last executing test programs: 4m50.925728456s ago: executing program 4 (id=1504): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 4m50.895058247s ago: executing program 4 (id=1505): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x20880, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r2 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, 0x0, 0x4) 4m50.76979082s ago: executing program 4 (id=1509): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000800)='kfree_skb\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) 4m50.678555633s ago: executing program 4 (id=1511): bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffed2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010008000900000001"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x16, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002c00000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1c, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00y\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/18], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r3}, &(0x7f0000000a00), &(0x7f0000000a40)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r3}, &(0x7f0000000880), &(0x7f00000008c0)=r2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x5, 0x3, 0x3, 0x3ff, 0x3409, r0, 0x8, '\x00', 0x0, r2, 0x0, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000552a7bc54c27bfd20467e72555fb154b6bbba6a045ec460a4e36e0bf86f51540000000751c7e0cd72a99365a84a07c3032f7df5ae9451b4c8ac6abb5d74c88465417100c5f65ac062dda5540891183f7cbd9ccbcd6e09bb589642f600ec11a807e2dfb2feeab5b0fcee9f3d6b23a0f8190a9b1bdbd6fb6cfb9", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000640)={&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000001280)='\\', 0xffffffe3}], 0x1}, 0x24004044) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00008004bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018030000", @ANYRES32, @ANYBLOB="0000000000000d00b70500000800000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000800000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 4m50.662247333s ago: executing program 2 (id=1512): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, &(0x7f0000000340), &(0x7f0000000380)=r1}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x7f, 0x0, 0x0, 0x7602, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000080)}, 0x300000000000000, 0x5, 0x0, 0x2, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 4m50.348834082s ago: executing program 2 (id=1515): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000070000000500000000000011030000000a000000030000000000000700000000080000000000000203000000cffaffffffffffff0f274d0cdeaa0b80696538a4b71ef24d5f89631da109b7ca463e19651dc3a660bb1b3150554ef2a346bf0010011ce525234978749ba36996cbe42d54c97e83a3"], &(0x7f0000000480)=""/143, 0x47, 0x8f, 0x0, 0x2, 0x10000, @value}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0xde, 0x0}, 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000700)="ec2faf12f1c1cfb90e908f632948df6ec3088917bacee5f2d2bd8d80d1e5efe3d05d70461c993e6a3db1bf38a6b469d737e42838c248ea8bbb6ae5c92d6cd13ae2d9a4c4d4c6da66a22041470270931fc3f79c890906ad3314d4407b9d2ea73c43f63755c26923aff19ad7c8cc6db1e1c97d952291ffede021a13ffe91993956c0d358a4fc178bbfaaad9b560fe29b6c1083dd", 0x93}], 0x1}, 0x4) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 4m50.115809139s ago: executing program 2 (id=1519): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000004000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f00000001c0), 0x4) 4m50.114459259s ago: executing program 2 (id=1520): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000002"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x6, 0x4, 0x8, 0xa, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x37e2f4aba9289b81, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 4m50.023511222s ago: executing program 2 (id=1521): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000800)='kfree_skb\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) 4m49.883615326s ago: executing program 2 (id=1522): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500), 0x0, 0xaf, &(0x7f0000000540), 0x0, 0x10, &(0x7f0000000580), 0x0, 0x0, 0x6c, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b000200e271d0dda3c6adf21375e8e72780f208a01237ed550cadbcd74337e7f0a6f5303cfbb24a4e7809b67c5e96a018149c1687eca644c3cb438e0e0b7299c0baa1770f194c65f2ffba2338095257e186e1815be00a1f4f7af265d8a962c37eee2af7053b88293bd1f703d1083b0477c490a40616c2f29687", @ANYRES32=0x0, @ANYBLOB="0400"/20, @ANYRES32=r1, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b000200e271d0dda3c6adf21375e8e72780f208a01237ed550cadbcd74337e7f0a6f5303cfbb24a4e7809b67c5e96a018149c1687eca644c3cb438e0e0b7299c0baa1770f194c65f2ffba2338095257e186e1815be00a1f4f7af265d8a962c37eee2af7053b88293bd1f703d1083b0477c490a40616c2f29687", @ANYRES32=0x0, @ANYBLOB="0400"/20, @ANYRES32=r1, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB="00000000ecff000094ba807aaf549dd3d9b98c8e96b164b200"/36, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="001708bc7f0000000000000000000000f77f00000000000000000000c9c65f6177f1e58cb85c3de9873c57eef0964c583c7dc1ff70f5276ebaa6328fa4714bb536e1c8ac9680968221628193f1bb766502d040bd0497f1eb98a823ae8bd75ff1b7c10b605d2e8f94da51fe96cc2df8fd6bfb5f9cffa58a9855d37fcf8c152f7a3e52aa0d6b40e27101f0f07da8a2e2664ba6fe12c3474a7a8aa7e768366133237bf63b223e681f57bc0c189e15db20d52fe396e3ce740b50637b0aead25b0a39dbc9765e56a9831b8339aacb0bb5ff88c208102ab399711a204954e2c414a148f9d6bc5601903b8c8b0d61ce884a4a534f1293bbd14b80e1ddaaa0a96d"], 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB="00000000ecff000094ba807aaf549dd3d9b98c8e96b164b200"/36, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r2}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000850000000800000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x7f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = perf_event_open(&(0x7f00000012c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x7f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="04000000040000000402000001a118471a6446f0", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x108, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3e}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="027b0d7c1a522497181c3ec0654cea643c000000040000000800000001000000800000004fa5e36ad306bb5191a33a7fb00bf8d64efa183dd4", @ANYRESDEC=r5, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r6, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 4m49.836630527s ago: executing program 32 (id=1522): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500), 0x0, 0xaf, &(0x7f0000000540), 0x0, 0x10, &(0x7f0000000580), 0x0, 0x0, 0x6c, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b000200e271d0dda3c6adf21375e8e72780f208a01237ed550cadbcd74337e7f0a6f5303cfbb24a4e7809b67c5e96a018149c1687eca644c3cb438e0e0b7299c0baa1770f194c65f2ffba2338095257e186e1815be00a1f4f7af265d8a962c37eee2af7053b88293bd1f703d1083b0477c490a40616c2f29687", @ANYRES32=0x0, @ANYBLOB="0400"/20, @ANYRES32=r1, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b000200e271d0dda3c6adf21375e8e72780f208a01237ed550cadbcd74337e7f0a6f5303cfbb24a4e7809b67c5e96a018149c1687eca644c3cb438e0e0b7299c0baa1770f194c65f2ffba2338095257e186e1815be00a1f4f7af265d8a962c37eee2af7053b88293bd1f703d1083b0477c490a40616c2f29687", @ANYRES32=0x0, @ANYBLOB="0400"/20, @ANYRES32=r1, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB="00000000ecff000094ba807aaf549dd3d9b98c8e96b164b200"/36, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB="00000000ecff000094ba807aaf549dd3d9b98c8e96b164b200"/36, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r2}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000850000000800000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x7f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = perf_event_open(&(0x7f00000012c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x7f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="04000000040000000402000001a118471a6446f0", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x108, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3e}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="027b0d7c1a522497181c3ec0654cea643c000000040000000800000001000000800000004fa5e36ad306bb5191a33a7fb00bf8d64efa183dd4", @ANYRESDEC=r5, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r6, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 4m49.629244563s ago: executing program 5 (id=1532): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000002"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x6, 0x4, 0x8, 0xa, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x37e2f4aba9289b81, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 4m49.561862425s ago: executing program 33 (id=1532): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000002"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x6, 0x4, 0x8, 0xa, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x37e2f4aba9289b81, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 4m49.554474145s ago: executing program 4 (id=1524): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x20880, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r2, 0x0, 0x4) 4m49.487721497s ago: executing program 4 (id=1525): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0500000004000000060000000500000000000000", @ANYRES32, @ANYBLOB="030000000000000000000000fa8872551c4b5303", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0100"/28], 0x50) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="1e0308003c5c980128876360864668f82ffdd569d2f630b5e033ff11edf1c5ffc733d2acb165fe588cd568cd1f31b87b68b00ad888ca"], 0xffdd) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0x3) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000009000000000000000300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000095000000000000008520000002000000853a555a0c058b9fa3a9bb3cdf2420000002000000180000000300000000000000fdffffff184d0000030000000000000000000000bf91000000000000b7020000000000008500000085000000b70000"], &(0x7f0000000080)='syzkaller\x00', 0xc, 0xe7, &(0x7f0000000540)=""/231, 0x41100, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x10, 0x5, 0x1}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000380)=[r0, r0, r0], &(0x7f00000003c0)=[{0x3, 0x3, 0xb, 0xb}], 0x10, 0xa34a, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000800)=[0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0], 0x0, 0xd7, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x66, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000097095c9721708cd0718382db421afd690000000009", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000840)={{r5}, &(0x7f0000000000), &(0x7f0000000800)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r7}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000b40), 0x8) recvmsg$unix(r8, &(0x7f0000002000)={&(0x7f0000000e40), 0x6e, &(0x7f0000001f40)=[{&(0x7f0000000ec0)=""/120, 0x78}, {&(0x7f0000000b80)=""/18, 0x12}, {&(0x7f0000000f40)=""/4096, 0x1000}], 0x3, &(0x7f0000001f80)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x80}, 0x120) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r9, &(0x7f0000000100)=ANY=[@ANYBLOB="1e031800dd5c980128854d4a"], 0xffdd) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0200000004000000040000000800000014100000", @ANYRES32, @ANYBLOB="0000000000000000000000c16f1b49e5e23848662f6e2135efce12ba3f1fded11d664d087d2282095a9fa0deb88e639559d176ba5f1d06bf4727dd318642e8a7671caba2c00eea71b7642fc655080803a3dbe06390d41aff4493ecf58eb63cddcc60f167aa124db5916fab3a8718a491e08a6d05ffdd779c743819f06ad7aec8b00dffc977346a", @ANYRES32=0x0, @ANYRESDEC, @ANYRESHEX=r4], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000007b000000950000979055fce90000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100033a00fc08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="3d1800000010000040000000f1ff000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000000240)='GPL\x00', 0x2fd6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r12}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x4, 0x1, &(0x7f0000002040)=ANY=[@ANYBLOB="98e025e8fe420209726f51279bae1e3e8d4cdd50d5766737f22cb31de36c2b4cd0de9ff1849a5041d82162ab83defef79292ce8d62b2399b0f0f463c7073ac37d73da365723629579c9e6c011c96a500000000"], &(0x7f0000000500)='syzkaller\x00', 0x4, 0x36, &(0x7f0000000ac0)=""/54, 0x83d00, 0x24, '\x00', r3, @fallback=0xc, r11, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000b00)={0x3, 0x2, 0xff, 0xe5}, 0x10, r4, r6, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) 4m49.426678039s ago: executing program 34 (id=1525): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0500000004000000060000000500000000000000", @ANYRES32, @ANYBLOB="030000000000000000000000fa8872551c4b5303", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0100"/28], 0x50) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="1e0308003c5c980128876360864668f82ffdd569d2f630b5e033ff11edf1c5ffc733d2acb165fe588cd568cd1f31b87b68b00ad888ca"], 0xffdd) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0x3) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000009000000000000000300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000095000000000000008520000002000000853a555a0c058b9fa3a9bb3cdf2420000002000000180000000300000000000000fdffffff184d0000030000000000000000000000bf91000000000000b7020000000000008500000085000000b70000"], &(0x7f0000000080)='syzkaller\x00', 0xc, 0xe7, &(0x7f0000000540)=""/231, 0x41100, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x10, 0x5, 0x1}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000380)=[r0, r0, r0], &(0x7f00000003c0)=[{0x3, 0x3, 0xb, 0xb}], 0x10, 0xa34a, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000800)=[0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0], 0x0, 0xd7, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x66, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000097095c9721708cd0718382db421afd690000000009", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000840)={{r5}, &(0x7f0000000000), &(0x7f0000000800)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r7}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000b40), 0x8) recvmsg$unix(r8, &(0x7f0000002000)={&(0x7f0000000e40), 0x6e, &(0x7f0000001f40)=[{&(0x7f0000000ec0)=""/120, 0x78}, {&(0x7f0000000b80)=""/18, 0x12}, {&(0x7f0000000f40)=""/4096, 0x1000}], 0x3, &(0x7f0000001f80)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x80}, 0x120) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r9, &(0x7f0000000100)=ANY=[@ANYBLOB="1e031800dd5c980128854d4a"], 0xffdd) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0200000004000000040000000800000014100000", @ANYRES32, @ANYBLOB="0000000000000000000000c16f1b49e5e23848662f6e2135efce12ba3f1fded11d664d087d2282095a9fa0deb88e639559d176ba5f1d06bf4727dd318642e8a7671caba2c00eea71b7642fc655080803a3dbe06390d41aff4493ecf58eb63cddcc60f167aa124db5916fab3a8718a491e08a6d05ffdd779c743819f06ad7aec8b00dffc977346a", @ANYRES32=0x0, @ANYRESDEC, @ANYRESHEX=r4], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000007b000000950000979055fce90000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100033a00fc08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="3d1800000010000040000000f1ff000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000000240)='GPL\x00', 0x2fd6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r12}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x4, 0x1, &(0x7f0000002040)=ANY=[@ANYBLOB="98e025e8fe420209726f51279bae1e3e8d4cdd50d5766737f22cb31de36c2b4cd0de9ff1849a5041d82162ab83defef79292ce8d62b2399b0f0f463c7073ac37d73da365723629579c9e6c011c96a500000000"], &(0x7f0000000500)='syzkaller\x00', 0x4, 0x36, &(0x7f0000000ac0)=""/54, 0x83d00, 0x24, '\x00', r3, @fallback=0xc, r11, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000b00)={0x3, 0x2, 0xff, 0xe5}, 0x10, r4, r6, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) 4m49.416597889s ago: executing program 6 (id=1523): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x3e, 0x8}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r0, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x28, &(0x7f00000006c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000740), &(0x7f0000000780), 0x8, 0x3e, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xe) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={r3, 0x20, &(0x7f00000004c0)={&(0x7f0000000280)=""/39, 0x27, 0x0, &(0x7f00000002c0)=""/238, 0xee}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x7, 0xc, &(0x7f0000000540)=ANY=[@ANYRESHEX=r2, @ANYRES32, @ANYRESHEX=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000980), 0x31080, 0x0) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f00000009c0)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x775}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r7, 