last executing test programs: 12.155839043s ago: executing program 3 (id=5333): bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000b00)={0xffffffffffffffff, &(0x7f0000000980)="9d69bad3ba770c29942638180c46b5c8e706e2c462608df7a22942b57df16d704cc5f7f6d9a20d4270b888eee558c1b62170ddc58c41bb313cc3bfffaa2ebc8063698e0d0899b85d51903581a68136dcc101493e51103b0a4ff420204752d43b4c907d4d4848cb2edb665a1b7450d858fa94b69072a1c371e9443447360f04197b0b581d7171c364d24c22b34b51f1ab0a98c1f010a0fccf92dea9175bb0abdedad783d67dbc3b3e7c7fc304ad8100ad6d055c13d9d0732997998f46d528fd707d90a371b1e7832aff43d3c2f150607496df7a6192d5b0c2850f2f48ed2f4a1bbfe6f66b7218", &(0x7f0000000a80)=""/108}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000000), 0x20000000}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}], 0x8, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0xe8, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0], 0x0, 0x17, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x0, 0x0, &(0x7f0000000500), 0x8, 0x42, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x16, 0x18, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x8, 0x6, 0x3, 0x5, 0x5}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x7}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x95, 0xcf, &(0x7f00000004c0)=""/207, 0x41100, 0x14, '\x00', r3, @fallback=0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r1, 0x4, 0x0, &(0x7f0000000880)=[{0x3, 0x4, 0x3, 0x2}, {0x1, 0x2, 0x4, 0x1}, {0x5, 0x1, 0x6, 0x8}, {0x1, 0x4, 0x7, 0x4}], 0x10, 0x1000000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 10.044230255s ago: executing program 3 (id=5333): bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000b00)={0xffffffffffffffff, &(0x7f0000000980)="9d69bad3ba770c29942638180c46b5c8e706e2c462608df7a22942b57df16d704cc5f7f6d9a20d4270b888eee558c1b62170ddc58c41bb313cc3bfffaa2ebc8063698e0d0899b85d51903581a68136dcc101493e51103b0a4ff420204752d43b4c907d4d4848cb2edb665a1b7450d858fa94b69072a1c371e9443447360f04197b0b581d7171c364d24c22b34b51f1ab0a98c1f010a0fccf92dea9175bb0abdedad783d67dbc3b3e7c7fc304ad8100ad6d055c13d9d0732997998f46d528fd707d90a371b1e7832aff43d3c2f150607496df7a6192d5b0c2850f2f48ed2f4a1bbfe6f66b7218", &(0x7f0000000a80)=""/108}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000000), 0x20000000}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}], 0x8, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0xe8, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0], 0x0, 0x17, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x0, 0x0, &(0x7f0000000500), 0x8, 0x42, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x16, 0x18, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x8, 0x6, 0x3, 0x5, 0x5}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x7}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x95, 0xcf, &(0x7f00000004c0)=""/207, 0x41100, 0x14, '\x00', r3, @fallback=0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r1, 0x4, 0x0, &(0x7f0000000880)=[{0x3, 0x4, 0x3, 0x2}, {0x1, 0x2, 0x4, 0x1}, {0x5, 0x1, 0x6, 0x8}, {0x1, 0x4, 0x7, 0x4}], 0x10, 0x1000000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 8.293373955s ago: executing program 0 (id=5456): close(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, 0x0, 0x10000) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYRES64=r3], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1}, 0x0) recvmsg(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x36}, 0x41fe) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[], 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x11, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, r7, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f00000003c0)=ANY=[@ANYBLOB="050000000000000073113400000000008510000002000000850000000500000095000000000000009500a50500000000d77f4c7e03671bff488e8e0405988d4f82620891e121a4f6f562dc1eabb7786a71d8bc090fd5616c8b512f6a"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) socketpair(0x2c, 0x2, 0x3, &(0x7f0000000300)) socketpair(0x27, 0x800, 0x853d, &(0x7f0000000600)) 7.765153898s ago: executing program 3 (id=5333): bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000b00)={0xffffffffffffffff, &(0x7f0000000980)="9d69bad3ba770c29942638180c46b5c8e706e2c462608df7a22942b57df16d704cc5f7f6d9a20d4270b888eee558c1b62170ddc58c41bb313cc3bfffaa2ebc8063698e0d0899b85d51903581a68136dcc101493e51103b0a4ff420204752d43b4c907d4d4848cb2edb665a1b7450d858fa94b69072a1c371e9443447360f04197b0b581d7171c364d24c22b34b51f1ab0a98c1f010a0fccf92dea9175bb0abdedad783d67dbc3b3e7c7fc304ad8100ad6d055c13d9d0732997998f46d528fd707d90a371b1e7832aff43d3c2f150607496df7a6192d5b0c2850f2f48ed2f4a1bbfe6f66b7218", &(0x7f0000000a80)=""/108}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000000), 0x20000000}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}], 0x8, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0xe8, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0], 0x0, 0x17, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x0, 0x0, &(0x7f0000000500), 0x8, 0x42, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x16, 0x18, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x8, 0x6, 0x3, 0x5, 0x5}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x7}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x95, 0xcf, &(0x7f00000004c0)=""/207, 0x41100, 0x14, '\x00', r3, @fallback=0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r1, 0x4, 0x0, &(0x7f0000000880)=[{0x3, 0x4, 0x3, 0x2}, {0x1, 0x2, 0x4, 0x1}, {0x5, 0x1, 0x6, 0x8}, {0x1, 0x4, 0x7, 0x4}], 0x10, 0x1000000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 5.787171738s ago: executing program 0 (id=5461): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x1ff) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz0\x00', 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 5.786669938s ago: executing program 1 (id=5462): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1a000000040000000031c387f0e99311dc000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000001f75"], 0x48) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="000000000000006f0a0400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.swap.high\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000300)=0x7fffffff7fffffff, 0x12) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x31) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB="0000000000f12133695affffff000000000000002a8866986076fdaf456681a2bd5359208518fff749acf8d75056945115e704ed33904d521406", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000a00)=""/177}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES8=r5, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="00000000000000000000000000000000000000000000000000e9ff00"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000008000000080000000800000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000e0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000005c0), 0x6, r7}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r7, &(0x7f00000004c0)="4c3c8e", &(0x7f0000000580)=""/161}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x52, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) 5.785665858s ago: executing program 4 (id=5464): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000000fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x18, 0x8, 0x2, 0x42, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000002c0)={&(0x7f0000000200), 0x0, &(0x7f0000000500), &(0x7f0000000580), 0x0, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0xe, 0x0, &(0x7f0000000300)="14fd54ab72df97e6256c00000000", 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r4, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) mkdir(0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 5.287678581s ago: executing program 4 (id=5465): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020fcff0000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000160000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000000012000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r3}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0100000004000000ff0f00000500000000000000f9a6f0", @ANYRESHEX=r0, @ANYBLOB="e70000000000000000000000000000e000000000768675961f16fee5b4d92a576abbd5369f87a9a8e0cf1e81f3b470b14b20b65e53bf40883ca1d8523b7e7e313e8bb9ade7a2e89cce582cfe073ac3a2320c40dc3fde11e9812874fcdec3d7d30f717b3caf4ead3cd09dac01884ed3ce99457b59e6d13037a36b128cfa53ccae9508af57017dcd3ed41f0f3db4f3412d9d6d8374d249620ff0c2837b671129b19e8571d25cadd07b66d3659e10b5c0b378ebdd6fad1a0ef3893e327d", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000cc3488f2709cd0d800"/28], 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r5, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="030000000400000004000000410000000000000048336d1257d0f41bd6ced25663904487ec17b7c77dc0677b8680287298b9bf1e35e5e81a7beb8f5d1ee546c6299ee549fc9544bead", @ANYRES32=r4, @ANYBLOB="ffff00"/20, @ANYRES32=r6, @ANYRES32, @ANYBLOB="04000000030000000900"/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r7 = perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x10, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2840, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfff, 0x0, 0x0, 0xfffffffffffffffc, 0x2, 0x0, 0x0, 0x1ff, 0x0, 0x7ffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="18010000000020000000ac1ad3e64070253df71aad27c6035d26a9000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="05000000010000008e000000c9e7000001000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000003510293f549a32a8e02e07d49765c5d9367bd4b4826a8149c30eeb2b6d3d417f2c767384d99476688de769cabb96611353e3580782a94874864f2fe3d27f02080c", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000004c0)='\\\x00') perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r10, &(0x7f0000000900), 0x0}, 0x20) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) 5.249018711s ago: executing program 1 (id=5466): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000518100000", @ANYRES32, @ANYBLOB="00000000000000007900000000000000180000000000000000000000000000009500000000000000d50a0000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x21) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x23000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xffffc036, '\x00', 0x0, r4, 0x3, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r5, 0x58, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x7, 0x8295, 0xbc0, 0x40, 0xffffffffffffffff, 0x7ff, '\x00', r6, 0xffffffffffffffff, 0x2, 0x0, 0x802, 0x4, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRESDEC=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, @void, @value}, 0x90) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000000000000000000104000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000cfc8891668d856a800c57000"/28], 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYRESDEC=r1, @ANYRESHEX=r2, @ANYRES16=r4, @ANYRES64=r1, @ANYRES32, @ANYBLOB="000000000000006d8e6303dec2dd2409852f1568cd23fb63fe3f0d28743500000000000000040000000000000225a70762e6d4c100"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8923, &(0x7f0000000800)={'pim6reg1\x00', @link_local={0x1, 0x33}}) 5.021446152s ago: executing program 4 (id=5467): bpf$MAP_CREATE(0x0, &(0x7f0000001200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x7, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000160001000000180095000000000000000500feff00000200950000000000000015510bf1abf0898100512397dced63225aa89c217ca929c3509ab300e56441a8ff5e12f6037102dee6dda45103"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$inet(r1, &(0x7f00000010c0)={&(0x7f0000000580)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10, &(0x7f0000000f80)=[{&(0x7f0000000940)="c50e86907e88fb09c450c091a22783d4c5612fc832fa419b91b0b4b9e2977dc72eab8c27ef4d7c895cd2b9fe897cf426f445ac976e2105970d39bf319b1ac856b7c3f9e43bdf7c0f5871d54d85e99e4217273e7beaacc689679c46ccd8f11f67dffabc6052d2286b0925b1d1101c007656da9808122bd3ed4f288c7617ab2288a623924a95ef49aeb7ef24f9118759070c7b39c4f059d3860087a81e778780b5e8d91133c6637e70f835ef1dc401619d0cdd92d6182c41d14455444c30e729874872318709fc63758f7073c84b0b905f", 0xd0}, {&(0x7f00000005c0)="a7c50ead226ed521bb3aa774f5b7fe9dc1fe785c75ee52930e3ddcde6093fd649a624b73ac4db966eacfd4b1a9f2911c2b733887f504a053b65ed8eca10dfca19e17d1d40c52762a", 0x48}, {&(0x7f0000000780)="341988165cff7aab1ebc7ee3c3a937021e53b079a76c724d0a2e0736f307ba33a7c527df0ad2403817e4d1cb7bd9b2058942e29d6955cfa8cb1b224276d957094cbdcd838fc29081dbfb25480b212596992b74c9017e858fd58e65bd9f8d14f7d7f14aca7090", 0x66}, {&(0x7f0000000b00)="4e1ca907a6c90300000000000000a1797e67ffb6d8c8b715b81af01a34f0111bceb8029ae80d51c3f12c5596e15a20a0c7861f5d0dadae1e0c983d94d3fff0e1b37f562ef50fa6118d6e67fa06a6b8f8a39519a1086e0b324867a405000000000000009b3270d8600180ef89144ee8a14f94d7b14a69e27021efe375b5cba7d15fda39e6cbd9c38197cb9179ec0d144c3894e06512eefb806bad0d404e641492b089755475667bdd45", 0xa9}, {&(0x7f0000000bc0)="5a4478da948cd8bfd030f05675174a0bfa72a2d56f765b4d6762506a28ba86f8afb8a0fc7713ceb7e9db03d64e51692de7decbb18f6ce2d41800dade121ffc4bc1bcd21d6dabd902edb8a25dc8d700f0f1cc011831601ebb2909091dcb37f762dfb2e8ddb787dcdba3c1916f5aeba8ac51c303b0d2ef3d4c3bc167fa2de0586b05e1b79a836bffce73d92db9a2ebe8b5e9b3828baaed38f06d29ad2574e73146a6fed3de31db0ccd45a1312eb7b001b28ff5ef67af92b912b390c8123fc3a1691fcf8f94a0be0a5113baf08d48da", 0xce}, {&(0x7f0000000cc0)="77cd58998483f5754bca807dfe82b98de10c7815b51e8617b3034ac909fc1982e9718adca807a8b01d7f5b3dccf6b4055c12360185aa308f1ddb7095449a8dccd3a0edc8e720e6fdad0e50ea737be5", 0x4f}, {&(0x7f0000000d40)="4f2329dd461c3b13fa5dbad6b16ce83f950017668516c2c7a4e34bf30745b8b2d70406975f577f34f366297bfcc66cdb8e9b506f833af0d7f60e417e6d633ed63020675326755cb0ce44ab41c9a217c9cdae8202b68da84ad452f755fe7bf98f1fd2156516a4440e25c7b06f1bfc86bcb2bfcc7620f30973592d6ced673b788910f1678dc50565019e703e58c129eca821fbdae3b2965f445add80c6e439316f6ecfae4992db6aa6812d2fded55930eb5d4ca259f25f657de1b99d71737d6f1895dfb9e190a22469d718ba9355b97ec2c0f86ce31495bdc490b8310303c03be1141ff54910", 0xe5}, {&(0x7f0000000e40)="c8c3e1fb6c7013fc49983421dda0677ddcf185cdaedcb574f081a0986a4fdf1e2f40cde830b11517452a5c0fa91fdfbcabc5ee33c3be8034772ae17d797411423352f08b416c5a4b6360795a0dc6d25c", 0x50}, {&(0x7f00000006c0)="f7d5413e47701b731040b42a474d0d584c79df061446a67cb4ba88c6c6d989cba3f181431341e07d39ec91907f9925bb253cdd", 0x33}], 0x9, &(0x7f0000001040)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x40}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @local}}}], 0x68}, 0xe55ba9a815aad349) ioctl$TUNSETOFFLOAD(r2, 0x40047452, 0x2000000c) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 4.999722913s ago: executing program 2 (id=5468): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x101141, 0x0) bpf$BPF_GET_PROG_INFO(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000cc0), 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) gettid() bpf$PROG_BIND_MAP(0xa, &(0x7f0000000280)={r4}, 0xc) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01c47544546523337d5b0018000000000000000c0000000c0000000400000002000000000000050000000000006100"], &(0x7f0000000b40)=""/176, 0x28, 0xb0, 0x1, 0x0, 0x0, @void, @value}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.993154363s ago: executing program 0 (id=5469): bpf$MAP_CREATE(0x0, &(0x7f0000001200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x7, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000160001000000180095000000000000000500feff00000200950000000000000015510bf1abf0898100512397dced63225aa89c217ca929c3509ab300e56441a8ff5e12f6037102dee6dda45103"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$inet(r1, &(0x7f00000010c0)={&(0x7f0000000580)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10, &(0x7f0000000f80)=[{&(0x7f0000000940)="c50e86907e88fb09c450c091a22783d4c5612fc832fa419b91b0b4b9e2977dc72eab8c27ef4d7c895cd2b9fe897cf426f445ac976e2105970d39bf319b1ac856b7c3f9e43bdf7c0f5871d54d85e99e4217273e7beaacc689679c46ccd8f11f67dffabc6052d2286b0925b1d1101c007656da9808122bd3ed4f288c7617ab2288a623924a95ef49aeb7ef24f9118759070c7b39c4f059d3860087a81e778780b5e8d91133c6637e70f835ef1dc401619d0cdd92d6182c41d14455444c30e729874872318709fc63758f7073c84b0b905f", 0xd0}, {&(0x7f00000005c0)="a7c50ead226ed521bb3aa774f5b7fe9dc1fe785c75ee52930e3ddcde6093fd649a624b73ac4db966eacfd4b1a9f2911c2b733887f504a053b65ed8eca10dfca19e17d1d40c52762a", 0x48}, {&(0x7f0000000780)="341988165cff7aab1ebc7ee3c3a937021e53b079a76c724d0a2e0736f307ba33a7c527df0ad2403817e4d1cb7bd9b2058942e29d6955cfa8cb1b224276d957094cbdcd838fc29081dbfb25480b212596992b74c9017e858fd58e65bd9f8d14f7d7f14aca7090", 0x66}, {&(0x7f0000000b00)="4e1ca907a6c90300000000000000a1797e67ffb6d8c8b715b81af01a34f0111bceb8029ae80d51c3f12c5596e15a20a0c7861f5d0dadae1e0c983d94d3fff0e1b37f562ef50fa6118d6e67fa06a6b8f8a39519a1086e0b324867a405000000000000009b3270d8600180ef89144ee8a14f94d7b14a69e27021efe375b5cba7d15fda39e6cbd9c38197cb9179ec0d144c3894e06512eefb806bad0d404e641492b089755475667bdd45", 0xa9}, {&(0x7f0000000bc0)="5a4478da948cd8bfd030f05675174a0bfa72a2d56f765b4d6762506a28ba86f8afb8a0fc7713ceb7e9db03d64e51692de7decbb18f6ce2d41800dade121ffc4bc1bcd21d6dabd902edb8a25dc8d700f0f1cc011831601ebb2909091dcb37f762dfb2e8ddb787dcdba3c1916f5aeba8ac51c303b0d2ef3d4c3bc167fa2de0586b05e1b79a836bffce73d92db9a2ebe8b5e9b3828baaed38f06d29ad2574e73146a6fed3de31db0ccd45a1312eb7b001b28ff5ef67af92b912b390c8123fc3a1691fcf8f94a0be0a5113baf08d48da", 0xce}, {&(0x7f0000000cc0)="77cd58998483f5754bca807dfe82b98de10c7815b51e8617b3034ac909fc1982e9718adca807a8b01d7f5b3dccf6b4055c12360185aa308f1ddb7095449a8dccd3a0edc8e720e6fdad0e50ea737be5", 0x4f}, {&(0x7f0000000d40)="4f2329dd461c3b13fa5dbad6b16ce83f950017668516c2c7a4e34bf30745b8b2d70406975f577f34f366297bfcc66cdb8e9b506f833af0d7f60e417e6d633ed63020675326755cb0ce44ab41c9a217c9cdae8202b68da84ad452f755fe7bf98f1fd2156516a4440e25c7b06f1bfc86bcb2bfcc7620f30973592d6ced673b788910f1678dc50565019e703e58c129eca821fbdae3b2965f445add80c6e439316f6ecfae4992db6aa6812d2fded55930eb5d4ca259f25f657de1b99d71737d6f1895dfb9e190a22469d718ba9355b97ec2c0f86ce31495bdc490b8310303c03be1141ff54910", 0xe5}, {&(0x7f0000000e40)="c8c3e1fb6c7013fc49983421dda0677ddcf185cdaedcb574f081a0986a4fdf1e2f40cde830b11517452a5c0fa91fdfbcabc5ee33c3be8034772ae17d797411423352f08b416c5a4b6360795a0dc6d25c", 0x50}, {&(0x7f00000006c0)="f7d5413e47701b731040b42a474d0d584c79df061446a67cb4ba88c6c6d989cba3f181431341e07d39ec91907f9925bb253cdd", 0x33}], 0x9, &(0x7f0000001040)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x40}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @local}}}], 0x68}, 0xe55ba9a815aad349) ioctl$TUNSETOFFLOAD(r2, 0x40047452, 0x2000000c) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 4.992637743s ago: executing program 1 (id=5470): bpf$MAP_CREATE(0x0, &(0x7f0000001200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x7, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000160001000000180095000000000000000500feff00000200950000000000000015510bf1abf0898100512397dced63225aa89c217ca929c3509ab300e56441a8ff5e12f6037102dee6dda45103"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$inet(r1, &(0x7f00000010c0)={&(0x7f0000000580)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10, &(0x7f0000000f80)=[{&(0x7f0000000940)="c50e86907e88fb09c450c091a22783d4c5612fc832fa419b91b0b4b9e2977dc72eab8c27ef4d7c895cd2b9fe897cf426f445ac976e2105970d39bf319b1ac856b7c3f9e43bdf7c0f5871d54d85e99e4217273e7beaacc689679c46ccd8f11f67dffabc6052d2286b0925b1d1101c007656da9808122bd3ed4f288c7617ab2288a623924a95ef49aeb7ef24f9118759070c7b39c4f059d3860087a81e778780b5e8d91133c6637e70f835ef1dc401619d0cdd92d6182c41d14455444c30e729874872318709fc63758f7073c84b0b905f", 