c0 [ 408.745768][T15570] ? __kasan_check_write+0x14/0x20 [ 408.750904][T15570] ? down_write+0xac/0x110 [ 408.755625][T15570] __generic_file_write_iter+0x24b/0x480 [ 408.761469][T15570] ? generic_write_checks+0x3d4/0x480 [ 408.766910][T15570] generic_file_write_iter+0xa9/0x1d0 [ 408.772342][T15570] vfs_write+0x725/0xd60 [ 408.777045][T15570] ? __bpf_trace_kmem_free+0x6f/0x90 [ 408.782355][T15570] ? kernel_write+0x3c0/0x3c0 [ 408.787226][T15570] ? mutex_trylock+0xa0/0xa0 [ 408.791984][T15570] ? __fget_files+0x2c4/0x320 [ 408.796688][T15570] ? __fdget_pos+0x2d2/0x380 [ 408.801300][T15570] ? ksys_write+0x71/0x240 [ 408.805860][T15570] ksys_write+0x140/0x240 [ 408.810316][T15570] ? __ia32_sys_read+0x90/0x90 [ 408.815208][T15570] ? debug_smp_processor_id+0x17/0x20 [ 408.820599][T15570] __x64_sys_write+0x7b/0x90 [ 408.825293][T15570] do_syscall_64+0x31/0x40 [ 408.829833][T15570] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 408.835839][T15570] RIP: 0033:0x7f70f70d7c29 [ 408.840369][T15570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 408.860696][T15570] RSP: 002b:00007f70f5b40038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 408.869764][T15570] RAX: ffffffffffffffda RBX: 00007f70f731efa0 RCX: 00007f70f70d7c29 [ 408.877761][T15570] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 408.885752][T15570] RBP: 00007f70f5b40090 R08: 0000000000000000 R09: 0000000000000000 [ 408.893749][T15570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 408.901833][T15570] R13: 00007f70f731f038 R14: 00007f70f731efa0 R15: 00007ffed2193078 [ 409.485215][T15610] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 409.499565][T15616] FAULT_INJECTION: forcing a failure. [ 409.499565][T15616] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 409.512808][T15616] CPU: 1 PID: 15616 Comm: syz.5.4342 Tainted: G W syzkaller #0 [ 409.522041][T15616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 409.525332][T15610] device syzkaller0 entered promiscuous mode [ 409.532237][T15616] Call Trace: [ 409.541511][T15616] __dump_stack+0x21/0x24 [ 409.545949][T15616] dump_stack_lvl+0x169/0x1d8 [ 409.550800][T15616] ? thaw_kernel_threads+0x220/0x220 [ 409.556369][T15616] ? show_regs_print_info+0x18/0x18 [ 409.561645][T15616] dump_stack+0x15/0x1c [ 409.565857][T15616] should_fail+0x3c1/0x510 [ 409.570277][T15616] should_fail_usercopy+0x1a/0x20 [ 409.575414][T15616] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 409.581502][T15616] generic_perform_write+0x326/0x510 [ 409.586825][T15616] ? atime_needs_update+0x5b0/0x5b0 [ 409.592592][T15616] ? grab_cache_page_write_begin+0xb0/0xb0 [ 409.598433][T15616] ? file_remove_privs+0x580/0x580 [ 409.603570][T15616] ? __fsnotify_parent+0x5f5/0x6c0 [ 409.608846][T15616] ? __kasan_check_write+0x14/0x20 [ 409.613960][T15616] ? down_write+0xac/0x110 [ 409.618373][T15616] __generic_file_write_iter+0x24b/0x480 [ 409.624013][T15616] ? generic_write_checks+0x3d4/0x480 [ 409.629676][T15616] generic_file_write_iter+0xa9/0x1d0 [ 409.635399][T15616] vfs_write+0x725/0xd60 [ 409.640255][T15616] ? __kasan_slab_free+0x11/0x20 [ 409.645861][T15616] ? kernel_write+0x3c0/0x3c0 [ 409.650546][T15616] ? mutex_trylock+0xa0/0xa0 [ 409.655156][T15616] ? __fget_files+0x2c4/0x320 [ 409.659839][T15616] ? __fdget_pos+0x2d2/0x380 [ 409.664422][T15616] ? ksys_write+0x71/0x240 [ 409.668864][T15616] ksys_write+0x140/0x240 [ 409.673204][T15616] ? __ia32_sys_read+0x90/0x90 [ 409.678000][T15616] ? debug_smp_processor_id+0x17/0x20 [ 409.683374][T15616] __x64_sys_write+0x7b/0x90 [ 409.688098][T15616] do_syscall_64+0x31/0x40 [ 409.692610][T15616] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 409.698604][T15616] RIP: 0033:0x7fc5daab8c29 [ 409.703055][T15616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 409.722847][T15616] RSP: 002b:00007fc5d9521038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 409.731544][T15616] RAX: ffffffffffffffda RBX: 00007fc5dacfffa0 RCX: 00007fc5daab8c29 [ 409.739802][T15616] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 409.748024][T15616] RBP: 00007fc5d9521090 R08: 0000000000000000 R09: 0000000000000000 [ 409.756137][T15616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 409.764296][T15616] R13: 00007fc5dad00038 R14: 00007fc5dacfffa0 R15: 00007ffdaa39e2f8 [ 410.169142][T15663] FAULT_INJECTION: forcing a failure. [ 410.169142][T15663] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 410.182560][T15663] CPU: 1 PID: 15663 Comm: syz.6.4355 Tainted: G W syzkaller #0 [ 410.191727][T15663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 410.201918][T15663] Call Trace: [ 410.205227][T15663] __dump_stack+0x21/0x24 [ 410.209699][T15663] dump_stack_lvl+0x169/0x1d8 [ 410.214413][T15663] ? thaw_kernel_threads+0x220/0x220 [ 410.219884][T15663] ? show_regs_print_info+0x18/0x18 [ 410.226148][T15663] dump_stack+0x15/0x1c [ 410.230456][T15663] should_fail+0x3c1/0x510 [ 410.234902][T15663] should_fail_usercopy+0x1a/0x20 [ 410.240187][T15663] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 410.246688][T15663] generic_perform_write+0x326/0x510 [ 410.252029][T15663] ? grab_cache_page_write_begin+0xb0/0xb0 [ 410.258129][T15663] ? file_remove_privs+0x580/0x580 [ 410.263247][T15663] ? irq_exit_rcu+0x9/0x10 [ 410.268310][T15663] ? __kasan_check_write+0x14/0x20 [ 410.273574][T15663] ? down_write+0xac/0x110 [ 410.278006][T15663] __generic_file_write_iter+0x24b/0x480 [ 410.283782][T15663] ? generic_write_checks+0x3d4/0x480 [ 410.289399][T15663] generic_file_write_iter+0xa9/0x1d0 [ 410.294896][T15663] vfs_write+0x725/0xd60 [ 410.299167][T15663] ? kernel_write+0x3c0/0x3c0 [ 410.304233][T15663] ? bpf_send_signal_common+0x2b2/0x420 [ 410.309994][T15663] ? mutex_trylock+0xa0/0xa0 [ 410.314604][T15663] ? __fget_files+0x2c4/0x320 [ 410.319402][T15663] ? __fdget_pos+0x2d2/0x380 [ 410.324018][T15663] ? ksys_write+0x71/0x240 [ 410.328473][T15663] ksys_write+0x140/0x240 [ 410.333016][T15663] ? __ia32_sys_read+0x90/0x90 [ 410.337859][T15663] ? debug_smp_processor_id+0x17/0x20 [ 410.343342][T15663] __x64_sys_write+0x7b/0x90 [ 410.348165][T15663] do_syscall_64+0x31/0x40 [ 410.352705][T15663] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 410.358616][T15663] RIP: 0033:0x7fe209359c29 [ 410.363064][T15663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 410.382989][T15663] RSP: 002b:00007fe207dc2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 410.391429][T15663] RAX: ffffffffffffffda RBX: 00007fe2095a0fa0 RCX: 00007fe209359c29 [ 410.399528][T15663] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 410.407613][T15663] RBP: 00007fe207dc2090 R08: 0000000000000000 R09: 0000000000000000 [ 410.415800][T15663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 410.423793][T15663] R13: 00007fe2095a1038 R14: 00007fe2095a0fa0 R15: 00007ffd83e8bcb8 [ 411.038939][ T2901] syzkaller0: tun_net_xmit 76 [ 411.043909][ T2901] syzkaller0: tun_net_xmit 48 [ 411.054503][T15690] syzkaller0: create flow: hash 2739695655 index 1 [ 411.064435][ C0] syzkaller0: tun_net_xmit 76 [ 411.064878][T15697] FAULT_INJECTION: forcing a failure. [ 411.064878][T15697] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 411.082472][T15697] CPU: 1 PID: 15697 Comm: syz.7.4369 Tainted: G W syzkaller #0 [ 411.092102][T15697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 411.102481][T15697] Call Trace: [ 411.105886][T15697] __dump_stack+0x21/0x24 [ 411.110229][T15697] dump_stack_lvl+0x169/0x1d8 [ 411.114947][T15697] ? thaw_kernel_threads+0x220/0x220 [ 411.120243][T15697] ? show_regs_print_info+0x18/0x18 [ 411.125680][T15697] dump_stack+0x15/0x1c [ 411.129931][T15697] should_fail+0x3c1/0x510 [ 411.134360][T15697] should_fail_usercopy+0x1a/0x20 [ 411.139495][T15697] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 411.145688][T15697] generic_perform_write+0x326/0x510 [ 411.151083][T15697] ? grab_cache_page_write_begin+0xb0/0xb0 [ 411.157257][T15697] ? file_remove_privs+0x580/0x580 [ 411.162563][T15697] ? __fsnotify_parent+0x5f5/0x6c0 [ 411.167878][T15697] ? __kasan_check_write+0x14/0x20 [ 411.173094][T15697] ? down_write+0xac/0x110 [ 411.177615][T15697] __generic_file_write_iter+0x24b/0x480 [ 411.183344][T15697] ? generic_write_checks+0x3d4/0x480 [ 411.188866][T15697] generic_file_write_iter+0xa9/0x1d0 [ 