0x18000000000002a0, 0xf, 0x0, &(0x7f00000001c0)="b15dd7cf1c00000400000000000036", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x9, 0x0, 0x0, 0x20880, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0c0000000400000004000000be3a000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00'], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8, 0x0, 0x5}, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r11 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r11, 0x0, 0x4) 4m49.39739868s ago: executing program 35 (id=1523): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x3e, 0x8}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r0, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x28, &(0x7f00000006c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000740), &(0x7f0000000780), 0x8, 0x3e, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xe) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={r3, 0x20, &(0x7f00000004c0)={&(0x7f0000000280)=""/39, 0x27, 0x0, &(0x7f00000002c0)=""/238, 0xee}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x7, 0xc, &(0x7f0000000540)=ANY=[@ANYRESHEX=r2, @ANYRES32, @ANYRESHEX=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000980), 0x31080, 0x0) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f00000009c0)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x775}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r7, 0x18000000000002a0, 0xf, 0x0, &(0x7f00000001c0)="b15dd7cf1c00000400000000000036", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x9, 0x0, 0x0, 0x20880, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0c0000000400000004000000be3a000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00'], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8, 0x0, 0x5}, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r11 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r11, 0x0, 0x4) 12.159177356s ago: executing program 7 (id=3512): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB="850000002e0000001600000000c0a5007a0000200000000095001000000000007aa7e27ebcf9b1971c1c6debf9e25a1999de9bc092cee7fb3bf3a261e5fcc637f2dfe1b5822177d97c3836754fd014b5ad25fdf8d1"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, 0xffffffffffffffff, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8, 0x0, 0xffffffffffffffff, 0xfe8e, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000280)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r2, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x5, 0x0, r1, 0x1, '\x00', r5, r6, 0x2, 0x3, 0x2, 0x0, @void, @value, @void, @value}, 0x50) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='net_prio.prioidx\x00', 0x0, 0x0) ioctl$TUNGETVNETLE(r3, 0x80047456, &(0x7f0000000180)) 10.013009386s ago: executing program 7 (id=3512): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB="850000002e0000001600000000c0a5007a0000200000000095001000000000007aa7e27ebcf9b1971c1c6debf9e25a1999de9bc092cee7fb3bf3a261e5fcc637f2dfe1b5822177d97c3836754fd014b5ad25fdf8d1"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, 0xffffffffffffffff, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8, 0x0, 0xffffffffffffffff, 0xfe8e, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000280)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r2, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x5, 0x0, r1, 0x1, '\x00', r5, r6, 0x2, 0x3, 0x2, 0x0, @void, @value, @void, @value}, 0x50) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='net_prio.prioidx\x00', 0x0, 0x0) ioctl$TUNGETVNETLE(r3, 0x80047456, &(0x7f0000000180)) 7.629418466s ago: executing program 3 (id=3669): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xa) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0xfffffd26) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x3, 0x5, 0x1000, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180)={0x0, r0}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000006c0)=ANY=[], &(0x7f00000011c0)=""/205, 0x31, 0xcd, 0x1, 0x0, 0x0, @void, @value}, 0x28) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffe}, [@call={0x85, 0x0, 0x0, 0x41}, @call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b70200001400ffd9b7030000000000008500000083000000bf09"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) gettid() bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 7.568704197s ago: executing program 7 (id=3512): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB="850000002e0000001600000000c0a5007a0000200000000095001000000000007aa7e27ebcf9b1971c1c6debf9e25a1999de9bc092cee7fb3bf3a261e5fcc637f2dfe1b5822177d97c3836754fd014b5ad25fdf8d1"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, 0xffffffffffffffff, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8, 0x0, 0xffffffffffffffff, 0xfe8e, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000280)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r2, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x5, 0x0, r1, 0x1, '\x00', r5, r6, 0x2, 0x3, 0x2, 0x0, @void, @value, @void, @value}, 0x50) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='net_prio.prioidx\x00', 0x0, 0x0) ioctl$TUNGETVNETLE(r3, 0x80047456, &(0x7f0000000180)) 5.598154735s ago: executing program 3 (id=3673): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1, 0x20}, 0x10) 5.569042735s ago: executing program 3 (id=3674): bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffed2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010008000900000001"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x16, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002c00000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1c, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00y\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/18], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r3}, &(0x7f0000000a00), &(0x7f0000000a40)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r3}, &(0x7f0000000880), &(0x7f00000008c0)=r2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x5, 0x3, 0x3, 0x3ff, 0x3409, r0, 0x8, '\x00', 0x0, r2, 0x0, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000552a7bc54c27bfd20467e72555fb154b6bbba6a045ec460a4e36e0bf86f51540000000751c7e0cd72a99365a84a07c3032f7df5ae9451b4c8ac6abb5d74c88465417100c5f65ac062dda5540891183f7cbd9ccbcd6e09bb589642f600ec11a807e2dfb2feeab5b0fcee9f3d6b23a0f8190a9b1bdbd6fb6cfb9", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000640)={&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000001280)='\\', 0xffffffe3}], 0x1}, 0x24004044) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa1ffb00000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018030000", @ANYRES32, @ANYBLOB="0000000000000d00b70500000800000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000800000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 5.561164945s ago: executing program 0 (id=3675): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10002, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, 0x0, 0x38}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r3}, 0x69) 5.493804556s ago: executing program 0 (id=3677): perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xffffffffffffff07, 0x7}, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffff800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x4, 0x4, 0x12, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) r5 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000300)={0x0, r3}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, 0x0, 0x4c, 0x0, 0x0, 0x8, 0x10000, @value=r5}, 0x28) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 5.231799137s ago: executing program 7 (id=3512): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB="850000002e0000001600000000c0a5007a0000200000000095001000000000007aa7e27ebcf9b1971c1c6debf9e25a1999de9bc092cee7fb3bf3a261e5fcc637f2dfe1b5822177d97c3836754fd014b5ad25fdf8d1"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, 0xffffffffffffffff, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8, 0x0, 0xffffffffffffffff, 0xfe8e, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000280)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r2, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x5, 0x0, r1, 0x1, '\x00', r5, r6, 0x2, 0x3, 0x2, 0x0, @void, @value, @void, @value}, 0x50) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='net_prio.prioidx\x00', 0x0, 0x0) ioctl$TUNGETVNETLE(r3, 0x80047456, &(0x7f0000000180)) 2.971998437s ago: executing program 0 (id=3681): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x30001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x20, 0x0, 0xa3500, 0x1, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) r6 = getpid() syz_open_procfs$namespace(r6, &(0x7f0000001380)='ns/mnt\x00') perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x8, 0xfa, 0xc, 0x1, 0x0, 0x8e, 0x1000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x2, 0x4c9}, 0x2200, 0x1, 0x4, 0x7, 0x8, 0xff, 0x6, 0x0, 0x3, 0x0, 0x5}, r6, 0xc, r5, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r7}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) (async) close(r1) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x30001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) close(r1) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x20, 0x0, 0xa3500, 0x1, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) (async) getpid() (async) syz_open_procfs$namespace(r6, &(0x7f0000001380)='ns/mnt\x00') (async) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x8, 0xfa, 0xc, 0x1, 0x0, 0x8e, 0x1000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x2, 0x4c9}, 0x2200, 0x1, 0x4, 0x7, 0x8, 0xff, 0x6, 0x0, 0x3, 0x0, 0x5}, r6, 0xc, r5, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r7}, 0x10) (async) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 2.970347727s ago: executing program 3 (id=3684): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xa) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0xfffffd26) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x3, 0x5, 0x1000, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180)={0x0, r0}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000006c0)=ANY=[], &(0x7f00000011c0)=""/205, 0x31, 0xcd, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffe}, [@call={0x85, 0x0, 0x0, 0x41}, @call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b70200001400ffd9b7030000000000008500000083000000bf09"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) gettid() bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 2.920452957s ago: executing program 1 (id=3685): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1, 0x25}, 0x10) 2.878890208s ago: executing program 8 (id=3686): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0500000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000a96e101a1464a0bb27ff127f55bb37c442be60933f3b6a8cdddd4e01d24169664fa28da275cd02f0ccd0a7f385d5ebddcb2f918e6c292eb7b2f1d957f768da9aac33fff529d0dce33bec996bf671fce31c4f36edbf0338f45604f85b57378f642ca4e1e052d7b1089ff35fda2574b1df1350b9ed5ccd6a29bb2eec20c16ba84a4b02ce0827b974fdf6ac05e358893bb87b1a4adde757c3ca6425c47f1d09636063f34042a7895fe7b9da166a3ff1da5fd88f37483748e14ff56e0fb323274a099e5fb638181485"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r1}, 0x10) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2.877686868s ago: executing program 8 (id=3687): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10002, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, 0x0, 0x38}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r4}, 0x69) 2.824119387s ago: executing program 1 (id=3688): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f0000000540), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0900f7ff0800000040000000809cba4091a1cc000800000000000003459a6b1911a2936408d33a", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYRES32=r1], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2.823777658s ago: executing program 0 (id=3689): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x9, 0x8, 0x4, 0x4009, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000ab225bd625430000382baa52d935a3f3bda9a8c288b4d586ac5770aa81000000000000000000"], 0x48) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0x10, 0x0, &(0x7f0000000080)="5aee41dea43e63a3f7fb7f1100000000", 0x0, 0xf004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x804000, &(0x7f00000004c0)="b7a81a454a687ad41908ca31026eb5fdc5fa63b216686a5c2bf1108a6ef69c4f919c396d275931c75bb6124106005edc19ceb19064b43774ad3205b472d26df18d1588be8091757c90d449d4adebc3fc3e674064ae740699731cb4e353b7c9b7475f22cab97dbeb97338e7e7c503e7fe7e7d5c3b6c4c0f121d5a24f812bc9c5e8c646e3a520409e9fb8c21961a6c917c76059161325bc73684b0b00a9b1fa2cc9fc53d151df2e39eb4d07e8df4d0219cf0d31396e2eaadce425ff2402f8eec4dc60c962836df8bbc67a3a9", 0xcb, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000680)="25fd62eb403ed1ea0b047f28e131190fb6af010ab3fae3942e1f94352455788959687e5ad8022a37cf60f9822c82c87cfabd85718e66ab8994899d50ccfc0b2578df1fde5938389c501462ee0f283a0862059c03206098d109ecbd34779d44aec696a9038cd8df5534969e2933671871f8ee5d4aee0a6e8650fe890ab64c72ce19311054c75300a986f980bba6c55508e1e86f6df135774e3810fb0603d77508c5a4f7b5b5db39d6a0b589c21612d7f95c4576b63b4f8c7f5f13c88a1351a643aacffb4fc01f3c4d075b5ed42c1ee90b25850777ca597f91529b9e98e20069f61e5d2d26b68a9daa3ac25c") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r7}, 0x10) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00"/13], 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, 0x0, 0x13b, 0x0, 0x0, 0x534b684e, 0x0, @void, @value}, 0x20) 2.818144717s ago: executing program 8 (id=3690): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000074fb0000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r1}, 0x18) 2.769779788s ago: executing program 1 (id=3691): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000080eff95"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000002c0)='contention_end\x00', r0}, 0x10) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001680)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="1401375a0d0000cdd651202a2f5fa9e0bd5099b96d8bc1ec5ccfd179c0e8b969492afbe9064faf69665c5d5da071ff4437644448daf5260360f99c681e3ddb2c5dc9b1cbcfd5756e1f3ffb0b4b139d6dcf595097d4b136c8df4d3000064d6bb449bd79798d25a26ccbcb14dedd10a106d801273be3258d9c04edbdb1271aef0271f3ea84b5721a2cc54bbb4aee8752f1e052", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000050000000300"/28], 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r1, &(0x7f0000000400)="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"}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r2], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), ""/16, 0x0, 0x0, 0x0, 0x0, 0x12, 0xa, &(0x7f00000001c0), &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xed, &(0x7f0000001400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x58, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x97, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000018c0)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x381, 0x64, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x200000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r5}, 0x69) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001500)=ANY=[@ANYBLOB="0b00000005000000010001000900000001000000", @ANYRES32, @ANYBLOB="0000000008e95100"/22, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r6, &(0x7f0000000000), 0x0}, 0x20) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x7602, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000001780)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="32a6d6c852b7be86f066de6400000000000000006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702004008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000001480)=ANY=[@ANYBLOB="1c00000007004000ff0300000300000002000200", @ANYRES32, @ANYBLOB="0e48d4ab932300f0ff0763397efd0ed1ca00000000", @ANYRES32=r4, @ANYRES32, @ANYBLOB="03000000040000000500"/28], 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000500)={&(0x7f0000001580)=""/29, 0x1d, 0x0, &(0x7f00000015c0)=""/13, 0xd}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x5}, 0x10, r7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x800000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x2, 0xe, &(0x7f0000000c00)=ANY=[@ANYBLOB="1856000009000000000000000000000072322000fcffffff18210000", @ANYRES32=r2, @ANYBLOB="00000000f6ffffff852000000400000018300000010000000000fa7936acf0c3be42975c4db8000000000000183900000200000000000000000000001868000006000000000000000088f4cc6752ecd620000000dc4a2400040000009b586226a6d75a9b6442ec694e6ecf7bf026d8c3ec42bc"], &(0x7f0000000240)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41000, 0x8, '\x00', r4, @fallback=0x19, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x8, 0x4, 0xf}, 0x10, r7, r3, 0x6, 