0xd0}, {&(0x7f00000005c0)="a7c50ead226ed521bb3aa774f5b7fe9dc1fe785c75ee52930e3ddcde6093fd649a624b73ac4db966eacfd4b1a9f2911c2b733887f504a053b65ed8eca10dfca19e17d1d40c52762a", 0x48}, {&(0x7f0000000780)="341988165cff7aab1ebc7ee3c3a937021e53b079a76c724d0a2e0736f307ba33a7c527df0ad2403817e4d1cb7bd9b2058942e29d6955cfa8cb1b224276d957094cbdcd838fc29081dbfb25480b212596992b74c9017e858fd58e65bd9f8d14f7d7f14aca7090", 0x66}, {&(0x7f0000000b00)="4e1ca907a6c90300000000000000a1797e67ffb6d8c8b715b81af01a34f0111bceb8029ae80d51c3f12c5596e15a20a0c7861f5d0dadae1e0c983d94d3fff0e1b37f562ef50fa6118d6e67fa06a6b8f8a39519a1086e0b324867a405000000000000009b3270d8600180ef89144ee8a14f94d7b14a69e27021efe375b5cba7d15fda39e6cbd9c38197cb9179ec0d144c3894e06512eefb806bad0d404e641492b089755475667bdd45", 0xa9}, {&(0x7f0000000bc0)="5a4478da948cd8bfd030f05675174a0bfa72a2d56f765b4d6762506a28ba86f8afb8a0fc7713ceb7e9db03d64e51692de7decbb18f6ce2d41800dade121ffc4bc1bcd21d6dabd902edb8a25dc8d700f0f1cc011831601ebb2909091dcb37f762dfb2e8ddb787dcdba3c1916f5aeba8ac51c303b0d2ef3d4c3bc167fa2de0586b05e1b79a836bffce73d92db9a2ebe8b5e9b3828baaed38f06d29ad2574e73146a6fed3de31db0ccd45a1312eb7b001b28ff5ef67af92b912b390c8123fc3a1691fcf8f94a0be0a5113baf08d48da", 0xce}, {&(0x7f0000000cc0)="77cd58998483f5754bca807dfe82b98de10c7815b51e8617b3034ac909fc1982e9718adca807a8b01d7f5b3dccf6b4055c12360185aa308f1ddb7095449a8dccd3a0edc8e720e6fdad0e50ea737be5", 0x4f}, {&(0x7f0000000d40)="4f2329dd461c3b13fa5dbad6b16ce83f950017668516c2c7a4e34bf30745b8b2d70406975f577f34f366297bfcc66cdb8e9b506f833af0d7f60e417e6d633ed63020675326755cb0ce44ab41c9a217c9cdae8202b68da84ad452f755fe7bf98f1fd2156516a4440e25c7b06f1bfc86bcb2bfcc7620f30973592d6ced673b788910f1678dc50565019e703e58c129eca821fbdae3b2965f445add80c6e439316f6ecfae4992db6aa6812d2fded55930eb5d4ca259f25f657de1b99d71737d6f1895dfb9e190a22469d718ba9355b97ec2c0f86ce31495bdc490b8310303c03be1141ff54910", 0xe5}, {&(0x7f0000000e40)="c8c3e1fb6c7013fc49983421dda0677ddcf185cdaedcb574f081a0986a4fdf1e2f40cde830b11517452a5c0fa91fdfbcabc5ee33c3be8034772ae17d797411423352f08b416c5a4b6360795a0dc6d25c", 0x50}, {&(0x7f00000006c0)="f7d5413e47701b731040b42a474d0d584c79df061446a67cb4ba88c6c6d989cba3f181431341e07d39ec91907f9925bb253cdd", 0x33}], 0x9, &(0x7f0000001040)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x40}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @local}}}], 0x68}, 0xe55ba9a815aad349) ioctl$TUNSETOFFLOAD(r2, 0x40047452, 0x2000000c) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 4.986282003s ago: executing program 3 (id=5333): bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000b00)={0xffffffffffffffff, &(0x7f0000000980)="9d69bad3ba770c29942638180c46b5c8e706e2c462608df7a22942b57df16d704cc5f7f6d9a20d4270b888eee558c1b62170ddc58c41bb313cc3bfffaa2ebc8063698e0d0899b85d51903581a68136dcc101493e51103b0a4ff420204752d43b4c907d4d4848cb2edb665a1b7450d858fa94b69072a1c371e9443447360f04197b0b581d7171c364d24c22b34b51f1ab0a98c1f010a0fccf92dea9175bb0abdedad783d67dbc3b3e7c7fc304ad8100ad6d055c13d9d0732997998f46d528fd707d90a371b1e7832aff43d3c2f150607496df7a6192d5b0c2850f2f48ed2f4a1bbfe6f66b7218", &(0x7f0000000a80)=""/108}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000000), 0x20000000}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}], 0x8, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0xe8, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0], 0x0, 0x17, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x0, 0x0, &(0x7f0000000500), 0x8, 0x42, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x16, 0x18, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x8, 0x6, 0x3, 0x5, 0x5}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x7}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x95, 0xcf, &(0x7f00000004c0)=""/207, 0x41100, 0x14, '\x00', r3, @fallback=0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r1, 0x4, 0x0, &(0x7f0000000880)=[{0x3, 0x4, 0x3, 0x2}, {0x1, 0x2, 0x4, 0x1}, {0x5, 0x1, 0x6, 0x8}, {0x1, 0x4, 0x7, 0x4}], 0x10, 0x1000000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 2.999920083s ago: executing program 0 (id=5471): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x3, &(0x7f00000008c0)=ANY=[@ANYBLOB], &(0x7f0000000280)='syzkaller\x00', 0x5, 0xc0, &(0x7f0000000a00)=""/192, 0x0, 0x8, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r2}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x315002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'ip6tnl0\x00', 0x2}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xfffffffffffffffd}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r4}, 0x10) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x3, 0x0, &(0x7f00000002c0)={0x0, 0x0}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) 2.999382663s ago: executing program 1 (id=5472): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r2}, &(0x7f0000000600), &(0x7f0000000640)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="05503cfd8b542d29090000000900000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x402, r6}, 0x38) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, &(0x7f0000001640)=""/233, &(0x7f00000002c0), &(0x7f0000000440), 0x5, r6}, 0x38) recvmsg(r4, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/4096, 0x1000}, 0x40000022) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x4d, 0x1, 0x3}, {0x61, 0x40}, {}, {0x0, 0x0, 0x4}, {0x6, 0x1}]}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x26e1, 0x0) close(r7) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1282, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x20001400) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="000080000000000000000000000100e2ffffff00fe65f804d783d6f809bbbf05ecbaacdcb79d7ece5ff841af343379b096bb0bebef46841964dcfb46debdbca6bccd05b346bf6dfa27ba888be5c17b24684d262b3d7ab4995761699f24b62771d9036d2858382ffaa3b6bd77578987168684f3c9eee81402a6ed12b7142c1672a0407eb2350e1380202fb2183ae8e62d29556705717e3f335efaff347b51f1ead4dc6aa7e336d0e936df4a86669d9cfcecbe5b155be15bc42ac3e3bb7b83a45c1dc4d091f91111b47bcff2d6bfc2a910bd0e281ae1bec091d2c21bd8a823b5cc96f48f4226bd5c74583f491bdf", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000480)=ANY=[@ANYRESOCT=r3, @ANYBLOB="783f8d0921fc97b50fd73a043bff1981defc8d3f53eae07c8e53fd84f2956875ef8fd26dbe5e18d858a224f2aeb1ee4608a0a4d11381df4bebe98edb55636418b044387a33890c3a672fb76d29b02c7357c88e45293f8abac3954ef74798a7a5b72f243f"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0xdb) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r8}, 0x0, &(0x7f00000002c0)}, 0x20) 2.998846023s ago: executing program 2 (id=5473): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x8, 0x0, 0x3, 0x20, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX], 0xfdef) 2.993195424s ago: executing program 4 (id=5474): sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)=@name={0x1e, 0x2, 0x1, {{0x42, 0x2}, 0x1}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000300)="0df14138e0d375e40efc9fa26d0a7a6f2c00f0e417e46de731f1db117d72ec5044de9156a28e27dc516d20972501e109fb8f8cb4abb174291458f928fe806e8d80073e6122bcce54ea04448849c6286c381ba1ecbcb578c4f7b6a2b8892b768b2ea61078b077cdb8482c87b4f1d7dbeefe75e6cb00726c248f", 0x79}, {&(0x7f0000000080)="4446a56fecf3e6d02ccd7e01537815401dbd93e11b8273c986f8181e718daa16d62fc97861db2db821a1e386aa1a3d4657557b77d7a298b2882576d534003b12", 0x40}, {&(0x7f00000004c0)="bb5123a229522785b9b8e8c465833e8942019663483ed7ffc409003a34aa283b8a3fd7b708eea652295fb3b9487e3f877420e0b3e00fda2b02d3957888035f233873d1f7180ca172605e208f83824d1931f179830a0c1e8dbffc88e6c9256d72b14247479e23ec967aeffac2b6a9cf0ace3514b3f307ce7efffcb0687fb1d3ba6758b10559580c4bd6cfcee1cde1cb06359b1aa70d1e29fe36c938ab868d067d0cb5486d8b6e9fd08a6036c28eb95cb5a4755fbd6202cd64c5395af9bb86198e11698072ee8895311ef42843e40f94f0f7065caf8be6e2a5a35563657263c884143e493222f233d69fd02224f3d96d7b4802", 0xf2}, {&(0x7f00000001c0)}], 0x4, &(0x7f0000000380)="190d395e35351793fb3ecddaa34fe898c9bfcbf0f95b19cbb1b4d6fc89671b3794f87680a83957f2776440898ef2f96684022113b60ee009c3be9855b7fc81eb513b9cfca9e3ffac874b4a06934c2b45e2523f982e797b23cfb37daeb2886f2c7557705f", 0x64}, 0x20000001) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x8a, &(0x7f0000000180), 0x127) sendmsg(r0, &(0x7f0000001bc0)={&(0x7f00000005c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x3, 0x4, 0x1, 0x1, {0xa, 0x4e20, 0x1, @mcast1, 0x9}}}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000640)="44cef9690026f95cfc90", 0xa}, {&(0x7f0000000740)="8ec5cc0d72d4fc11e4b52335ad6bbf8464def854d0ee7c7a115c67730a019a0b3c672a181e295c332ddde5316ce51494cf77d266e7d6ab9995b119e72c9c8b1532958e1f57476ddcfe3d77f096576582eecd7fee901729b9c2df89eeefc8b7fb1d4ce2b6472a85ac061672650a0f62d52767b08607b7fc24e51ed2e5f29a5928647fd62b7cf4e492b962dee30af7870f33ca7b", 0x93}, {&(0x7f0000000800)="f0efe6f7f1ad1db12558b82b1f17dcab4eb9f14bf692a9cf7913093a", 0x1c}, {&(0x7f0000000840)="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", 0x1000}, {&(0x7f0000001840)="e4060e38d1631b96bd2b4b7971f76c3fcc3449e3ecb7bb7416a955ad6176eb63700d53d6c92e15653e95b3b055248d0d798123bc0762be3a4b02463ad953f118ff9db6fa8cccc2eaed71d63ce572b1b686b6fabab529744354e60d8dbd6438c77a1f5b5ae749bd020d0efa4f657943ba9067a959ca411d172f3ad12d0b50d15bc306f15c56424d9e8608260cf205c5b9c912f5087167e05ef6c7b105d45bbc0edef0283157757adc0ca6", 0xaa}, {&(0x7f0000001900)="8379edbc426fdc8c9cfa586fd2a6a36a3f847632c19699beda2578061ccded720e8c7ff1e1c6959562e099dc853238d55f089e699e5b5764bc116a9ce00d3446886e934248014cf52a70ea759476a10fb108e2b090", 0x55}, {&(0x7f0000001980)="be41e65f7fab97a81fe11309b1ea2f602c15baed49be00c4cc1dbd6cb92b5189ec24b6f30c5639d2084a8b11fc93485d60c2b9205a76133c5dc990b235ba0a98781c2dbe8f2b89061d", 0x49}], 0x7, &(0x7f0000001a80)=[{0xa0, 0x111, 0xffffd082, "1637aaae7019d0dc6a58423b20b584c51fb50178c068666559d6c50f3630a0e4714286b4a1bcbbb58922130df3eaac14d3451245a0a4e989304c4899c4cf4fff39d8d7c278c0fb84f89a065c22678a3f3722440f0c8fc6b7ba198d2f75c3f14d0ef0d45b94c0df34c8894d4238959d62509919e2b79d08c04055e936bcf28d042bdfbaee1a3b9fff57bd2b2d7d"}, {0x20, 0x36, 0x1, "86d8e7dbc8d97fb3a2e9c076"}, {0x48, 0x6, 0xa, "af0b2e4117905b393673a02bf663002da0d710cee8ce19b8eca8b771a6895c4c8f5a8b644bbec4fef7d81dbebf4029fd41"}], 0x108}, 0x40800) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000380)='mm_page_alloc\x00', r5}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000001000000000000000000000071120b000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) openat$cgroup_freezer_state(r6, &(0x7f0000000840), 0x2, 0x0) r8 = openat$cgroup_freezer_state(r6, &(0x7f0000002b00), 0x2, 0x0) close(r8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 2.982258814s ago: executing program 2 (id=5475): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000002e00), &(0x7f0000000200), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11600, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000500)={'\x00', 0x2}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x5}, 0x9808, 0x14a, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0b0000000400000002000000040000004c250200", @ANYRES32, @ANYBLOB="000000000000000000002000000000000000a300", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x50) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x10, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000001000)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed@n\x00\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xf3\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x9c\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x5}, 0x9808, 0x14a, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0b0000000400000002000000040000004c250200", @ANYRES32, @ANYBLOB="000000000000000000002000000000000000a300", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x50) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x10, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000001000)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed@n\x00\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xf3\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x9c\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) 2.489760986s ago: executing program 4 (id=5478): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r1}, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440), 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000040018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1b, 0x18, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9ea}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x67}}, @call={0x85, 0x0, 0x0, 0x2f}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x5, 0x61, &(0x7f0000000640)=""/97, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x36, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x3, 0x5, 0x81, 0x7}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f0000000780)=[r3], 0x0, 0x10, 0x420, @void, @value}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000400)={&(0x7f0000000500)=@tipc, 0x80, &(0x7f0000000180)=[{&(0x7f0000000580)=""/163, 0xa3}], 0x1, &(0x7f0000000700)=""/125, 0x7d}, 0x10000) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='module_load\x00'}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kmem_cache_free\x00'}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) close(0xffffffffffffffff) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r5, 0x8982, 0x20000000) 2.487174287s ago: executing program 1 (id=5479): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001540)={{r6}, &(0x7f00000014c0), &(0x7f0000001500)=r5}, 0x20) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x1, 0x0, 0xd66, 0xf5ffffff}, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x18, &(0x7f00000000c0), 0x31}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf2, 0x3, 0x0, 0x0, 0x0, 0x5, 0x404, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1000, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 2.481772296s ago: executing program 3 (id=5333): bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000b00)={0xffffffffffffffff, &(0x7f0000000980)="9d69bad3ba770c29942638180c46b5c8e706e2c462608df7a22942b57df16d704cc5f7f6d9a20d4270b888eee558c1b62170ddc58c41bb313cc3bfffaa2ebc8063698e0d0899b85d51903581a68136dcc101493e51103b0a4ff420204752d43b4c907d4d4848cb2edb665a1b7450d858fa94b69072a1c371e9443447360f04197b0b581d7171c364d24c22b34b51f1ab0a98c1f010a0fccf92dea9175bb0abdedad783d67dbc3b3e7c7fc304ad8100ad6d055c13d9d0732997998f46d528fd707d90a371b1e7832aff43d3c2f150607496df7a6192d5b0c2850f2f48ed2f4a1bbfe6f66b7218", &(0x7f0000000a80)=""/108}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000000), 0x20000000}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}], 0x8, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0xe8, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0], 0x0, 0x17, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x0, 0x0, &(0x7f0000000500), 0x8, 0x42, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x16, 0x18, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x8, 0x6, 0x3, 0x5, 0x5}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x7}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x95, 0xcf, &(0x7f00000004c0)=""/207, 0x41100, 0x14, '\x00', r3, @fallback=0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r1, 0x4, 0x0, &(0x7f0000000880)=[{0x3, 0x4, 0x3, 0x2}, {0x1, 0x2, 0x4, 0x1}, {0x5, 0x1, 0x6, 0x8}, {0x1, 0x4, 0x7, 0x4}], 0x10, 0x1000000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 2.435284427s ago: executing program 2 (id=5480): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x1ff) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz0\x00', 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 414.929388ms ago: executing program 0 (id=5481): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000000500000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000200b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x2c, 0x2, 0x3, &(0x7f0000000300)) socketpair(0x27, 0x800, 0x853d, &(0x7f0000000600)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x7, 0x10001, 0x8, 0x124, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f00000002c0)={0x0, r5}, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=ANY=[@ANYBLOB="1000000004000000040000000700000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*2\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x220, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 414.529008ms ago: executing program 1 (id=5482): bpf$MAP_CREATE(0x0, &(0x7f0000001200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x7, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000160001000000180095000000000000000500feff00000200950000000000000015510bf1abf0898100512397dced63225aa89c217ca929c3509ab300e56441a8ff5e12f6037102dee6dda45103"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$inet(r1, &(0x7f00000010c0)={&(0x7f0000000580)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10, &(0x7f0000000f80)=[{&(0x7f0000000940)="c50e86907e88fb09c450c091a22783d4c5612fc832fa419b91b0b4b9e2977dc72eab8c27ef4d7c895cd2b9fe897cf426f445ac976e2105970d39bf319b1ac856b7c3f9e43bdf7c0f5871d54d85e99e4217273e7beaacc689679c46ccd8f11f67dffabc6052d2286b0925b1d1101c007656da9808122bd3ed4f288c7617ab2288a623924a95ef49aeb7ef24f9118759070c7b39c4f059d3860087a81e778780b5e8d91133c6637e70f835ef1dc401619d0cdd92d6182c41d14455444c30e729874872318709fc63758f7073c84b0b905f", 0xd0}, {&(0x7f00000005c0)="a7c50ead226ed521bb3aa774f5b7fe9dc1fe785c75ee52930e3ddcde6093fd649a624b73ac4db966eacfd4b1a9f2911c2b733887f504a053b65ed8eca10dfca19e17d1d40c52762a", 0x48}, {&(0x7f0000000780)="341988165cff7aab1ebc7ee3c3a937021e53b079a76c724d0a2e0736f307ba33a7c527df0ad2403817e4d1cb7bd9b2058942e29d6955cfa8cb1b224276d957094cbdcd838fc29081dbfb25480b212596992b74c9017e858fd58e65bd9f8d14f7d7f14aca7090", 0x66}, {&(0x7f0000000b00)="4e1ca907a6c90300000000000000a1797e67ffb6d8c8b715b81af01a34f0111bceb8029ae80d51c3f12c5596e15a20a0c7861f5d0dadae1e0c983d94d3fff0e1b37f562ef50fa6118d6e67fa06a6b8f8a39519a1086e0b324867a405000000000000009b3270d8600180ef89144ee8a14f94d7b14a69e27021efe375b5cba7d15fda39e6cbd9c38197cb9179ec0d144c3894e06512eefb806bad0d404e641492b089755475667bdd45", 0xa9}, {&(0x7f0000000bc0)="5a4478da948cd8bfd030f05675174a0bfa72a2d56f765b4d6762506a28ba86f8afb8a0fc7713ceb7e9db03d64e51692de7decbb18f6ce2d41800dade121ffc4bc1bcd21d6dabd902edb8a25dc8d700f0f1cc011831601ebb2909091dcb37f762dfb2e8ddb787dcdba3c1916f5aeba8ac51c303b0d2ef3d4c3bc167fa2de0586b05e1b79a836bffce73d92db9a2ebe8b5e9b3828baaed38f06d29ad2574e73146a6fed3de31db0ccd45a1312eb7b001b28ff5ef67af92b912b390c8123fc3a1691fcf8f94a0be0a5113baf08d48da", 0xce}, {&(0x7f0000000cc0)="77cd58998483f5754bca807dfe82b98de10c7815b51e8617b3034ac909fc1982e9718adca807a8b01d7f5b3dccf6b4055c12360185aa308f1ddb7095449a8dccd3a0edc8e720e6fdad0e50ea737be5", 0x4f}, {&(0x7f0000000d40)="4f2329dd461c3b13fa5dbad6b16ce83f950017668516c2c7a4e34bf30745b8b2d70406975f577f34f366297bfcc66cdb8e9b506f833af0d7f60e417e6d633ed63020675326755cb0ce44ab41c9a217c9cdae8202b68da84ad452f755fe7bf98f1fd2156516a4440e25c7b06f1bfc86bcb2bfcc7620f30973592d6ced673b788910f1678dc50565019e703e58c129eca821fbdae3b2965f445add80c6e439316f6ecfae4992db6aa6812d2fded55930eb5d4ca259f25f657de1b99d71737d6f1895dfb9e190a22469d718ba9355b97ec2c0f86ce31495bdc490b8310303c03be1141ff54910", 0xe5}, {&(0x7f0000000e40)="c8c3e1fb6c7013fc49983421dda0677ddcf185cdaedcb574f081a0986a4fdf1e2f40cde830b11517452a5c0fa91fdfbcabc5ee33c3be8034772ae17d797411423352f08b416c5a4b6360795a0dc6d25c", 0x50}, {&(0x7f00000006c0)="f7d5413e47701b731040b42a474d0d584c79df061446a67cb4ba88c6c6d989cba3f181431341e07d39ec91907f9925bb253cdd", 0x33}], 0x9, &(0x7f0000001040)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x40}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @local}}}], 0x68}, 0xe55ba9a815aad349) ioctl$TUNSETOFFLOAD(r2, 