411.194261][T15697] vfs_write+0x725/0xd60 [ 411.198667][T15697] ? __bpf_trace_kmem_free+0x6f/0x90 [ 411.204049][T15697] ? kernel_write+0x3c0/0x3c0 [ 411.208771][T15697] ? mutex_trylock+0xa0/0xa0 [ 411.213460][T15697] ? __fget_files+0x2c4/0x320 [ 411.218255][T15697] ? __fdget_pos+0x2d2/0x380 [ 411.222869][T15697] ? ksys_write+0x71/0x240 [ 411.227393][T15697] ksys_write+0x140/0x240 [ 411.231841][T15697] ? __ia32_sys_read+0x90/0x90 [ 411.236956][T15697] ? debug_smp_processor_id+0x17/0x20 [ 411.242343][T15697] __x64_sys_write+0x7b/0x90 [ 411.247042][T15697] do_syscall_64+0x31/0x40 [ 411.251774][T15697] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 411.257856][T15697] RIP: 0033:0x7f70f70d7c29 [ 411.262290][T15697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 411.282104][T15697] RSP: 002b:00007f70f5b40038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 411.290919][T15697] RAX: ffffffffffffffda RBX: 00007f70f731efa0 RCX: 00007f70f70d7c29 [ 411.299178][T15697] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 411.307765][T15697] RBP: 00007f70f5b40090 R08: 0000000000000000 R09: 0000000000000000 [ 411.315777][T15697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 411.324115][T15697] R13: 00007f70f731f038 R14: 00007f70f731efa0 R15: 00007ffed2193078 [ 411.341320][T15688] syzkaller0: delete flow: hash 2739695655 index 1 [ 411.863685][T15743] FAULT_INJECTION: forcing a failure. [ 411.863685][T15743] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 411.877174][T15743] CPU: 0 PID: 15743 Comm: syz.7.4384 Tainted: G W syzkaller #0 [ 411.886141][T15743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 411.896319][T15743] Call Trace: [ 411.899635][T15743] __dump_stack+0x21/0x24 [ 411.903980][T15743] dump_stack_lvl+0x169/0x1d8 [ 411.908693][T15743] ? thaw_kernel_threads+0x220/0x220 [ 411.914124][T15743] ? show_regs_print_info+0x18/0x18 [ 411.919532][T15743] dump_stack+0x15/0x1c [ 411.923731][T15743] should_fail+0x3c1/0x510 [ 411.928470][T15743] should_fail_usercopy+0x1a/0x20 [ 411.933526][T15743] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 411.940130][T15743] generic_perform_write+0x326/0x510 [ 411.945471][T15743] ? grab_cache_page_write_begin+0xb0/0xb0 [ 411.951324][T15743] ? file_remove_privs+0x580/0x580 [ 411.956460][T15743] ? __fsnotify_parent+0x5f5/0x6c0 [ 411.961703][T15743] ? __kasan_check_write+0x14/0x20 [ 411.966845][T15743] ? down_write+0xac/0x110 [ 411.971296][T15743] __generic_file_write_iter+0x24b/0x480 [ 411.976965][T15743] ? generic_write_checks+0x3d4/0x480 [ 411.982367][T15743] generic_file_write_iter+0xa9/0x1d0 [ 411.987932][T15743] vfs_write+0x725/0xd60 [ 411.992540][T15743] ? __bpf_trace_kmem_free+0x6f/0x90 [ 411.998257][T15743] ? kernel_write+0x3c0/0x3c0 [ 412.002942][T15743] ? mutex_trylock+0xa0/0xa0 [ 412.007702][T15743] ? __fget_files+0x2c4/0x320 [ 412.012403][T15743] ? __fdget_pos+0x2d2/0x380 [ 412.017198][T15743] ? ksys_write+0x71/0x240 [ 412.021756][T15743] ksys_write+0x140/0x240 [ 412.026423][T15743] ? __ia32_sys_read+0x90/0x90 [ 412.031196][T15743] ? debug_smp_processor_id+0x17/0x20 [ 412.036583][T15743] __x64_sys_write+0x7b/0x90 [ 412.041378][T15743] do_syscall_64+0x31/0x40 [ 412.045982][T15743] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 412.052561][T15743] RIP: 0033:0x7f70f70d7c29 [ 412.056994][T15743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 412.076712][T15743] RSP: 002b:00007f70f5b40038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 412.085149][T15743] RAX: ffffffffffffffda RBX: 00007f70f731efa0 RCX: 00007f70f70d7c29 [ 412.093121][T15743] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 412.101105][T15743] RBP: 00007f70f5b40090 R08: 0000000000000000 R09: 0000000000000000 [ 412.109078][T15743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 412.117045][T15743] R13: 00007f70f731f038 R14: 00007f70f731efa0 R15: 00007ffed2193078 [ 412.582408][T15773] device syzkaller0 entered promiscuous mode [ 412.983877][T15782] FAULT_INJECTION: forcing a failure. [ 412.983877][T15782] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 412.997648][T15782] CPU: 0 PID: 15782 Comm: syz.5.4396 Tainted: G W syzkaller #0 [ 413.006891][T15782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 413.017068][T15782] Call Trace: [ 413.020442][T15782] __dump_stack+0x21/0x24 [ 413.024798][T15782] dump_stack_lvl+0x169/0x1d8 [ 413.029513][T15782] ? thaw_kernel_threads+0x220/0x220 [ 413.034896][T15782] ? show_regs_print_info+0x18/0x18 [ 413.040098][T15782] dump_stack+0x15/0x1c [ 413.044252][T15782] should_fail+0x3c1/0x510 [ 413.048760][T15782] should_fail_usercopy+0x1a/0x20 [ 413.053909][T15782] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 413.059981][T15782] generic_perform_write+0x326/0x510 [ 413.065705][T15782] ? grab_cache_page_write_begin+0xb0/0xb0 [ 413.071567][T15782] ? file_remove_privs+0x580/0x580 [ 413.076775][T15782] ? __fsnotify_parent+0x5f5/0x6c0 [ 413.082000][T15782] ? __kasan_check_write+0x14/0x20 [ 413.087197][T15782] ? down_write+0xac/0x110 [ 413.091733][T15782] __generic_file_write_iter+0x24b/0x480 [ 413.097482][T15782] ? generic_write_checks+0x3d4/0x480 [ 413.102871][T15782] generic_file_write_iter+0xa9/0x1d0 [ 413.108244][T15782] vfs_write+0x725/0xd60 [ 413.112490][T15782] ? __kasan_slab_free+0x11/0x20 [ 413.117451][T15782] ? kernel_write+0x3c0/0x3c0 [ 413.122131][T15782] ? mutex_trylock+0xa0/0xa0 [ 413.126904][T15782] ? __fget_files+0x2c4/0x320 [ 413.131608][T15782] ? __fdget_pos+0x2d2/0x380 [ 413.136205][T15782] ? ksys_write+0x71/0x240 [ 413.140620][T15782] ksys_write+0x140/0x240 [ 413.144946][T15782] ? __ia32_sys_read+0x90/0x90 [ 413.149795][T15782] ? debug_smp_processor_id+0x17/0x20 [ 413.155253][T15782] __x64_sys_write+0x7b/0x90 [ 413.159850][T15782] do_syscall_64+0x31/0x40 [ 413.164266][T15782] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 413.170153][T15782] RIP: 0033:0x7fc5daab8c29 [ 413.174595][T15782] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 413.194406][T15782] RSP: 002b:00007fc5d9521038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 413.202911][T15782] RAX: ffffffffffffffda RBX: 00007fc5dacfffa0 RCX: 00007fc5daab8c29 [ 413.210882][T15782] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 413.218971][T15782] RBP: 00007fc5d9521090 R08: 0000000000000000 R09: 0000000000000000 [ 413.226939][T15782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 413.234904][T15782] R13: 00007fc5dad00038 R14: 00007fc5dacfffa0 R15: 00007ffdaa39e2f8 [ 413.976694][T15823] FAULT_INJECTION: forcing a failure. [ 413.976694][T15823] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 413.990149][T15823] CPU: 0 PID: 15823 Comm: syz.7.4408 Tainted: G W syzkaller #0 [ 413.999449][T15823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 414.009819][T15823] Call Trace: [ 414.013136][T15823] __dump_stack+0x21/0x24 [ 414.017575][T15823] dump_stack_lvl+0x169/0x1d8 [ 414.022276][T15823] ? thaw_kernel_threads+0x220/0x220 [ 414.027759][T15823] ? show_regs_print_info+0x18/0x18 [ 414.032961][T15823] dump_stack+0x15/0x1c [ 414.037114][T15823] should_fail+0x3c1/0x510 [ 414.041528][T15823] should_fail_usercopy+0x1a/0x20 [ 414.046863][T15823] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 414.052955][T15823] generic_perform_write+0x326/0x510 [ 414.058373][T15823] ? grab_cache_page_write_begin+0xb0/0xb0 [ 414.064200][T15823] ? file_remove_privs+0x580/0x580 [ 414.069324][T15823] ? __fsnotify_parent+0x5f5/0x6c0 [ 414.074461][T15823] ? __kasan_check_write+0x14/0x20 [ 414.079710][T15823] ? down_write+0xac/0x110 [ 414.084146][T15823] __generic_file_write_iter+0x24b/0x480 [ 414.089813][T15823] ? generic_write_checks+0x3d4/0x480 [ 414.095407][T15823] generic_file_write_iter+0xa9/0x1d0 [ 414.100807][T15823] vfs_write+0x725/0xd60 [ 414.105305][T15823] ? kernel_write+0x3c0/0x3c0 [ 414.110003][T15823] ? mutex_trylock+0xa0/0xa0 [ 414.114607][T15823] ? __fget_files+0x2c4/0x320 [ 414.119312][T15823] ? __fdget_pos+0x2d2/0x380 [ 414.123926][T15823] ? ksys_write+0x71/0x240 [ 414.128365][T15823] ksys_write+0x140/0x240 [ 414.132716][T15823] ? __ia32_sys_read+0x90/0x90 [ 414.137624][T15823] ? debug_smp_processor_id+0x17/0x20 [ 414.143105][T15823] __x64_sys_write+0x7b/0x90 [ 414.147727][T15823] do_syscall_64+0x31/0x40 [ 414.152260][T15823] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 