0x0, &(0x7f0000001600)=[{0x4, 0x3, 0xb, 0x8}, {0x5, 0x5, 0x2}, {0x1, 0x1, 0x4, 0x9}, {0x4, 0x2, 0x7, 0x6}, {0x0, 0x3, 0x7, 0xf}, {0x5, 0x1, 0x8, 0x6}], 0x10, 0xc, @void, @value}, 0x94) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000240)=r8, 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz0\x00', 0x200002, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r10}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r11, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 2.627361429s ago: executing program 1 (id=3692): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000080eff95"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000002c0)='contention_end\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="12000000290000000400000002"], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r1, &(0x7f0000000240), 0x0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400), 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000680)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xf, 0xb, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffff800, 0x0, 0x0, 0x0, 0x4}, [@map_idx={0x18, 0x6, 0x5, 0x0, 0x1}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x10000}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffff9}, @map_val={0x18, 0x8, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000380)='GPL\x00', 0x9, 0x48, &(0x7f00000004c0)=""/72, 0x41000, 0x12, '\x00', 0x0, @fallback=0x38, r4, 0x8, &(0x7f0000000540)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0xd, 0xf7a, 0x7fa}, 0x10, r5, r2, 0x5, 0x0, &(0x7f00000006c0)=[{0x2, 0x2, 0x4}, {0x2, 0x2, 0x6, 0xc}, {0x0, 0x1, 0x8, 0x6}, {0x3, 0x2, 0xe, 0xa}, {0x0, 0x4, 0x4, 0xa}], 0x10, 0x7, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8982, &(0x7f0000000080)) 2.595630439s ago: executing program 8 (id=3693): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[@ANYBLOB="85000000a800000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r1, r2, 0x2, 0x2, 0x0, @void, @value}, 0x10) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r1, r2, 0x2, 0x2, 0x0, @void, @value}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)=ANY=[], 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0xe, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x5, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0xe, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x5, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0x4f, 0xc1, &(0x7f0000000100)="097475856eb3c6d9b2dedfe76b6eed1915079a117ad1a4420ba492b0eeb26636bf7a2e2bac47a4685134e0f49cb2363f9739ddd958c831528d1c54909d3c6c962c8f751c45d7203a184a047ba7ba2d", &(0x7f0000000180)=""/193, 0xffffffff, 0x0, 0x49, 0xb0, &(0x7f0000000280)="ba87e8ec18deae32c58569463bbfaa816638c0e39dc5ccf8360aa2b915bc3093fb1d7ba6a7f0d7555867094aea5c92b206dc99caa9fcc5cda28f3c0d6178c2237667f0aad7d46a6f65", &(0x7f00000003c0)="7b918d1d3f205c4c13cb87c0862b331c19362de8a3f911a161c0b4d7b358a1ef664201b27ecaecab1dfe74d3c25200ee3443e8115e2b015e26873ab3455f4a2c2e6e6dc42f7128a4da770172f2e662e91a6a7b6d0ce36485ca81291c43ca989e3c69c58f20fb4ced87c38b284b801796882c3fd228ad1bf0e42ba8e3ca738dce40ec32c11e4fb05491ae8dfd0e0ae4b0139b79387289aaf4c9a91f200fe747bac7867b39d11319014f67d0585c3195e2", 0x5, 0x0, 0x8}, 0x50) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x66) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f00000001c0)={0x2, &(0x7f0000000040)=[{0xc}, {0x6}]}) (async) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f00000001c0)={0x2, &(0x7f0000000040)=[{0xc}, {0x6}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000000)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0c000000040000000400000009"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000024c0), &(0x7f0000001280), 0xffffffff, r6}, 0x38) 2.539198039s ago: executing program 1 (id=3694): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x10) (fail_nth: 5) 2.470520629s ago: executing program 7 (id=3512): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB="850000002e0000001600000000c0a5007a0000200000000095001000000000007aa7e27ebcf9b1971c1c6debf9e25a1999de9bc092cee7fb3bf3a261e5fcc637f2dfe1b5822177d97c3836754fd014b5ad25fdf8d1"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, 0xffffffffffffffff, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8, 0x0, 0xffffffffffffffff, 0xfe8e, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000280)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r2, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x5, 0x0, r1, 0x1, '\x00', r5, r6, 0x2, 0x3, 0x2, 0x0, @void, @value, @void, @value}, 0x50) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='net_prio.prioidx\x00', 0x0, 0x0) ioctl$TUNGETVNETLE(r3, 0x80047456, &(0x7f0000000180)) 122.8224ms ago: executing program 0 (id=3695): perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x9}, 0x8080, 0x5, 0x0, 0x0, 0xed}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000d100000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x300}, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x4, 0x5, 0x0, &(0x7f0000000040)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r2}, &(0x7f0000000a00), &(0x7f0000000a40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xe, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000006110b4000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0xc, &(0x7f0000000440)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x87}}, @call={0x85, 0x0, 0x0, 0x9e}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_open_procfs$namespace(0x0, &(0x7f0000000500)='ns/mnt\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r4}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 122.3457ms ago: executing program 1 (id=3696): bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffed2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010008000900000001"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x16, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002c00000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1c, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00y\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/18], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r3}, &(0x7f0000000a00), &(0x7f0000000a40)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r3}, &(0x7f0000000880), &(0x7f00000008c0)=r2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x5, 0x3, 0x3, 0x3ff, 0x3409, r0, 0x8, '\x00', 0x0, r2, 0x0, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000552a7bc54c27bfd20467e72555fb154b6bbba6a045ec460a4e36e0bf86f51540000000751c7e0cd72a99365a84a07c3032f7df5ae9451b4c8ac6abb5d74c88465417100c5f65ac062dda5540891183f7cbd9ccbcd6e09bb589642f600ec11a807e2dfb2feeab5b0fcee9f3d6b23a0f8190a9b1bdbd6fb6cfb9", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000640)={&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000001280)='\\', 0xffffffe3}], 0x1}, 0x24004044) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa1ffc00000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018030000", @ANYRES32, @ANYBLOB="0000000000000d00b70500000800000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000800000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 122.01955ms ago: executing program 8 (id=3697): socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000002180)={0x0, 0x0, 0x0}, 0xc040014) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x1d, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 64) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0xb, 0x7, 0x0, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0xfffffffd, 0x0, @void, @value, @void, @value}, 0x50) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r3, 0x0) (async) perf_event_open(0x0, 0x0, 0xffefffffffffffff, r3, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000009500001000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r5}, 0x10) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001600)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) close(0xffffffffffffffff) (async, rerun: 32) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) (rerun: 32) close(r6) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x20001400) write$cgroup_subtree(r6, 0x0, 0x2) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x4, 0x4, 0x4, 0x10000, 0x808, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r7}, 0x10) 119.98679ms ago: executing program 3 (id=3698): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0500000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000a96e101a1464a0bb27ff127f55bb37c442be60933f3b6a8cdddd4e01d24169664fa28da275cd02f0ccd0a7f385d5ebddcb2f918e6c292eb7b2f1d957f768da9aac33fff529d0dce33bec996bf671fce31c4f36edbf0338f45604f85b57378f642ca4e1e052d7b1089ff35fda2574b1df1350b9ed5ccd6a29bb2eec20c16ba84a4b02ce0827b974fdf6ac05e358893bb87b1a4adde757c3ca6425c47f1d09636063f34042a7895fe7b9da166a3ff1da5fd88f37483748e14ff56e0fb323274a099e5fb638181485"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r1}, 0x10) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 65.03113ms ago: executing program 8 (id=3699): bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x0, 0x0}, 0x8) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001200)=ANY=[@ANYBLOB="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", @ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xb, &(0x7f0000000040)=ANY=[@ANYRES8=r1, @ANYRES8], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xb2) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000240)=r3}, 0x20) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000500000000000000", @ANYRES32=0x1, @ANYBLOB=';\x00'/20, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="03000000040000000400002100"/28], 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x1a, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x7}, {{}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x2, 0x300}, {0x6e}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000980)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x38, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r7}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r9 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1e, 0x11, &(0x7f0000001440)=ANY=[@ANYBLOB="1800000010000000000000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7020000008500000083000000bf0900000000000055090100000000009500000000000000950000000000000091353000f0ffffffbf91000000000000b7020000020000008500000084000000b70000000000000095000000000000005b7abca40b091263cf64a661024104df7af425c865bc0d83a1318fa6aaf447ccc14c6057e5f4a7f46e4e31be96d3b2e74f16a87d8a95a33e39615464e289d2f67a704bad112de20d6c87d4d68a69939d1639b08b5b5226d9495c16110f2400000000000000000000006a47b4ef5c984761fdf212cc73e1398faa220ec066169275c466bc9e19ce4f3667d35bedcf20dd802aeb2e21454392c3bbee8d5fa23bd48111e021797b42d7cd3dc35db2c6bd1b911fde2ef33c29c10ffeff35f5dca9a5634038f27b4ff62d7e6a6769bdaa893281d08a0941d5f90a9a7c5d4a902b255914d57297c74cda"], &(0x7f00000005c0)='syzkaller\x00', 0xa, 0x5a, &(0x7f0000000900)=""/90, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x3c, r1, 0x8, &(0x7f0000000680)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x2, 0x6, 0xfffffffa, 0x7}, 0x10, r6, r2, 0x0, &(0x7f00000009c0)=[r4, r4, r4, r4, r4, r4, r4], 0x0, 0x10, 0x8000, @void, @value}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0x1, 0x58, &(0x7f0000000400)}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x0, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9, @void, @value, @void, @value}, 0x50) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r10, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r10, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x17, &(0x7f0000001380)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @generic={0x62, 0x9, 0x1, 0x2, 0xffff}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, @exit, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}}], &(0x7f00000003c0)='GPL\x00', 0xad25, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f00000004c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0x8, 0x0, 0xe}, 0x10, 0x0, 0x0, 0x5, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x5, 0xd, 0x3}, {0x4, 0x2, 0x4, 0x8}, {0x3, 0x5, 0x4, 0xb}, {0x3, 0x1, 0x0, 0x3}, {0x2, 0x3, 0xa, 0x2}], 0x10, 0x400, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000010000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000001c0)='percpu_alloc_percpu\x00', r11}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x8, 0x1, 0x2f, 0x10}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xff39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 42.24018ms ago: executing program 3 (id=3700): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10002, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, 0x0, 0x38}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r4}, 0x69) 1.93792ms ago: executing program 0 (id=3701): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f0000000540), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0900f7ff0800000040000000809cba4091a1cc000800000000000003459a6b1911a2936408d33a", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYRES32=r1], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 7 (id=3512): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB="850000002e0000001600000000c0a5007a0000200000000095001000000000007aa7e27ebcf9b1971c1c6debf9e25a1999de9bc092cee7fb3bf3a261e5fcc637f2dfe1b5822177d97c3836754fd014b5ad25fdf8d1"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, 0xffffffffffffffff, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8, 0x0, 0xffffffffffffffff, 0xfe8e, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000280)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r2, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x5, 0x0, r1, 0x1, '\x00', r5, r6, 0x2, 0x3, 0x2, 0x0, @void, @value, @void, @value}, 0x50) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='net_prio.prioidx\x00', 0x0, 0x0) ioctl$TUNGETVNETLE(r3, 0x80047456, &(0x7f0000000180)) kernel console output (not intermixed with test programs): +0x356/0x7e0 [ 85.697294][ T1597] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 85.702760][ T1597] ? __ia32_sys_read+0x90/0x90 [ 85.707362][ T1597] __x64_sys_perf_event_open+0xbf/0xd0 [ 85.712652][ T1597] x64_sys_call+0x7de/0x9a0 [ 85.716993][ T1597] do_syscall_64+0x3b/0xb0 [ 85.721245][ T1597] ? clear_bhb_loop+0x55/0xb0 [ 85.725758][ T1597] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 85.731486][ T1597] RIP: 0033:0x7ffb3df8d169 [ 85.735742][ T1597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 85.755184][ T1597] RSP: 002b:00007ffb3ee12038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 85.763425][ T1597] RAX: ffffffffffffffda RBX: 00007ffb3e1a5fa0 RCX: 00007ffb3df8d169 [ 85.771239][ T1597] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000400000001080 [ 85.779047][ T1597] RBP: 00007ffb3ee12090 R08: 0000000000000000 R09: 0000000000000000 [ 85.786862][ T1597] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 85.794670][ T1597] R13: 0000000000000000 R14: 00007ffb3e1a5fa0 R15: 00007ffe488947f8 [ 85.802488][ T1597] [ 85.816909][ T28] audit: type=1400 audit(1741257303.988:138): avc: denied { remove_name } for pid=85 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 86.055050][ T28] audit: type=1400 audit(1741257303.988:139): avc: denied { rename } for pid=85 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 87.173020][ T1637] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.232491][ T1645] FAULT_INJECTION: forcing a failure. [ 87.232491][ T1645] name failslab, interval 1, probability 0, space 0, times 0 [ 87.394855][ T1645] CPU: 0 PID: 1645 Comm: syz.0.357 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 87.404411][ T1645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 87.414303][ T1645] Call Trace: [ 87.417428][ T1645] [ 87.420205][ T1645] dump_stack_lvl+0x151/0x1b7 [ 87.424717][ T1645] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 87.430012][ T1645] ? snprintf+0xd6/0x120 [ 87.434091][ T1645] dump_stack+0x15/0x18 [ 87.438082][ T1645] should_fail_ex+0x3d0/0x520 [ 87.442597][ T1645] __should_failslab+0xaf/0xf0 [ 87.447196][ T1645] ? traceprobe_set_print_fmt+0x5c/0xc0 [ 87.452579][ T1645] should_failslab+0x9/0x20 [ 87.456918][ T1645] __kmem_cache_alloc_node+0x3d/0x2a0 [ 87.462126][ T1645] ? traceprobe_set_print_fmt+0x5c/0xc0 [ 87.467506][ T1645] __kmalloc+0xa3/0x1e0 [ 87.471498][ T1645] traceprobe_set_print_fmt+0x5c/0xc0 [ 87.476707][ T1645] create_local_trace_uprobe+0x575/0x710 [ 87.482176][ T1645] ? bpf_get_uprobe_info+0x540/0x540 [ 87.487295][ T1645] perf_uprobe_init+0xfa/0x1a0 [ 87.491893][ T1645] perf_uprobe_event_init+0x106/0x190 [ 87.497103][ T1645] perf_try_init_event+0x143/0x410 [ 87.502050][ T1645] perf_event_alloc+0x1029/0x1840 [ 87.506912][ T1645] __se_sys_perf_event_open+0xb27/0x3d60 [ 87.512379][ T1645] ? htab_map_hash+0x356/0x7e0 [ 87.516980][ T1645] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 87.522447][ T1645] ? __ia32_sys_read+0x90/0x90 [ 87.527048][ T1645] __x64_sys_perf_event_open+0xbf/0xd0 [ 87.532340][ T1645] x64_sys_call+0x7de/0x9a0 [ 87.536683][ T1645] do_syscall_64+0x3b/0xb0 [ 87.540930][ T1645] ? clear_bhb_loop+0x55/0xb0 [ 87.545444][ T1645] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 87.551173][ T1645] RIP: 0033:0x7ff74a98d169 [ 87.555426][ T1645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 87.574866][ T1645] RSP: 002b:00007ff74a7ff038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 87.583111][ T1645] RAX: ffffffffffffffda RBX: 00007ff74aba5fa0 RCX: 00007ff74a98d169 [ 87.590924][ T1645] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000400000001080 [ 87.598735][ T1645] RBP: 00007ff74a7ff090 R08: 0000000000000000 R09: 0000000000000000 [ 87.606549][ T1645] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 87.614357][ T1645] R13: 0000000000000000 R14: 00007ff74aba5fa0 R15: 00007ffebd3dbc58 [ 87.622172][ T1645] [ 87.937415][ T1657] device wg2 entered promiscuous mode [ 87.996809][ T1662] device pim6reg1 entered promiscuous mode [ 88.003647][ T28] audit: type=1400 audit(1741257306.168:140): avc: denied { create } for pid=1653 comm="syz.3.