0x40047452, 0x2000000c) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 413.657938ms ago: executing program 2 (id=5483): bpf$MAP_CREATE(0x0, &(0x7f0000001200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x7, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000160001000000180095000000000000000500feff00000200950000000000000015510bf1abf0898100512397dced63225aa89c217ca929c3509ab300e56441a8ff5e12f6037102dee6dda45103"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$inet(r1, &(0x7f00000010c0)={&(0x7f0000000580)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10, &(0x7f0000000f80)=[{&(0x7f0000000940)="c50e86907e88fb09c450c091a22783d4c5612fc832fa419b91b0b4b9e2977dc72eab8c27ef4d7c895cd2b9fe897cf426f445ac976e2105970d39bf319b1ac856b7c3f9e43bdf7c0f5871d54d85e99e4217273e7beaacc689679c46ccd8f11f67dffabc6052d2286b0925b1d1101c007656da9808122bd3ed4f288c7617ab2288a623924a95ef49aeb7ef24f9118759070c7b39c4f059d3860087a81e778780b5e8d91133c6637e70f835ef1dc401619d0cdd92d6182c41d14455444c30e729874872318709fc63758f7073c84b0b905f", 0xd0}, {&(0x7f00000005c0)="a7c50ead226ed521bb3aa774f5b7fe9dc1fe785c75ee52930e3ddcde6093fd649a624b73ac4db966eacfd4b1a9f2911c2b733887f504a053b65ed8eca10dfca19e17d1d40c52762a", 0x48}, {&(0x7f0000000780)="341988165cff7aab1ebc7ee3c3a937021e53b079a76c724d0a2e0736f307ba33a7c527df0ad2403817e4d1cb7bd9b2058942e29d6955cfa8cb1b224276d957094cbdcd838fc29081dbfb25480b212596992b74c9017e858fd58e65bd9f8d14f7d7f14aca7090", 0x66}, {&(0x7f0000000b00)="4e1ca907a6c90300000000000000a1797e67ffb6d8c8b715b81af01a34f0111bceb8029ae80d51c3f12c5596e15a20a0c7861f5d0dadae1e0c983d94d3fff0e1b37f562ef50fa6118d6e67fa06a6b8f8a39519a1086e0b324867a405000000000000009b3270d8600180ef89144ee8a14f94d7b14a69e27021efe375b5cba7d15fda39e6cbd9c38197cb9179ec0d144c3894e06512eefb806bad0d404e641492b089755475667bdd45", 0xa9}, {&(0x7f0000000bc0)="5a4478da948cd8bfd030f05675174a0bfa72a2d56f765b4d6762506a28ba86f8afb8a0fc7713ceb7e9db03d64e51692de7decbb18f6ce2d41800dade121ffc4bc1bcd21d6dabd902edb8a25dc8d700f0f1cc011831601ebb2909091dcb37f762dfb2e8ddb787dcdba3c1916f5aeba8ac51c303b0d2ef3d4c3bc167fa2de0586b05e1b79a836bffce73d92db9a2ebe8b5e9b3828baaed38f06d29ad2574e73146a6fed3de31db0ccd45a1312eb7b001b28ff5ef67af92b912b390c8123fc3a1691fcf8f94a0be0a5113baf08d48da", 0xce}, {&(0x7f0000000cc0)="77cd58998483f5754bca807dfe82b98de10c7815b51e8617b3034ac909fc1982e9718adca807a8b01d7f5b3dccf6b4055c12360185aa308f1ddb7095449a8dccd3a0edc8e720e6fdad0e50ea737be5", 0x4f}, {&(0x7f0000000d40)="4f2329dd461c3b13fa5dbad6b16ce83f950017668516c2c7a4e34bf30745b8b2d70406975f577f34f366297bfcc66cdb8e9b506f833af0d7f60e417e6d633ed63020675326755cb0ce44ab41c9a217c9cdae8202b68da84ad452f755fe7bf98f1fd2156516a4440e25c7b06f1bfc86bcb2bfcc7620f30973592d6ced673b788910f1678dc50565019e703e58c129eca821fbdae3b2965f445add80c6e439316f6ecfae4992db6aa6812d2fded55930eb5d4ca259f25f657de1b99d71737d6f1895dfb9e190a22469d718ba9355b97ec2c0f86ce31495bdc490b8310303c03be1141ff54910", 0xe5}, {&(0x7f0000000e40)="c8c3e1fb6c7013fc49983421dda0677ddcf185cdaedcb574f081a0986a4fdf1e2f40cde830b11517452a5c0fa91fdfbcabc5ee33c3be8034772ae17d797411423352f08b416c5a4b6360795a0dc6d25c", 0x50}, {&(0x7f00000006c0)="f7d5413e47701b731040b42a474d0d584c79df061446a67cb4ba88c6c6d989cba3f181431341e07d39ec91907f9925bb253cdd", 0x33}], 0x9, &(0x7f0000001040)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x40}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @local}}}], 0x68}, 0xe55ba9a815aad349) ioctl$TUNSETOFFLOAD(r2, 0x40047452, 0x2000000c) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 413.306368ms ago: executing program 4 (id=5484): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1002}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x1ff, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 0s ago: executing program 3 (id=5333): bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000b00)={0xffffffffffffffff, &(0x7f0000000980)="9d69bad3ba770c29942638180c46b5c8e706e2c462608df7a22942b57df16d704cc5f7f6d9a20d4270b888eee558c1b62170ddc58c41bb313cc3bfffaa2ebc8063698e0d0899b85d51903581a68136dcc101493e51103b0a4ff420204752d43b4c907d4d4848cb2edb665a1b7450d858fa94b69072a1c371e9443447360f04197b0b581d7171c364d24c22b34b51f1ab0a98c1f010a0fccf92dea9175bb0abdedad783d67dbc3b3e7c7fc304ad8100ad6d055c13d9d0732997998f46d528fd707d90a371b1e7832aff43d3c2f150607496df7a6192d5b0c2850f2f48ed2f4a1bbfe6f66b7218", &(0x7f0000000a80)=""/108}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000000), 0x20000000}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}], 0x8, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0xe8, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0], 0x0, 0x17, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x0, 0x0, &(0x7f0000000500), 0x8, 0x42, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x16, 0x18, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x8, 0x6, 0x3, 0x5, 0x5}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x7}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x95, 0xcf, &(0x7f00000004c0)=""/207, 0x41100, 0x14, '\x00', r3, @fallback=0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r1, 0x4, 0x0, &(0x7f0000000880)=[{0x3, 0x4, 0x3, 0x2}, {0x1, 0x2, 0x4, 0x1}, {0x5, 0x1, 0x6, 0x8}, {0x1, 0x4, 0x7, 0x4}], 0x10, 0x1000000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) kernel console output (not intermixed with test programs): 7][ T3648] ? _kstrtoull+0x3a0/0x4a0 [ 140.442292][ T3648] ? tun_do_read+0x1f60/0x1f60 [ 140.446891][ T3648] ? kstrtouint_from_user+0x20a/0x2a0 [ 140.452099][ T3648] ? kstrtol_from_user+0x310/0x310 [ 140.457045][ T3648] ? bpf_ringbuf_notify+0x30/0x30 [ 140.461922][ T3648] ? avc_policy_seqno+0x1b/0x70 [ 140.466597][ T3648] ? selinux_file_permission+0x2bb/0x560 [ 140.472060][ T3648] ? fsnotify_perm+0x67/0x4e0 [ 140.476584][ T3648] tun_chr_write_iter+0x1a8/0x250 [ 140.481444][ T3648] vfs_write+0xb4c/0xe70 [ 140.485517][ T3648] ? kernel_write+0x3d0/0x3d0 [ 140.490030][ T3648] ? __fdget_pos+0x209/0x3a0 [ 140.494458][ T3648] ? ksys_write+0x77/0x2c0 [ 140.498712][ T3648] ksys_write+0x199/0x2c0 [ 140.502876][ T3648] ? __ia32_sys_read+0x90/0x90 [ 140.507564][ T3648] ? debug_smp_processor_id+0x17/0x20 [ 140.512770][ T3648] __x64_sys_write+0x7b/0x90 [ 140.517197][ T3648] do_syscall_64+0x34/0x70 [ 140.521449][ T3648] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 140.527171][ T3648] RIP: 0033:0x7f0357b6a759 [ 140.531423][ T3648] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 140.550874][ T3648] RSP: 002b:00007f03567e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 140.559112][ T3648] RAX: ffffffffffffffda RBX: 00007f0357d21f80 RCX: 00007f0357b6a759 [ 140.567182][ T3648] RDX: 000000000000fdef RSI: 0000000020000200 RDI: 00000000000000c8 [ 140.574999][ T3648] RBP: 00007f03567e3090 R08: 0000000000000000 R09: 0000000000000000 [ 140.582806][ T3648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.590613][ T3648] R13: 0000000000000000 R14: 00007f0357d21f80 R15: 00007ffc82f9af68 [ 141.311611][ T3667] syz.4.1002[3667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.311664][ T3667] syz.4.1002[3667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.404671][ T24] audit: type=1400 audit(1732047726.459:150): avc: denied { ioctl } for pid=3670 comm="syz.0.1003" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 141.543277][ T3677] device wg2 left promiscuous mode [ 141.880258][ T3697] device syzkaller0 entered promiscuous mode [ 142.373847][ T3723] syz.1.1021[3723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.373902][ T3723] syz.1.1021[3723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.789442][ T24] audit: type=1400 audit(1732047727.849:151): avc: denied { create } for pid=3748 comm="syz.2.1030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 142.862772][ T3753] device syzkaller0 entered promiscuous mode [ 142.869321][ T3754] device pim6reg1 entered promiscuous mode [ 143.941461][ T3773] FAULT_INJECTION: forcing a failure. [ 143.941461][ T3773] name failslab, interval 1, probability 0, space 0, times 0 [ 144.126846][ T3773] CPU: 1 PID: 3773 Comm: syz.0.1037 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 144.137943][ T3773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 144.147844][ T3773] Call Trace: [ 144.150970][ T3773] dump_stack_lvl+0x1e2/0x24b [ 144.155477][ T3773] ? bfq_pos_tree_add_move+0x43b/0x43b [ 144.160774][ T3773] dump_stack+0x15/0x17 [ 144.164766][ T3773] should_fail+0x3c6/0x510 [ 144.169019][ T3773] ? __d_alloc+0x2d/0x6c0 [ 144.173181][ T3773] __should_failslab+0xa4/0xe0 [ 144.177787][ T3773] should_failslab+0x9/0x20 [ 144.182132][ T3773] kmem_cache_alloc+0x3d/0x2e0 [ 144.186733][ T3773] __d_alloc+0x2d/0x6c0 [ 144.190721][ T3773] ? sched_clock+0x3a/0x40 [ 144.194970][ T3773] d_alloc_parallel+0xec/0x1370 [ 144.199657][ T3773] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 144.205303][ T3773] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 144.211292][ T3773] ? d_hash_and_lookup+0x1e0/0x1e0 [ 144.216234][ T3773] ? __d_lookup+0x4b6/0x520 [ 144.220571][ T3773] ? __kasan_check_write+0x14/0x20 [ 144.225524][ T3773] ? down_write+0xd7/0x150 [ 144.229771][ T3773] ? down_read_killable+0x220/0x220 [ 144.234810][ T3773] path_openat+0x9d4/0x3000 [ 144.239147][ T3773] ? do_filp_open+0x460/0x460 [ 144.243655][ T3773] ? sched_clock+0x3a/0x40 [ 144.247909][ T3773] ? debug_smp_processor_id+0x17/0x20 [ 144.253113][ T3773] do_filp_open+0x21c/0x460 [ 144.257452][ T3773] ? vfs_tmpfile+0x2b0/0x2b0 [ 144.261883][ T3773] ? get_unused_fd_flags+0x94/0xa0 [ 144.266825][ T3773] do_sys_openat2+0x13f/0x710 [ 144.271338][ T3773] ? lapic_next_event+0x5f/0x70 [ 144.276026][ T3773] ? clockevents_program_event+0x214/0x2c0 [ 144.281666][ T3773] ? do_sys_open+0x220/0x220 [ 144.286096][ T3773] ? hrtimer_interrupt+0x6a8/0x8b0 [ 144.291045][ T3773] __x64_sys_openat+0x243/0x290 [ 144.295727][ T3773] ? __ia32_sys_open+0x270/0x270 [ 144.300503][ T3773] ? debug_smp_processor_id+0x17/0x20 [ 144.305710][ T3773] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 144.311609][ T3773] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 144.317525][ T3773] ? irqentry_exit_to_user_mode+0x41/0x80 [ 144.323155][ T3773] do_syscall_64+0x34/0x70 [ 144.327409][ T3773] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 144.333132][ T3773] RIP: 0033:0x7fe9127fe759 [ 144.337387][ T3773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.356827][ T3773] RSP: 002b:00007fe911477038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 144.365069][ T3773] RAX: ffffffffffffffda RBX: 00007fe9129b5f80 RCX: 00007fe9127fe759 [ 144.372882][ T3773] RDX: 0000000000080040 RSI: 0000000020000080 RDI: 0000000000000008 [ 144.380695][ T3773] RBP: 00007fe911477090 R08: 0000000000000000 R09: 0000000000000000 [ 144.388504][ T3773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 144.396315][ T3773] R13: 0000000000000000 R14: 00007fe9129b5f80 R15: 00007ffd6b6361b8 [ 144.940674][ T3803] device syzkaller0 entered promiscuous mode [ 148.390333][ T3828] device syzkaller0 entered promiscuous mode [ 149.743124][ T3843] device pim6reg1 entered promiscuous mode [ 150.379193][ T3860] device wg2 left promiscuous mode [ 152.836929][ C0] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 153.599362][ T3968] device sit0 entered promiscuous mode [ 155.447873][ T3997] device veth1_macvtap left promiscuous mode [ 155.466989][ T3997] device macsec0 left promiscuous mode [ 162.178535][ T24] audit: type=1400 audit(1732047747.239:152): avc: denied { create } for pid=4176 comm="syz.4.1158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 163.172677][ T4246] syz.1.1180[4246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.172729][ T4246] syz.1.1180[4246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.266967][ T4246] syz.1.1180[4246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.284122][ T4246] syz.1.1180[4246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.048096][ T4367] device pim6reg1 entered promiscuous mode [ 168.635191][ T4388] device syzkaller0 entered promiscuous mode [ 168.823137][ T4399] tun0: tun_chr_ioctl cmd 1074025675 [ 168.867334][ T4399] tun0: persist enabled [ 170.043501][ T4444] syz.0.1243[4444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.043554][ T4444] syz.0.1243[4444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.135804][ T4448] syz.2.1246[4448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.186924][ T4448] syz.2.1246[4448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.203503][ T4444] device wg2 entered promiscuous mode [ 170.270176][ T4448] syz.2.1246[4448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.271400][ T4448] syz.2.1246[4448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.240413][ T4477] syz.3.1258 (4477) used obsolete PPPIOCDETACH ioctl [ 171.798672][ T4503] syz.1.1267[4503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.798726][ T4503] syz.1.1267[4503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.317432][ T24] audit: type=1400 audit(1732047757.379:153): avc: denied { create } for pid=4524 comm="syz.3.1275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 173.529094][ T4554] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.536327][ T4554] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.549054][ T4554] device bridge0 left promiscuous mode [ 173.584049][ T4556] device bridge_slave_0 entered promiscuous mode [ 174.652120][ T4592] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 174.788514][ T4592] device syzkaller0 entered promiscuous mode [ 175.129956][ T4607] device veth1_macvtap left promiscuous mode [ 178.467155][ T4688] device veth0_vlan left promiscuous mode [ 178.583422][ T4688] device veth0_vlan entered promiscuous mode [ 181.335163][ T4778] device sit0 left promiscuous mode [ 181.544074][ T4781] device sit0 entered promiscuous mode [ 182.006682][ T4783] device veth0_vlan left promiscuous mode [ 182.055565][ T4783] device veth0_vlan entered promiscuous mode [ 182.427665][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.436386][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.488828][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 182.560546][ T4795] device sit0 entered promiscuous mode [ 183.022574][ T4789] device wg2 entered promiscuous mode [ 184.544544][ T4836] syz.2.1387[4836] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.544634][ T4836] syz.2.1387[4836] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.416837][ T4859] device macsec0 entered promiscuous mode [ 185.459381][ T4864] syz.1.1401[4864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.459430][ T4864] syz.1.1401[4864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.522617][ T4889] device syzkaller0 entered promiscuous mode [ 186.701169][ T4900] device sit0 left promiscuous mode [ 186.835732][ T4900] device sit0 entered promiscuous mode [ 188.904864][ T4978] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 188.981648][ T4978] device syzkaller0 entered promiscuous mode [ 189.147473][ T24] audit: type=1400 audit(1732047774.209:154): avc: denied { setattr } for pid=4983 comm="syz.4.1445" path="/dev/ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 190.104299][ T5023] device sit0 left promiscuous mode [ 190.280537][ T5023] device sit0 entered promiscuous mode [ 191.847051][ T5068] device sit0 left promiscuous mode [ 192.029125][ T5074] device sit0 entered promiscuous mode [ 192.551171][ T5088] syz.0.1482[5088] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.551223][ T5088] syz.0.1482[5088] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.684087][ T24] audit: type=1400 audit(1732047779.739:155): avc: denied { create } for pid=5163 comm="syz.1.1515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 194.823223][ T5167] device syzkaller0 entered promiscuous mode [ 194.872529][ T24] audit: type=1400 audit(1732047779.899:156): avc: denied { append } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 194.911142][ T24] audit: type=1400 audit(1732047779.899:157): avc: denied { open } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 195.093760][ T24] audit: type=1400 audit(1732047779.899:158): avc: denied { getattr } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 195.320864][ T5180] bridge0: port 3(veth1) entered blocking state [ 195.387534][ T5180] bridge0: port 3(veth1) entered disabled state [ 195.491832][ T5180] device veth1 entered promiscuous mode [ 195.532331][ T5180] bridge0: port 3(veth1) entered blocking state [ 195.538440][ T5180] bridge0: port 3(veth1) entered forwarding state [ 198.064530][ T5249] device syzkaller0 entered promiscuous mode [ 199.462321][ T24] audit: type=1400 audit(1732047784.519:159): avc: denied { append } for pid=5287 comm="syz.2.1559" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 199.722548][ T5299] syz.1.1561[5299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.722598][ T5299] syz.1.1561[5299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.073158][ T5299] device wg2 entered promiscuous mode [ 200.535929][ T5315] device syzkaller0 entered promiscuous mode [ 200.769840][ T5330] syz.4.1574[5330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.774906][ T5330] syz.4.1574[5330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.093302][ T5400] device pim6reg1 entered promiscuous mode [ 202.112760][ T5405] syz.0.1599[5405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.112811][ T5405] syz.0.1599[5405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.177764][ T5405] syz.0.1599[5405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.225155][ T5412] device veth0_to_team entered promiscuous mode [ 202.242990][ T5405] syz.0.1599[5405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.807347][ T5602] syz.3.1665[5602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.877204][ T5602] syz.3.1665[5602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.031830][ T5611] device wg2 entered promiscuous mode [ 209.250738][ T5653] syz.0.1683[5653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.250787][ T5653] syz.0.1683[5653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.397459][ T5653] device wg2 left promiscuous mode [ 211.873114][ T5756] device veth1_macvtap left promiscuous mode [ 212.416168][ T5777] pim6reg0: tun_chr_ioctl cmd 1074025673 [ 212.427185][ T5775] pim6reg0: tun_chr_ioctl cmd 1074025698 [ 216.592570][ T5875] device syzkaller0 entered promiscuous mode [ 216.692520][ T5878] FAULT_INJECTION: forcing a failure. [ 216.692520][ T5878] name failslab, interval 1, probability 0, space 0, times 0 [ 216.816980][ T5878] CPU: 1 PID: 5878 Comm: syz.4.1761 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 216.828072][ T5878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 216.837958][ T5878] Call Trace: [ 216.841096][ T5878] dump_stack_lvl+0x1e2/0x24b [ 216.845602][ T5878] ? bfq_pos_tree_add_move+0x43b/0x43b [ 216.850899][ T5878] dump_stack+0x15/0x17 [ 216.854894][ T5878] should_fail+0x3c6/0x510 [ 216.859142][ T5878] ? __d_alloc+0x2d/0x6c0 [ 216.863395][ T5878] __should_failslab+0xa4/0xe0 [ 216.867998][ T5878] should_failslab+0x9/0x20 [ 216.872336][ T5878] kmem_cache_alloc+0x3d/0x2e0 [ 216.876937][ T5878] __d_alloc+0x2d/0x6c0 [ 216.880929][ T5878] ? _raw_spin_lock+0x1b0/0x1b0 [ 216.885616][ T5878] d_alloc_pseudo+0x1d/0x70 [ 216.889954][ T5878] alloc_file_pseudo+0x131/0x2f0 [ 216.894730][ T5878] ? alloc_empty_file_noaccount+0x80/0x80 [ 216.900284][ T5878] ? perf_event_alloc+0x15f8/0x1970 [ 216.905316][ T5878] anon_inode_getfile+0xa7/0x180 [ 216.910091][ T5878] __se_sys_perf_event_open+0xfe4/0x3c30 [ 216.915578][ T5878] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 216.921035][ T5878] ? __ia32_sys_read+0x90/0x90 [ 216.925630][ T5878] __x64_sys_perf_event_open+0xbf/0xd0 [ 216.930922][ T5878] do_syscall_64+0x34/0x70 [ 216.935188][ T5878] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 216.940901][ T5878] RIP: 0033:0x7f0357b6a759 [ 216.945155][ T5878] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 216.964591][ T5878] RSP: 002b:00007f03567e3038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 216.972846][ T5878] RAX: ffffffffffffffda RBX: 00007f0357d21f80 RCX: 00007f0357b6a759 [ 216.980646][ T5878] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 00000000200003c0 [ 216.988453][ T5878] RBP: 00007f03567e3090 R08: 0000000000000000 R09: 0000000000000000 [ 216.996264][ T5878] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 217.004077][ T5878] R13: 0000000000000001 R14: 00007f0357d21f80 R15: 00007ffc82f9af68 [ 219.919703][ T5994] syz.4.1803[5994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.919757][ T5994] syz.4.1803[5994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.944877][ T5991] syz.2.1804[5991] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.965840][ T5991] syz.2.1804[5991] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.126841][ T5991] device wg2 entered promiscuous mode [ 221.897818][ T6087] device pim6reg1 entered promiscuous mode [ 221.985141][ T6102] syz.1.1844[6102] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.985190][ T6102] syz.1.1844[6102] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.040952][ T6102] device wg2 left promiscuous mode [ 222.237387][ T6106] device wg2 entered promiscuous mode [ 222.672854][ T6131] device syzkaller0 entered promiscuous mode [ 223.040294][ T6147] syz.0.1862[6147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.040347][ T6147] syz.0.1862[6147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.251096][ T6154] device wg2 entered promiscuous mode [ 223.426743][ T6147] device wg2 left promiscuous mode [ 224.150134][ T6174] device syzkaller0 entered promiscuous mode [ 224.219061][ T6188] syz.3.1877[6188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.219137][ T6188] syz.3.1877[6188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.490387][ T6188] device wg2 left promiscuous mode [ 224.835704][ T6199] device syzkaller0 entered promiscuous mode [ 225.304954][ T6232] device syzkaller0 entered promiscuous mode [ 225.808338][ T6247] syz.0.1897[6247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.808389][ T6247] syz.0.1897[6247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.841299][ T6282] device syzkaller0 entered promiscuous mode [ 227.600816][ T6324] device syzkaller0 entered promiscuous mode [ 228.718786][ T6391] syz.3.1948[6391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.718832][ T6391] syz.3.1948[6391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.044324][ T6391] device wg2 entered promiscuous mode [ 230.760493][ T6476] syz.3.1977[6476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.760547][ T6476] syz.3.1977[6476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.832011][ T6476] device wg2 left promiscuous mode [ 231.927367][ T6523] syz.3.1996[6523] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.927419][ T6523] syz.3.1996[6523] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.116523][ T6523] device wg2 entered promiscuous mode [ 233.778545][ T6580] syz.2.2017[6580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.778598][ T6580] syz.2.2017[6580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.997939][ T6580] device wg2 left promiscuous mode [ 234.056017][ T6580] device wg2 entered promiscuous mode [ 234.335221][ T6592] device syzkaller0 entered promiscuous mode [ 235.602653][ T6634] syz.2.2036[6634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.602702][ T6634] syz.2.2036[6634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.616053][ T6628] device syzkaller0 entered promiscuous mode [ 235.809704][ T6634] device wg2 left promiscuous mode [ 235.868599][ T6635] device wg2 entered promiscuous mode [ 235.909370][ T6646] device macsec0 entered promiscuous mode [ 236.646984][ T6682] FAULT_INJECTION: forcing a failure. [ 236.646984][ T6682] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 236.798413][ T6682] CPU: 1 PID: 6682 Comm: syz.1.2051 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 236.809529][ T6682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 236.819407][ T6682] Call Trace: [ 236.822533][ T6682] dump_stack_lvl+0x1e2/0x24b [ 236.827040][ T6682] ? bfq_pos_tree_add_move+0x43b/0x43b [ 236.832340][ T6682] ? __kasan_record_aux_stack+0xd3/0x100 [ 236.837812][ T6682] dump_stack+0x15/0x17 [ 236.841884][ T6682] should_fail+0x3c6/0x510 [ 236.846135][ T6682] should_fail_usercopy+0x1a/0x20 [ 236.850999][ T6682] _copy_to_user+0x20/0x90 [ 236.855288][ T6682] simple_read_from_buffer+0xc7/0x150 [ 236.860459][ T6682] proc_fail_nth_read+0x1a3/0x210 [ 236.865319][ T6682] ? proc_fault_inject_write+0x390/0x390 [ 236.870789][ T6682] ? security_file_permission+0x86/0xb0 [ 236.876169][ T6682] ? rw_verify_area+0x1c3/0x360 [ 236.880870][ T6682] ? proc_fault_inject_write+0x390/0x390 [ 236.886415][ T6682] vfs_read+0x200/0xba0 [ 236.890404][ T6682] ? __kasan_check_read+0x11/0x20 [ 236.895276][ T6682] ? kernel_read+0x70/0x70 [ 236.899515][ T6682] ? __kasan_check_write+0x14/0x20 [ 236.904461][ T6682] ? mutex_lock+0xa5/0x110 [ 236.908800][ T6682] ? mutex_trylock+0xa0/0xa0 [ 236.913230][ T6682] ? __fdget_pos+0x2e7/0x3a0 [ 236.917652][ T6682] ? ksys_read+0x77/0x2c0 [ 236.921819][ T6682] ksys_read+0x199/0x2c0 [ 236.925895][ T6682] ? vfs_write+0xe70/0xe70 [ 236.930154][ T6682] ? fpu__clear_all+0x20/0x20 [ 236.934676][ T6682] ? __kasan_check_read+0x11/0x20 [ 236.939523][ T6682] __x64_sys_read+0x7b/0x90 [ 236.943873][ T6682] do_syscall_64+0x34/0x70 [ 236.948116][ T6682] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 236.953844][ T6682] RIP: 0033:0x7f88d4ebb19c [ 236.958094][ T6682] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 236.977535][ T6682] RSP: 002b:00007f88d3b35030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 236.985782][ T6682] RAX: ffffffffffffffda RBX: 00007f88d5073f80 RCX: 00007f88d4ebb19c [ 236.993591][ T6682] RDX: 000000000000000f RSI: 00007f88d3b350a0 RDI: 0000000000000005 [ 237.001408][ T6682] RBP: 00007f88d3b35090 R08: 0000000000000000 R09: 0000000000000000 [ 237.009219][ T6682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 237.017018][ T6682] R13: 0000000000000000 R14: 00007f88d5073f80 R15: 00007ffc7324fae8 [ 237.138066][ T6690] device wg2 left promiscuous mode [ 237.165705][ T6692] device syzkaller0 entered promiscuous mode [ 237.288837][ T6690] device wg2 entered promiscuous mode [ 237.577602][ T6709] device macsec0 left promiscuous mode [ 237.781632][ T6724] device veth1_macvtap left promiscuous mode [ 238.839805][ T6761] device wg2 left promiscuous mode [ 238.855551][ T6761] device wg2 entered promiscuous mode [ 238.887305][ T6759] device wg2 left promiscuous mode [ 238.894881][ T6759] device wg2 entered promiscuous mode [ 240.011167][ T6797] device wg2 left promiscuous mode [ 240.070092][ T6797] device wg2 entered promiscuous mode [ 241.226004][ T6840] device wg2 left promiscuous mode [ 241.334398][ T6841] device wg2 entered promiscuous mode [ 242.011474][ T6860] device syzkaller0 entered promiscuous mode [ 242.063120][ T6866] device syzkaller0 entered promiscuous mode [ 242.069742][ T6874] syz.0.2120[6874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.069788][ T6874] syz.0.2120[6874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.107216][ T6874] device wg2 entered promiscuous mode [ 242.454814][ T6891] device veth0_vlan left promiscuous mode [ 242.466043][ T6891] device veth0_vlan entered promiscuous mode [ 242.514160][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 242.547390][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 242.600540][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 242.647307][ T6902] syz.1.2134[6902] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.647359][ T6902] syz.1.2134[6902] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.698173][ T6902] device wg2 left promiscuous mode [ 242.779122][ T6902] device wg2 entered promiscuous mode [ 242.891724][ T6921] FAULT_INJECTION: forcing a failure. [ 242.891724][ T6921] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 242.934796][ T6921] CPU: 0 PID: 6921 Comm: syz.1.2141 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 242.945901][ T6921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 242.955785][ T6921] Call Trace: [ 242.958931][ T6921] dump_stack_lvl+0x1e2/0x24b [ 242.963430][ T6921] ? bfq_pos_tree_add_move+0x43b/0x43b [ 242.968731][ T6921] dump_stack+0x15/0x17 [ 242.972718][ T6921] should_fail+0x3c6/0x510 [ 242.976971][ T6921] should_fail_alloc_page+0x52/0x60 [ 242.982446][ T6921] __alloc_pages_nodemask+0x1b3/0xaf0 [ 242.987647][ T6921] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 242.993027][ T6921] kmalloc_order+0x4c/0x170 [ 242.997362][ T6921] kmalloc_order_trace+0x18/0x90 [ 243.002135][ T6921] ? alloc_skb_with_frags+0xa1/0x570 [ 243.007258][ T6921] __kmalloc_track_caller+0x1dd/0x320 [ 243.012463][ T6921] ? __alloc_skb+0x80/0x510 [ 243.016801][ T6921] ? alloc_skb_with_frags+0xa1/0x570 [ 243.021923][ T6921] __alloc_skb+0xbc/0x510 [ 243.026090][ T6921] alloc_skb_with_frags+0xa1/0x570 [ 243.031036][ T6921] ? unwind_get_return_address+0x4d/0x90 [ 243.036501][ T6921] ? bpf_trace_run2+0xef/0x280 [ 243.041102][ T6921] ? is_bpf_text_address+0x172/0x190 [ 243.046223][ T6921] sock_alloc_send_pskb+0x915/0xa50 [ 243.051259][ T6921] ? sock_kzfree_s+0x60/0x60 [ 243.055688][ T6921] ? debug_smp_processor_id+0x17/0x20 [ 243.060892][ T6921] ? get_perf_callchain+0x5cb/0x810 [ 243.065928][ T6921] tun_get_user+0xe90/0x38f0 [ 243.070357][ T6921] ? _kstrtoull+0x3a0/0x4a0 [ 243.074698][ T6921] ? tun_do_read+0x1f60/0x1f60 [ 243.079291][ T6921] ? kstrtouint_from_user+0x20a/0x2a0 [ 243.084498][ T6921] ? kstrtol_from_user+0x310/0x310 [ 243.089451][ T6921] ? avc_policy_seqno+0x1b/0x70 [ 243.094131][ T6921] ? selinux_file_permission+0x2bb/0x560 [ 243.099603][ T6921] ? fsnotify_perm+0x67/0x4e0 [ 243.104116][ T6921] tun_chr_write_iter+0x1a8/0x250 [ 243.108974][ T6921] vfs_write+0xb4c/0xe70 [ 243.113055][ T6921] ? kernel_write+0x3d0/0x3d0 [ 243.117568][ T6921] ? __fdget_pos+0x209/0x3a0 [ 243.121989][ T6921] ? ksys_write+0x77/0x2c0 [ 243.126245][ T6921] ksys_write+0x199/0x2c0 [ 243.130411][ T6921] ? __ia32_sys_read+0x90/0x90 [ 243.135013][ T6921] ? debug_smp_processor_id+0x17/0x20 [ 243.140218][ T6921] __x64_sys_write+0x7b/0x90 [ 243.144642][ T6921] do_syscall_64+0x34/0x70 [ 243.148900][ T6921] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 243.154623][ T6921] RIP: 0033:0x7f88d4ebc759 [ 243.158880][ T6921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 243.178319][ T6921] RSP: 002b:00007f88d3b35038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 243.186564][ T6921] RAX: ffffffffffffffda RBX: 00007f88d5073f80 RCX: 00007f88d4ebc759 [ 243.194387][ T6921] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 243.202186][ T6921] RBP: 00007f88d3b35090 R08: 0000000000000000 R09: 0000000000000000 [ 243.210003][ T6921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 243.217815][ T6921] R13: 0000000000000000 R14: 00007f88d5073f80 R15: 00007ffc7324fae8 [ 243.339150][ T6924] device pim6reg1 entered promiscuous mode [ 245.350012][ T7007] cgroup: fork rejected by pids controller in /syz3 [ 245.974076][ T7027] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.981160][ T7027] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.988527][ T7027] device bridge_slave_0 entered promiscuous mode [ 245.995281][ T7027] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.002134][ T7027] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.009487][ T7027] device bridge_slave_1 entered promiscuous mode [ 246.246930][ T7032] device veth1_macvtap entered promiscuous mode [ 246.276120][ T7032] device veth1_macvtap left promiscuous mode [ 246.309822][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.374127][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.530618][ T322] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.537500][ T322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.728691][ T24] audit: type=1400 audit(1732047831.789:160): avc: denied { create } for pid=7041 comm="syz.4.2179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 246.750754][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 246.781266][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.793870][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.802425][ T322] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.809288][ T322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.892242][ T7027] device veth0_vlan entered promiscuous mode [ 246.937718][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 246.945866][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 246.956613][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 246.964497][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 247.063351][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 247.141411][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 247.213718][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 247.287905][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.346359][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 247.398002][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.460911][ T7059] device sit0 left promiscuous mode [ 247.520413][ T7027] device veth1_macvtap entered promiscuous mode [ 247.627303][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 247.729798][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 247.737952][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 247.869980][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 247.907859][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 248.077465][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 248.227131][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 248.388555][ T24] audit: type=1400 audit(1732047833.449:161): avc: denied { mounton } for pid=7027 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 248.488301][ T7093] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 248.498977][ T7093] device syzkaller0 entered promiscuous mode [ 249.283106][ T7168] device syzkaller0 entered promiscuous mode [ 249.555160][ T7198] device sit0 left promiscuous mode [ 249.681470][ T7198] device sit0 entered promiscuous mode [ 250.092907][ T7208] device veth0_to_team entered promiscuous mode [ 250.284011][ T581] device veth0_to_team left promiscuous mode [ 250.290137][ T581] Ÿë: port 1(veth0_to_team) entered disabled state [ 250.324392][ T581] device veth0_vlan left promiscuous mode [ 250.337954][ T7245] FAULT_INJECTION: forcing a failure. [ 250.337954][ T7245] name failslab, interval 1, probability 0, space 0, times 0 [ 250.367072][ T7245] CPU: 1 PID: 7245 Comm: syz.4.2245 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 250.378167][ T7245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 250.388055][ T7245] Call Trace: [ 250.391188][ T7245] dump_stack_lvl+0x1e2/0x24b [ 250.395695][ T7245] ? panic+0x812/0x812 [ 250.399601][ T7245] ? bfq_pos_tree_add_move+0x43b/0x43b [ 250.404902][ T7245] ? avc_has_perm+0x14d/0x400 [ 250.409411][ T7245] ? memcpy+0x56/0x70 [ 250.413233][ T7245] dump_stack+0x15/0x17 [ 250.417224][ T7245] should_fail+0x3c6/0x510 [ 250.421474][ T7245] ? __alloc_skb+0x80/0x510 [ 250.425816][ T7245] __should_failslab+0xa4/0xe0 [ 250.430421][ T7245] should_failslab+0x9/0x20 [ 250.434759][ T7245] kmem_cache_alloc+0x3d/0x2e0 [ 250.439354][ T7245] __alloc_skb+0x80/0x510 [ 250.443520][ T7245] ? strncpy_from_kernel_nofault+0x92/0x1e0 [ 250.449251][ T7245] alloc_skb_with_frags+0xa1/0x570 [ 250.454199][ T7245] ? ex_handler_fprestore+0xf0/0xf0 [ 250.459231][ T7245] ? fixup_exception+0x94/0xd0 [ 250.463833][ T7245] sock_alloc_send_pskb+0x915/0xa50 [ 250.468873][ T7245] ? sock_kzfree_s+0x60/0x60 [ 250.473293][ T7245] ? stack_trace_save+0x113/0x1c0 [ 250.478155][ T7245] ? __bad_area_nosemaphore+0xc4/0x430 [ 250.483449][ T7245] tun_get_user+0xe90/0x38f0 [ 250.487874][ T7245] ? exc_page_fault+0x33d/0x5b0 [ 250.492558][ T7245] ? _kstrtoull+0x3a0/0x4a0 [ 250.496905][ T7245] ? tun_do_read+0x1f60/0x1f60 [ 250.501498][ T7245] ? kstrtouint_from_user+0x20a/0x2a0 [ 250.506702][ T7245] ? copy_from_kernel_nofault_allowed+0x92/0xd0 [ 250.512787][ T7245] ? kstrtol_from_user+0x310/0x310 [ 250.517724][ T7245] ? strncpy_from_kernel_nofault+0x1c2/0x1e0 [ 250.523542][ T7245] ? avc_policy_seqno+0x1b/0x70 [ 250.528225][ T7245] ? selinux_file_permission+0x2bb/0x560 [ 250.533694][ T7245] ? fsnotify_perm+0x67/0x4e0 [ 250.538210][ T7245] tun_chr_write_iter+0x1a8/0x250 [ 250.543065][ T7245] vfs_write+0xb4c/0xe70 [ 250.547154][ T7245] ? kernel_write+0x3d0/0x3d0 [ 250.551661][ T7245] ? __fdget_pos+0x209/0x3a0 [ 250.556082][ T7245] ? ksys_write+0x77/0x2c0 [ 250.560334][ T7245] ksys_write+0x199/0x2c0 [ 250.564501][ T7245] ? __ia32_sys_read+0x90/0x90 [ 250.569105][ T7245] ? debug_smp_processor_id+0x17/0x20 [ 250.574334][ T7245] __x64_sys_write+0x7b/0x90 [ 250.578739][ T7245] do_syscall_64+0x34/0x70 [ 250.582992][ T7245] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 250.588721][ T7245] RIP: 0033:0x7f0357b6a759 [ 250.592974][ T7245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 250.612417][ T7245] RSP: 002b:00007f03567e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 250.620656][ T7245] RAX: ffffffffffffffda RBX: 00007f0357d21f80 RCX: 00007f0357b6a759 [ 250.628463][ T7245] RDX: 000000000000fdef RSI: 0000000020000580 RDI: 00000000000000c8 [ 250.636276][ T7245] RBP: 00007f03567e3090 R08: 0000000000000000 R09: 0000000000000000 [ 250.644087][ T7245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 250.651898][ T7245] R13: 0000000000000000 R14: 00007f0357d21f80 R15: 00007ffc82f9af68 [ 250.828148][ T7248] 8: renamed from ipvlan1 [ 253.678323][ T7345] syz.1.2278[7345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.678378][ T7345] syz.1.2278[7345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.910095][ T7354] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 254.074078][ T7354] device syzkaller0 entered promiscuous mode [ 254.275567][ T7362] device wg2 left promiscuous mode [ 254.339877][ T7364] device wg2 entered promiscuous mode [ 254.795944][ T7384] device pim6reg1 entered promiscuous mode [ 254.961555][ T7388] syz.2.2292[7388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.961607][ T7388] syz.2.2292[7388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.013866][ T7388] device pim6reg1 entered promiscuous mode [ 255.068871][ T7402] syz.4.2297[7402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.068926][ T7402] syz.4.2297[7402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.111474][ T7405] device wg2 left promiscuous mode [ 255.220809][ T7402] device wg2 entered promiscuous mode [ 256.155617][ T7421] device syzkaller0 entered promiscuous mode [ 256.389411][ T7438] syz.2.2308[7438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.389466][ T7438] syz.2.2308[7438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.481302][ T7438] device wg2 left promiscuous mode [ 256.652461][ T7438] device wg2 entered promiscuous mode [ 256.783636][ T7455] device veth1_macvtap entered promiscuous mode [ 256.800913][ T7455] device macsec0 entered promiscuous mode [ 256.861491][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 257.304662][ T7485] syz.1.2323[7485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.304726][ T7485] syz.1.2323[7485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.328408][ T7483] device