414.158265][T15823] RIP: 0033:0x7f70f70d7c29 [ 414.163141][T15823] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 414.183115][T15823] RSP: 002b:00007f70f5b40038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 414.191541][T15823] RAX: ffffffffffffffda RBX: 00007f70f731efa0 RCX: 00007f70f70d7c29 [ 414.199528][T15823] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000007 [ 414.207687][T15823] RBP: 00007f70f5b40090 R08: 0000000000000000 R09: 0000000000000000 [ 414.215743][T15823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 414.223812][T15823] R13: 00007f70f731f038 R14: 00007f70f731efa0 R15: 00007ffed2193078 [ 415.473747][T15854] device syzkaller0 entered promiscuous mode [ 415.662489][T15869] device syzkaller0 entered promiscuous mode [ 416.014328][T15888] device syzkaller0 entered promiscuous mode [ 416.133484][T15899] device syzkaller0 entered promiscuous mode [ 416.179763][T15900] device wg2 entered promiscuous mode [ 416.241556][T15889] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.259565][T15889] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.267622][T15889] device bridge_slave_0 entered promiscuous mode [ 416.538091][T15912] device syzkaller0 entered promiscuous mode [ 416.575711][T15889] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.582889][T15889] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.590775][T15889] device bridge_slave_1 entered promiscuous mode [ 416.745974][T15910] device syzkaller0 entered promiscuous mode [ 417.028320][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 417.036351][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 417.055355][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 417.065215][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 417.073913][T14390] bridge0: port 1(bridge_slave_0) entered blocking state [ 417.081125][T14390] bridge0: port 1(bridge_slave_0) entered forwarding state [ 417.204486][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 417.255114][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 417.294148][T14390] bridge0: port 2(bridge_slave_1) entered blocking state [ 417.301329][T14390] bridge0: port 2(bridge_slave_1) entered forwarding state [ 417.385397][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 417.453530][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 417.550022][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 417.593800][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 417.615344][T15952] bridge0: port 3(veth1) entered blocking state [ 417.621928][T15952] bridge0: port 3(veth1) entered disabled state [ 417.658490][T15952] device veth1 entered promiscuous mode [ 417.725273][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 417.758044][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 417.835349][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 417.852861][T15889] device veth0_vlan entered promiscuous mode [ 417.889375][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 417.898553][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 417.909464][T15889] device veth1_macvtap entered promiscuous mode [ 417.961814][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 417.984410][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 418.004859][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 418.059710][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 418.078021][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 418.222960][T15973] device pim6reg1 entered promiscuous mode [ 418.302093][T15989] device syzkaller0 entered promiscuous mode [ 418.660059][T16010] device pim6reg1 entered promiscuous mode [ 419.079185][ T300] device vlan0 left promiscuous mode [ 419.084733][ T300] GPL: port 1(vlan0) entered disabled state [ 419.135515][ T300] device veth1 left promiscuous mode [ 419.180344][ T300] bridge0: port 3(veth1) entered disabled state [ 419.230432][ T300] device bridge_slave_1 left promiscuous mode [ 419.306140][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.359436][ T300] device bridge_slave_0 left promiscuous mode [ 419.394151][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.453583][ T300] device veth0_vlan left promiscuous mode [ 419.937565][T16046] device syzkaller0 entered promiscuous mode [ 420.360891][T16057] device pim6reg1 entered promiscuous mode [ 420.564383][T16074] device syzkaller0 entered promiscuous mode [ 421.582877][T16155] device sit0 entered promiscuous mode [ 421.863190][T16174] device sit0 left promiscuous mode [ 422.366310][T16211] device pim6reg1 entered promiscuous mode [ 423.477777][T16307] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 424.485718][T16365] syz.5.4566[16365] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.485781][T16365] syz.5.4566[16365] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.892184][T16395] device syzkaller0 entered promiscuous mode [ 425.138693][T16406] syz.8.4579[16406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.138799][T16406] syz.8.4579[16406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.509816][T16431] : port 1(erspan0) entered blocking state [ 425.590354][T16431] : port 1(erspan0) entered disabled state [ 425.605140][T16431] device erspan0 entered promiscuous mode [ 425.615576][T16422] : port 1(erspan0) entered blocking state [ 425.621835][T16422] : port 1(erspan0) entered forwarding state [ 425.964700][T16452] device sit0 entered promiscuous mode [ 426.032644][T16463] syz.8.4599[16463] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.032742][T16463] syz.8.4599[16463] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 427.838122][T16532] device pim6reg1 entered promiscuous mode [ 428.051580][T16553] device wg2 entered promiscuous mode [ 429.029047][T16646] FAULT_INJECTION: forcing a failure. [ 429.029047][T16646] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 429.060693][T16646] CPU: 1 PID: 16646 Comm: syz.9.4654 Tainted: G W syzkaller #0 [ 429.069677][T16646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 429.079753][T16646] Call Trace: [ 429.083066][T16646] __dump_stack+0x21/0x24 [ 429.087519][T16646] dump_stack_lvl+0x169/0x1d8 [ 429.092245][T16646] ? thaw_kernel_threads+0x220/0x220 [ 429.097640][T16646] ? show_regs_print_info+0x18/0x18 [ 429.102854][T16646] ? proc_fail_nth_read+0x210/0x210 [ 429.108256][T16646] dump_stack+0x15/0x1c [ 429.112680][T16646] should_fail+0x3c1/0x510 [ 429.117108][T16646] should_fail_usercopy+0x1a/0x20 [ 429.122147][T16646] _copy_from_user+0x20/0xd0 [ 429.126768][T16646] perf_copy_attr+0x14c/0x730 [ 429.131559][T16646] __se_sys_perf_event_open+0xd1/0x1b10 [ 429.137124][T16646] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 429.143333][T16646] __x64_sys_perf_event_open+0xbf/0xd0 [ 429.148814][T16646] do_syscall_64+0x31/0x40 [ 429.153597][T16646] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 429.159842][T16646] RIP: 0033:0x7f411d089c29 [ 429.164275][T16646] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 429.184427][T16646] RSP: 002b:00007f411baf2038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 429.193033][T16646] RAX: ffffffffffffffda RBX: 00007f411d2d0fa0 RCX: 00007f411d089c29 [ 429.201021][T16646] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 00002000000012c0 [ 429.209042][T16646] RBP: 00007f411baf2090 R08: 0000000000000000 R09: 0000000000000000 [ 429.217195][T16646] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 429.225165][T16646] R13: 00007f411d2d1038 R14: 00007f411d2d0fa0 R15: 00007ffc94d0fe68 [ 429.601807][T16673] device syzkaller0 entered promiscuous mode [ 429.847922][T16690] FAULT_INJECTION: forcing a failure. [ 429.847922][T16690] name failslab, interval 1, probability 0, space 0, times 0 [ 429.904108][T16690] CPU: 1 PID: 16690 Comm: syz.9.4666 Tainted: G W syzkaller #0 [ 429.913008][T16690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 429.923337][T16690] Call Trace: [ 429.926937][T16690] __dump_stack+0x21/0x24 [ 429.931358][T16690] dump_stack_lvl+0x169/0x1d8 [ 429.936444][T16690] ? show_regs_print_info+0x18/0x18 [ 429.941806][T16690] ? expand_files+0xde/0x8e0 [ 429.946401][T16690] dump_stack+0x15/0x1c [ 429.950597][T16690] should_fail+0x3c1/0x510 [ 429.955180][T16690] ? perf_event_alloc+0xd0/0x1990 [ 429.960220][T16690] __should_failslab+0xa4/0xe0 [ 429.964991][T16690] should_failslab+0x9/0x20 [ 429.969591][T16690] kmem_cache_alloc_trace+0x3a/0x2e0 [ 429.974931][T16690] perf_event_alloc+0xd0/0x1990 [ 429.979809][T16690] ? __alloc_fd+0x498/0x530 [ 429.984335][T16690] __se_sys_perf_event_open+0x6f7/0x1b10 [ 429.989986][T16690] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 429.995968][T16690] __x64_sys_perf_event_open+0xbf/0xd0 [ 430.001547][T16690] do_syscall_64+0x31/0x40 [ 430.006264][T16690] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 430.012265][T16690] RIP: 0033:0x7f411d089c29 [ 430.016723][T16690] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 430.036892][T16690] RSP: 002b:00007f411baf2038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 430.045508][T16690] RAX: ffffffffffffffda RBX: 00007f411d2d0fa0 RCX: 00007f411d089c29 [ 430.053476][T16690] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 00002000000012c0 [ 430.061444][T16690] RBP: 00007f411baf2090 R08: 0000000000000000 R09: 0000000000000000 [ 430.069632][T16690] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 430.077696][T16690] R13: 00007f411d2d1038 R14: 00007f411d2d0fa0 R15: 00007ffc94d0fe68 [ 431.200726][T16734] device syzkaller0 entered promiscuous mode [ 431.245389][T16742] FAULT_INJECTION: forcing a failure. [ 431.245389][T16742] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 431.259355][T16742] CPU: 0 PID: 16742 Comm: syz.8.4680 Tainted: G W syzkaller #0 [ 431.268257][T16742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 431.278598][T16742] Call Trace: [ 431.281891][T16742] __dump_stack+0x21/0x24 [ 431.286225][T16742] dump_stack_lvl+0x169/0x1d8 [ 431.290902][T16742] ? thaw_kernel_threads+0x220/0x220 [ 431.296188][T16742] ? vsnprintf+0x1871/0x1960 [ 431.300779][T16742] ? show_regs_print_info+0x18/0x18 [ 431.305975][T16742] dump_stack+0x15/0x1c [ 431.310310][T16742] should_fail+0x3c1/0x510 [ 431.315474][T16742] should_fail_usercopy+0x1a/0x20 [ 431.320659][T16742] _copy_to_user+0x20/0x90 [ 431.325085][T16742] simple_read_from_buffer+0xe9/0x160 [ 431.330477][T16742] proc_fail_nth_read+0x19a/0x210 [ 431.335555][T16742] ? proc_fault_inject_write+0x2f0/0x2f0 [ 431.341363][T16742] ? rw_verify_area+0x1c0/0x360 [ 431.346229][T16742] ? proc_fault_inject_write+0x2f0/0x2f0 [ 431.351885][T16742] vfs_read+0x1fe/0xa10 [ 431.356046][T16742] ? kernel_read+0x70/0x70 [ 431.360640][T16742] ? _raw_spin_unlock+0x4d/0x70 [ 431.365495][T16742] ? __kasan_check_write+0x14/0x20 [ 431.370690][T16742] ? mutex_lock+0x8c/0xe0 [ 431.375129][T16742] ? mutex_trylock+0xa0/0xa0 [ 431.379891][T16742] ? __fget_files+0x2c4/0x320 [ 431.384667][T16742] ? __fdget_pos+0x2d2/0x380 [ 431.389416][T16742] ? ksys_read+0x71/0x240 [ 431.393836][T16742] ksys_read+0x140/0x240 [ 431.398166][T16742] ? vfs_write+0xd60/0xd60 [ 431.402596][T16742] ? debug_smp_processor_id+0x17/0x20 [ 431.408110][T16742] __x64_sys_read+0x7b/0x90 [ 431.412623][T16742] do_syscall_64+0x31/0x40 [ 431.417172][T16742] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 431.423079][T16742] RIP: 0033:0x7f1d8098763c [ 431.427492][T16742] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 431.447093][T16742] RSP: 002b:00007f1d7f3f1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 431.455509][T16742] RAX: ffffffffffffffda RBX: 00007f1d80bcffa0 RCX: 00007f1d8098763c [ 431.463563][T16742] RDX: 000000000000000f RSI: 00007f1d7f3f10a0 RDI: 0000000000000006 [ 431.471736][T16742] RBP: 00007f1d7f3f1090 R08: 0000000000000000 R09: 0000000000000000 [ 431.479907][T16742] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 431.487882][T16742] R13: 00007f1d80bd0038 R14: 00007f1d80bcffa0 R15: 00007ffc07a9dd68 [ 431.663144][T16754] device pim6reg1 entered promiscuous mode [ 432.069897][T16797] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.077134][T16797] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.084716][T16797] device bridge0 left promiscuous mode [ 432.193158][T16797] device bridge_slave_1 left promiscuous mode [ 432.199767][T16797] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.207392][T16797] device bridge_slave_0 left promiscuous mode [ 432.213551][T16797] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.304578][T16871] syz.6.4718[16871] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 433.304673][T16871] syz.6.4718[16871] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 433.332859][T16873] device veth0_vlan left promiscuous mode [ 433.375218][T16873] device veth0_vlan entered promiscuous mode [ 433.427271][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 433.441260][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 433.449395][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 433.810861][T16920] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.818117][T16920] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.972670][T16929] device veth0_vlan left promiscuous mode [ 434.004345][T16929] device veth0_vlan entered promiscuous mode [ 434.040875][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 434.050039][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 434.058125][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 435.640723][T16987] device syzkaller0 entered promiscuous mode [ 435.675505][T16992] device wg2 left promiscuous mode [ 435.685052][T16996] device wg2 entered promiscuous mode [ 436.826570][T17056] device wg2 entered promiscuous mode [ 437.930509][T17118] device wg2 left promiscuous mode [ 437.995913][T17118] device wg2 entered promiscuous mode [ 439.510151][T17173] device wg2 left promiscuous mode [ 439.671862][T17173] device wg2 entered promiscuous mode [ 440.986352][T17208] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.994067][T17208] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.001598][T17208] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.009024][T17208] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.016908][T17208] device bridge0 entered promiscuous mode [ 441.041870][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 442.024742][T17241] device veth1_macvtap left promiscuous mode [ 442.715485][T17270] device pim6reg1 entered promiscuous mode [ 443.286389][T17299] syzkaller0: refused to change device tx_queue_len [ 443.414223][T17307] @ÿ: renamed from bond_slave_0 [ 443.464236][T17307] device wg2 left promiscuous mode [ 443.575871][T17311] device wg2 entered promiscuous mode [ 443.842188][T17319] device syzkaller0 entered promiscuous mode [ 443.895377][T17333] device pim6reg1 entered promiscuous mode [ 444.210628][ T24] audit: type=1400 audit(1758311386.500:176): avc: denied { create } for pid=17349 comm="syz.7.4861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 444.649696][T17374] syz.9.4866[17374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.649760][T17374] syz.9.4866[17374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.122208][T17398] device syzkaller0 entered promiscuous mode [ 446.007397][T17431] device sit0 entered promiscuous mode [ 446.440863][T17467] device syzkaller0 entered promiscuous mode [ 446.759346][T17488] bridge0: port 3(veth0_macvtap) entered blocking state [ 446.801715][T17488] bridge0: port 3(veth0_macvtap) entered disabled state [ 446.871284][T17488] device veth0_macvtap entered promiscuous mode [ 446.908769][T17488] bridge0: port 3(veth0_macvtap) entered blocking state [ 446.915996][T17488] bridge0: port 3(veth0_macvtap) entered forwarding state [ 447.782888][T17536] ÿÿÿÿÿÿ: renamed from vlan1 [ 447.804552][T17537] device syzkaller0 entered promiscuous mode [ 448.198778][T17571] tap0: tun_chr_ioctl cmd 1074025698 [ 448.742514][T17632] device pim6reg1 entered promiscuous mode [ 450.798321][T17724] device sit0 left promiscuous mode [ 451.320793][T17756] : port 1(erspan0) entered blocking state [ 451.370895][T17756] : port 1(erspan0) entered disabled state [ 451.396338][T17756] device erspan0 entered promiscuous mode [ 451.457826][T17759] : port 1(erspan0) entered blocking state [ 451.464196][T17759] : port 1(erspan0) entered forwarding state [ 452.412982][T17806] device pim6reg1 entered promiscuous mode [ 454.347408][T17861] device syzkaller0 entered promiscuous mode [ 454.584125][T17888] @ÿ: renamed from bond_slave_0 [ 454.699490][T17893] device