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 90.062195][ T28] audit: type=1400 audit(1741257308.228:141): avc: denied { create } for pid=1705 comm="syz.4.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 91.105061][ T1738] FAULT_INJECTION: forcing a failure. [ 91.105061][ T1738] name failslab, interval 1, probability 0, space 0, times 0 [ 91.238510][ T1738] CPU: 0 PID: 1738 Comm: syz.2.385 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 91.248060][ T1738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 91.257959][ T1738] Call Trace: [ 91.261079][ T1738] [ 91.263855][ T1738] dump_stack_lvl+0x151/0x1b7 [ 91.268369][ T1738] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 91.273664][ T1738] ? pcpu_block_refresh_hint+0x215/0x350 [ 91.279132][ T1738] dump_stack+0x15/0x18 [ 91.283124][ T1738] should_fail_ex+0x3d0/0x520 [ 91.287638][ T1738] __should_failslab+0xaf/0xf0 [ 91.292240][ T1738] ? __uprobe_register+0x1bf/0x800 [ 91.297194][ T1738] should_failslab+0x9/0x20 [ 91.301519][ T1738] __kmem_cache_alloc_node+0x3d/0x2a0 [ 91.306728][ T1738] ? __uprobe_register+0x1bf/0x800 [ 91.311674][ T1738] kmalloc_trace+0x2a/0xa0 [ 91.315928][ T1738] __uprobe_register+0x1bf/0x800 [ 91.320704][ T1738] uprobe_register_refctr+0x2d/0x40 [ 91.325734][ T1738] probe_event_enable+0x3ad/0xb60 [ 91.330596][ T1738] ? __uprobe_trace_func+0x3d0/0x3d0 [ 91.335717][ T1738] trace_uprobe_register+0x90/0x590 [ 91.340751][ T1738] ? _find_next_bit+0x126/0x130 [ 91.345437][ T1738] perf_trace_event_init+0x43b/0x940 [ 91.350563][ T1738] perf_uprobe_init+0x132/0x1a0 [ 91.355245][ T1738] perf_uprobe_event_init+0x106/0x190 [ 91.360451][ T1738] perf_try_init_event+0x143/0x410 [ 91.365398][ T1738] perf_event_alloc+0x1029/0x1840 [ 91.370260][ T1738] __se_sys_perf_event_open+0xb27/0x3d60 [ 91.375730][ T1738] ? htab_map_hash+0x356/0x7e0 [ 91.380330][ T1738] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 91.385796][ T1738] ? __ia32_sys_read+0x90/0x90 [ 91.390397][ T1738] __x64_sys_perf_event_open+0xbf/0xd0 [ 91.395690][ T1738] x64_sys_call+0x7de/0x9a0 [ 91.400030][ T1738] do_syscall_64+0x3b/0xb0 [ 91.404282][ T1738] ? clear_bhb_loop+0x55/0xb0 [ 91.408794][ T1738] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 91.414523][ T1738] RIP: 0033:0x7ffb3df8d169 [ 91.418777][ T1738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.438216][ T1738] RSP: 002b:00007ffb3ee12038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 91.446462][ T1738] RAX: ffffffffffffffda RBX: 00007ffb3e1a5fa0 RCX: 00007ffb3df8d169 [ 91.454273][ T1738] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000400000001080 [ 91.462085][ T1738] RBP: 00007ffb3ee12090 R08: 0000000000000000 R09: 0000000000000000 [ 91.469895][ T1738] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 91.477707][ T1738] R13: 0000000000000000 R14: 00007ffb3e1a5fa0 R15: 00007ffe488947f8 [ 91.485523][ T1738] [ 91.718235][ T28] audit: type=1400 audit(1741257309.888:142): avc: denied { create } for pid=1758 comm="syz.3.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 92.327392][ T1736] device syzkaller0 entered promiscuous mode [ 92.919677][ T1777] syz.0.396[1777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.919743][ T1777] syz.0.396[1777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.262608][ T1786] device wg2 left promiscuous mode [ 93.594909][ T1786] device wg2 entered promiscuous mode [ 94.424353][ T28] audit: type=1400 audit(1741257312.588:143): avc: denied { create } for pid=1808 comm="syz.3.401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 96.586967][ T1894] syz.4.425[1894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.751386][ T1888] device veth0_vlan left promiscuous mode [ 96.935329][ T1888] device veth0_vlan entered promiscuous mode [ 97.015931][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.038063][ T28] audit: type=1400 audit(1741257315.208:144): avc: denied { create } for pid=1900 comm="syz.2.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 97.123620][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.186328][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.447398][ T1890] device wg2 entered promiscuous mode [ 98.175321][ T1922] syz.2.430 (1922) used greatest stack depth: 21768 bytes left [ 98.883982][ T28] audit: type=1400 audit(1741257317.048:145): avc: denied { create } for pid=1927 comm="syz.4.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 101.284895][ T1982] device wg2 entered promiscuous mode [ 102.409655][ T2005] device veth0_vlan left promiscuous mode [ 102.496154][ T2005] device veth0_vlan entered promiscuous mode [ 102.653704][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 102.686055][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 102.711993][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 104.710106][ T28] audit: type=1400 audit(1741257322.878:146): avc: denied { create } for pid=2041 comm="syz.0.461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 104.950393][ T2051] pimreg0: tun_chr_ioctl cmd 1074025677 [ 104.975800][ T2051] pimreg0: linktype set to 270 [ 106.694101][ T2096] device wg2 left promiscuous mode [ 106.712063][ T2096] device wg2 entered promiscuous mode [ 106.789461][ T28] audit: type=1400 audit(1741257324.958:147): avc: denied { create } for pid=2104 comm="syz.4.481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 106.824283][ T28] audit: type=1400 audit(1741257324.988:148): avc: denied { create } for pid=2108 comm="syz.1.483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 107.915881][ T28] audit: type=1400 audit(1741257326.088:149): avc: denied { create } for pid=2151 comm="syz.2.495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 108.263266][ T2161] device wg2 left promiscuous mode [ 108.398905][ T2161] device wg2 entered promiscuous mode [ 109.381184][ T2224] bond_slave_1: mtu less than device minimum [ 109.999517][ T2255] pimreg0: tun_chr_ioctl cmd 1074025677 [ 110.050326][ T2255] pimreg0: linktype set to 270 [ 110.284406][ T2272] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.849298][ T28] audit: type=1400 audit(1741257330.018:150): avc: denied { create } for pid=2324 comm="syz.1.542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 112.341477][ T2347] pimreg0: tun_chr_ioctl cmd 1074025677 [ 112.409066][ T2347] pimreg0: linktype set to 270 [ 119.134623][ T2412] device sit0 entered promiscuous mode [ 120.176484][ T2439] device syzkaller0 entered promiscuous mode [ 120.231086][ T2441] device wg2 left promiscuous mode [ 120.282391][ T2442] device wg2 entered promiscuous mode [ 121.474686][ T2475] device sit0 left promiscuous mode [ 121.795648][ T2473] device sit0 entered promiscuous mode [ 122.390742][ T2486] device sit0 left promiscuous mode [ 122.400714][ T2488] device sit0 entered promiscuous mode [ 123.041452][ T2504] device syzkaller0 entered promiscuous mode [ 123.074187][ T2507] device wg2 left promiscuous mode [ 123.111026][ T2509] device wg2 entered promiscuous mode [ 123.741571][ T2532] device veth0_vlan left promiscuous mode [ 123.845696][ T2532] device veth0_vlan entered promiscuous mode [ 124.217077][ T2532] syz.2.594 (2532) used greatest stack depth: 21720 bytes left [ 125.723881][ T28] audit: type=1400 audit(1741257343.888:151): avc: denied { create } for pid=2540 comm="syz.4.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 127.012055][ T2563] device syzkaller0 entered promiscuous mode [ 127.092646][ T2568] device wg2 left promiscuous mode [ 127.106691][ T2574] device wg2 entered promiscuous mode [ 127.586374][ T2578] device pim6reg1 entered promiscuous mode [ 130.727522][ T2646] device syzkaller0 entered promiscuous mode [ 130.754177][ T2642] device pim6reg1 entered promiscuous mode [ 130.765343][ T2648] device wg2 left promiscuous mode [ 130.777770][ T2651] device wg2 entered promiscuous mode [ 132.162274][ T2699] device pim6reg1 entered promiscuous mode [ 132.637095][ T2738] device veth0_vlan left promiscuous mode [ 132.692364][ T2738] device veth0_vlan entered promiscuous mode [ 132.813821][ T28] audit: type=1400 audit(1741257350.978:152): avc: denied { create } for pid=2752 comm="syz.1.659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 133.473662][ T2766] device sit0 left promiscuous mode [ 133.510734][ T2766] device sit0 entered promiscuous mode [ 136.315864][ T2836] device syzkaller0 entered promiscuous mode [ 136.347299][ T2838] device wg2 left promiscuous mode [ 136.362994][ T2857] device sit0 left promiscuous mode [ 136.378316][ T2861] device sit0 entered promiscuous mode [ 136.577212][ T2889] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.613681][ T2889] device bridge_slave_1 left promiscuous mode [ 136.619818][ T2889] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.635353][ T2889] device bridge_slave_0 left promiscuous mode [ 136.651424][ T2889] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.415302][ T28] audit: type=1400 audit(1741257355.588:153): avc: denied { ioctl } for pid=2904 comm="syz.1.699" path="socket:[23453]" dev="sockfs" ino=23453 ioctlcmd=0x8943 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 138.002251][ T2921] device syzkaller0 entered promiscuous mode [ 138.082501][ T2925] device wg2 left promiscuous mode [ 138.091814][ T2735] syz.2.641 (2735) used greatest stack depth: 21672 bytes left [ 138.124082][ T2939] device bridge_slave_1 left promiscuous mode [ 138.130356][ T2939] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.179542][ T2939] device bridge_slave_0 left promiscuous mode [ 138.185600][ T2939] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.256330][ T2942] device wg2 left promiscuous mode [ 138.318356][ T2943] device wg2 entered promiscuous mode [ 138.353391][ T2946] syz.1.710[2946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.353449][ T2946] syz.1.710[2946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.526887][ T2955] device veth0_vlan left promiscuous mode [ 138.545666][ T2955] device veth0_vlan entered promiscuous mode [ 138.642941][ T2969] device sit0 entered promiscuous mode [ 138.893982][ T28] audit: type=1400 audit(1741257357.058:154): avc: denied { create } for pid=2980 comm="syz.0.720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 138.967917][ T28] audit: type=1400 audit(1741257357.088:155): avc: denied { append } for pid=85 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 139.032032][ T28] audit: type=1400 audit(1741257357.088:156): avc: denied { open } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 139.105501][ T2978] device veth0_vlan left promiscuous mode [ 139.158609][ T2978] device veth0_vlan entered promiscuous mode [ 139.165840][ T28] audit: type=1400 audit(1741257357.088:157): avc: denied { getattr } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 139.345958][ T2989] device wg2 entered promiscuous mode [ 139.362389][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.378408][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 139.409065][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 139.456631][ T2999] ip6_vti0: mtu greater than device maximum [ 139.494869][ T2978] device sit0 left promiscuous mode [ 140.251859][ T3018] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.384918][ T3025] syz.1.731[3025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.384989][ T3025] syz.1.731[3025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.435401][ T3022] device bridge_slave_1 left promiscuous mode [ 140.544031][ T3022] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.609032][ T3022] device bridge_slave_0 left promiscuous mode [ 140.656505][ T3022] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.093222][ T3041] device sit0 left promiscuous mode [ 141.215779][ T3043] device sit0 entered promiscuous mode [ 142.272014][ T3068] device syzkaller0 entered promiscuous mode [ 143.345222][ T3106] device veth0_vlan left promiscuous mode [ 143.465541][ T3106] device veth0_vlan entered promiscuous mode [ 143.651156][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.698074][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.805874][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 144.006292][ T3123] device sit0 entered promiscuous mode [ 145.439433][ T3171] device syzkaller0 entered promiscuous mode [ 145.468153][ T3172] device sit0 entered promiscuous mode [ 145.647384][ T3173] device wg2 left promiscuous mode [ 145.653686][ T3165] device wg2 entered promiscuous mode [ 145.665642][ T3180] device wg2 entered promiscuous mode [ 146.035930][ T3189] ip6_vti0: mtu greater than device maximum [ 146.651213][ T3195] device syzkaller0 entered promiscuous mode [ 146.730307][ T3197] device wg2 left promiscuous mode [ 146.827321][ T3194] device wg2 entered promiscuous mode [ 147.493389][ T3219] device sit0 left promiscuous mode [ 147.931626][ T3235] bond_slave_1: mtu less than device minimum [ 148.058215][ T3236] device veth0_vlan left promiscuous mode [ 148.066541][ T3236] device veth0_vlan entered promiscuous mode [ 148.073218][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.081620][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.089506][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 150.587856][ T3319] device pim6reg1 entered promiscuous mode [ 150.786385][ T3325] device syzkaller0 entered promiscuous mode [ 151.202815][ T3341] device sit0 left promiscuous mode [ 151.225688][ T3341] device sit0 entered promiscuous mode [ 151.545782][ T3337] device wg2 left promiscuous mode [ 151.602567][ T3354] device wg2 entered promiscuous mode [ 151.633968][ T3363] device sit0 left promiscuous mode [ 151.675187][ T3365] device sit0 entered promiscuous mode [ 152.177997][ T3369] device syzkaller0 entered promiscuous mode [ 152.206260][ T3370] device wg2 left promiscuous mode [ 152.217496][ T3372] device wg2 entered promiscuous mode [ 152.896508][ T3399] device syzkaller0 entered promiscuous mode [ 153.908633][ T3420] device syzkaller0 entered promiscuous mode [ 154.065654][ T3424] device wg2 left promiscuous mode [ 154.092852][ T3427] device wg2 entered promiscuous mode [ 154.519570][ T3434] device veth0_vlan left promiscuous mode [ 154.600083][ T3434] device veth0_vlan entered promiscuous mode [ 155.166721][ T3454] device veth0_vlan left promiscuous mode [ 155.220609][ T3454] device veth0_vlan entered promiscuous mode [ 155.891542][ T3471] device wg2 left promiscuous mode [ 156.025900][ T3471] device wg2 entered promiscuous mode [ 157.457083][ T3504] device syzkaller0 entered promiscuous mode [ 157.489306][ T3498] device wg2 left promiscuous mode [ 157.737936][ T3503] device syzkaller0 entered promiscuous mode [ 157.746439][ T3508] device wg2 entered promiscuous mode [ 157.777487][ T3525] device wg2 left promiscuous mode [ 157.784272][ T3526] device wg2 entered promiscuous mode [ 159.154868][ T3574] device sit0 left promiscuous mode [ 159.267206][ T3570] device veth0_vlan left promiscuous mode [ 159.281909][ T3570] device veth0_vlan entered promiscuous mode [ 159.431864][ T3584] device syzkaller0 entered promiscuous mode [ 159.441178][ T3582] device wg2 left promiscuous mode [ 159.455109][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 159.463172][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 159.470790][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 159.478418][ T3585] device wg2 entered promiscuous mode [ 161.569861][ T3639] device syzkaller0 entered promiscuous mode [ 162.577703][ T3659] device syzkaller0 entered promiscuous mode [ 162.606108][ T3661] device wg2 left promiscuous mode [ 162.776830][ T3666] device wg2 entered promiscuous mode [ 163.028710][ T3677] device sit0 left promiscuous mode [ 163.281517][ T3676] device sit0 entered promiscuous mode [ 163.861064][ T28] audit: type=1400 audit(1741257382.028:158): avc: denied { create } for pid=3692 comm="syz.3.931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 164.343156][ T3690] device syzkaller0 entered promiscuous mode [ 164.701477][ T3727] device sit0 entered promiscuous mode [ 165.705525][ T3746] device veth0_vlan left promiscuous mode [ 165.711318][ T3746] device veth0_vlan entered promiscuous mode [ 165.849183][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.880744][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.888448][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.261625][ T3758] device syzkaller0 entered promiscuous mode [ 166.312797][ T3761] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 166.320474][ T3761] device pim6reg1 entered promiscuous mode [ 167.577397][ T3812] device syzkaller0 entered promiscuous mode [ 168.843892][ T3852] device syzkaller0 entered promiscuous mode [ 169.393446][ T3873] device syzkaller0 entered promiscuous mode [ 169.557887][ T3868] device veth1_macvtap left promiscuous mode [ 169.564065][ T3868] device macsec0 left promiscuous mode [ 169.821592][ T3889] device sit0 left promiscuous mode [ 169.892694][ T3889] device dummy0 entered promiscuous mode [ 170.670872][ T3912] device syzkaller0 entered promiscuous mode [ 171.426781][ T28] audit: type=1400 audit(1741257389.588:159): avc: denied { ioctl } for pid=3927 comm="syz.0.994" path="net:[4026532628]" dev="nsfs" ino=4026532628 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 171.919519][ T3926] device syzkaller0 entered promiscuous mode [ 172.215104][ T3929] device wg2 left promiscuous mode [ 172.327405][ T3933] device wg2 entered promiscuous mode [ 174.056907][ T3987] device syzkaller0 entered promiscuous mode [ 174.096743][ T3990] device wg2 left promiscuous mode [ 174.103841][ T3993] device wg2 entered promiscuous mode [ 174.607744][ T4055] !