syzkaller0 entered promiscuous mode [ 257.622834][ T7490] device sit0 left promiscuous mode [ 257.638990][ T7490] device sit0 entered promiscuous mode [ 257.770912][ T7507] device pim6reg1 entered promiscuous mode [ 258.192482][ T7522] device syzkaller0 entered promiscuous mode [ 258.378202][ T7538] device syzkaller0 entered promiscuous mode [ 258.919849][ T7570] device syzkaller0 entered promiscuous mode [ 258.973007][ T7575] bpf_get_probe_write_proto: 4 callbacks suppressed [ 258.973016][ T7575] syz.0.2356[7575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.127086][ T7575] syz.0.2356[7575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.879437][ T7599] device sit0 left promiscuous mode [ 260.277581][ T7599] device sit0 entered promiscuous mode [ 261.308156][ T7623] syz.0.2368[7623] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.308210][ T7623] syz.0.2368[7623] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.446371][ T7624] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 261.608028][ T7624] device syzkaller0 entered promiscuous mode [ 262.308968][ T7647] device syzkaller0 entered promiscuous mode [ 262.326554][ T7656] Â: renamed from pim6reg1 [ 262.359884][ T7660] -: renamed from syzkaller0 [ 263.132201][ T7733] syz.4.2411[7733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.132255][ T7733] syz.4.2411[7733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.184103][ T7738] device syzkaller0 entered promiscuous mode [ 264.144695][ T7770] device syzkaller0 entered promiscuous mode [ 264.437263][ T7794] device wg2 left promiscuous mode [ 264.459182][ T7794] device wg2 entered promiscuous mode [ 265.246212][ T7822] device syzkaller0 entered promiscuous mode [ 265.546026][ T7832] device wg2 left promiscuous mode [ 265.656264][ T7832] device wg2 entered promiscuous mode [ 266.060645][ T7845] device syzkaller0 entered promiscuous mode [ 266.827097][ T7877] device wg2 entered promiscuous mode [ 268.491350][ T24] audit: type=1400 audit(1732047853.549:162): avc: denied { create } for pid=7903 comm="syz.3.2468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 270.119291][ T7973] bridge0: port 3(veth1) entered disabled state [ 270.127779][ T7973] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.140740][ T7973] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.541281][ T7981] bridge0: port 3(veth1) entered blocking state [ 270.547375][ T7981] bridge0: port 3(veth1) entered forwarding state [ 270.553676][ T7981] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.560504][ T7981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.567576][ T7981] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.574461][ T7981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.837805][ T7981] device bridge0 entered promiscuous mode [ 270.970524][ T7988] device wg2 left promiscuous mode [ 270.991221][ T7990] device wg2 entered promiscuous mode [ 271.107341][ T7995] device pim6reg1 entered promiscuous mode [ 271.523781][ T8029] device wg2 left promiscuous mode [ 271.576519][ T8030] device wg2 entered promiscuous mode [ 272.138949][ T24] audit: type=1400 audit(1732047857.189:163): avc: denied { create } for pid=8039 comm="syz.0.2510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 272.143225][ T8045] device syzkaller0 entered promiscuous mode [ 272.553630][ T8092] device pim6reg1 entered promiscuous mode [ 273.108881][ T8123] ÿÿÿÿÿÿ: renamed from vlan1 [ 273.275821][ T8132] syz.2.2538[8132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.275878][ T8132] syz.2.2538[8132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.426672][ T8221] device wg2 left promiscuous mode [ 276.465177][ T8221] device wg2 entered promiscuous mode [ 276.831046][ T8238] device syzkaller0 entered promiscuous mode [ 276.995130][ T8245] device veth1_macvtap left promiscuous mode [ 277.002619][ T8245] device macsec0 left promiscuous mode [ 277.190948][ T8252] device veth1_macvtap entered promiscuous mode [ 277.209083][ T8252] device macsec0 entered promiscuous mode [ 278.010762][ T8279] bridge0: port 3(veth0) entered blocking state [ 278.047457][ T8279] bridge0: port 3(veth0) entered disabled state [ 278.053926][ T8279] device veth0 entered promiscuous mode [ 278.231336][ T8291] device syzkaller0 entered promiscuous mode [ 278.622007][ T8304] device wg2 left promiscuous mode [ 278.700502][ T8304] device wg2 entered promiscuous mode [ 279.183917][ T8319] device syzkaller0 entered promiscuous mode [ 279.384578][ T8325] device syzkaller0 entered promiscuous mode [ 279.684244][ T8342] device wg2 left promiscuous mode [ 279.774140][ T8348] device wg2 entered promiscuous mode [ 280.260670][ T8360] FAULT_INJECTION: forcing a failure. [ 280.260670][ T8360] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 280.357271][ T8360] CPU: 1 PID: 8360 Comm: syz.0.2614 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 280.368368][ T8360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 280.378262][ T8360] Call Trace: [ 280.381389][ T8360] dump_stack_lvl+0x1e2/0x24b [ 280.385902][ T8360] ? bfq_pos_tree_add_move+0x43b/0x43b [ 280.391192][ T8360] ? memset+0x35/0x40 [ 280.395027][ T8360] dump_stack+0x15/0x17 [ 280.399006][ T8360] should_fail+0x3c6/0x510 [ 280.403257][ T8360] should_fail_usercopy+0x1a/0x20 [ 280.408123][ T8360] _copy_from_user+0x20/0xd0 [ 280.412542][ T8360] __se_sys_bpf+0x232/0x11cb0 [ 280.417054][ T8360] ? visit_groups_merge+0x2434/0x24b0 [ 280.422265][ T8360] ? perf_event_output_forward+0x14e/0x1b0 [ 280.427907][ T8360] ? perf_prepare_sample+0x1af0/0x1af0 [ 280.433201][ T8360] ? __x64_sys_bpf+0x90/0x90 [ 280.437628][ T8360] ? __this_cpu_preempt_check+0x13/0x20 [ 280.443007][ T8360] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 280.449083][ T8360] ? hrtimer_forward+0x1a6/0x2c0 [ 280.453856][ T8360] ? perf_swevent_hrtimer+0x4b8/0x560 [ 280.459068][ T8360] ? _raw_spin_unlock+0x4d/0x70 [ 280.463744][ T8360] ? cpu_clock_event_read+0x50/0x50 [ 280.468780][ T8360] ? timerqueue_add+0x24c/0x270 [ 280.473463][ T8360] ? enqueue_hrtimer+0xad/0x200 [ 280.478149][ T8360] ? __hrtimer_run_queues+0x438/0xa50 [ 280.483359][ T8360] ? __hrtimer_run_queues+0x9ea/0xa50 [ 280.488584][ T8360] ? ktime_get+0x10e/0x140 [ 280.492829][ T8360] ? lapic_next_event+0x5f/0x70 [ 280.497509][ T8360] ? clockevents_program_event+0x214/0x2c0 [ 280.503155][ T8360] ? hrtimer_interrupt+0x6a8/0x8b0 [ 280.508104][ T8360] ? debug_smp_processor_id+0x17/0x20 [ 280.513305][ T8360] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 280.519205][ T8360] __x64_sys_bpf+0x7b/0x90 [ 280.523457][ T8360] do_syscall_64+0x34/0x70 [ 280.527708][ T8360] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 280.533438][ T8360] RIP: 0033:0x7fe9127fe759 [ 280.537691][ T8360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 280.557488][ T8360] RSP: 002b:00007fe911456038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 280.565723][ T8360] RAX: ffffffffffffffda RBX: 00007fe9129b6058 RCX: 00007fe9127fe759 [ 280.573530][ T8360] RDX: 0000000000000078 RSI: 0000000020000440 RDI: 0000000000000005 [ 280.581342][ T8360] RBP: 00007fe911456090 R08: 0000000000000000 R09: 0000000000000000 [ 280.589153][ T8360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 280.596963][ T8360] R13: 0000000000000000 R14: 00007fe9129b6058 R15: 00007ffd6b6361b8 [ 281.361206][ T8417] device syzkaller0 entered promiscuous mode [ 281.383135][ T24] audit: type=1400 audit(1732047866.439:164): avc: denied { create } for pid=8418 comm="syz.4.2634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 283.502034][ T8498] device syzkaller0 entered promiscuous mode [ 283.537277][ T8503] syz.0.2658[8503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.537327][ T8503] syz.0.2658[8503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.514733][ T8525] device syzkaller0 entered promiscuous mode [ 285.301079][ T8546] device wg2 left promiscuous mode [ 285.367698][ T8546] device wg2 entered promiscuous mode [ 285.720458][ T8565] device syzkaller0 entered promiscuous mode [ 288.798129][ T8649] device pim6reg1 entered promiscuous mode [ 290.039752][ T8684] device pim6reg1 entered promiscuous mode [ 290.967641][ T8715] device syzkaller0 entered promiscuous mode [ 291.982818][ T8763] device wg2 left promiscuous mode [ 292.121634][ T8763] device wg2 entered promiscuous mode [ 293.415731][ T8800] device pim6reg1 entered promiscuous mode [ 293.574876][ T8811] device syzkaller0 entered promiscuous mode [ 293.846948][ T8816] device wg2 left promiscuous mode [ 294.031406][ T8821] device wg2 entered promiscuous mode [ 295.453927][ T8882] device syzkaller0 entered promiscuous mode [ 296.691252][ T8917] device sit0 left promiscuous mode [ 298.436185][ T8973] device syzkaller0 entered promiscuous mode [ 298.730633][ T8962] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.744640][ T8962] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.902865][ T8962] device bridge_slave_0 entered promiscuous mode [ 299.033738][ T8962] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.189419][ T8962] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.196678][ T8962] device bridge_slave_1 entered promiscuous mode [ 299.637524][ T9010] device syzkaller0 entered promiscuous mode [ 299.746959][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 299.754490][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 299.778004][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 299.787206][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 299.795364][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.802250][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.825659][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 299.839272][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 299.857557][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.864401][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.918154][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 299.942630][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 299.951901][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 299.967985][ T9030] device veth1_macvtap left promiscuous mode [ 299.974021][ T9030] device macsec0 entered promiscuous mode [ 299.985995][ T581] device bridge_slave_1 left promiscuous mode [ 299.994307][ T581] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.016010][ T581] device bridge_slave_0 left promiscuous mode [ 300.022162][ T581] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.168323][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 300.190544][ T8962] device veth0_vlan entered promiscuous mode [ 300.196973][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 300.207080][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 300.216097][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 300.230671][ T9042] device syzkaller0 entered promiscuous mode [ 300.249690][ T8962] device veth1_macvtap entered promiscuous mode [ 300.257263][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 300.280984][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 300.314669][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 300.403544][ T9059] device wg2 left promiscuous mode [ 300.410704][ T9059] device wg2 entered promiscuous mode [ 300.923686][ T9079] device syzkaller0 entered promiscuous mode [ 301.239664][ T9092] device veth1_macvtap left promiscuous mode [ 301.245559][ T9092] device macsec0 entered promiscuous mode [ 301.252768][ T9093] device wg2 left promiscuous mode [ 301.270416][ T9093] device wg2 entered promiscuous mode [ 301.413505][ T9112] device syzkaller0 entered promiscuous mode [ 301.485209][ T9116] device wg2 left promiscuous mode [ 301.496508][ T9116] device wg2 entered promiscuous mode [ 302.000436][ T9133] tun1: tun_chr_ioctl cmd 2147767520 [ 302.839345][ T9140] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.846193][ T9140] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.921409][ T9140] device bridge_slave_0 entered promiscuous mode [ 303.137886][ T9140] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.164736][ T9140] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.172451][ T9140] device bridge_slave_1 entered promiscuous mode [ 303.642888][ T9159] device syzkaller0 entered promiscuous mode [ 303.651777][ T9155] bridge0: port 3(veth0) entered blocking state [ 303.657989][ T9155] bridge0: port 3(veth0) entered disabled state [ 303.666581][ T9155] device veth0 entered promiscuous mode [ 303.674470][ T9155] bridge0: port 3(veth0) entered blocking state [ 303.680552][ T9155] bridge0: port 3(veth0) entered forwarding state [ 304.675643][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 304.683505][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 304.757671][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 304.765745][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 304.773976][ T581] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.780866][ T581] bridge0: port 1(bridge_slave_0) entered forwarding state [ 304.788037][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 304.796212][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 304.804222][ T581] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.811050][ T581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.818496][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 304.826336][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.834120][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 304.842021][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.849853][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 304.857951][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 304.865963][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 304.877281][ T9140] device veth0_vlan entered promiscuous mode [ 304.888882][ T9140] device veth1_macvtap entered promiscuous mode [ 304.933931][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 304.941823][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 304.950403][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 304.959129][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 304.967398][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 304.974873][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 304.995129][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 305.024188][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 305.054670][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 305.226205][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 305.242648][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 306.111161][ T9193] Â: renamed from pim6reg1 [ 306.204271][ T9193] tap0: tun_chr_ioctl cmd 2147767506 [ 309.838303][ T9263] device veth1_macvtap left promiscuous mode [ 309.844215][ T9263] device macsec0 entered promiscuous mode [ 310.787824][ T9295] device syzkaller0 entered promiscuous mode [ 311.193409][ T9316] device wg2 left promiscuous mode [ 311.450696][ T9320] device wg2 entered promiscuous mode [ 314.624286][ T9373] device syzkaller0 entered promiscuous mode [ 315.485938][ T9410] device veth0_vlan left promiscuous mode [ 315.650066][ T9410] device veth0_vlan entered promiscuous mode [ 315.893152][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 315.901421][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 315.908925][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 315.970167][ T9421] device wg2 entered promiscuous mode [ 316.051680][ T9434] device syzkaller0 entered promiscuous mode [ 316.948607][ T9464] device wg2 left promiscuous mode [ 317.022583][ T9467] device wg2 entered promiscuous mode [ 318.918908][ T9501] device pim6reg1 entered promiscuous mode [ 318.926604][ T9509] device sit0 entered promiscuous mode [ 319.684794][ T9523] syz.4.2984[9523] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.684847][ T9523] syz.4.2984[9523] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.205908][ T9534] device sit0 entered promiscuous mode [ 320.888775][ T9544] syz.4.2991[9544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.888826][ T9544] syz.4.2991[9544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.448168][ T9601] FAULT_INJECTION: forcing a failure. [ 323.448168][ T9601] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 323.490660][ T9601] CPU: 1 PID: 9601 Comm: syz.3.3008 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 323.501749][ T9601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 323.511638][ T9601] Call Trace: [ 323.514777][ T9601] dump_stack_lvl+0x1e2/0x24b [ 323.519281][ T9601] ? bfq_pos_tree_add_move+0x43b/0x43b [ 323.524580][ T9601] dump_stack+0x15/0x17 [ 323.528565][ T9601] should_fail+0x3c6/0x510 [ 323.532823][ T9601] should_fail_usercopy+0x1a/0x20 [ 323.537681][ T9601] _copy_to_user+0x20/0x90 [ 323.542019][ T9601] simple_read_from_buffer+0xc7/0x150 [ 323.547229][ T9601] proc_fail_nth_read+0x1a3/0x210 [ 323.552088][ T9601] ? proc_fault_inject_write+0x390/0x390 [ 323.557557][ T9601] ? security_file_permission+0x86/0xb0 [ 323.562944][ T9601] ? rw_verify_area+0x1c3/0x360 [ 323.567711][ T9601] ? proc_fault_inject_write+0x390/0x390 [ 323.573179][ T9601] vfs_read+0x200/0xba0 [ 323.577170][ T9601] ? kernel_read+0x70/0x70 [ 323.581423][ T9601] ? __kasan_check_write+0x14/0x20 [ 323.586369][ T9601] ? mutex_lock+0xa5/0x110 [ 323.590619][ T9601] ? mutex_trylock+0xa0/0xa0 [ 323.595048][ T9601] ? __fdget_pos+0x2e7/0x3a0 [ 323.599471][ T9601] ? ksys_read+0x77/0x2c0 [ 323.603639][ T9601] ksys_read+0x199/0x2c0 [ 323.607719][ T9601] ? vfs_write+0xe70/0xe70 [ 323.611975][ T9601] ? debug_smp_processor_id+0x17/0x20 [ 323.617182][ T9601] __x64_sys_read+0x7b/0x90 [ 323.621521][ T9601] do_syscall_64+0x34/0x70 [ 323.625776][ T9601] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 323.631497][ T9601] RIP: 0033:0x7fcba9e9719c [ 323.635756][ T9601] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 323.655196][ T9601] RSP: 002b:00007fcba8b11030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 323.663442][ T9601] RAX: ffffffffffffffda RBX: 00007fcbaa04ff80 RCX: 00007fcba9e9719c [ 323.671252][ T9601] RDX: 000000000000000f RSI: 00007fcba8b110a0 RDI: 0000000000000007 [ 323.679062][ T9601] RBP: 00007fcba8b11090 R08: 0000000000000000 R09: 0000000000000000 [ 323.686871][ T9601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 323.694682][ T9601] R13: 0000000000000000 R14: 00007fcbaa04ff80 R15: 00007ffd0ef601f8 [ 323.729456][ T9586] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.736348][ T9586] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.758624][ T9586] device bridge_slave_0 entered promiscuous mode [ 323.775664][ T9586] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.783091][ T9586] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.791287][ T9586] device bridge_slave_1 entered promiscuous mode [ 323.927584][ T9611] device syzkaller0 entered promiscuous mode [ 324.066528][ T9586] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.073402][ T9586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.080489][ T9586] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.087269][ T9586] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.196166][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 324.204635][ T581] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.212395][ T581] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.230343][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 324.238339][ T581] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.245171][ T581] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.262306][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 324.271208][ T9621] syz.2.3014[9621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.271256][ T9621] syz.2.3014[9621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.276168][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.300326][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.329221][ T9618] device syzkaller0 entered promiscuous mode [ 324.341533][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 324.370383][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 324.497076][ T24] audit: type=1400 audit(1732047909.549:165): avc: denied { create } for pid=9617 comm="syz.0.3013" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 324.628013][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 324.679453][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 324.769375][ T322] device veth0_vlan left promiscuous mode [ 325.140824][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 325.177629][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 325.221121][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 325.249084][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 325.288352][ T9586] device veth0_vlan entered promiscuous mode [ 325.501781][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 325.530363][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 325.558364][ T9586] device veth1_macvtap entered promiscuous mode [ 325.577926][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 325.587061][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 325.623815][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 325.637601][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 329.614079][ T9814] device veth0_vlan left promiscuous mode [ 329.674090][ T9814] device veth0_vlan entered promiscuous mode [ 329.772554][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.789523][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 329.797173][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 333.159927][ T9925] syz.1.3102[9925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.159985][ T9925] syz.1.3102[9925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.906110][ T9952] device sit0 left promiscuous mode [ 335.709878][ T9971] device syzkaller0 entered promiscuous mode [ 336.316954][ T9992] device veth0_vlan left promiscuous mode [ 336.412400][ T9992] device veth0_vlan entered promiscuous mode [ 336.562704][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 336.579874][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 336.597524][ T581] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 336.937744][T10002] device sit0 entered promiscuous mode [ 337.977521][T10026] syz.0.3130[10026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.977586][T10026] syz.0.3130[10026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.844926][T10081] device pim6reg1 entered promiscuous mode [ 339.917393][T10087] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.928481][T10087] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.043726][T10089] device bridge_slave_1 left promiscuous mode [ 340.053399][T10089] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.136338][T10089] device bridge_slave_0 left promiscuous mode [ 340.202586][T10089] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.616710][T10116] device pim6reg1 entered promiscuous mode [ 341.279547][T10154] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.286394][T10154] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.296016][T10154] device bridge_slave_0 entered promiscuous mode [ 341.386887][T10154] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.421607][T10154] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.451110][T10154] device bridge_slave_1 entered promiscuous mode [ 342.189222][T10184] device sit0 entered promiscuous mode [ 342.792934][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 342.812597][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 342.862252][ T24] audit: type=1400 audit(1732047927.919:166): avc: denied { create } for pid=10199 comm="syz.4.3181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 342.883142][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 342.901864][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 342.920060][ T322] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.926937][ T322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.030774][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 343.039184][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 343.047560][ T322] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.054409][ T322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.062434][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 343.098833][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 343.113816][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 343.152389][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 343.215595][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 343.234395][T10212] device pim6reg1 entered promiscuous mode [ 343.248783][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 343.257950][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 343.270566][T10154] device veth0_vlan entered promiscuous mode [ 343.466376][T10154] device veth1_macvtap entered promiscuous mode [ 343.581075][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 343.624442][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 343.706968][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 343.755523][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 343.810772][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 343.888207][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 343.946561][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 344.025977][T10224] device pim6reg1 entered promiscuous mode [ 344.067137][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 344.085295][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 344.093644][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 344.102973][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 344.402670][T10247] syz.0.3195[10247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.402727][T10247] syz.0.3195[10247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.608612][T10251] device wg2 entered promiscuous mode [ 344.850291][ T49] device veth1 left promiscuous mode [ 344.855728][ T49] bridge0: port 3(veth1) entered disabled state [ 344.894113][ T49] device bridge_slave_1 left promiscuous mode [ 344.900871][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.908230][ T49] device bridge_slave_0 left promiscuous mode [ 344.914173][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.922252][ T49] device veth0_vlan left promiscuous mode [ 345.029676][T10274] syz.2.3202[10274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.029736][T10274] syz.2.3202[10274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.042805][T10304] device pim6reg1 entered promiscuous mode [ 346.267445][T10321] syz.3.3217[10321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.267497][T10321] syz.3.3217[10321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.414050][T10324] device bridge0 entered promiscuous mode [ 346.575677][T10321] device wg2 left promiscuous mode [ 346.584685][T10326] device wg2 entered promiscuous mode [ 346.722463][T10334] syz.1.3222[10334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.722514][T10334] syz.1.3222[10334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.754521][T10334] syz.1.3222[10334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.959853][T10356] syz.1.3226[10356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.152993][ T24] audit: type=1400 audit(1732047932.209:167): avc: denied { attach_queue } for pid=10365 comm="syz.1.3229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 348.227792][T10377] ÿÿÿÿÿÿ: renamed from vlan1 [ 348.317798][T10391] device pim6reg1 entered promiscuous mode [ 348.805436][T10402] device veth0_vlan left promiscuous mode [ 348.953455][T10402] device veth0_vlan entered promiscuous mode [ 349.253941][ T7] bridge0: port 3(veth0) entered disabled state [ 349.738756][T10429] device ip_vti0 entered promiscuous mode [ 350.180388][T10442] device syzkaller0 entered promiscuous mode [ 352.377003][T10501] device wg2 left promiscuous mode [ 352.436994][T10501] device wg2 entered promiscuous mode [ 354.420476][T10532] device wg2 left promiscuous mode [ 354.527408][T10532] bpf_get_probe_write_proto: 3 callbacks suppressed [ 354.527418][T10532] syz.3.3275[10532] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.564127][T10536] device veth0_vlan left promiscuous mode [ 354.590760][T10532] syz.3.3275[10532] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.634779][T10536] device veth0_vlan entered promiscuous mode [ 354.818009][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 354.855119][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 354.960701][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 354.987313][T10532] device wg2 entered promiscuous mode [ 355.040456][T10545] FAULT_INJECTION: forcing a failure. [ 355.040456][T10545] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 355.109048][T10545] CPU: 0 PID: 10545 Comm: syz.2.3280 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 355.120226][T10545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 355.130119][T10545] Call Trace: [ 355.133253][T10545] dump_stack_lvl+0x1e2/0x24b [ 355.137761][T10545] ? bfq_pos_tree_add_move+0x43b/0x43b [ 355.143059][T10545] ? kmem_cache_free+0xa9/0x1e0 [ 355.147739][T10545] dump_stack+0x15/0x17 [ 355.151732][T10545] should_fail+0x3c6/0x510 [ 355.155986][T10545] should_fail_usercopy+0x1a/0x20 [ 355.160849][T10545] _copy_from_user+0x20/0xd0 [ 355.165278][T10545] __copy_msghdr_from_user+0xaf/0x7c0 [ 355.170482][T10545] ? __ia32_sys_shutdown+0x70/0x70 [ 355.175430][T10545] ___sys_sendmsg+0x166/0x2e0 [ 355.179941][T10545] ? __sys_sendmsg+0x280/0x280 [ 355.184541][T10545] ? rw_verify_area+0x1c3/0x360 [ 355.189237][T10545] ? __fdget+0x1bc/0x240 [ 355.193311][T10545] __se_sys_sendmsg+0x1b1/0x280 [ 355.197993][T10545] ? __x64_sys_sendmsg+0x90/0x90 [ 355.202772][T10545] ? ksys_write+0x260/0x2c0 [ 355.207112][T10545] ? debug_smp_processor_id+0x17/0x20 [ 355.212316][T10545] __x64_sys_sendmsg+0x7b/0x90 [ 355.216916][T10545] do_syscall_64+0x34/0x70 [ 355.221167][T10545] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 355.226893][T10545] RIP: 0033:0x7f59ca553759 [ 355.231149][T10545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 355.250589][T10545] RSP: 002b:00007f59c91cc038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 355.258832][T10545] RAX: ffffffffffffffda RBX: 00007f59ca70af80 RCX: 00007f59ca553759 [ 355.266644][T10545] RDX: 0000000000000000 RSI: 0000000020001c40 RDI: 0000000000000007 [ 355.274455][T10545] RBP: 00007f59c91cc090 R08: 0000000000000000 R09: 0000000000000000 [ 355.282270][T10545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 355.290078][T10545] R13: 0000000000000000 R14: 00007f59ca70af80 R15: 00007ffe388b4538 [ 357.387838][T10605] FAULT_INJECTION: forcing a failure. [ 357.387838][T10605] name failslab, interval 1, probability 0, space 0, times 0 [ 357.431158][T10605] CPU: 0 PID: 10605 Comm: syz.0.3298 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 357.442333][T10605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 357.452224][T10605] Call Trace: [ 357.455360][T10605] dump_stack_lvl+0x1e2/0x24b [ 357.459865][T10605] ? panic+0x812/0x812 [ 357.463772][T10605] ? stack_trace_save+0x113/0x1c0 [ 357.468636][T10605] ? bfq_pos_tree_add_move+0x43b/0x43b [ 357.473928][T10605] dump_stack+0x15/0x17 [ 357.477922][T10605] should_fail+0x3c6/0x510 [ 357.482172][T10605] ? __alloc_skb+0x80/0x510 [ 357.486513][T10605] __should_failslab+0xa4/0xe0 [ 357.491114][T10605] should_failslab+0x9/0x20 [ 357.495453][T10605] kmem_cache_alloc+0x3d/0x2e0 [ 357.500052][T10605] __alloc_skb+0x80/0x510 [ 357.504221][T10605] tipc_msg_build+0x13e/0x1040 [ 357.508819][T10605] ? memcpy+0x56/0x70 [ 357.512639][T10605] ? avc_has_perm_noaudit+0x240/0x240 [ 357.517846][T10605] ? tipc_msg_fragment+0x760/0x760 [ 357.522796][T10605] ? avc_has_perm+0x14d/0x400 [ 357.527299][T10605] __tipc_sendstream+0xacf/0x19f0 [ 357.532166][T10605] ? tsk_advance_rx_queue+0x700/0x700 [ 357.537368][T10605] ? sock_init_data+0xc0/0xc0 [ 357.541878][T10605] ? wait_woken+0x250/0x250 [ 357.546223][T10605] ? __kasan_check_write+0x14/0x20 [ 357.551174][T10605] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 357.556464][T10605] tipc_sendstream+0x55/0x70 [ 357.560887][T10605] ? tipc_getsockopt+0x790/0x790 [ 357.565664][T10605] ____sys_sendmsg+0x59e/0x8f0 [ 357.570263][T10605] ? __sys_sendmsg_sock+0x40/0x40 [ 357.575121][T10605] ? import_iovec+0xe5/0x120 [ 357.579547][T10605] ___sys_sendmsg+0x252/0x2e0 [ 357.584062][T10605] ? __sys_sendmsg+0x280/0x280 [ 357.588661][T10605] ? rw_verify_area+0x1c3/0x360 [ 357.593354][T10605] ? __fdget+0x1bc/0x240 [ 357.597428][T10605] __se_sys_sendmsg+0x1b1/0x280 [ 357.602112][T10605] ? __x64_sys_sendmsg+0x90/0x90 [ 357.606891][T10605] ? ksys_write+0x260/0x2c0 [ 357.611230][T10605] ? debug_smp_processor_id+0x17/0x20 [ 357.616432][T10605] __x64_sys_sendmsg+0x7b/0x90 [ 357.621034][T10605] do_syscall_64+0x34/0x70 [ 357.625288][T10605] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 357.631012][T10605] RIP: 0033:0x7fbdfd2d8759 [ 357.635266][T10605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 357.654706][T10605] RSP: 002b:00007fbdfbf51038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 357.662951][T10605] RAX: ffffffffffffffda RBX: 00007fbdfd48ff80 RCX: 00007fbdfd2d8759 [ 357.670764][T10605] RDX: 0000000000000000 RSI: 0000000020001c40 RDI: 0000000000000007 [ 357.678577][T10605] RBP: 00007fbdfbf51090 R08: 0000000000000000 R09: 0000000000000000 [ 357.686383][T10605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 357.694194][T10605] R13: 0000000000000000 R14: 00007fbdfd48ff80 R15: 00007fffee00b928 [ 357.763668][T10607] device wg2 left promiscuous mode [ 357.840051][T10610] syz.1.3300[10610] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.840097][T10610] syz.1.3300[10610] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 359.065872][T10651] syz.3.3313[10651] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 359.243448][T10651] syz.3.3313[10651] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 359.368964][T10651] device wg2 left promiscuous mode [ 359.437572][T10658] device veth1_macvtap left promiscuous mode [ 359.458619][T10658] device macsec0 entered promiscuous mode [ 359.465631][T10656] device wg2 entered promiscuous mode [ 360.551025][T10696] syz.3.3326[10696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.551073][T10696] syz.3.3326[10696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.859313][T10701] device sit0 entered promiscuous mode [ 361.879263][T10734] device macsec0 left promiscuous mode [ 362.117219][T10734] device veth1_macvtap entered promiscuous mode [ 362.208709][T10734] device macsec0 entered promiscuous mode [ 362.349787][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 363.439846][ T24] audit: type=1400 audit(1732047948.499:168): avc: denied { create } for pid=10773 comm="syz.1.3349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 364.415310][ T24] audit: type=1400 audit(1732047949.469:169): avc: denied { rename } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 364.801173][ T24] audit: type=1400 audit(1732047949.469:170): avc: denied { unlink } for pid=77 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 364.949021][ T24] audit: type=1400 audit(1732047949.469:171): avc: denied { create } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 365.783634][T10803] device syzkaller0 entered promiscuous mode [ 366.013618][T10808] syz.1.3358[10808] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.013665][T10808] syz.1.3358[10808] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.113474][T10840] device syzkaller0 entered promiscuous mode [ 371.379146][T10883] device syzkaller0 entered promiscuous mode [ 373.271142][T10937] FAULT_INJECTION: forcing a failure. [ 373.271142][T10937] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 373.366877][T10937] CPU: 0 PID: 10937 Comm: syz.1.3401 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 373.378056][T10937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 373.387944][T10937] Call Trace: [ 373.391083][T10937] dump_stack_lvl+0x1e2/0x24b [ 373.395589][T10937] ? bfq_pos_tree_add_move+0x43b/0x43b [ 373.400896][T10937] dump_stack+0x15/0x17 [ 373.404874][T10937] should_fail+0x3c6/0x510 [ 373.409131][T10937] should_fail_usercopy+0x1a/0x20 [ 373.413993][T10937] _copy_from_user+0x20/0xd0 [ 373.418419][T10937] kstrtouint_from_user+0xca/0x2a0 [ 373.423358][T10937] ? kstrtol_from_user+0x310/0x310 [ 373.428312][T10937] ? snprintf+0xd6/0x120 [ 373.432392][T10937] ? memset+0x35/0x40 [ 373.436207][T10937] proc_fail_nth_write+0xa6/0x290 [ 373.441070][T10937] ? security_file_permission+0x7b/0xb0 [ 373.446449][T10937] ? proc_fail_nth_read+0x210/0x210 [ 373.451484][T10937] ? security_file_permission+0x86/0xb0 [ 373.456866][T10937] ? rw_verify_area+0x1c3/0x360 [ 373.461551][T10937] ? proc_fail_nth_read+0x210/0x210 [ 373.466583][T10937] vfs_write+0x36a/0xe70 [ 373.470671][T10937] ? kernel_write+0x3d0/0x3d0 [ 373.475178][T10937] ? __kasan_check_write+0x14/0x20 [ 373.480127][T10937] ? mutex_lock+0xa5/0x110 [ 373.484375][T10937] ? mutex_trylock+0xa0/0xa0 [ 373.488805][T10937] ? __fdget_pos+0x2e7/0x3a0 [ 373.493226][T10937] ? ksys_write+0x77/0x2c0 [ 373.497482][T10937] ksys_write+0x199/0x2c0 [ 373.501649][T10937] ? __ia32_sys_read+0x90/0x90 [ 373.506252][T10937] ? debug_smp_processor_id+0x17/0x20 [ 373.511456][T10937] __x64_sys_write+0x7b/0x90 [ 373.515881][T10937] do_syscall_64+0x34/0x70 [ 373.520133][T10937] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 373.525858][T10937] RIP: 0033:0x7ff6d220323f [ 373.530115][T10937] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 373.549554][T10937] RSP: 002b:00007ff6d0e7d030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 373.557797][T10937] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6d220323f [ 373.565607][T10937] RDX: 0000000000000001 RSI: 00007ff6d0e7d0a0 RDI: 0000000000000006 [ 373.573416][T10937] RBP: 00007ff6d0e7d090 R08: 0000000000000000 R09: 0000000000000000 [ 373.581231][T10937] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 373.589040][T10937] R13: 0000000000000000 R14: 00007ff6d23bbf80 R15: 00007ffcaa551d38 [ 375.865631][T11061] syz.3.3441[11061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.865684][T11061] syz.3.3441[11061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.686996][T11086] device pim6reg1 entered promiscuous mode [ 376.788340][T11096] syz.2.3453[11096] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.788394][T11096] syz.2.3453[11096] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.837758][T11096] device wg2 left promiscuous mode [ 376.940670][T11096] device wg2 entered promiscuous mode [ 377.100136][T11114] syz.0.3457[11114] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.100191][T11114] syz.0.3457[11114] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.132192][T11120] device syzkaller0 entered promiscuous mode [ 377.888632][T11139] device syzkaller0 entered promiscuous mode [ 377.919617][T11154] device wg2 entered promiscuous mode [ 378.779548][T11200] device wg2 left promiscuous mode [ 378.827808][T11196] device wg2 entered promiscuous mode [ 379.876749][T11227] device veth0_vlan left promiscuous mode [ 379.981331][T11227] device veth0_vlan entered promiscuous mode [ 380.137996][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 380.167690][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 