veth1_macvtap left promiscuous mode [ 455.346228][T17923] device pim6reg1 entered promiscuous mode [ 455.538147][ T1922] bridge0: port 3(veth0_macvtap) entered disabled state [ 456.820167][T17982] syz.8.5045[17982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.820231][T17982] syz.8.5045[17982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.878834][T17984] syz.8.5045[17984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 457.034311][T17991] device wg2 left promiscuous mode [ 457.100297][T17991] device wg2 entered promiscuous mode [ 457.868868][T18022] device syzkaller0 entered promiscuous mode [ 458.902917][T18101] device pim6reg1 entered promiscuous mode [ 459.775353][T18158] device pim6reg1 entered promiscuous mode [ 461.407477][T18257] device syzkaller0 entered promiscuous mode [ 461.636826][T18274] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.644330][T18274] bridge0: port 1(bridge_slave_0) entered disabled state [ 461.655412][T18274] device bridge0 left promiscuous mode [ 465.409357][T18356] device pim6reg1 entered promiscuous mode [ 465.479447][T18359] device syzkaller0 entered promiscuous mode [ 465.712156][T18368] device pim6reg1 entered promiscuous mode [ 466.027869][T18370] device syzkaller0 entered promiscuous mode [ 467.549189][T18476] device veth0_vlan left promiscuous mode [ 467.583008][T18476] device veth0_vlan entered promiscuous mode [ 467.653578][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 467.663199][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 467.671219][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 467.810300][T18511] device wg2 entered promiscuous mode [ 468.327358][T18539] device sit0 entered promiscuous mode [ 471.055996][T18671] device pim6reg1 entered promiscuous mode [ 471.215515][T18691] device pim6reg1 entered promiscuous mode [ 471.541634][T18706] syz.8.5268[18706] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 471.541712][T18706] syz.8.5268[18706] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 472.176301][T18724] device sit0 left promiscuous mode [ 472.530805][T18725] device pim6reg1 entered promiscuous mode [ 473.382271][T18761] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 473.411049][T18761] device syzkaller0 entered promiscuous mode [ 473.976544][T18770] device syzkaller0 entered promiscuous mode [ 475.006434][T18830] device syzkaller0 entered promiscuous mode [ 475.809151][T18888] device wg2 left promiscuous mode [ 475.870713][T18888] device wg2 entered promiscuous mode [ 476.607020][T18950] device wg2 left promiscuous mode [ 477.325762][T18990] device syzkaller0 entered promiscuous mode [ 477.413692][T19009] device wg2 left promiscuous mode [ 477.760261][T19047] device sit0 entered promiscuous mode [ 477.814524][T19047] device sit0 left promiscuous mode [ 478.028605][T19049] device veth0_vlan left promiscuous mode [ 478.123862][T19049] device veth0_vlan entered promiscuous mode [ 478.177624][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 478.186332][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 478.193922][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 478.281157][T19079] device pim6reg1 entered promiscuous mode [ 480.030409][T19150] device wg2 left promiscuous mode [ 480.071153][T19150] syz.8.5402[19150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 480.071216][T19150] syz.8.5402[19150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 483.126329][T19257] device sit0 entered promiscuous mode [ 483.737354][T19291] -1: renamed from syzkaller0 [ 483.933806][T19306] device veth0_vlan left promiscuous mode [ 483.970805][T19306] device veth0_vlan entered promiscuous mode [ 484.022367][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 484.054744][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 484.085843][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 484.111221][T19320] device pim6reg1 entered promiscuous mode [ 484.324510][T19348] device pim6reg1 entered promiscuous mode [ 484.792403][T19391] device wg2 entered promiscuous mode [ 489.110887][T19546] device sit0 left promiscuous mode [ 489.759811][T19560] device syzkaller0 entered promiscuous mode [ 491.262397][T19649] tap0: tun_chr_ioctl cmd 1074025673 [ 491.283463][T19649] tap0: tun_chr_ioctl cmd 1074025673 [ 491.289197][T19649] tap0: tun_chr_ioctl cmd 1074025673 [ 491.295674][T19649] tap0: tun_chr_ioctl cmd 1074025673 [ 491.724496][T19685] bridge0: port 2(bridge_slave_1) entered disabled state [ 491.734203][T19685] bridge0: port 1(bridge_slave_0) entered disabled state [ 491.834054][T19693] device bridge_slave_1 left promiscuous mode [ 491.875565][T19693] bridge0: port 2(bridge_slave_1) entered disabled state [ 491.884794][T19693] device bridge_slave_0 left promiscuous mode [ 491.891274][T19693] bridge0: port 1(bridge_slave_0) entered disabled state [ 492.974206][T19719] device syzkaller0 entered promiscuous mode [ 494.636310][T19762] device syzkaller0 entered promiscuous mode [ 495.076888][T19768] device pim6reg1 entered promiscuous mode [ 497.323155][T19831] device syzkaller0 entered promiscuous mode [ 498.974327][T19924] device macsec0 entered promiscuous mode [ 500.195683][T19973] device veth0_vlan left promiscuous mode [ 500.212118][T19973] device veth0_vlan entered promiscuous mode [ 500.219370][T19973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 500.236660][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 500.265162][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 500.272777][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 500.730004][ T24] audit: type=1400 audit(1758311443.020:177): avc: denied { attach_queue } for pid=19994 comm="syz.6.5650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 501.424980][T20017] bridge0: port 4(veth0_macvtap) entered blocking state [ 501.444892][T20017] bridge0: port 4(veth0_macvtap) entered disabled state [ 501.493497][T20017] device veth0_macvtap entered promiscuous mode [ 501.621546][T20028] device sit0 entered promiscuous mode [ 502.831125][T20056] device veth0_virt_wifi entered promiscuous mode [ 503.795931][T20084] device wg2 left promiscuous mode [ 503.825176][T20083] device wg2 entered promiscuous mode [ 505.093832][T20141] device syzkaller0 entered promiscuous mode [ 505.558419][T20169] ref_ctr_offset mismatch. inode: 0x63b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 506.393123][T20211] device pim6reg1 entered promiscuous mode [ 506.802728][T20248] device sit0 left promiscuous mode [ 507.059605][T20267] device syzkaller0 entered promiscuous mode [ 508.786724][T20395] device sit0 left promiscuous mode [ 508.800826][T20390] ref_ctr_offset mismatch. inode: 0x984 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 508.978961][T20407] device sit0 entered promiscuous mode [ 509.303292][T20443] syz.8.5782[20443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.303384][T20443] syz.8.5782[20443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.333465][T20443] syz.8.5782[20443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.356784][T20443] syz.8.5782[20443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.376653][T20447] syz.5.5786[20447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.412964][T20447] syz.5.5786[20447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.459330][T20447] syz.5.5786[20447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.573535][T20447] syz.5.5786[20447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.716812][T20469] device sit0 entered promiscuous mode [ 510.182400][T20512] device pim6reg1 entered promiscuous mode [ 510.328783][T20524] device pim6reg1 entered promiscuous mode [ 510.684909][T20529] device syzkaller0 entered promiscuous mode [ 510.831746][T20572] device syzkaller0 entered promiscuous mode [ 512.167250][T20634] bridge0: port 2(bridge_slave_1) entered disabled state [ 512.174655][T20634] bridge0: port 1(bridge_slave_0) entered disabled state [ 512.440864][T20641] device sit0 left promiscuous mode [ 512.576573][T20645] device sit0 entered promiscuous mode [ 514.499596][T20722] device veth0_macvtap left promiscuous mode [ 514.508003][T20722] bridge0: port 4(veth0_macvtap) entered disabled state [ 514.532868][T20722] device veth1 left promiscuous mode [ 