380.198822][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 380.240239][T11244] device syzkaller0 entered promiscuous mode [ 380.472821][T11253] device wg2 left promiscuous mode [ 380.510873][T11254] device wg2 entered promiscuous mode [ 381.452966][T11271] FAULT_INJECTION: forcing a failure. [ 381.452966][T11271] name failslab, interval 1, probability 0, space 0, times 0 [ 381.549634][T11271] CPU: 0 PID: 11271 Comm: syz.2.3503 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 381.560820][T11271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 381.570712][T11271] Call Trace: [ 381.573845][T11271] dump_stack_lvl+0x1e2/0x24b [ 381.578353][T11271] ? panic+0x812/0x812 [ 381.582254][T11271] ? bfq_pos_tree_add_move+0x43b/0x43b [ 381.587550][T11271] ? avc_has_perm+0x14d/0x400 [ 381.592064][T11271] ? memcpy+0x56/0x70 [ 381.595883][T11271] dump_stack+0x15/0x17 [ 381.599879][T11271] should_fail+0x3c6/0x510 [ 381.604136][T11271] ? __alloc_skb+0x80/0x510 [ 381.608469][T11271] __should_failslab+0xa4/0xe0 [ 381.613066][T11271] should_failslab+0x9/0x20 [ 381.617415][T11271] kmem_cache_alloc+0x3d/0x2e0 [ 381.622006][T11271] __alloc_skb+0x80/0x510 [ 381.626172][T11271] alloc_skb_with_frags+0xa1/0x570 [ 381.631121][T11271] ? is_bpf_text_address+0x172/0x190 [ 381.636246][T11271] sock_alloc_send_pskb+0x915/0xa50 [ 381.641294][T11271] ? sock_kzfree_s+0x60/0x60 [ 381.645703][T11271] ? stack_trace_save+0x113/0x1c0 [ 381.650566][T11271] ? terminate_walk+0x407/0x4f0 [ 381.655259][T11271] ? stack_trace_snprint+0xf0/0xf0 [ 381.660200][T11271] tun_get_user+0xe90/0x38f0 [ 381.664623][T11271] ? kmem_cache_free+0xa9/0x1e0 [ 381.669308][T11271] ? do_sys_openat2+0x1fc/0x710 [ 381.673996][T11271] ? _kstrtoull+0x3a0/0x4a0 [ 381.678342][T11271] ? tun_do_read+0x1f60/0x1f60 [ 381.682933][T11271] ? kstrtouint_from_user+0x20a/0x2a0 [ 381.688140][T11271] ? kstrtol_from_user+0x310/0x310 [ 381.693093][T11271] ? avc_policy_seqno+0x1b/0x70 [ 381.697789][T11271] ? selinux_file_permission+0x2bb/0x560 [ 381.703254][T11271] ? fsnotify_perm+0x67/0x4e0 [ 381.707764][T11271] tun_chr_write_iter+0x1a8/0x250 [ 381.712650][T11271] vfs_write+0xb4c/0xe70 [ 381.716699][T11271] ? kernel_write+0x3d0/0x3d0 [ 381.721220][T11271] ? __fdget_pos+0x209/0x3a0 [ 381.725641][T11271] ? ksys_write+0x77/0x2c0 [ 381.729897][T11271] ksys_write+0x199/0x2c0 [ 381.734059][T11271] ? __ia32_sys_read+0x90/0x90 [ 381.738657][T11271] ? debug_smp_processor_id+0x17/0x20 [ 381.743956][T11271] __x64_sys_write+0x7b/0x90 [ 381.748377][T11271] do_syscall_64+0x34/0x70 [ 381.752634][T11271] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 381.758354][T11271] RIP: 0033:0x7f59ca553759 [ 381.762608][T11271] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 381.782048][T11271] RSP: 002b:00007f59c91cc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 381.790316][T11271] RAX: ffffffffffffffda RBX: 00007f59ca70af80 RCX: 00007f59ca553759 [ 381.798098][T11271] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 381.805907][T11271] RBP: 00007f59c91cc090 R08: 0000000000000000 R09: 0000000000000000 [ 381.813722][T11271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 381.821531][T11271] R13: 0000000000000000 R14: 00007f59ca70af80 R15: 00007ffe388b4538 [ 382.012921][T11281] device veth1_macvtap entered promiscuous mode [ 382.025974][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 382.097633][T11287] device wg2 entered promiscuous mode [ 382.122514][T11290] syz.1.3509[11290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.122557][T11290] syz.1.3509[11290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.277159][T11320] FAULT_INJECTION: forcing a failure. [ 383.277159][T11320] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 383.508441][T11320] CPU: 0 PID: 11320 Comm: syz.4.3518 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 383.519621][T11320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 383.529509][T11320] Call Trace: [ 383.532644][T11320] dump_stack_lvl+0x1e2/0x24b [ 383.537153][T11320] ? bfq_pos_tree_add_move+0x43b/0x43b [ 383.542448][T11320] dump_stack+0x15/0x17 [ 383.546443][T11320] should_fail+0x3c6/0x510 [ 383.550699][T11320] should_fail_alloc_page+0x52/0x60 [ 383.555731][T11320] __alloc_pages_nodemask+0x1b3/0xaf0 [ 383.560940][T11320] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 383.566327][T11320] kmalloc_order+0x4c/0x170 [ 383.570657][T11320] kmalloc_order_trace+0x18/0x90 [ 383.575433][T11320] ? alloc_skb_with_frags+0xa1/0x570 [ 383.580555][T11320] __kmalloc_track_caller+0x1dd/0x320 [ 383.585761][T11320] ? __alloc_skb+0x80/0x510 [ 383.590100][T11320] ? alloc_skb_with_frags+0xa1/0x570 [ 383.595227][T11320] __alloc_skb+0xbc/0x510 [ 383.599385][T11320] alloc_skb_with_frags+0xa1/0x570 [ 383.604335][T11320] ? is_bpf_text_address+0x172/0x190 [ 383.609454][T11320] sock_alloc_send_pskb+0x915/0xa50 [ 383.614489][T11320] ? sock_kzfree_s+0x60/0x60 [ 383.618913][T11320] ? stack_trace_save+0x113/0x1c0 [ 383.623775][T11320] ? terminate_walk+0x407/0x4f0 [ 383.628460][T11320] ? stack_trace_snprint+0xf0/0xf0 [ 383.633410][T11320] tun_get_user+0xe90/0x38f0 [ 383.637835][T11320] ? kmem_cache_free+0xa9/0x1e0 [ 383.642528][T11320] ? do_sys_openat2+0x1fc/0x710 [ 383.647206][T11320] ? _kstrtoull+0x3a0/0x4a0 [ 383.651548][T11320] ? tun_do_read+0x1f60/0x1f60 [ 383.656143][T11320] ? kstrtouint_from_user+0x20a/0x2a0 [ 383.661354][T11320] ? kstrtol_from_user+0x310/0x310 [ 383.666304][T11320] ? avc_policy_seqno+0x1b/0x70 [ 383.670988][T11320] ? selinux_file_permission+0x2bb/0x560 [ 383.676457][T11320] ? fsnotify_perm+0x67/0x4e0 [ 383.681015][T11320] tun_chr_write_iter+0x1a8/0x250 [ 383.685840][T11320] vfs_write+0xb4c/0xe70 [ 383.689923][T11320] ? kernel_write+0x3d0/0x3d0 [ 383.694427][T11320] ? __fdget_pos+0x209/0x3a0 [ 383.698849][T11320] ? ksys_write+0x77/0x2c0 [ 383.703107][T11320] ksys_write+0x199/0x2c0 [ 383.707275][T11320] ? __ia32_sys_read+0x90/0x90 [ 383.711870][T11320] ? debug_smp_processor_id+0x17/0x20 [ 383.717074][T11320] __x64_sys_write+0x7b/0x90 [ 383.721499][T11320] do_syscall_64+0x34/0x70 [ 383.725754][T11320] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 383.731483][T11320] RIP: 0033:0x7fd15653a759 [ 383.735732][T11320] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 383.755176][T11320] RSP: 002b:00007fd1551b3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 383.763412][T11320] RAX: ffffffffffffffda RBX: 00007fd1566f1f80 RCX: 00007fd15653a759 [ 383.771229][T11320] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 383.779035][T11320] RBP: 00007fd1551b3090 R08: 0000000000000000 R09: 0000000000000000 [ 383.786846][T11320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 383.794655][T11320] R13: 0000000000000000 R14: 00007fd1566f1f80 R15: 00007ffe11e7a0c8 [ 383.866331][T11325] device wg2 left promiscuous mode [ 384.878871][T11342] syz.0.3524[11342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.878921][T11342] syz.0.3524[11342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.813625][T11371] device veth1_macvtap left promiscuous mode [ 385.835036][T11371] device macsec0 entered promiscuous mode [ 385.962666][T11382] syz.3.3537[11382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.027767][T11382] syz.3.3537[11382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.433256][T11426] device pim6reg1 entered promiscuous mode [ 388.826878][T11453] device veth0_vlan left promiscuous mode [ 388.865881][T11453] device veth0_vlan entered promiscuous mode [ 388.985099][T11455] device wg2 left promiscuous mode [ 388.990908][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 389.000058][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 389.007611][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 389.015147][T11460] device wg2 entered promiscuous mode [ 389.066462][T11466] device pim6reg1 entered promiscuous mode [ 390.987243][T11504] device sit0 left promiscuous mode [ 391.478158][T11504] device sit0 entered promiscuous mode [ 392.181969][T11535] ÿÿÿÿÿÿ: renamed from vlan1 [ 394.728594][T11612] device macsec0 left promiscuous mode [ 395.430466][T11629] syz.0.3611[11629] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.430519][T11629] syz.0.3611[11629] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.527557][T11650] device syzkaller0 entered promiscuous mode [ 396.903044][T11661] syz.0.3620[11661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.903088][T11661] syz.0.3620[11661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.935099][T11689] device wg2 entered promiscuous mode [ 398.037877][T11707] syz.3.3635[11707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.037930][T11707] syz.3.3635[11707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.447833][T11730] device veth1_macvtap left promiscuous mode [ 398.471589][T11730] device macsec0 left promiscuous mode [ 398.484810][T11730] device veth1_macvtap entered promiscuous mode [ 398.491360][T11730] device macsec0 entered promiscuous mode [ 398.545463][T11732] syz.2.3643[11732] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.545523][T11732] syz.2.3643[11732] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.561415][T11729] device syzkaller0 entered promiscuous mode [ 399.596415][T11781] FAULT_INJECTION: forcing a failure. [ 399.596415][T11781] name failslab, interval 1, probability 0, space 0, times 0 [ 399.608872][T11781] CPU: 0 PID: 11781 Comm: syz.4.3656 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 399.620010][T11781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 399.629902][T11781] Call Trace: [ 399.633039][T11781] dump_stack_lvl+0x1e2/0x24b [ 399.637551][T11781] ? bfq_pos_tree_add_move+0x43b/0x43b [ 399.642840][T11781] dump_stack+0x15/0x17 [ 399.646831][T11781] should_fail+0x3c6/0x510 [ 399.651081][T11781] ? __alloc_skb+0x80/0x510 [ 399.655423][T11781] __should_failslab+0xa4/0xe0 [ 399.660029][T11781] should_failslab+0x9/0x20 [ 399.664366][T11781] kmem_cache_alloc+0x3d/0x2e0 [ 399.668966][T11781] __alloc_skb+0x80/0x510 [ 399.673132][T11781] ? __kasan_check_write+0x14/0x20 [ 399.678076][T11781] __napi_alloc_skb+0x15d/0x2e0 [ 399.682775][T11781] napi_get_frags+0x6a/0x170 [ 399.687198][T11781] tun_get_user+0xc88/0x38f0 [ 399.691623][T11781] ? kasan_set_track+0x4b/0x70 [ 399.696218][T11781] ? kmem_cache_free+0xa9/0x1e0 [ 399.700905][T11781] ? do_sys_openat2+0x1fc/0x710 [ 399.705588][T11781] ? _kstrtoull+0x3a0/0x4a0 [ 399.709934][T11781] ? tun_do_read+0x1f60/0x1f60 [ 399.714529][T11781] ? kstrtouint_from_user+0x20a/0x2a0 [ 399.719751][T11781] ? kstrtol_from_user+0x310/0x310 [ 399.724690][T11781] ? avc_policy_seqno+0x1b/0x70 [ 399.729374][T11781] ? selinux_file_permission+0x2bb/0x560 [ 399.734854][T11781] ? fsnotify_perm+0x67/0x4e0 [ 399.739359][T11781] tun_chr_write_iter+0x1a8/0x250 [ 399.744216][T11781] vfs_write+0xb4c/0xe70 [ 399.748288][T11781] ? putname+0xe7/0x140 [ 399.752286][T11781] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 399.757941][T11781] ? kernel_write+0x3d0/0x3d0 [ 399.762444][T11781] ? __fdget_pos+0x209/0x3a0 [ 399.766863][T11781] ? ksys_write+0x77/0x2c0 [ 399.771118][T11781] ksys_write+0x199/0x2c0 [ 399.775287][T11781] ? __ia32_sys_read+0x90/0x90 [ 399.779885][T11781] ? debug_smp_processor_id+0x17/0x20 [ 399.785103][T11781] __x64_sys_write+0x7b/0x90 [ 399.789525][T11781] do_syscall_64+0x34/0x70 [ 399.793777][T11781] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 399.799501][T11781] RIP: 0033:0x7fd15653a759 [ 399.803752][T11781] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 399.823194][T11781] RSP: 002b:00007fd155192038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 399.831435][T11781] RAX: ffffffffffffffda RBX: 00007fd1566f2058 RCX: 00007fd15653a759 [ 399.839253][T11781] RDX: 0000000000000066 RSI: 0000000020000180 RDI: 0000000000000006 [ 399.847056][T11781] RBP: 00007fd155192090 R08: 0000000000000000 R09: 0000000000000000 [ 399.854868][T11781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 399.862678][T11781] R13: 0000000000000001 R14: 00007fd1566f2058 R15: 00007ffe11e7a0c8 [ 400.443542][T11802] syz.4.3664[11802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.443589][T11802] syz.4.3664[11802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.783687][T11807] device sit0 entered promiscuous mode [ 401.185190][T11815] device syzkaller0 entered promiscuous mode [ 401.313649][T11831] device wg2 left promiscuous mode [ 401.327308][T11831] device wg2 entered promiscuous mode [ 401.440250][T11841] syz.1.3675[11841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 401.440300][T11841] syz.1.3675[11841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 402.210220][T11852] device syzkaller0 entered promiscuous mode [ 403.276775][T11899] bridge0: port 3(veth0_to_batadv) entered blocking state [ 403.283707][T11899] bridge0: port 3(veth0_to_batadv) entered disabled state [ 403.419447][T11899] device veth0_to_batadv entered promiscuous mode [ 403.425776][T11899] bridge0: port 3(veth0_to_batadv) entered blocking state [ 403.432672][T11899] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 403.885967][T11908] FAULT_INJECTION: forcing a failure. [ 403.885967][T11908] name failslab, interval 1, probability 0, space 0, times 0 [ 403.914225][T11908] CPU: 1 PID: 11908 Comm: syz.2.3697 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 403.925408][T11908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 403.935300][T11908] Call Trace: [ 403.938436][T11908] dump_stack_lvl+0x1e2/0x24b [ 403.942937][T11908] ? panic+0x812/0x812 [ 403.946845][T11908] ? bfq_pos_tree_add_move+0x43b/0x43b [ 403.952138][T11908] ? avc_has_perm+0x14d/0x400 [ 403.956650][T11908] ? memcpy+0x56/0x70 [ 403.960469][T11908] dump_stack+0x15/0x17 [ 403.964461][T11908] should_fail+0x3c6/0x510 [ 403.968714][T11908] ? __alloc_skb+0x80/0x510 [ 403.973063][T11908] __should_failslab+0xa4/0xe0 [ 403.977654][T11908] should_failslab+0x9/0x20 [ 403.981997][T11908] kmem_cache_alloc+0x3d/0x2e0 [ 403.986595][T11908] __alloc_skb+0x80/0x510 [ 403.990761][T11908] alloc_skb_with_frags+0xa1/0x570 [ 403.995710][T11908] ? is_bpf_text_address+0x172/0x190 [ 404.000838][T11908] sock_alloc_send_pskb+0x915/0xa50 [ 404.005862][T11908] ? sock_kzfree_s+0x60/0x60 [ 404.010286][T11908] ? stack_trace_save+0x113/0x1c0 [ 404.015146][T11908] ? terminate_walk+0x407/0x4f0 [ 404.019834][T11908] ? stack_trace_snprint+0xf0/0xf0 [ 404.024781][T11908] tun_get_user+0xe90/0x38f0 [ 404.029211][T11908] ? kmem_cache_free+0xa9/0x1e0 [ 404.033894][T11908] ? do_sys_openat2+0x1fc/0x710 [ 404.038581][T11908] ? _kstrtoull+0x3a0/0x4a0 [ 404.042923][T11908] ? tun_do_read+0x1f60/0x1f60 [ 404.047522][T11908] ? kstrtouint_from_user+0x20a/0x2a0 [ 404.052731][T11908] ? kstrtol_from_user+0x310/0x310 [ 404.057680][T11908] ? avc_policy_seqno+0x1b/0x70 [ 404.062363][T11908] ? selinux_file_permission+0x2bb/0x560 [ 404.067832][T11908] ? fsnotify_perm+0x67/0x4e0 [ 404.072343][T11908] tun_chr_write_iter+0x1a8/0x250 [ 404.077203][T11908] vfs_write+0xb4c/0xe70 [ 404.081282][T11908] ? kernel_write+0x3d0/0x3d0 [ 404.085800][T11908] ? __fdget_pos+0x209/0x3a0 [ 404.090222][T11908] ? ksys_write+0x77/0x2c0 [ 404.094473][T11908] ksys_write+0x199/0x2c0 [ 404.098640][T11908] ? __ia32_sys_read+0x90/0x90 [ 404.103242][T11908] ? debug_smp_processor_id+0x17/0x20 [ 404.108447][T11908] __x64_sys_write+0x7b/0x90 [ 404.112873][T11908] do_syscall_64+0x34/0x70 [ 404.117126][T11908] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 404.122856][T11908] RIP: 0033:0x7f59ca553759 [ 404.127109][T11908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 404.146548][T11908] RSP: 002b:00007f59c91cc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 404.154791][T11908] RAX: ffffffffffffffda RBX: 00007f59ca70af80 RCX: 00007f59ca553759 [ 404.162601][T11908] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 404.170421][T11908] RBP: 00007f59c91cc090 R08: 0000000000000000 R09: 0000000000000000 [ 404.178223][T11908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 404.186034][T11908] R13: 0000000000000000 R14: 00007f59ca70af80 R15: 00007ffe388b4538 [ 404.270525][T11920] syz.1.3699[11920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 404.270582][T11920] syz.1.3699[11920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.988600][T11959] FAULT_INJECTION: forcing a failure. [ 405.988600][T11959] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 406.047264][T11959] CPU: 0 PID: 11959 Comm: syz.0.3713 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 406.058446][T11959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 406.068335][T11959] Call Trace: [ 406.071472][T11959] dump_stack_lvl+0x1e2/0x24b [ 406.075974][T11959] ? bfq_pos_tree_add_move+0x43b/0x43b [ 406.081271][T11959] dump_stack+0x15/0x17 [ 406.085259][T11959] should_fail+0x3c6/0x510 [ 406.089529][T11959] should_fail_alloc_page+0x52/0x60 [ 406.094549][T11959] __alloc_pages_nodemask+0x1b3/0xaf0 [ 406.099770][T11959] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 406.105149][T11959] kmalloc_order+0x4c/0x170 [ 406.109483][T11959] kmalloc_order_trace+0x18/0x90 [ 406.114253][T11959] ? alloc_skb_with_frags+0xa1/0x570 [ 406.119376][T11959] __kmalloc_track_caller+0x1dd/0x320 [ 406.124577][T11959] ? __alloc_skb+0x80/0x510 [ 406.128918][T11959] ? alloc_skb_with_frags+0xa1/0x570 [ 406.134039][T11959] __alloc_skb+0xbc/0x510 [ 406.138208][T11959] alloc_skb_with_frags+0xa1/0x570 [ 406.143155][T11959] ? is_bpf_text_address+0x172/0x190 [ 406.148276][T11959] sock_alloc_send_pskb+0x915/0xa50 [ 406.153312][T11959] ? sock_kzfree_s+0x60/0x60 [ 406.157733][T11959] ? stack_trace_save+0x113/0x1c0 [ 406.162591][T11959] ? terminate_walk+0x407/0x4f0 [ 406.167285][T11959] ? stack_trace_snprint+0xf0/0xf0 [ 406.172232][T11959] tun_get_user+0xe90/0x38f0 [ 406.176656][T11959] ? kmem_cache_free+0xa9/0x1e0 [ 406.181338][T11959] ? do_sys_openat2+0x1fc/0x710 [ 406.186024][T11959] ? _kstrtoull+0x3a0/0x4a0 [ 406.190368][T11959] ? tun_do_read+0x1f60/0x1f60 [ 406.194966][T11959] ? kstrtouint_from_user+0x20a/0x2a0 [ 406.200175][T11959] ? kstrtol_from_user+0x310/0x310 [ 406.205121][T11959] ? avc_policy_seqno+0x1b/0x70 [ 406.209807][T11959] ? selinux_file_permission+0x2bb/0x560 [ 406.215277][T11959] ? fsnotify_perm+0x67/0x4e0 [ 406.219795][T11959] tun_chr_write_iter+0x1a8/0x250 [ 406.224653][T11959] vfs_write+0xb4c/0xe70 [ 406.228730][T11959] ? kernel_write+0x3d0/0x3d0 [ 406.233246][T11959] ? __fdget_pos+0x209/0x3a0 [ 406.237669][T11959] ? ksys_write+0x77/0x2c0 [ 406.241923][T11959] ksys_write+0x199/0x2c0 [ 406.246087][T11959] ? __ia32_sys_read+0x90/0x90 [ 406.250691][T11959] ? debug_smp_processor_id+0x17/0x20 [ 406.255897][T11959] __x64_sys_write+0x7b/0x90 [ 406.260322][T11959] do_syscall_64+0x34/0x70 [ 406.264574][T11959] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 406.270300][T11959] RIP: 0033:0x7fbdfd2d8759 [ 406.274555][T11959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 406.293996][T11959] RSP: 002b:00007fbdfbf51038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 406.302243][T11959] RAX: ffffffffffffffda RBX: 00007fbdfd48ff80 RCX: 00007fbdfd2d8759 [ 406.310050][T11959] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 406.317862][T11959] RBP: 00007fbdfbf51090 R08: 0000000000000000 R09: 0000000000000000 [ 406.325672][T11959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 406.333485][T11959] R13: 0000000000000000 R14: 00007fbdfd48ff80 R15: 00007fffee00b928 [ 408.068248][T12015] FAULT_INJECTION: forcing a failure. [ 408.068248][T12015] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 408.103505][T12015] CPU: 1 PID: 12015 Comm: syz.4.3730 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 408.114686][T12015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 408.124572][T12015] Call Trace: [ 408.127705][T12015] dump_stack_lvl+0x1e2/0x24b [ 408.132215][T12015] ? bfq_pos_tree_add_move+0x43b/0x43b [ 408.137509][T12015] ? __alloc_skb+0x37c/0x510 [ 408.141936][T12015] dump_stack+0x15/0x17 [ 408.145932][T12015] should_fail+0x3c6/0x510 [ 408.150182][T12015] should_fail_usercopy+0x1a/0x20 [ 408.155041][T12015] _copy_from_iter+0x22c/0xd10 [ 408.159641][T12015] ? sock_alloc_send_pskb+0x936/0xa50 [ 408.164848][T12015] ? copyout_mc+0x90/0x90 [ 408.169015][T12015] ? __check_object_size+0x2e6/0x3c0 [ 408.174139][T12015] skb_copy_datagram_from_iter+0x100/0x6d0 [ 408.179787][T12015] tun_get_user+0x1904/0x38f0 [ 408.184288][T12015] ? kmem_cache_free+0xa9/0x1e0 [ 408.188975][T12015] ? do_sys_openat2+0x1fc/0x710 [ 408.193661][T12015] ? _kstrtoull+0x3a0/0x4a0 [ 408.198002][T12015] ? tun_do_read+0x1f60/0x1f60 [ 408.202598][T12015] ? kstrtouint_from_user+0x20a/0x2a0 [ 408.207812][T12015] ? kstrtol_from_user+0x310/0x310 [ 408.212759][T12015] ? avc_policy_seqno+0x1b/0x70 [ 408.217443][T12015] ? selinux_file_permission+0x2bb/0x560 [ 408.222911][T12015] ? fsnotify_perm+0x67/0x4e0 [ 408.227427][T12015] tun_chr_write_iter+0x1a8/0x250 [ 408.232294][T12015] vfs_write+0xb4c/0xe70 [ 408.236363][T12015] ? kernel_write+0x3d0/0x3d0 [ 408.240881][T12015] ? __fdget_pos+0x209/0x3a0 [ 408.245299][T12015] ? ksys_write+0x77/0x2c0 [ 408.249583][T12015] ksys_write+0x199/0x2c0 [ 408.253727][T12015] ? __ia32_sys_read+0x90/0x90 [ 408.258330][T12015] ? debug_smp_processor_id+0x17/0x20 [ 408.263530][T12015] __x64_sys_write+0x7b/0x90 [ 408.267956][T12015] do_syscall_64+0x34/0x70 [ 408.272210][T12015] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 408.277934][T12015] RIP: 0033:0x7fd15653a759 [ 408.282191][T12015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 408.301634][T12015] RSP: 002b:00007fd1551b3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 408.309881][T12015] RAX: ffffffffffffffda RBX: 00007fd1566f1f80 RCX: 00007fd15653a759 [ 408.317684][T12015] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 408.325497][T12015] RBP: 00007fd1551b3090 R08: 0000000000000000 R09: 0000000000000000 [ 408.333309][T12015] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 408.341118][T12015] R13: 0000000000000000 R14: 00007fd1566f1f80 R15: 00007ffe11e7a0c8 [ 408.969559][T12028] ªªªªªª: renamed from vlan0 [ 411.324013][T12083] device syzkaller0 entered promiscuous mode [ 412.214970][T12119] bridge0: port 2(bridge_slave_1) entered disabled state [ 412.762787][T12142] device vxcan1 entered promiscuous mode [ 415.168405][T12194] device syzkaller0 entered promiscuous mode [ 416.598301][T12261] device macsec0 entered promiscuous mode [ 417.272951][T12275] device pim6reg1 entered promiscuous mode [ 418.905852][T12327] syz.1.3821[12327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.905899][T12327] syz.1.3821[12327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.816186][T12389] device pim6reg1 entered promiscuous mode [ 424.168932][T12414] device pim6reg1 entered promiscuous mode [ 424.797137][T12430] device pim6reg1 entered promiscuous mode [ 425.124708][T12440] syz.0.3853[12440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.124752][T12440] syz.0.3853[12440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.481639][T12451] device pim6reg1 entered promiscuous mode [ 428.394958][T12495] device sit0 entered promiscuous mode [ 429.866653][T12536] device syzkaller0 entered promiscuous mode [ 431.150225][T12597] device syzkaller0 entered promiscuous mode [ 431.173712][T12602] device gre0 entered promiscuous mode [ 431.431057][T12632] syz.1.3908[12632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.431110][T12632] syz.1.3908[12632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.790543][T12653] device pim6reg1 entered promiscuous mode [ 433.658018][T12693] device syzkaller0 entered promiscuous mode [ 433.794905][T12700] Â: renamed from pim6reg1 [ 435.437217][T12722] syz.4.3936[12722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.437271][T12722] syz.4.3936[12722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.989772][T12747] syz.4.3943[12747] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 436.044361][T12747] syz.4.3943[12747] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.248771][T12797] syz.0.3958[12797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.260916][T12799] device bridge0 entered promiscuous mode [ 438.517755][T12797] syz.0.3958[12797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.088864][T12844] syz.3.3971[12844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.212834][T12844] syz.3.3971[12844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.267226][ T95] udevd[95]: worker [907] terminated by signal 33 (Unknown signal 33) [ 439.388120][ T95] udevd[95]: worker [907] failed while handling '/devices/virtual/block/loop1' [ 439.484045][ T95] udevd[95]: worker [902] terminated by signal 33 (Unknown signal 33) [ 439.568992][ T95] udevd[95]: worker [902] failed while handling '/devices/virtual/block/loop2' [ 439.618771][T12858] ÿÿÿÿÿÿ: renamed from vlan1 [ 445.908554][T13061] device veth0_vlan left promiscuous mode [ 445.937463][T13061] device veth0_vlan entered promiscuous mode [ 445.974005][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 446.036549][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 446.076120][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 446.635007][T13085] device macsec0 left promiscuous mode [ 448.426817][T13130] device veth0_vlan left promiscuous mode [ 448.598402][T13130] device veth0_vlan entered promiscuous mode [ 448.894638][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 448.934061][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 448.985148][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 449.010251][T13141] batadv_slave_1: mtu less than device minimum [ 449.221600][T13149] bridge0: port 3(veth0_to_batadv) entered disabled state [ 449.232009][T13149] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.243410][T13149] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.275029][T13149] device bridge0 left promiscuous mode [ 451.278478][T13220] device sit0 left promiscuous mode [ 451.444803][T13224] device sit0 entered promiscuous mode [ 453.032002][T13264] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.047929][T13264] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.301382][T13273] syz.3.4105[13273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.301429][T13273] syz.3.4105[13273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.013794][T13319] device veth0_vlan left promiscuous mode [ 455.041282][T13319] device veth0_vlan entered promiscuous mode [ 455.048090][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 455.058650][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 455.105719][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 455.341129][T13335] device sit0 left promiscuous mode [ 455.453081][T13335] device sit0 entered promiscuous mode [ 456.789565][T13376] device sit0 left promiscuous mode [ 456.894624][T13376] device sit0 entered promiscuous mode [ 457.414895][T13384] bridge0: port 2(bridge_slave_1) entered disabled state [ 457.421881][T13384] bridge0: port 1(bridge_slave_0) entered disabled state [ 457.433909][T13386] device bridge_slave_1 left promiscuous mode [ 457.440098][T13386] bridge0: port 2(bridge_slave_1) entered disabled state [ 457.455381][T13386] device bridge_slave_0 left promiscuous mode [ 457.474687][T13386] bridge0: port 1(bridge_slave_0) entered disabled state [ 462.084018][T13545] bridge0: port 1(bridge_slave_0) entered disabled state [ 462.094346][T13545] device bridge0 left promiscuous mode [ 463.206292][T13588] device veth0_vlan left promiscuous mode [ 463.302853][T13588] device veth0_vlan entered promiscuous mode [ 463.429066][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 463.463537][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 463.473636][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 463.580666][T13608] syz.1.4205[13608] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 463.580710][T13608] syz.1.4205[13608] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.079341][T13628] device sit0 entered promiscuous mode [ 464.617214][T13640] device wg2 left promiscuous mode [ 466.137235][T13677] syz.4.4226[13677] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.137289][T13677] syz.4.4226[13677] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.937469][T13706] bridge0: port 2(bridge_slave_1) entered blocking state [ 466.955526][T13706] bridge0: port 2(bridge_slave_1) entered forwarding state [ 466.962647][T13706] bridge0: port 1(bridge_slave_0) entered blocking state [ 466.969426][T13706] bridge0: port 1(bridge_slave_0) entered forwarding state [ 467.206901][T13706] device bridge0 entered promiscuous mode [ 467.213018][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 468.667434][T13750] syz.3.4247[13750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.667491][T13750] syz.3.4247[13750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 470.289826][T13787] bridge0: port 3(veth0_to_batadv) entered blocking state [ 470.307970][T13787] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 470.315153][T13787] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.321955][T13787] bridge0: port 2(bridge_slave_1) entered forwarding state [ 470.329029][T13787] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.335819][T13787] bridge0: port 1(bridge_slave_0) entered forwarding state [ 470.487587][T13787] device bridge0 entered promiscuous mode [ 470.493811][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 473.158080][T13857] syz.2.4281[13857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 473.158133][T13857] syz.2.4281[13857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 473.957318][T13878] syz.3.4286[13878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 473.982119][T13888] syz.0.4291[13888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.006993][T13875] syz.3.4286[13875] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.041137][T13888] syz.0.4291[13888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.086921][T13878] syz.3.4286[13878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.278977][T13875] syz.3.4286[13875] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.882011][T13966] device macsec0 entered promiscuous mode [ 477.148710][T14021] syz.0.4335[14021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.148769][T14021] syz.0.4335[14021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 478.544738][T14065] device wg2 left promiscuous mode [ 478.985369][T14083] device sit0 left promiscuous mode [ 479.032291][T14085] device sit0 entered promiscuous mode [ 481.710628][ T24] audit: type=1400 audit(1732048066.769:172): avc: denied { create } for pid=14165 comm="syz.2.4377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 483.766852][T14215] device sit0 left promiscuous mode [ 485.817500][T14268] device veth0_vlan left promiscuous mode [ 485.936361][T14268] device veth0_vlan entered promiscuous mode [ 486.136184][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 486.205236][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 486.255043][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 487.438413][T14353] syz.0.4438[14353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.438473][T14353] syz.0.4438[14353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.720899][T14469] device sit0 left promiscuous mode [ 490.916797][T14469] device sit0 entered promiscuous mode [ 491.466081][T14478] device veth1_macvtap left promiscuous mode [ 491.496852][T14478] device macsec0 left promiscuous mode [ 492.105143][T14507] bridge0: port 2(bridge_slave_1) entered disabled state [ 492.114908][T14507] bridge0: port 1(bridge_slave_0) entered disabled state [ 492.188298][T14507] device bridge0 left promiscuous mode [ 492.698423][T14536] syz.2.4499[14536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 492.698478][T14536] syz.2.4499[14536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 501.458218][T14802] device veth0_vlan left promiscuous mode [ 501.499223][T14802] device veth0_vlan entered promiscuous mode [ 501.613080][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 501.635158][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 501.760518][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 503.731567][T14936] device veth0_vlan left promiscuous mode [ 503.823842][T14936] device veth0_vlan entered promiscuous mode [ 503.930461][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 503.938538][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 503.948734][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 505.488702][T14974] syz.4.4612[14974] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 505.501089][T14974] syz.4.4612[14974] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 510.696772][T15133] syz.1.4668[15133] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 510.736989][T15133] syz.1.4668[15133] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 511.121254][T15165] device sit0 left promiscuous mode [ 511.164958][T15165] device sit0 entered promiscuous mode [ 514.572152][T15281] device sit0 left promiscuous mode [ 514.612750][T15281] device sit0 entered promiscuous mode [ 516.666858][T15350] device veth0_vlan left promiscuous mode [ 516.698364][T15350] device veth0_vlan entered promiscuous mode [ 516.756641][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 516.794224][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 516.855388][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 518.446793][T15413] ªªªªªª: renamed from vlan0 [ 526.620850][T15740] device veth1_macvtap left promiscuous mode [ 526.727442][T15740] device macsec0 left promiscuous mode [ 529.286316][T15811] device veth0_vlan left promiscuous mode [ 529.504667][T15811] device veth0_vlan entered promiscuous mode [ 529.547239][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 529.557413][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 529.667572][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 536.407065][T15987] device macsec0 left promiscuous mode [ 537.398968][T16036] syz.0.4957[16036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 537.407146][T16036] syz.0.4957[16036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 539.409979][T16094] device lo entered promiscuous mode [ 541.288721][T16151] device macsec0 entered promiscuous mode [ 541.608122][T16154] device veth1_macvtap entered promiscuous mode [ 541.614714][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 541.682037][T16154] device veth1_macvtap left promiscuous mode [ 542.997449][T16204] device lo entered promiscuous mode [ 545.558908][T16268] device lo entered promiscuous mode [ 548.893815][T16388] device sit0 left promiscuous mode [ 550.012748][T16441] syz.3.5072[16441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.012780][T16441] syz.3.5072[16441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.666850][T16465] device veth0_vlan left promiscuous mode [ 550.837905][T16465] device veth0_vlan entered promiscuous mode [ 550.960579][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 551.009603][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 551.146454][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 553.672428][T16513] device lo entered promiscuous mode [ 554.334032][T16539] device lo entered promiscuous mode [ 554.402120][T16539] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 559.945898][T16680] device wg2 entered promiscuous mode [ 560.781505][T16719] device macsec0 left promiscuous mode [ 563.725264][T16811] device sit0 entered promiscuous mode [ 564.564101][ T24] audit: type=1400 audit(1732048149.619:173): avc: denied { create } for pid=16831 comm="syz.4.5191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 577.897405][T16944] bridge0: port 4(veth0) entered blocking state [ 577.903471][T16944] bridge0: port 4(veth0) entered disabled state [ 578.134582][T16944] device veth0 entered promiscuous mode [ 578.196936][T16944] bridge0: port 4(veth0) entered blocking state [ 578.203003][T16944] bridge0: port 4(veth0) entered forwarding state [ 579.597037][T16982] syz.4.5232[16982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 579.597093][T16982] syz.4.5232[16982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 581.000837][T17017] device sit0 left promiscuous mode [ 581.413783][T17023] device sit0 entered promiscuous mode [ 585.767719][T17122] syz.2.5272[17122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.767776][T17122] syz.2.5272[17122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 586.780839][T17143] syz.1.5277[17143] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 586.852663][T17143] syz.1.5277[17143] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.067819][T17156] device wg2 left promiscuous mode [ 587.231169][T17165] device wg2 entered promiscuous mode [ 587.432740][T17174] device sit0 left promiscuous mode [ 588.027100][T17189] bridge0: port 4(veth0) entered disabled state [ 588.033505][T17189] bridge0: port 3(veth0_to_batadv) entered disabled state [ 588.040524][T17189] bridge0: port 2(bridge_slave_1) entered disabled state [ 588.047751][T17189] bridge0: port 1(bridge_slave_0) entered disabled state [ 588.060223][T17189] device bridge0 left promiscuous mode [ 588.102081][T17202] device sit0 left promiscuous mode [ 594.150614][ T7] device veth0_vlan left promiscuous mode [ 597.572049][T17482] device macsec0 left promiscuous mode [ 603.660495][T17626] syz.1.5416[17626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 603.660553][T17626] syz.1.5416[17626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 606.804288][T17686] syz.0.5432[17686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 606.847179][T17686] syz.0.5432[17686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 609.955995][T17722] syz.2.5444[17722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 610.066223][T17722] syz.2.5444[17722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 616.766035][T17803] device veth0_vlan left promiscuous mode [ 616.941762][T17803] device veth0_vlan entered promiscuous mode [ 617.134125][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 617.174713][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 617.266253][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=3 req=5333 state=3 status=67 (errno 32: Broken pipe) [ 623.797659][ T7] device veth0 left promiscuous mode [ 623.802801][ T7] bridge0: port 4(veth0) entered disabled state [ 623.809258][ T7] device veth0_to_batadv left promiscuous mode [ 623.815361][ T7] bridge0: port 3(veth0_to_batadv) entered disabled state [ 623.822996][ T7] device bridge_slave_1 left promiscuous mode [ 623.828980][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 623.836029][ T7] device bridge_slave_0 left promiscuous mode [ 623.841983][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 623.849527][ T7] device veth0 left promiscuous mode [ 623.854660][ T7] bridge0: port 3(veth0) entered disabled state [ 623.861173][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 623.868241][ T7] device bridge_slave_0 left promiscuous mode [ 623.874133][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 623.881896][ T7] device bridge_slave_1 left promiscuous mode [ 623.887869][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 623.894925][ T7] device bridge_slave_0 left promiscuous mode [ 623.900908][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 623.908713][ T7] device veth0_vlan left promiscuous mode