514.539808][T20722] bridge0: port 3(veth1) entered disabled state [ 514.556591][T20722] device bridge_slave_1 left promiscuous mode [ 514.563808][T20722] bridge0: port 2(bridge_slave_1) entered disabled state [ 514.588419][T20722] device bridge_slave_0 left promiscuous mode [ 514.601213][T20722] bridge0: port 1(bridge_slave_0) entered disabled state [ 514.891730][T20743] device wg2 left promiscuous mode [ 514.998955][T20742] device wg2 entered promiscuous mode [ 516.065285][T20781] device syzkaller0 entered promiscuous mode [ 516.673476][T20829] : renamed from pim6reg1 [ 516.726507][T20829] device sit0 left promiscuous mode [ 516.918208][T20839] device veth0_vlan left promiscuous mode [ 516.932703][T20839] device veth0_vlan entered promiscuous mode [ 516.963633][T20839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 516.984270][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 516.993796][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 517.012720][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 517.360061][T20861] device veth0_vlan left promiscuous mode [ 517.378557][T20861] device veth0_vlan entered promiscuous mode [ 517.417441][T20861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 517.454357][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 517.477562][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 517.495542][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 519.589638][T20948] device pim6reg1 entered promiscuous mode [ 521.027123][T20989] device sit0 left promiscuous mode [ 521.265593][T20994] device GPL entered promiscuous mode [ 521.301671][T20993] device sit0 entered promiscuous mode [ 521.581842][T21000] device sit0 entered promiscuous mode [ 521.945406][T21020] device pim6reg1 entered promiscuous mode [ 522.410869][T21041] device sit0 left promiscuous mode [ 522.441661][T21041] device sit0 entered promiscuous mode [ 523.298243][T21058] device sit0 left promiscuous mode [ 523.511772][T21059] device sit0 entered promiscuous mode [ 524.282330][T21116] device sit0 entered promiscuous mode [ 524.859306][T21127] device syzkaller0 entered promiscuous mode [ 525.909310][T21178] -1: renamed from syzkaller0 [ 526.335793][T21205] device macsec0 left promiscuous mode [ 526.384084][T21205] device veth1_macvtap entered promiscuous mode [ 526.394967][T21205] device macsec0 entered promiscuous mode [ 526.423808][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 527.215602][T21247] device pim6reg1 entered promiscuous mode [ 527.308514][T21256] device syzkaller0 entered promiscuous mode [ 527.381595][T21262] syz.8.6027[21262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 527.384855][T21262] syz.8.6027[21262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 527.600004][T21258] device pim6reg1 entered promiscuous mode [ 528.008798][T21299] device sit0 left promiscuous mode [ 528.270300][T21303] device sit0 entered promiscuous mode [ 528.968416][T21369] device syzkaller0 entered promiscuous mode [ 534.567028][T21607] device pim6reg1 entered promiscuous mode [ 535.155583][T21638] device syzkaller0 entered promiscuous mode [ 535.368434][T21670] device veth1_macvtap left promiscuous mode [ 535.375908][T21670] device macsec0 left promiscuous mode [ 535.431488][T21670] device veth1_macvtap entered promiscuous mode [ 535.504102][T21670] device macsec0 entered promiscuous mode [ 536.231091][T21710] device veth0_vlan left promiscuous mode [ 536.251395][T21710] device veth0_vlan entered promiscuous mode [ 536.322827][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 536.355497][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 536.375957][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 536.409009][T21733] Ÿë: port 1(veth0_vlan) entered blocking state [ 536.442442][T21733] Ÿë: port 1(veth0_vlan) entered disabled state [ 537.194069][T21770] device sit0 left promiscuous mode [ 537.312281][T21774] device sit0 entered promiscuous mode [ 537.621030][T21809] device syzkaller0 entered promiscuous mode [ 537.893747][T21817] device veth0_vlan left promiscuous mode [ 537.936662][T21817] device veth0_vlan entered promiscuous mode [ 537.982169][T21817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 538.073270][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 538.099009][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 538.112719][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 538.345892][T21830] device syzkaller0 entered promiscuous mode [ 538.572767][T21855] device sit0 left promiscuous mode [ 538.840109][T21875] device wg2 left promiscuous mode [ 539.032532][T21878] device wg2 entered promiscuous mode [ 539.867668][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 539.888062][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 539.912830][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 540.019686][T21925] device wg2 left promiscuous mode [ 542.001245][T22064] device pim6reg1 entered promiscuous mode [ 542.579885][T22093] device syzkaller0 entered promiscuous mode [ 543.145595][T22127] device syzkaller0 entered promiscuous mode [ 543.335160][T22142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 543.359715][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 543.370251][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 543.378921][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 543.445949][T22146] device syzkaller0 entered promiscuous mode [ 543.734644][T22170] device syzkaller0 entered promiscuous mode [ 544.786334][T22217] device syzkaller0 entered promiscuous mode [ 544.923214][T22234] syz.6.6311[22234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 544.923267][T22234] syz.6.6311[22234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 546.053660][T22263] device wg2 left promiscuous mode [ 546.485319][T22268] device wg2 entered promiscuous mode [ 548.177362][T22328] device sit0 left promiscuous mode [ 548.625490][T22334] device syzkaller0 entered promiscuous mode [ 548.883253][T22332] bridge0: port 1(bridge_slave_0) entered blocking state [ 548.954992][T22332] bridge0: port 1(bridge_slave_0) entered disabled state [ 548.964481][T22332] device bridge_slave_0 entered promiscuous mode [ 548.979418][T22332] bridge0: port 2(bridge_slave_1) entered blocking state [ 548.986784][T22332] bridge0: port 2(bridge_slave_1) entered disabled state [ 549.001553][T22332] device bridge_slave_1 entered promiscuous mode [ 549.168859][T22351] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 549.209670][T22351] device syzkaller0 entered promiscuous mode [ 549.424876][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 549.432944][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 549.442244][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 549.474345][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 549.503144][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 549.510558][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 549.536664][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 549.570796][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 549.581902][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 549.596380][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 549.603617][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 549.694222][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 549.794582][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 549.818098][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 549.946038][T22332] device veth0_vlan entered promiscuous mode [ 550.004599][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 550.028066][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 550.073358][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 550.176927][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 550.191216][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 550.231821][T22332] device veth1_macvtap entered promiscuous mode [ 550.582351][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 550.590909][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 550.599745][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 550.674755][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 550.705547][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 551.207652][ T1922] device veth0_vlan left promiscuous mode [ 551.999749][T22522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 552.016573][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 552.032591][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 552.073486][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 552.284812][T22513] bridge0: port 1(bridge_slave_0) entered blocking state [ 552.292154][T22513] bridge0: port 1(bridge_slave_0) entered disabled state [ 552.321232][T22513] device bridge_slave_0 entered promiscuous mode [ 552.343660][T22513] bridge0: port 2(bridge_slave_1) entered blocking state [ 552.361248][T22513] bridge0: port 2(bridge_slave_1) entered disabled state [ 552.380856][T22513] device bridge_slave_1 entered promiscuous mode [ 552.977783][ T1922] : port 1(erspan0) entered disabled state [ 552.985013][ T1922] device erspan0 left promiscuous mode [ 552.990810][ T1922] : port 1(erspan0) entered disabled state [ 553.049569][T22572] device syzkaller0 entered promiscuous mode [ 553.375596][T22585] device wg2 entered promiscuous mode [ 553.400420][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 553.408145][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 553.456938][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 553.469232][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 553.479087][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 553.486408][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 553.680115][T22596] device syzkaller0 entered promiscuous mode [ 553.709727][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 553.717840][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 553.727067][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 553.737528][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 553.744617][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 553.779137][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 553.791943][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 553.866656][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 553.882314][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 553.895097][ T1922] device bridge_slave_1 left promiscuous mode [ 553.901775][ T1922] bridge0: port 2(bridge_slave_1) entered disabled state [ 553.916971][ T1922] bridge0: port 1(bridge_slave_0) entered disabled state [ 554.296641][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 554.324404][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 554.333099][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 554.342356][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 554.385110][T22513] device veth0_vlan entered promiscuous mode [ 554.486547][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 554.504981][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 554.562998][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 554.575103][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 554.606247][T22513] device veth1_macvtap entered promiscuous mode [ 554.637473][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 554.646286][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 554.670646][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 554.799767][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 554.827428][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 556.179638][T22720] device pim6reg1 entered promiscuous mode [ 556.875724][T22759] device wg2 entered promiscuous mode [ 558.086843][T22827] device veth0_vlan left promiscuous mode [ 558.104211][T22827] device veth0_vlan entered promiscuous mode [ 558.132442][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 558.162259][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 558.180421][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 560.344475][T22955] device syzkaller0 entered promiscuous mode [ 562.013319][T23009] device wg2 left promiscuous mode [ 562.341004][T23028] tap0: tun_chr_ioctl cmd 1074025673 [ 562.354292][T23027] tap0: tun_chr_ioctl cmd 1074025673 [ 563.013676][T23050] device syzkaller0 entered promiscuous mode [ 563.445548][T23055] device syzkaller0 entered promiscuous mode [ 563.637967][T23084] device pim6reg1 entered promiscuous mode [ 564.894291][T23144] device veth1_macvtap left promiscuous mode [ 564.908154][T23144] device macsec0 entered promiscuous mode [ 565.420717][T23168] device sit0 entered promiscuous mode [ 565.949612][T23174] device syzkaller0 entered promiscuous mode [ 566.412885][T23207] device syzkaller0 entered promiscuous mode [ 566.428689][T23209] bridge0: port 2(bridge_slave_1) entered disabled state [ 566.436782][T23209] bridge0: port 1(bridge_slave_0) entered disabled state [ 566.515105][T23217] ip6erspan0: tun_chr_ioctl cmd 1074812118 [ 567.861364][T23330] device veth1_macvtap left promiscuous mode [ 567.874843][T23330] device macsec0 left promiscuous mode [ 567.933445][T23331] device veth1_macvtap entered promiscuous mode [ 567.952115][T23331] device macsec0 entered promiscuous mode [ 567.968980][T14390] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 568.166123][T23352] device syzkaller0 entered promiscuous mode [ 569.266215][T23438] FAULT_INJECTION: forcing a failure. [ 569.266215][T23438] name failslab, interval 1, probability 0, space 0, times 0 [ 569.279317][T23438] CPU: 1 PID: 23438 Comm: syz.9.6659 Tainted: G W syzkaller #0 [ 569.288465][T23438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 569.298541][T23438] Call Trace: [ 569.301858][T23438] __dump_stack+0x21/0x24 [ 569.306286][T23438] dump_stack_lvl+0x169/0x1d8 [ 569.310970][T23438] ? show_regs_print_info+0x18/0x18 [ 569.316167][T23438] ? do_syscall_64+0x31/0x40 [ 569.321042][T23438] dump_stack+0x15/0x1c [ 569.325298][T23438] should_fail+0x3c1/0x510 [ 569.329731][T23438] ? __get_vm_area_node+0x113/0x450 [ 569.334938][T23438] __should_failslab+0xa4/0xe0 [ 569.339700][T23438] should_failslab+0x9/0x20 [ 569.344203][T23438] kmem_cache_alloc_trace+0x3a/0x2e0 [ 569.349641][T23438] __get_vm_area_node+0x113/0x450 [ 569.354683][T23438] __vmalloc_node_range+0xe0/0x780 [ 569.359806][T23438] ? copy_process+0x5b2/0x32c0 [ 569.364575][T23438] ? kmem_cache_alloc+0x165/0x2e0 [ 569.369595][T23438] dup_task_struct+0x40f/0xbd0 [ 569.374350][T23438] ? copy_process+0x5b2/0x32c0 [ 569.379116][T23438] ? __kasan_check_write+0x14/0x20 [ 569.384922][T23438] ? recalc_sigpending+0x1ac/0x230 [ 569.390143][T23438] copy_process+0x5b2/0x32c0 [ 569.394982][T23438] ? memset+0x35/0x40 [ 569.398983][T23438] ? proc_fail_nth_read+0x210/0x210 [ 569.404309][T23438] ? __pidfd_prepare+0x150/0x150 [ 569.409667][T23438] ? rw_verify_area+0x1c0/0x360 [ 569.414786][T23438] ? vfs_write+0xac8/0xd60 [ 569.419215][T23438] ? __bpf_trace_kmem_free+0x6f/0x90 [ 569.424900][T23438] kernel_clone+0x23f/0x940 [ 569.429417][T23438] ? kernel_write+0x3c0/0x3c0 [ 569.434220][T23438] ? create_io_thread+0x130/0x130 [ 569.439251][T23438] ? mutex_lock+0x8c/0xe0 [ 569.443598][T23438] __x64_sys_clone+0x176/0x1d0 [ 569.448480][T23438] ? __ia32_sys_vfork+0xf0/0xf0 [ 569.453437][T23438] ? ksys_write+0x1eb/0x240 [ 569.458123][T23438] ? debug_smp_processor_id+0x17/0x20 [ 569.463505][T23438] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 569.469585][T23438] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 569.475229][T23438] do_syscall_64+0x31/0x40 [ 569.479745][T23438] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 569.485630][T23438] RIP: 0033:0x7f411d089c29 [ 569.490058][T23438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 569.509820][T23438] RSP: 002b:00007f411baf1fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 569.518448][T23438] RAX: ffffffffffffffda RBX: 00007f411d2d0fa0 RCX: 00007f411d089c29 [ 569.526708][T23438] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 569.534853][T23438] RBP: 00007f411baf2090 R08: 0000000000000000 R09: 0000000000000000 [ 569.542906][T23438] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 569.550895][T23438] R13: 00007f411d2d1038 R14: 00007f411d2d0fa0 R15: 00007ffc94d0fe68 [ 569.560964][T23439] ÿÿÿÿÿÿ: renamed from vlan1 [ 569.590219][T23438] syz.9.6659: vmalloc: allocation failure: 32768 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz9,mems_allowed=0 [ 569.625162][T23438] CPU: 1 PID: 23438 Comm: syz.9.6659 Tainted: G W syzkaller #0 [ 569.634055][T23438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 569.644469][T23438] Call Trace: [ 569.647872][T23438] __dump_stack+0x21/0x24 [ 569.652379][T23438] dump_stack_lvl+0x169/0x1d8 [ 569.657067][T23438] ? show_regs_print_info+0x18/0x18 [ 569.662323][T23438] ? pr_cont_kernfs_name+0xe3/0xf0 [ 569.667472][T23438] dump_stack+0x15/0x1c [ 569.671761][T23438] warn_alloc+0x1b0/0x1d0 [ 569.676102][T23438] ? perf_trace_kmem_alloc+0x4b/0x130 [ 569.681480][T23438] ? zone_watermark_ok_safe+0x250/0x250 [ 569.687109][T23438] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 569.692762][T23438] ? __get_vm_area_node+0x345/0x450 [ 569.698113][T23438] __vmalloc_node_range+0x27d/0x780 [ 569.703338][T23438] ? kmem_cache_alloc+0x165/0x2e0 [ 569.708497][T23438] dup_task_struct+0x40f/0xbd0 [ 569.713344][T23438] ? copy_process+0x5b2/0x32c0 [ 569.718231][T23438] ? __kasan_check_write+0x14/0x20 [ 569.723477][T23438] ? recalc_sigpending+0x1ac/0x230 [ 569.728859][T23438] copy_process+0x5b2/0x32c0 [ 569.733496][T23438] ? memset+0x35/0x40 [ 569.737584][T23438] ? proc_fail_nth_read+0x210/0x210 [ 569.742872][T23438] ? __pidfd_prepare+0x150/0x150 [ 569.748386][T23438] ? rw_verify_area+0x1c0/0x360 [ 569.753508][T23438] ? vfs_write+0xac8/0xd60 [ 569.757934][T23438] ? __bpf_trace_kmem_free+0x6f/0x90 [ 569.763472][T23438] kernel_clone+0x23f/0x940 [ 569.768386][T23438] ? kernel_write+0x3c0/0x3c0 [ 569.773233][T23438] ? create_io_thread+0x130/0x130 [ 569.778536][T23438] ? mutex_lock+0x8c/0xe0 [ 569.782905][T23438] __x64_sys_clone+0x176/0x1d0 [ 569.787674][T23438] ? __ia32_sys_vfork+0xf0/0xf0 [ 569.792783][T23438] ? ksys_write+0x1eb/0x240 [ 569.797374][T23438] ? debug_smp_processor_id+0x17/0x20 [ 569.802837][T23438] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 569.808990][T23438] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 569.814751][T23438] do_syscall_64+0x31/0x40 [ 569.819274][T23438] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 569.825163][T23438] RIP: 0033:0x7f411d089c29 [ 569.829582][T23438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 569.849500][T23438] RSP: 002b:00007f411baf1fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 569.857911][T23438] RAX: ffffffffffffffda RBX: 00007f411d2d0fa0 RCX: 00007f411d089c29 [ 569.865902][T23438] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 569.873885][T23438] RBP: 00007f411baf2090 R08: 0000000000000000 R09: 0000000000000000 [ 569.882300][T23438] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 569.890281][T23438] R13: 00007f411d2d1038 R14: 00007f411d2d0fa0 R15: 00007ffc94d0fe68 [ 569.912663][T23438] Mem-Info: [ 569.916978][T23438] active_anon:39 inactive_anon:15045 isolated_anon:0 [ 569.916978][T23438] active_file:24459 inactive_file:3909 isolated_file:0 [ 569.916978][T23438] unevictable:0 dirty:322 writeback:0 [ 569.916978][T23438] slab_reclaimable:7539 slab_unreclaimable:80136 [ 569.916978][T23438] mapped:29702 shmem:276 pagetables:639 bounce:0 [ 569.916978][T23438] free:1552770 free_pcp:1187 free_cma:0 [ 569.964146][T23438] Node 0 active_anon:156kB inactive_anon:60096kB active_file:97836kB inactive_file:15636kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:118808kB dirty:1312kB writeback:0kB shmem:1108kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:8192kB all_unreclaimable? no [ 570.014009][T23438] DMA32 free:2985936kB min:62668kB low:78332kB high:93996kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2988784kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:2848kB local_pcp:1388kB free_cma:0kB [ 570.043716][T23438] lowmem_reserve[]: 0 3941 3941 [ 570.049891][T23438] Normal free:3224028kB min:84784kB low:105980kB high:127176kB reserved_highatomic:0KB active_anon:156kB inactive_anon:60328kB active_file:97836kB inactive_file:15636kB unevictable:0kB writepending:1312kB present:5242880kB managed:4036368kB mlocked:0kB pagetables:2512kB bounce:0kB free_pcp:1896kB local_pcp:992kB free_cma:0kB [ 570.084175][T23438] lowmem_reserve[]: 0 0 0 [ 570.088728][T23438] DMA32: 6*4kB (UM) 5*8kB (M) 5*16kB (M) 8*32kB (UM) 9*64kB (UM) 6*128kB (UM) 7*256kB (UM) 5*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 725*4096kB (M) = 2985936kB [ 570.107427][T23438] Normal: 1651*4kB (UME) 2644*8kB (UME) 1350*16kB (UME) 1016*32kB (UME) 620*64kB (UME) 274*128kB (UME) 106*256kB (UME) 46*512kB (UME) 22*1024kB (M) 16*2048kB (ME) 723*4096kB (UM) = 3224012kB [ 570.127422][T23438] 28645 total pagecache pages [ 570.132225][T23438] 0 pages in swap cache [ 570.137580][T23438] Swap cache stats: add 0, delete 0, find 0/0 [ 570.143836][T23438] Free swap = 124996kB [ 570.148501][T23438] Total swap = 124996kB [ 570.152897][T23438] 2097051 pages RAM [ 570.157102][T23438] 0 pages HighMem/MovableOnly [ 570.166327][T23438] 340763 pages reserved [ 570.182480][T23438] 0 pages cma reserved [ 570.850931][T23495] device syzkaller0 entered promiscuous mode [ 572.087900][T23540] device syzkaller0 entered promiscuous mode [ 572.324574][T23544] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 572.472883][T23544] device syzkaller0 entered promiscuous mode [ 574.002376][T23623] device wg2 entered promiscuous mode [ 574.630227][T23663] syz.7.6722[23663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 574.630293][T23663] syz.7.6722[23663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 574.648891][T23659] device pim6reg1 entered promiscuous mode [ 574.688117][T23670] syz.7.6722[23670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 574.688176][T23670] syz.7.6722[23670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 575.556746][T23704] device syzkaller0 entered promiscuous mode [ 575.828903][T23706] device veth0_vlan left promiscuous mode [ 575.836506][T23706] device veth0_vlan entered promiscuous mode [ 575.895601][T23703] device wg2 entered promiscuous mode [ 576.717720][T23763] device wg2 left promiscuous mode [ 577.187266][T23784] device pim6reg1 entered promiscuous mode [ 578.019114][T23835] device sit0 entered promiscuous mode [ 578.295509][T23840] device sit0 left promiscuous mode [ 578.663838][T23873] device syzkaller0 entered promiscuous mode [ 579.719755][T23958] device veth0_vlan left promiscuous mode [ 579.734760][T23958] device veth0_vlan entered promiscuous mode [ 579.793535][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 579.802221][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 579.833149][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 579.851799][T23964] device pim6reg1 entered promiscuous mode [ 580.057801][T23982] ±ÿ: renamed from team_slave_1 [ 581.179396][T24039] device veth0_vlan left promiscuous mode [ 581.257326][T24039] device veth0_vlan entered promiscuous mode [ 582.056702][T24103] device pim6reg1 entered promiscuous mode [ 582.100929][T24105] bridge0: port 1(bridge_slave_0) entered disabled state [ 582.241323][T24120] bridge0: port 2(bridge_slave_1) entered disabled state [ 582.252493][T24120] device bridge_slave_1 left promiscuous mode [ 582.267186][T24120] bridge0: port 2(bridge_slave_1) entered disabled state [ 582.282309][T24120] device bridge_slave_0 left promiscuous mode [ 582.294138][T24120] bridge0: port 1(bridge_slave_0) entered disabled state [ 582.435115][T24127] device pim6reg1 entered promiscuous mode [ 582.618950][T24145] ±ÿ: renamed from team_slave_1 [ 582.722244][T24158] device wg2 entered promiscuous mode [ 583.949877][T24218] device wg2 left promiscuous mode [ 585.847381][T24319] syz.7.6913[24319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.847484][T24319] syz.7.6913[24319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.946194][T24330] syz.5.6923[24330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 586.039742][T24330] syz.5.6923[24330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 586.436239][T24356] device syzkaller0 entered promiscuous mode [ 586.718886][T24379] device syzkaller0 entered promiscuous mode [ 587.088456][T24372] bridge0: port 1(bridge_slave_0) entered blocking state [ 587.164319][T24372] bridge0: port 1(bridge_slave_0) entered disabled state [ 587.172747][T24372] device bridge_slave_0 entered promiscuous mode [ 588.025976][T14390] device veth1_macvtap left promiscuous mode [ 588.032196][T14390] device veth0_vlan left promiscuous mode