€ÿ: renamed from bond_slave_0 [ 175.120887][ T4067] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.294977][ T4071] device bridge_slave_1 left promiscuous mode [ 175.325430][ T4071] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.336830][ T4071] device bridge_slave_0 left promiscuous mode [ 175.379285][ T4071] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.242726][ T4088] device syzkaller0 entered promiscuous mode [ 176.271553][ T4091] device wg2 left promiscuous mode [ 176.337790][ T4096] device veth0_vlan left promiscuous mode [ 176.355024][ T4096] device veth0_vlan entered promiscuous mode [ 176.363916][ T4100] device wg2 entered promiscuous mode [ 177.299929][ T4131] device wg2 left promiscuous mode [ 177.464125][ T4132] device wg2 entered promiscuous mode [ 178.235921][ T4146] device syzkaller0 entered promiscuous mode [ 178.326011][ T4149] device wg2 left promiscuous mode [ 178.332157][ T4151] device wg2 entered promiscuous mode [ 178.461747][ T28] audit: type=1400 audit(1741257396.628:160): avc: denied { create } for pid=4180 comm="syz.0.1074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 178.522596][ T4188] device syzkaller0 entered promiscuous mode [ 179.438408][ T4227] device syzkaller0 entered promiscuous mode [ 179.492186][ T4228] device wg2 left promiscuous mode [ 179.498285][ T4229] device wg2 entered promiscuous mode [ 182.178550][ T4291] device syzkaller0 entered promiscuous mode [ 182.265196][ T4294] device wg2 left promiscuous mode [ 182.317192][ T4295] device wg2 entered promiscuous mode [ 182.516811][ T4309] device veth0_vlan left promiscuous mode [ 182.524421][ T4309] device veth0_vlan entered promiscuous mode [ 182.908348][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.965431][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.045984][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 183.999903][ T4361] device syzkaller0 entered promiscuous mode [ 184.036707][ T4356] device wg2 left promiscuous mode [ 184.062920][ T4359] device wg2 entered promiscuous mode [ 185.212188][ T4392] device pim6reg1 entered promiscuous mode [ 185.698825][ T4403] device wg2 left promiscuous mode [ 185.876212][ T4406] device wg2 entered promiscuous mode [ 187.960135][ T4464] device wg2 left promiscuous mode [ 188.085310][ T4464] device wg2 entered promiscuous mode [ 189.787115][ T4513] device wg2 left promiscuous mode [ 189.865837][ T4513] device wg2 entered promiscuous mode [ 191.485244][ T4562] device wg2 left promiscuous mode [ 191.593579][ T4562] device wg2 entered promiscuous mode [ 192.308479][ T4574] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 192.976512][ T4611] device wg2 left promiscuous mode [ 193.013634][ T4611] device wg2 entered promiscuous mode [ 193.271688][ T4620] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.281539][ T4620] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.608230][ T4638] device pim6reg1 entered promiscuous mode [ 193.903754][ T4648] bond_slave_1: mtu less than device minimum [ 194.175283][ T4659] device wg2 left promiscuous mode [ 194.211293][ T4659] device wg2 entered promiscuous mode [ 195.385611][ T4696] device pim6reg1 entered promiscuous mode [ 195.876500][ T4722] device wg2 left promiscuous mode [ 196.028352][ T4722] device wg2 entered promiscuous mode [ 196.044980][ T4748] syz.0.1249 (4748) used obsolete PPPIOCDETACH ioctl [ 197.007643][ T4791] device wg2 left promiscuous mode [ 197.157919][ T4791] device wg2 entered promiscuous mode [ 198.519615][ T4841] device wg2 left promiscuous mode [ 198.527507][ T4841] device wg2 entered promiscuous mode [ 198.870204][ T4855] device sit0 left promiscuous mode [ 198.938693][ T4861] ip6_vti0: mtu greater than device maximum [ 199.169407][ T4867] device wg2 left promiscuous mode [ 199.236285][ T4879] device wg2 entered promiscuous mode [ 199.985448][ T4924] device wg2 left promiscuous mode [ 200.025682][ T4924] device wg2 entered promiscuous mode [ 201.337755][ T4974] device wg2 left promiscuous mode [ 201.430449][ T4979] device wg2 entered promiscuous mode [ 202.538828][ T5015] device wg2 left promiscuous mode [ 202.584902][ T5015] device wg2 entered promiscuous mode [ 202.681553][ T5032] bridge0: port 3(dummy0) entered blocking state [ 202.710195][ T5032] bridge0: port 3(dummy0) entered disabled state [ 202.760173][ T5032] device dummy0 entered promiscuous mode [ 202.797820][ T5038] device dummy0 left promiscuous mode [ 202.818393][ T5038] bridge0: port 3(dummy0) entered disabled state [ 203.714530][ T5068] device wg2 left promiscuous mode [ 203.794677][ T5073] device wg2 entered promiscuous mode [ 204.426010][ T5105] bridge0: port 3(veth0) entered blocking state [ 204.432085][ T5105] bridge0: port 3(veth0) entered disabled state [ 204.725567][ T5105] device veth0 entered promiscuous mode [ 205.055820][ T5116] device wg2 left promiscuous mode [ 205.135338][ T5116] device wg2 entered promiscuous mode [ 206.238675][ T5149] device veth1_macvtap left promiscuous mode [ 206.455630][ T5146] device pim6reg1 entered promiscuous mode [ 206.501524][ T5162] device wg2 left promiscuous mode [ 206.545946][ T5163] device wg2 entered promiscuous mode [ 208.008896][ T5217] device wg2 left promiscuous mode [ 208.038223][ T5217] device wg2 entered promiscuous mode [ 209.811685][ T5255] device wg2 left promiscuous mode [ 209.866824][ T5255] device wg2 entered promiscuous mode [ 210.901539][ T5311] device wg2 left promiscuous mode [ 211.050545][ T5311] device wg2 entered promiscuous mode [ 211.688967][ T5330] device pim6reg1 entered promiscuous mode [ 211.747045][ T5329] device pim6reg1 entered promiscuous mode [ 212.494369][ T5354] device wg2 left promiscuous mode [ 212.570125][ T5357] device wg2 entered promiscuous mode [ 213.068075][ T5378] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 213.193371][ T5378] device syzkaller0 entered promiscuous mode [ 213.230006][ T5394] device wg2 left promiscuous mode [ 213.237142][ T5398] device wg2 entered promiscuous mode [ 213.654164][ T5433] device wg2 left promiscuous mode [ 213.687397][ T5435] device sit0 entered promiscuous mode [ 213.719052][ T5433] device wg2 entered promiscuous mode [ 213.899682][ T5438] device sit0 left promiscuous mode [ 214.013590][ T5435] device sit0 entered promiscuous mode [ 214.278951][ T5472] device syzkaller0 entered promiscuous mode [ 214.316529][ T5476] device wg2 left promiscuous mode [ 214.394007][ T5476] device wg2 entered promiscuous mode [ 214.613938][ T5486] device syzkaller0 entered promiscuous mode [ 215.366335][ T5497] device macsec0 entered promiscuous mode [ 215.406398][ T5491] device veth1_macvtap left promiscuous mode [ 215.415541][ T5491] device macsec0 left promiscuous mode [ 215.591878][ T5530] device wg2 left promiscuous mode [ 215.698967][ T5538] device wg2 entered promiscuous mode [ 215.840820][ T5546] FAULT_INJECTION: forcing a failure. [ 215.840820][ T5546] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 215.915348][ T5546] CPU: 1 PID: 5546 Comm: syz.3.1508 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 215.924978][ T5546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 215.934874][ T5546] Call Trace: [ 215.937993][ T5546] [ 215.940771][ T5546] dump_stack_lvl+0x151/0x1b7 [ 215.945286][ T5546] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 215.950579][ T5546] ? avc_denied+0x1b0/0x1b0 [ 215.954921][ T5546] dump_stack+0x15/0x18 [ 215.958910][ T5546] should_fail_ex+0x3d0/0x520 [ 215.963424][ T5546] should_fail+0xb/0x10 [ 215.967416][ T5546] should_fail_usercopy+0x1a/0x20 [ 215.972277][ T5546] _copy_from_user+0x1e/0xc0 [ 215.976705][ T5546] sk_setsockopt+0x2cf/0x31e0 [ 215.981218][ T5546] ? sockopt_capable+0x60/0x60 [ 215.985818][ T5546] ? selinux_socket_setsockopt+0x260/0x360 [ 215.991547][ T5546] ? __fget_files+0x2cb/0x330 [ 215.996060][ T5546] sock_setsockopt+0x59/0x70 [ 216.000484][ T5546] __sys_setsockopt+0x423/0x8b0 [ 216.005170][ T5546] ? fput+0x15b/0x1b0 [ 216.008990][ T5546] ? __ia32_sys_recv+0xb0/0xb0 [ 216.013591][ T5546] ? debug_smp_processor_id+0x17/0x20 [ 216.018798][ T5546] __x64_sys_setsockopt+0xbf/0xd0 [ 216.023658][ T5546] x64_sys_call+0x1a2/0x9a0 [ 216.027997][ T5546] do_syscall_64+0x3b/0xb0 [ 216.032249][ T5546] ? clear_bhb_loop+0x55/0xb0 [ 216.036769][ T5546] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 216.042491][ T5546] RIP: 0033:0x7f8679d8d169 [ 216.046748][ T5546] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 216.066185][ T5546] RSP: 002b:00007f867ac40038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 216.074431][ T5546] RAX: ffffffffffffffda RBX: 00007f8679fa5fa0 RCX: 00007f8679d8d169 [ 216.082242][ T5546] RDX: 000000000000001d RSI: 0000000000000001 RDI: 0000000000000008 [ 216.090054][ T5546] RBP: 00007f867ac40090 R08: 0000000000000004 R09: 0000000000000000 [ 216.097865][ T5546] R10: 00004000000001c0 R11: 0000000000000246 R12: 0000000000000001 [ 216.105677][ T5546] R13: 0000000000000000 R14: 00007f8679fa5fa0 R15: 00007ffe9e03ebe8 [ 216.113498][ T5546] [ 216.270051][ T5569] device pim6reg1 entered promiscuous mode [ 216.456940][ T5585] device wg2 left promiscuous mode [ 216.472023][ T5585] device wg2 entered promiscuous mode [ 216.609227][ T291] syz-executor (291) used greatest stack depth: 21200 bytes left [ 217.286199][ T5596] FAULT_INJECTION: forcing a failure. [ 217.286199][ T5596] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 217.344840][ T5596] CPU: 0 PID: 5596 Comm: syz.3.1529 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 217.354475][ T5596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 217.364375][ T5596] Call Trace: [ 217.367496][ T5596] [ 217.370272][ T5596] dump_stack_lvl+0x151/0x1b7 [ 217.374787][ T5596] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 217.380078][ T5596] ? queue_work_on+0x135/0x170 [ 217.384683][ T5596] dump_stack+0x15/0x18 [ 217.388670][ T5596] should_fail_ex+0x3d0/0x520 [ 217.393186][ T5596] should_fail+0xb/0x10 [ 217.397176][ T5596] should_fail_usercopy+0x1a/0x20 [ 217.402037][ T5596] _copy_to_user+0x1e/0x90 [ 217.406292][ T5596] simple_read_from_buffer+0xc7/0x150 [ 217.411500][ T5596] proc_fail_nth_read+0x1a3/0x210 [ 217.416359][ T5596] ? proc_fault_inject_write+0x390/0x390 [ 217.421829][ T5596] ? fsnotify_perm+0x269/0x5b0 [ 217.426429][ T5596] ? security_file_permission+0x86/0xb0 [ 217.431808][ T5596] ? proc_fault_inject_write+0x390/0x390 [ 217.437276][ T5596] vfs_read+0x26c/0xae0 [ 217.441269][ T5596] ? kernel_read+0x1f0/0x1f0 [ 217.445692][ T5596] ? mutex_lock+0xb1/0x1e0 [ 217.449947][ T5596] ? bit_wait_io_timeout+0x120/0x120 [ 217.455071][ T5596] ? __fdget_pos+0x2e2/0x390 [ 217.459493][ T5596] ? ksys_read+0x77/0x2c0 [ 217.463661][ T5596] ksys_read+0x199/0x2c0 [ 217.467742][ T5596] ? __ia32_sys_recv+0xb0/0xb0 [ 217.472338][ T5596] ? vfs_write+0xed0/0xed0 [ 217.476594][ T5596] ? debug_smp_processor_id+0x17/0x20 [ 217.481798][ T5596] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 217.487702][ T5596] __x64_sys_read+0x7b/0x90 [ 217.492044][ T5596] x64_sys_call+0x28/0x9a0 [ 217.496292][ T5596] do_syscall_64+0x3b/0xb0 [ 217.500544][ T5596] ? clear_bhb_loop+0x55/0xb0 [ 217.505059][ T5596] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 217.510789][ T5596] RIP: 0033:0x7f8679d8bb7c [ 217.515042][ T5596] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 217.534481][ T5596] RSP: 002b:00007f867ac40030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 217.542727][ T5596] RAX: ffffffffffffffda RBX: 00007f8679fa5fa0 RCX: 00007f8679d8bb7c [ 217.550537][ T5596] RDX: 000000000000000f RSI: 00007f867ac400a0 RDI: 000000000000000a [ 217.558349][ T5596] RBP: 00007f867ac40090 R08: 0000000000000000 R09: 0000000000000000 [ 217.566161][ T5596] R10: 00004000000001c0 R11: 0000000000000246 R12: 0000000000000001 [ 217.573972][ T5596] R13: 0000000000000000 R14: 00007f8679fa5fa0 R15: 00007ffe9e03ebe8 [ 217.581790][ T5596] [ 217.754179][ T5597] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.775007][ T5597] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.782259][ T5597] device bridge_slave_0 entered promiscuous mode [ 217.916765][ T5597] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.923617][ T5597] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.959269][ T5597] device bridge_slave_1 entered promiscuous mode [ 218.081661][ T5626] device veth0_vlan left promiscuous mode [ 218.088238][ T5626] device veth0_vlan entered promiscuous mode [ 218.113588][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.128250][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.135908][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.228419][ T5598] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.236731][ T5598] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.243974][ T5598] device bridge_slave_0 entered promiscuous mode [ 218.250868][ T5598] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.257810][ T5598] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.265112][ T5598] device bridge_slave_1 entered promiscuous mode [ 218.338437][ T10] device veth1_macvtap left promiscuous mode [ 218.344285][ T10] device veth0_vlan left promiscuous mode [ 218.365213][ T10] device veth1_macvtap left promiscuous mode [ 218.371078][ T10] device veth0_vlan left promiscuous mode [ 218.479264][ T5659] device wg2 left promiscuous mode [ 218.671321][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.679413][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.721728][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.732533][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.825700][ T360] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.832566][ T360] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.839814][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.847987][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.860313][ T360] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.867165][ T360] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.935811][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.977355][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.065276][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.220285][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 219.248647][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.349633][ T5597] device veth0_vlan entered promiscuous mode [ 219.369124][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.401979][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.448532][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.456894][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.466682][ T5045] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.473532][ T5045] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.480761][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.488872][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.497554][ T5045] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.504385][ T5045] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.511605][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 219.519471][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.540659][ T5597] device veth1_macvtap entered promiscuous mode [ 219.552292][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.565760][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.573007][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.580832][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.590877][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.598740][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.606646][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.614313][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 219.622423][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.630315][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 219.644551][ T5598] device veth0_vlan entered promiscuous mode [ 219.655689][ T5695] device pim6reg1 entered promiscuous mode [ 219.701201][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 219.709567][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.717943][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 219.725780][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.733622][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 219.741982][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 219.769287][ T5598] device veth1_macvtap entered promiscuous mode [ 219.882136][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.918268][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.995168][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 220.085143][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 220.157809][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 220.165344][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 220.184980][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 220.206817][ T28] audit: type=1400 audit(1741257438.378:161): avc: denied { mounton } for pid=5597 comm="syz-executor" path="/root/syzkaller.xoLtM5/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 220.234725][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 220.250022][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 220.265466][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 220.312594][ T28] audit: type=1400 audit(1741257438.378:162): avc: denied { mount } for pid=5597 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 220.334323][ T28] audit: type=1400 audit(1741257438.408:163): avc: denied { mounton } for pid=5597 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=528 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 220.357310][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 220.456496][ T5703] FAULT_INJECTION: forcing a failure. [ 220.456496][ T5703] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 220.756698][ T5703] CPU: 0 PID: 5703 Comm: syz.7.1526 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 220.766341][ T5703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 220.776235][ T5703] Call Trace: [ 220.779356][ T5703] [ 220.782133][ T5703] dump_stack_lvl+0x151/0x1b7 [ 220.786650][ T5703] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 220.791944][ T5703] dump_stack+0x15/0x18 [ 220.795933][ T5703] should_fail_ex+0x3d0/0x520 [ 220.800448][ T5703] should_fail_alloc_page+0x68/0x90 [ 220.805483][ T5703] prepare_alloc_pages+0x13b/0x6d0 [ 220.810427][ T5703] ? putname+0xfa/0x150 [ 220.814421][ T5703] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 220.819456][ T5703] ? _kstrtol+0x150/0x150 [ 220.823624][ T5703] __alloc_pages+0x162/0x610 [ 220.828050][ T5703] ? prep_new_page+0x110/0x110 [ 220.832652][ T5703] __get_free_pages+0xe/0x30 [ 220.837075][ T5703] mem_rw+0x8d/0x5f0 [ 220.840803][ T5703] ? selinux_file_permission+0x2bb/0x560 [ 220.846279][ T5703] mem_write+0x33/0x40 [ 220.850178][ T5703] ? mem_read+0x40/0x40 [ 220.854174][ T5703] vfs_write+0x41d/0xed0 [ 220.858253][ T5703] ? __kasan_slab_free+0x11/0x20 [ 220.863025][ T5703] ? file_end_write+0x1c0/0x1c0 [ 220.867709][ T5703] ? mutex_lock+0xb1/0x1e0 [ 220.871966][ T5703] ? bit_wait_io_timeout+0x120/0x120 [ 220.877086][ T5703] ? __fdget_pos+0x2e2/0x390 [ 220.881509][ T5703] ? ksys_write+0x77/0x2c0 [ 220.885762][ T5703] ksys_write+0x199/0x2c0 [ 220.889929][ T5703] ? __this_cpu_preempt_check+0x13/0x20 [ 220.895312][ T5703] ? __ia32_sys_read+0x90/0x90 [ 220.899912][ T5703] ? debug_smp_processor_id+0x17/0x20 [ 220.905119][ T5703] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 220.911021][ T5703] __x64_sys_write+0x7b/0x90 [ 220.915446][ T5703] x64_sys_call+0x2f/0x9a0 [ 220.919699][ T5703] do_syscall_64+0x3b/0xb0 [ 220.923953][ T5703] ? clear_bhb_loop+0x55/0xb0 [ 220.928467][ T5703] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 220.934192][ T5703] RIP: 0033:0x7fcb04b8d169 [ 220.938445][ T5703] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 220.957889][ T5703] RSP: 002b:00007fcb05971038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 220.966134][ T5703] RAX: ffffffffffffffda RBX: 00007fcb04da5fa0 RCX: 00007fcb04b8d169 [ 220.973942][ T5703] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000006 [ 220.981754][ T5703] RBP: 00007fcb05971090 R08: 0000000000000000 R09: 0000000000000000 [ 220.989567][ T5703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 220.997377][ T5703] R13: 0000000000000000 R14: 00007fcb04da5fa0 R15: 00007ffde9180ec8 [ 221.005193][ T5703] [ 222.035296][ T5762] FAULT_INJECTION: forcing a failure. [ 222.035296][ T5762] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 222.301393][ T5762] CPU: 1 PID: 5762 Comm: syz.3.1576 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 222.311039][ T5762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 222.320936][ T5762] Call Trace: [ 222.324056][ T5762] [ 222.326833][ T5762] dump_stack_lvl+0x151/0x1b7 [ 222.331345][ T5762] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 222.336644][ T5762] ? __alloc_pages+0x34c/0x610 [ 222.341240][ T5762] ? prep_new_page+0x110/0x110 [ 222.345843][ T5762] dump_stack+0x15/0x18 [ 222.349831][ T5762] should_fail_ex+0x3d0/0x520 [ 222.354347][ T5762] should_fail+0xb/0x10 [ 222.358338][ T5762] should_fail_usercopy+0x1a/0x20 [ 222.363198][ T5762] _copy_from_user+0x1e/0xc0 [ 222.367625][ T5762] mem_rw+0x39d/0x5f0 [ 222.371445][ T5762] mem_write+0x33/0x40 [ 222.375348][ T5762] ? mem_read+0x40/0x40 [ 222.379347][ T5762] vfs_write+0x41d/0xed0 [ 222.383429][ T5762] ? __kasan_slab_free+0x11/0x20 [ 222.388197][ T5762] ? file_end_write+0x1c0/0x1c0 [ 222.392882][ T5762] ? mutex_lock+0xb1/0x1e0 [ 222.397134][ T5762] ? bit_wait_io_timeout+0x120/0x120 [ 222.402256][ T5762] ? __fdget_pos+0x2e2/0x390 [ 222.406683][ T5762] ? ksys_write+0x77/0x2c0 [ 222.410934][ T5762] ksys_write+0x199/0x2c0 [ 222.415101][ T5762] ? __this_cpu_preempt_check+0x13/0x20 [ 222.420484][ T5762] ? __ia32_sys_read+0x90/0x90 [ 222.425084][ T5762] ? debug_smp_processor_id+0x17/0x20 [ 222.430291][ T5762] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 222.436191][ T5762] __x64_sys_write+0x7b/0x90 [ 222.440620][ T5762] x64_sys_call+0x2f/0x9a0 [ 222.444871][ T5762] do_syscall_64+0x3b/0xb0 [ 222.449122][ T5762] ? clear_bhb_loop+0x55/0xb0 [ 222.453636][ T5762] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 222.459362][ T5762] RIP: 0033:0x7f8679d8d169 [ 222.463616][ T5762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 222.483057][ T5762] RSP: 002b:00007f867ac40038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 222.491305][ T5762] RAX: ffffffffffffffda RBX: 00007f8679fa5fa0 RCX: 00007f8679d8d169 [ 222.499118][ T5762] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000006 [ 222.506928][ T5762] RBP: 00007f867ac40090 R08: 0000000000000000 R09: 0000000000000000 [ 222.514736][ T5762] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 222.522548][ T5762] R13: 0000000000000000 R14: 00007f8679fa5fa0 R15: 00007ffe9e03ebe8 [ 222.530364][ T5762] [ 223.881789][ T5813] device veth0_vlan left promiscuous mode [ 223.942834][ T5813] device veth0_vlan entered promiscuous mode [ 224.243279][ T5813] device syzkaller0 entered promiscuous mode [ 224.309837][ T5816] device pim6reg1 entered promiscuous mode [ 224.358252][ T5829] FAULT_INJECTION: forcing a failure. [ 224.358252][ T5829] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 224.371401][ T5829] CPU: 0 PID: 5829 Comm: syz.7.1593 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 224.381017][ T5829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 224.390911][ T5829] Call Trace: [ 224.394036][ T5829] [ 224.396809][ T5829] dump_stack_lvl+0x151/0x1b7 [ 224.401325][ T5829] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 224.406622][ T5829] dump_stack+0x15/0x18 [ 224.410609][ T5829] should_fail_ex+0x3d0/0x520 [ 224.415124][ T5829] should_fail+0xb/0x10 [ 224.419114][ T5829] should_fail_usercopy+0x1a/0x20 [ 224.423975][ T5829] _copy_to_user+0x1e/0x90 [ 224.428229][ T5829] simple_read_from_buffer+0xc7/0x150 [ 224.433433][ T5829] proc_fail_nth_read+0x1a3/0x210 [ 224.438294][ T5829] ? proc_fault_inject_write+0x390/0x390 [ 224.443765][ T5829] ? fsnotify_perm+0x269/0x5b0 [ 224.448363][ T5829] ? security_file_permission+0x86/0xb0 [ 224.453744][ T5829] ? proc_fault_inject_write+0x390/0x390 [ 224.459218][ T5829] vfs_read+0x26c/0xae0 [ 224.463207][ T5829] ? kernel_read+0x1f0/0x1f0 [ 224.467630][ T5829] ? mutex_lock+0xb1/0x1e0 [ 224.471882][ T5829] ? bit_wait_io_timeout+0x120/0x120 [ 224.477004][ T5829] ? __fdget_pos+0x2e2/0x390 [ 224.481429][ T5829] ? ksys_read+0x77/0x2c0 [ 224.485595][ T5829] ksys_read+0x199/0x2c0 [ 224.489675][ T5829] ? __this_cpu_preempt_check+0x13/0x20 [ 224.495056][ T5829] ? vfs_write+0xed0/0xed0 [ 224.499309][ T5829] ? debug_smp_processor_id+0x17/0x20 [ 224.504516][ T5829] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 224.510418][ T5829] __x64_sys_read+0x7b/0x90 [ 224.514759][ T5829] x64_sys_call+0x28/0x9a0 [ 224.519010][ T5829] do_syscall_64+0x3b/0xb0 [ 224.523262][ T5829] ? clear_bhb_loop+0x55/0xb0 [ 224.527778][ T5829] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 224.533509][ T5829] RIP: 0033:0x7fcb04b8bb7c [ 224.537763][ T5829] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 224.557206][ T5829] RSP: 002b:00007fcb05971030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 224.565446][ T5829] RAX: ffffffffffffffda RBX: 00007fcb04da5fa0 RCX: 00007fcb04b8bb7c [ 224.573258][ T5829] RDX: 000000000000000f RSI: 00007fcb059710a0 RDI: 0000000000000007 [ 224.581066][ T5829] RBP: 00007fcb05971090 R08: 0000000000000000 R09: 0000000000000000 [ 224.588877][ T5829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 224.596691][ T5829] R13: 0000000000000000 R14: 00007fcb04da5fa0 R15: 00007ffde9180ec8 [ 224.604505][ T5829] [ 224.833707][ T5844] Â: renamed from pim6reg1 [ 227.628696][ T28] audit: type=1400 audit(1741257445.798:164): avc: denied { create } for pid=5955 comm="syz.0.1631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 228.185703][ T5980] device veth0_vlan left promiscuous mode [ 228.269342][ T5980] device veth0_vlan entered promiscuous mode [ 230.178211][ T6051] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.185225][ T6051] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.579735][ T6101] device veth1_macvtap left promiscuous mode [ 231.777573][ T6101] device veth1_macvtap entered promiscuous mode [ 231.835037][ T6101] device macsec0 entered promiscuous mode [ 233.810346][ T6150] device veth0_vlan left promiscuous mode [ 233.836363][ T6150] device veth0_vlan entered promiscuous mode [ 233.936160][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 233.962038][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 234.025322][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 234.777855][ T6152] device sit0 left promiscuous mode [ 237.093724][ T6241] pim6reg: tun_chr_ioctl cmd 1074025677 [ 237.099304][ T6241] pim6reg: linktype set to 804 [ 238.118622][ T6310] device syzkaller0 entered promiscuous mode [ 241.628753][ T6441] device syzkaller0 entered promiscuous mode [ 242.109228][ T6457] device syzkaller0 entered promiscuous mode [ 243.889510][ T6523] device pim6reg1 entered promiscuous mode [ 244.098474][ T6535] device sit0 left promiscuous mode [ 245.643960][ T6575] device pim6reg1 entered promiscuous mode [ 246.380592][ T28] audit: type=1400 audit(1741257464.548:165): avc: denied { create } for pid=6615 comm="syz.0.1829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 246.380747][ T6616] syz.0.1829 uses obsolete (PF_INET,SOCK_PACKET) [ 246.775097][ T6632] device syzkaller0 entered promiscuous mode [ 247.232863][ T6649] device veth0_vlan left promiscuous mode [ 247.243664][ T6649] device veth0_vlan entered promiscuous mode [ 247.261645][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.276805][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 247.291813][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.575433][ T6681] device wg2 entered promiscuous mode [ 251.464964][ T6783] device veth0_vlan left promiscuous mode [ 251.471003][ T6783] device veth0_vlan entered promiscuous mode [ 252.507489][ T6844] syz.8.1890[6844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.507557][ T6844] syz.8.1890[6844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.883194][ T6915] device sit0 entered promiscuous mode [ 262.913072][ T7084] device syzkaller0 entered promiscuous mode [ 265.211412][ T7119] device veth0_vlan left promiscuous mode [ 265.225503][ T7119] device veth0_vlan entered promiscuous mode [ 265.321792][ T7124] device veth0_vlan left promiscuous mode [ 265.352526][ T7124] device veth0_vlan entered promiscuous mode [ 266.006497][ T7140] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 266.068164][ T7140] device syzkaller0 entered promiscuous mode [ 266.718510][ T7157] device wg2 entered promiscuous mode [ 267.982947][ T7175] device pim6reg1 entered promiscuous mode [ 269.023593][ T7179] device syzkaller0 entered promiscuous mode [ 271.184732][ T7202] device wg2 left promiscuous mode [ 271.482254][ T7202] device wg2 entered promiscuous mode [ 271.682511][ T7210] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 271.854609][ T7210] device syzkaller0 entered promiscuous mode [ 272.313174][ T7224] device syzkaller0 entered promiscuous mode [ 272.552768][ T7229] device syzkaller0 entered promiscuous mode [ 272.990596][ T7234] device wg2 entered promiscuous mode [ 274.821294][ T7275] device pim6reg1 entered promiscuous mode [ 275.586171][ T7295] device syzkaller0 entered promiscuous mode [ 275.617329][ T7300] device wg2 left promiscuous mode [ 275.626164][ T7302] device wg2 entered promiscuous mode [ 275.636337][ T7306] device veth0_vlan left promiscuous mode [ 275.642360][ T7306] device veth0_vlan entered promiscuous mode [ 276.065422][ T7317] device veth0_vlan left promiscuous mode [ 276.244465][ T7317] device veth0_vlan entered promiscuous mode [ 279.111830][ T7331] device syzkaller0 entered promiscuous mode [ 279.253495][ T7335] device wg2 left promiscuous mode [ 279.274047][ T7337] device wg2 entered promiscuous mode [ 280.083331][ T7361] device sit0 entered promiscuous mode [ 280.897406][ T7379] device syzkaller0 entered promiscuous mode [ 281.949543][ T7394] FAULT_INJECTION: forcing a failure. [ 281.949543][ T7394] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 282.056760][ T7394] CPU: 0 PID: 7394 Comm: syz.0.2034 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 282.066393][ T7394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 282.076287][ T7394] Call Trace: [ 282.079409][ T7394] [ 282.082189][ T7394] dump_stack_lvl+0x151/0x1b7 [ 282.086706][ T7394] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 282.091995][ T7394] ? __local_bh_enable_ip+0x58/0x80 [ 282.097030][ T7394] dump_stack+0x15/0x18 [ 282.101026][ T7394] should_fail_ex+0x3d0/0x520 [ 282.105537][ T7394] should_fail+0xb/0x10 [ 282.109528][ T7394] should_fail_usercopy+0x1a/0x20 [ 282.114388][ T7394] _copy_to_user+0x1e/0x90 [ 282.118641][ T7394] simple_read_from_buffer+0xc7/0x150 [ 282.123847][ T7394] proc_fail_nth_read+0x1a3/0x210 [ 282.128707][ T7394] ? proc_fault_inject_write+0x390/0x390 [ 282.134174][ T7394] ? fsnotify_perm+0x269/0x5b0 [ 282.138778][ T7394] ? security_file_permission+0x86/0xb0 [ 282.144156][ T7394] ? proc_fault_inject_write+0x390/0x390 [ 282.149625][ T7394] vfs_read+0x26c/0xae0 [ 282.153618][ T7394] ? kernel_read+0x1f0/0x1f0 [ 282.158042][ T7394] ? mutex_lock+0xb1/0x1e0 [ 282.162296][ T7394] ? bit_wait_io_timeout+0x120/0x120 [ 282.167422][ T7394] ? __fdget_pos+0x2e2/0x390 [ 282.171844][ T7394] ? ksys_read+0x77/0x2c0 [ 282.176013][ T7394] ksys_read+0x199/0x2c0 [ 282.180088][ T7394] ? __ia32_sys_recv+0xb0/0xb0 [ 282.184691][ T7394] ? vfs_write+0xed0/0xed0 [ 282.188945][ T7394] ? debug_smp_processor_id+0x17/0x20 [ 282.194150][ T7394] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 282.200054][ T7394] __x64_sys_read+0x7b/0x90 [ 282.204389][ T7394] x64_sys_call+0x28/0x9a0 [ 282.208645][ T7394] do_syscall_64+0x3b/0xb0 [ 282.212895][ T7394] ? clear_bhb_loop+0x55/0xb0 [ 282.217412][ T7394] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 282.223136][ T7394] RIP: 0033:0x7ff74a98bb7c [ 282.227390][ T7394] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 282.246831][ T7394] RSP: 002b:00007ff74a7ff030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 282.255075][ T7394] RAX: ffffffffffffffda RBX: 00007ff74aba5fa0 RCX: 00007ff74a98bb7c [ 282.262888][ T7394] RDX: 000000000000000f RSI: 00007ff74a7ff0a0 RDI: 0000000000000006 [ 282.270699][ T7394] RBP: 00007ff74a7ff090 R08: 0000000000000000 R09: 0000000000000000 [ 282.278513][ T7394] R10: 00004000000001c0 R11: 0000000000000246 R12: 0000000000000001 [ 282.286325][ T7394] R13: 0000000000000000 R14: 00007ff74aba5fa0 R15: 00007ffebd3dbc58 [ 282.294141][ T7394] [ 283.254192][ T7415] device pim6reg1 entered promiscuous mode [ 283.453135][ T7419] device sit0 entered promiscuous mode [ 283.663406][ T7426] device sit0 left promiscuous mode [ 284.426469][ T7442] bond_slave_1: mtu less than device minimum [ 284.471925][ T7446] device sit0 left promiscuous mode [ 285.785552][ T7502] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.792553][ T7502] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.092184][ T7515] bond_slave_1: mtu less than device minimum [ 286.762930][ T28] audit: type=1400 audit(1741257504.928:166): avc: denied { append } for pid=7528 comm="syz.1.2068" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 289.147209][ T7576] device sit0 entered promiscuous mode [ 289.610716][ T7595] device sit0 left promiscuous mode [ 290.490097][ T7604] device veth0_vlan left promiscuous mode [ 290.519005][ T7604] device veth0_vlan entered promiscuous mode [ 290.601329][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 290.609875][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 290.617210][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 291.620975][ T7674] device sit0 entered promiscuous mode [ 292.457223][ T7695] syz.8.2114[7695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.457293][ T7695] syz.8.2114[7695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.593517][ T7776] device syzkaller0 entered promiscuous mode [ 297.497048][ T7828] device sit0 left promiscuous mode [ 297.847923][ T7831] device sit0 entered promiscuous mode [ 305.572435][ T7956] device wg2 left promiscuous mode [ 305.616292][ T7959] device wg2 entered promiscuous mode [ 311.303267][ T8109] device pim6reg1 entered promiscuous mode [ 312.011186][ T8144] device syzkaller0 entered promiscuous mode [ 314.451097][ T8239] syz.8.2268[8239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.506620][ T8239] syz.8.2268[8239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.283242][ T8257] device sit0 entered promiscuous mode [ 317.506803][ T8314] device wg2 left promiscuous mode [ 317.859244][ T8328] FAULT_INJECTION: forcing a failure. [ 317.859244][ T8328] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 317.985291][ T8328] CPU: 0 PID: 8328 Comm: syz.0.2294 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 317.994933][ T8328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 318.004827][ T8328] Call Trace: [ 318.007948][ T8328] [ 318.010730][ T8328] dump_stack_lvl+0x151/0x1b7 [ 318.015242][ T8328] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 318.020537][ T8328] ? kstrtouint+0xf6/0x180 [ 318.024785][ T8328] ? kasan_save_free_info+0x2b/0x40 [ 318.029824][ T8328] dump_stack+0x15/0x18 [ 318.033814][ T8328] should_fail_ex+0x3d0/0x520 [ 318.038347][ T8328] should_fail+0xb/0x10 [ 318.042317][ T8328] should_fail_usercopy+0x1a/0x20 [ 318.047179][ T8328] _copy_from_user+0x1e/0xc0 [ 318.051610][ T8328] move_addr_to_kernel+0x87/0x150 [ 318.056468][ T8328] copy_msghdr_from_user+0x436/0x670 [ 318.061588][ T8328] ? sendmsg_copy_msghdr+0x70/0x70 [ 318.066537][ T8328] __sys_sendmsg+0x236/0x390 [ 318.070962][ T8328] ? ____sys_sendmsg+0x9a0/0x9a0 [ 318.075744][ T8328] ? __kasan_check_write+0x14/0x20 [ 318.080680][ T8328] ? mutex_unlock+0xb2/0x260 [ 318.085111][ T8328] ? bpf_probe_read_user_str+0x49/0x70 [ 318.090403][ T8328] ? __ia32_sys_read+0x90/0x90 [ 318.095007][ T8328] __x64_sys_sendmsg+0x7f/0x90 [ 318.099604][ T8328] x64_sys_call+0x16a/0x9a0 [ 318.103939][ T8328] do_syscall_64+0x3b/0xb0 [ 318.108194][ T8328] ? clear_bhb_loop+0x55/0xb0 [ 318.112711][ T8328] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 318.118434][ T8328] RIP: 0033:0x7ff74a98d169 [ 318.122688][ T8328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 318.142132][ T8328] RSP: 002b:00007ff74a7de038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 318.150374][ T8328] RAX: ffffffffffffffda RBX: 00007ff74aba6080 RCX: 00007ff74a98d169 [ 318.158185][ T8328] RDX: 0000000000000000 RSI: 0000400000004440 RDI: 0000000000000004 [ 318.165996][ T8328] RBP: 00007ff74a7de090 R08: 0000000000000000 R09: 0000000000000000 [ 318.173810][ T8328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 318.181618][ T8328] R13: 0000000000000000 R14: 00007ff74aba6080 R15: 00007ffebd3dbc58 [ 318.189437][ T8328] [ 319.463246][ T8363] device syzkaller0 entered promiscuous mode [ 319.544193][ T8370] FAULT_INJECTION: forcing a failure. [ 319.544193][ T8370] name failslab, interval 1, probability 0, space 0, times 0 [ 319.734864][ T8370] CPU: 0 PID: 8370 Comm: syz.8.2306 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 319.744508][ T8370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 319.754401][ T8370] Call Trace: [ 319.757523][ T8370] [ 319.760299][ T8370] dump_stack_lvl+0x151/0x1b7 [ 319.764811][ T8370] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 319.770105][ T8370] ? __stack_depot_save+0x36/0x480 [ 319.775057][ T8370] dump_stack+0x15/0x18 [ 319.779048][ T8370] should_fail_ex+0x3d0/0x520 [ 319.783559][ T8370] __should_failslab+0xaf/0xf0 [ 319.788160][ T8370] should_failslab+0x9/0x20 [ 319.792496][ T8370] kmem_cache_alloc_node+0x42/0x330 [ 319.797533][ T8370] ? __alloc_skb+0xcc/0x2d0 [ 319.801873][ T8370] __alloc_skb+0xcc/0x2d0 [ 319.806039][ T8370] tipc_msg_build+0x145/0x1190 [ 319.810637][ T8370] ? __kasan_check_write+0x14/0x20 [ 319.815585][ T8370] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 319.820621][ T8370] ? tipc_msg_fragment+0x760/0x760 [ 319.825569][ T8370] ? tipc_nametbl_lookup_mcast_nodes+0x424/0xa10 [ 319.831729][ T8370] __tipc_sendmsg+0x2203/0x3240 [ 319.836420][ T8370] ? avc_has_perm_noaudit+0x2dd/0x430 [ 319.841622][ T8370] ? rht_lock+0x130/0x130 [ 319.845793][ T8370] ? __kernel_text_address+0xd/0x40 [ 319.850824][ T8370] ? wait_woken+0x100/0x100 [ 319.855163][ T8370] ? avc_has_perm+0x16f/0x260 [ 319.859676][ T8370] ? avc_has_perm_noaudit+0x430/0x430 [ 319.864883][ T8370] ? __kasan_check_write+0x14/0x20 [ 319.869828][ T8370] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 319.874691][ T8370] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 319.879724][ T8370] ? __local_bh_enable_ip+0x58/0x80 [ 319.884759][ T8370] ? lock_sock_nested+0x261/0x300 [ 319.889618][ T8370] ? sock_init_data+0xc0/0xc0 [ 319.894134][ T8370] ? tipc_recvmsg+0x13b0/0x13b0 [ 319.898820][ T8370] tipc_sendmsg+0x55/0x70 [ 319.902986][ T8370] ____sys_sendmsg+0x5d3/0x9a0 [ 319.907585][ T8370] ? __sys_sendmsg_sock+0x40/0x40 [ 319.912449][ T8370] __sys_sendmsg+0x2a9/0x390 [ 319.916875][ T8370] ? ____sys_sendmsg+0x9a0/0x9a0 [ 319.921647][ T8370] ? __kasan_check_write+0x14/0x20 [ 319.926591][ T8370] ? mutex_unlock+0xb2/0x260 [ 319.931022][ T8370] ? __kasan_check_write+0x14/0x20 [ 319.935979][ T8370] ? __ia32_sys_read+0x90/0x90 [ 319.940567][ T8370] ? debug_smp_processor_id+0x17/0x20 [ 319.945779][ T8370] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 319.951677][ T8370] __x64_sys_sendmsg+0x7f/0x90 [ 319.956276][ T8370] x64_sys_call+0x16a/0x9a0 [ 319.960613][ T8370] do_syscall_64+0x3b/0xb0 [ 319.964865][ T8370] ? clear_bhb_loop+0x55/0xb0 [ 319.969383][ T8370] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 319.975106][ T8370] RIP: 0033:0x7fa6c878d169 [ 319.979360][ T8370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 319.998804][ T8370] RSP: 002b:00007fa6c9649038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 320.007047][ T8370] RAX: ffffffffffffffda RBX: 00007fa6c89a5fa0 RCX: 00007fa6c878d169 [ 320.014859][ T8370] RDX: 0000000000000000 RSI: 0000400000004440 RDI: 0000000000000007 [ 320.022673][ T8370] RBP: 00007fa6c9649090 R08: 0000000000000000 R09: 0000000000000000 [ 320.030480][ T8370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 320.038292][ T8370] R13: 0000000000000000 R14: 00007fa6c89a5fa0 R15: 00007ffd0b6b0368 [ 320.046110][ T8370] [ 320.191729][ T8387] device veth0_vlan left promiscuous mode [ 320.241472][ T8387] device veth0_vlan entered promiscuous mode [ 320.376328][ T8401] device sit0 entered promiscuous mode [ 321.188056][ T8387] device sit0 left promiscuous mode [ 322.025637][ T8443] syz.7.2327[8443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.025696][ T8443] syz.7.2327[8443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.050525][ T8444] syz.7.2327[8444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.065090][ T8444] syz.7.2327[8444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.725473][ T8468] FAULT_INJECTION: forcing a failure. [ 322.725473][ T8468] name failslab, interval 1, probability 0, space 0, times 0 [ 322.952182][ T8468] CPU: 1 PID: 8468 Comm: syz.7.2334 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 322.961820][ T8468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 322.971712][ T8468] Call Trace: [ 322.974836][ T8468] [ 322.977617][ T8468] dump_stack_lvl+0x151/0x1b7 [ 322.982126][ T8468] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 322.987425][ T8468] dump_stack+0x15/0x18 [ 322.991414][ T8468] should_fail_ex+0x3d0/0x520 [ 322.995930][ T8468] __should_failslab+0xaf/0xf0 [ 323.000527][ T8468] should_failslab+0x9/0x20 [ 323.004865][ T8468] kmem_cache_alloc_node+0x42/0x330 [ 323.009902][ T8468] ? __alloc_skb+0xcc/0x2d0 [ 323.014239][ T8468] ? kasan_set_track+0x60/0x70 [ 323.018843][ T8468] __alloc_skb+0xcc/0x2d0 [ 323.023007][ T8468] ? __x64_sys_sendmsg+0x7f/0x90 [ 323.027780][ T8468] __pskb_copy_fclone+0xb4/0x1120 [ 323.032645][ T8468] tipc_msg_reassemble+0x1ba/0x580 [ 323.037587][ T8468] ? tipc_msg_lookup_dest+0xa90/0xa90 [ 323.042795][ T8468] ? _copy_from_iter+0x2bb/0xe00 [ 323.047570][ T8468] tipc_mcast_xmit+0x23d/0x1b40 [ 323.052257][ T8468] ? __build_skb_around+0x23f/0x3d0 [ 323.057291][ T8468] ? tipc_bcbase_xmit+0xb60/0xb60 [ 323.062149][ T8468] ? memcpy+0x56/0x70 [ 323.065968][ T8468] ? tipc_msg_build+0x498/0x1190 [ 323.070742][ T8468] ? __kasan_check_write+0x14/0x20 [ 323.075691][ T8468] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 323.080725][ T8468] ? tipc_msg_fragment+0x760/0x760 [ 323.085670][ T8468] ? tipc_nametbl_lookup_mcast_nodes+0x424/0xa10 [ 323.091835][ T8468] __tipc_sendmsg+0x2617/0x3240 [ 323.096523][ T8468] ? avc_has_perm_noaudit+0x2dd/0x430 [ 323.101727][ T8468] ? rht_lock+0x130/0x130 [ 323.105899][ T8468] ? __kernel_text_address+0xd/0x40 [ 323.110925][ T8468] ? wait_woken+0x100/0x100 [ 323.115267][ T8468] ? avc_has_perm+0x16f/0x260 [ 323.119784][ T8468] ? avc_has_perm_noaudit+0x430/0x430 [ 323.124987][ T8468] ? __kasan_check_write+0x14/0x20 [ 323.129934][ T8468] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 323.134797][ T8468] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 323.139830][ T8468] ? __local_bh_enable_ip+0x58/0x80 [ 323.144862][ T8468] ? lock_sock_nested+0x261/0x300 [ 323.149727][ T8468] ? sock_init_data+0xc0/0xc0 [ 323.154238][ T8468] ? tipc_recvmsg+0x13b0/0x13b0 [ 323.158922][ T8468] tipc_sendmsg+0x55/0x70 [ 323.163088][ T8468] ____sys_sendmsg+0x5d3/0x9a0 [ 323.167686][ T8468] ? __sys_sendmsg_sock+0x40/0x40 [ 323.172550][ T8468] __sys_sendmsg+0x2a9/0x390 [ 323.176974][ T8468] ? ____sys_sendmsg+0x9a0/0x9a0 [ 323.181750][ T8468] ? __kasan_check_write+0x14/0x20 [ 323.186692][ T8468] ? mutex_unlock+0xb2/0x260 [ 323.191122][ T8468] ? __kasan_check_write+0x14/0x20 [ 323.196069][ T8468] ? __ia32_sys_read+0x90/0x90 [ 323.200675][ T8468] ? debug_smp_processor_id+0x17/0x20 [ 323.205873][ T8468] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 323.211779][ T8468] __x64_sys_sendmsg+0x7f/0x90 [ 323.216377][ T8468] x64_sys_call+0x16a/0x9a0 [ 323.220722][ T8468] do_syscall_64+0x3b/0xb0 [ 323.224969][ T8468] ? clear_bhb_loop+0x55/0xb0 [ 323.229480][ T8468] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 323.235216][ T8468] RIP: 0033:0x7fcb04b8d169 [ 323.239464][ T8468] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 323.258905][ T8468] RSP: 002b:00007fcb05971038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 323.267149][ T8468] RAX: ffffffffffffffda RBX: 00007fcb04da5fa0 RCX: 00007fcb04b8d169 [ 323.274963][ T8468] RDX: 0000000000000000 RSI: 0000400000004440 RDI: 0000000000000007 [ 323.282778][ T8468] RBP: 00007fcb05971090 R08: 0000000000000000 R09: 0000000000000000 [ 323.290583][ T8468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 323.298394][ T8468] R13: 0000000000000000 R14: 00007fcb04da5fa0 R15: 00007ffde9180ec8 [ 323.306217][ T8468] [ 323.346423][ T8482] syz.8.2338[8482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.346519][ T8482] syz.8.2338[8482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.490338][ T8487] device sit0 left promiscuous mode [ 323.512324][ T8482] syz.8.2338[8482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.526852][ T8482] syz.8.2338[8482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.643878][ T8487] device sit0 entered promiscuous mode [ 323.816551][ T8522] syz.8.2350[8522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.816619][ T8522] syz.8.2350[8522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.936925][ T8560] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 325.034920][ T8560] pim6reg0: linktype set to 1 [ 325.766806][ T8587] device sit0 entered promiscuous mode [ 335.390844][ T8705] device pim6reg1 entered promiscuous mode [ 343.051291][ T8868] device syzkaller0 entered promiscuous mode [ 343.301828][ T8877] device sit0 left promiscuous mode [ 343.317445][ T8876] device sit0 entered promiscuous mode [ 343.337977][ T8886] device veth0_vlan left promiscuous mode [ 343.362453][ T8886] device veth0_vlan entered promiscuous mode [ 343.593330][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 343.616558][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 343.681047][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 344.592906][ T8924] device pim6reg1 entered promiscuous mode [ 344.970933][ T8928] tap0: tun_chr_ioctl cmd 1074025673 [ 345.860078][ T8949] device sit0 entered promiscuous mode [ 346.425273][ T8957] device sit0 left promiscuous mode [ 346.519646][ T8960] device sit0 entered promiscuous mode [ 349.514945][ T8971] device sit0 left promiscuous mode [ 349.553656][ T8968] device sit0 entered promiscuous mode [ 350.739539][ T9008] device sit0 left promiscuous mode [ 350.768439][ T9011] device sit0 entered promiscuous mode [ 352.053070][ T9038] device sit0 left promiscuous mode [ 352.094879][ T9046] device sit0 entered promiscuous mode [ 352.336851][ T9043] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 352.602473][ T9043] device syzkaller0 entered promiscuous mode [ 353.203604][ T9066] device syzkaller0 entered promiscuous mode [ 355.934879][ T9111] device pim6reg1 entered promiscuous mode [ 356.732199][ T9124] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 356.902923][ T9124] device syzkaller0 entered promiscuous mode [ 357.038997][ T9144] device syzkaller0 entered promiscuous mode [ 357.220428][ T9141] device syzkaller0 left promiscuous mode [ 358.472565][ T9169] device pim6reg1 entered promiscuous mode [ 358.590526][ T9168] device veth1_macvtap left promiscuous mode [ 360.314136][ T9194] device syzkaller0 entered promiscuous mode [ 360.343942][ T9190] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 360.359622][ T9190] device syzkaller0 entered promiscuous mode [ 361.085749][ T9220] device syzkaller0 entered promiscuous mode [ 361.134246][ T9219] device pim6reg1 entered promiscuous mode [ 361.149689][ T9214] device veth1_macvtap left promiscuous mode [ 361.156489][ T9214] device macsec0 left promiscuous mode [ 361.208031][ T9220] device syzkaller0 left promiscuous mode [ 362.387772][ T9271] device pim6reg1 entered promiscuous mode [ 362.715364][ T9289] device pim6reg1 entered promiscuous mode [ 369.700308][ T9320] device pim6reg1 entered promiscuous mode [ 369.864220][ T9337] device syzkaller0 entered promiscuous mode [ 371.371348][ T9388] syz.1.2594[9388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.371411][ T9388] syz.1.2594[9388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.397817][ T9381] device wg2 left promiscuous mode [ 371.417555][ T9382] device wg2 entered promiscuous mode [ 373.011566][ T9436] device pim6reg1 entered promiscuous mode [ 374.329208][ T9463] device sit0 left promiscuous mode [ 374.487920][ T9469] device syzkaller0 entered promiscuous mode [ 374.603620][ T9468] device sit0 entered promiscuous mode [ 375.113430][ T9498] device pim6reg1 entered promiscuous mode [ 375.885271][ T9540] device sit0 left promiscuous mode [ 375.988161][ T9540] device sit0 entered promiscuous mode [ 376.809695][ T9591] device pim6reg1 entered promiscuous mode [ 377.106623][ T9604] device wg2 left promiscuous mode [ 377.115262][ T9609] device wg2 entered promiscuous mode [ 377.284600][ T9622] device pim6reg1 entered promiscuous mode [ 377.372485][ T9628] device sit0 left promiscuous mode [ 377.433707][ T9628] device sit0 entered promiscuous mode [ 377.870126][ T9648] device wg2 entered promiscuous mode [ 381.875986][ T9714] device sit0 left promiscuous mode [ 382.090210][ T9718] device sit0 entered promiscuous mode [ 382.496451][ T28] audit: type=1400 audit(1741257600.668:167): avc: denied { create } for pid=9735 comm="syz.7.2694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 383.073115][ T9764] device pim6reg1 entered promiscuous mode [ 383.692404][ T9791] bond_slave_1: mtu less than device minimum [ 383.728030][ T9797] bond_slave_1: mtu less than device minimum [ 384.233184][ T9817] device wg2 left promiscuous mode [ 384.424198][ T9812] device wg2 entered promiscuous mode [ 385.889076][ T9866] device veth0_vlan left promiscuous mode [ 385.896220][ T9866] device veth0_vlan entered promiscuous mode [ 385.969632][ T9882] bridge0: port 2(bridge_slave_1) entered blocking state [ 385.976510][ T9882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 385.983738][ T9882] device bridge0 entered promiscuous mode [ 386.663149][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 387.308000][ T9930] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.315857][ T9930] bridge0: port 1(bridge_slave_0) entered forwarding state [ 387.338102][ T9930] device bridge0 entered promiscuous mode [ 387.598402][ T9943] device sit0 left promiscuous mode [ 388.139266][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 388.170814][ T9952] device wg2 left promiscuous mode [ 388.234926][ T9949] device wg2 entered promiscuous mode [ 390.457452][ T9984] device veth0_vlan left promiscuous mode [ 390.612718][ T9984] device veth0_vlan entered promiscuous mode [ 391.228287][T10018] device sit0 left promiscuous mode [ 391.362767][T10018] device sit0 entered promiscuous mode [ 391.687187][T10033] device pim6reg1 entered promiscuous mode [ 393.684684][T10106] device sit0 left promiscuous mode [ 394.493103][T10127] Â: renamed from pim6reg1 [ 395.130646][T10142] bond_slave_1: mtu less than device minimum [ 398.077024][T10216] device syzkaller0 entered promiscuous mode [ 398.513693][T10239] syz.1.2837[10239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.513763][T10239] syz.1.2837[10239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.088080][T10291] device lo entered promiscuous mode [ 400.342641][T10291] syzkaller0: create flow: hash 234322847 index 2 [ 400.351953][ T4193] syzkaller0: tun_net_xmit 76 [ 400.356634][ T4193] syzkaller0: tun_net_xmit 48 [ 400.384898][ T4193] syzkaller0: tun_net_xmit 76 [ 400.415263][ T4193] syzkaller0: tun_net_xmit 76 [ 400.435001][T10290] syzkaller0: delete flow: hash 234322847 index 2 [ 400.470640][T10295] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.481924][T10295] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.494748][T10295] device bridge_slave_0 entered promiscuous mode [ 400.556173][T10295] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.566183][T10295] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.573457][T10295] device bridge_slave_1 entered promiscuous mode [ 401.155006][T10295] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.161878][T10295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 401.168994][T10295] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.175760][T10295] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.486845][ T360] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.496957][ T360] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.710646][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 401.730634][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 401.865790][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 401.993089][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 402.085118][ T360] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.091975][ T360] bridge0: port 1(bridge_slave_0) entered forwarding state [ 402.274593][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 402.346645][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 402.375412][ T360] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.382280][ T360] bridge0: port 2(bridge_slave_1) entered forwarding state [ 402.390898][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 402.398901][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 402.440425][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 402.448489][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 402.529095][T10295] device veth0_vlan entered promiscuous mode [ 402.585784][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 402.593974][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 402.602280][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 402.610124][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 402.620610][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 402.628085][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 402.666436][T10295] device veth1_macvtap entered promiscuous mode [ 402.714879][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 402.729268][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 402.737517][ T28] audit: type=1400 audit(1741257620.908:168): avc: denied { rename } for pid=85 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 402.761974][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 402.807127][T10349] bond_slave_1: mtu less than device minimum [ 402.861444][ T28] audit: type=1400 audit(1741257620.908:169): avc: denied { unlink } for pid=85 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 402.901250][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 402.909973][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 402.919528][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 402.927944][ T28] audit: type=1400 audit(1741257620.908:170): avc: denied { create } for pid=85 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 402.959778][ T360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 403.016176][ T41] device veth0 left promiscuous mode [ 403.021364][ T41] bridge0: port 3(veth0) entered disabled state [ 403.345801][ T41] device bridge_slave_1 left promiscuous mode [ 403.351758][ T41] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.501748][ T41] device bridge_slave_0 left promiscuous mode [ 403.573333][ T41] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.673610][ T41] device veth0_vlan left promiscuous mode [ 405.917441][ T28] audit: type=1400 audit(1741257624.078:171): avc: denied { create } for pid=10399 comm="syz.1.2883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 408.887303][T10455] Â: renamed from pim6reg1 [ 410.441923][T10503] device vlan1 entered promiscuous mode [ 411.694645][T10516] device syzkaller0 entered promiscuous mode [ 411.915094][T10530] device syzkaller0 entered promiscuous mode [ 411.931990][T10521] device veth1_macvtap left promiscuous mode [ 412.798658][T10559] device veth1_macvtap entered promiscuous mode [ 412.885732][T10559] device macsec0 entered promiscuous mode [ 415.956587][T10630] device sit0 entered promiscuous mode [ 417.561694][T10677] device syzkaller0 entered promiscuous mode [ 417.707231][ T290] syz-executor (290) used greatest stack depth: 20936 bytes left [ 418.074127][T10705] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.087364][T10705] bridge0: port 1(bridge_slave_0) entered disabled state [ 418.097013][T10705] device bridge_slave_0 entered promiscuous mode [ 418.253138][T10705] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.260486][T10705] bridge0: port 2(bridge_slave_1) entered disabled state [ 418.278585][T10705] device bridge_slave_1 entered promiscuous mode [ 418.995091][ T318] device veth0_vlan left promiscuous mode [ 419.502442][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 419.575585][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 419.729611][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 419.962429][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 420.115574][ T41] bridge0: port 1(bridge_slave_0) entered blocking state [ 420.122437][ T41] bridge0: port 1(bridge_slave_0) entered forwarding state [ 420.265286][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 420.273848][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 420.282361][ T41] bridge0: port 2(bridge_slave_1) entered blocking state [ 420.289238][ T41] bridge0: port 2(bridge_slave_1) entered forwarding state [ 420.415161][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 420.445123][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 420.459796][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 420.485169][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 420.493598][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 420.527887][T10705] device veth0_vlan entered promiscuous mode [ 420.540249][T10761] device pim6reg1 entered promiscuous mode [ 420.548381][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 420.565655][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 420.587889][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 420.596309][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 420.604250][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 420.611566][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 420.628233][T10705] device veth1_macvtap entered promiscuous mode [ 420.641940][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 420.673876][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 420.682522][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 420.715240][T10778] device syzkaller0 entered promiscuous mode [ 420.733384][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 420.745133][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 420.754462][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 420.763535][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 421.220204][T10818] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 421.237844][T10818] pim6reg0: linktype set to 6 [ 421.838269][T10854] FAULT_INJECTION: forcing a failure. [ 421.838269][T10854] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 421.851370][T10854] CPU: 1 PID: 10854 Comm: syz.7.3023 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 421.861072][T10854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 421.870968][T10854] Call Trace: [ 421.874092][T10854] [ 421.876869][T10854] dump_stack_lvl+0x151/0x1b7 [ 421.881380][T10854] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 421.886675][T10854] ? vfs_write+0x952/0xed0 [ 421.890929][T10854] ? __kasan_slab_free+0x11/0x20 [ 421.895703][T10854] dump_stack+0x15/0x18 [ 421.899691][T10854] should_fail_ex+0x3d0/0x520 [ 421.901344][T10830] device syzkaller0 entered promiscuous mode [ 421.904207][T10854] should_fail+0xb/0x10 [ 421.904233][T10854] should_fail_usercopy+0x1a/0x20 [ 421.904254][T10854] _copy_from_user+0x1e/0xc0 [ 421.904274][T10854] __sys_bpf+0x23b/0x7f0 [ 421.904296][T10854] ? bpf_link_show_fdinfo+0x300/0x300 [ 421.904321][T10854] ? __ia32_sys_read+0x90/0x90 [ 421.904343][T10854] ? debug_smp_processor_id+0x17/0x20 [ 421.904366][T10854] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 421.904386][T10854] __x64_sys_bpf+0x7c/0x90 [ 421.904406][T10854] x64_sys_call+0x87f/0x9a0 [ 421.904424][T10854] do_syscall_64+0x3b/0xb0 [ 421.904442][T10854] ? clear_bhb_loop+0x55/0xb0 [ 421.904464][T10854] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 421.904486][T10854] RIP: 0033:0x7fcb04b8d169 [ 421.904502][T10854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 421.904517][T10854] RSP: 002b:00007fcb05971038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 421.904537][T10854] RAX: ffffffffffffffda RBX: 00007fcb04da5fa0 RCX: 00007fcb04b8d169 [ 421.904550][T10854] RDX: 000000000000000c RSI: 00004000000004c0 RDI: 000000000000000a [ 421.904562][T10854] RBP: 00007fcb05971090 R08: 0000000000000000 R09: 0000000000000000 [ 421.904573][T10854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 421.904584][T10854] R13: 0000000000000000 R14: 00007fcb04da5fa0 R15: 00007ffde9180ec8 [ 422.042726][T10854] [ 422.051716][T10842] device sit0 left promiscuous mode [ 422.064854][T10845] device sit0 entered promiscuous mode [ 422.696440][T10891] FAULT_INJECTION: forcing a failure. [ 422.696440][T10891] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 422.905226][T10891] CPU: 0 PID: 10891 Comm: syz.3.3036 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 422.914937][T10891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 422.924832][T10891] Call Trace: [ 422.927955][T10891] [ 422.930742][T10891] dump_stack_lvl+0x151/0x1b7 [ 422.935249][T10891] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 422.940545][T10891] dump_stack+0x15/0x18 [ 422.944534][T10891] should_fail_ex+0x3d0/0x520 [ 422.949047][T10891] should_fail+0xb/0x10 [ 422.953040][T10891] should_fail_usercopy+0x1a/0x20 [ 422.957899][T10891] _copy_to_user+0x1e/0x90 [ 422.962154][T10891] bpf_prog_test_run_raw_tp+0x52e/0x6d0 [ 422.967536][T10891] ? bpf_prog_test_run_tracing+0x760/0x760 [ 422.973177][T10891] ? __kasan_check_write+0x14/0x20 [ 422.978125][T10891] ? fput+0x15b/0x1b0 [ 422.981939][T10891] ? bpf_prog_test_run_tracing+0x760/0x760 [ 422.987584][T10891] bpf_prog_test_run+0x3b0/0x630 [ 422.992358][T10891] ? bpf_prog_query+0x260/0x260 [ 422.997043][T10891] ? selinux_bpf+0xd2/0x100 [ 423.001382][T10891] ? security_bpf+0x82/0xb0 [ 423.005723][T10891] __sys_bpf+0x59f/0x7f0 [ 423.009804][T10891] ? bpf_link_show_fdinfo+0x300/0x300 [ 423.015012][T10891] ? __ia32_sys_read+0x90/0x90 [ 423.019610][T10891] ? debug_smp_processor_id+0x17/0x20 [ 423.024815][T10891] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 423.030719][T10891] __x64_sys_bpf+0x7c/0x90 [ 423.034971][T10891] x64_sys_call+0x87f/0x9a0 [ 423.039309][T10891] do_syscall_64+0x3b/0xb0 [ 423.043563][T10891] ? clear_bhb_loop+0x55/0xb0 [ 423.048076][T10891] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 423.053803][T10891] RIP: 0033:0x7f7928d8d169 [ 423.058056][T10891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 423.077500][T10891] RSP: 002b:00007f7929c43038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 423.085742][T10891] RAX: ffffffffffffffda RBX: 00007f7928fa5fa0 RCX: 00007f7928d8d169 [ 423.093554][T10891] RDX: 000000000000000c RSI: 00004000000004c0 RDI: 000000000000000a [ 423.101365][T10891] RBP: 00007f7929c43090 R08: 0000000000000000 R09: 0000000000000000 [ 423.109176][T10891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 423.116994][T10891] R13: 0000000000000000 R14: 00007f7928fa5fa0 R15: 00007fffeb44b2e8 [ 423.124809][T10891] [ 423.405188][T10929] bond_slave_1: mtu less than device minimum [ 423.542969][T10943] FAULT_INJECTION: forcing a failure. [ 423.542969][T10943] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 423.567417][T10943] CPU: 1 PID: 10943 Comm: syz.0.3051 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 423.577131][T10943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 423.587028][T10943] Call Trace: [ 423.590148][T10943] [ 423.592924][T10943] dump_stack_lvl+0x151/0x1b7 [ 423.597439][T10943] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 423.602738][T10943] dump_stack+0x15/0x18 [ 423.606727][T10943] should_fail_ex+0x3d0/0x520 [ 423.611239][T10943] should_fail+0xb/0x10 [ 423.615229][T10943] should_fail_usercopy+0x1a/0x20 [ 423.620091][T10943] _copy_to_user+0x1e/0x90 [ 423.624346][T10943] simple_read_from_buffer+0xc7/0x150 [ 423.629553][T10943] proc_fail_nth_read+0x1a3/0x210 [ 423.634415][T10943] ? proc_fault_inject_write+0x390/0x390 [ 423.639883][T10943] ? fsnotify_perm+0x269/0x5b0 [ 423.644485][T10943] ? security_file_permission+0x86/0xb0 [ 423.649860][T10943] ? proc_fault_inject_write+0x390/0x390 [ 423.655332][T10943] vfs_read+0x26c/0xae0 [ 423.659321][T10943] ? __kasan_check_write+0x14/0x20 [ 423.664269][T10943] ? kernel_read+0x1f0/0x1f0 [ 423.668696][T10943] ? mutex_lock+0xb1/0x1e0 [ 423.672950][T10943] ? bit_wait_io_timeout+0x120/0x120 [ 423.678071][T10943] ? __fdget_pos+0x2e2/0x390 [ 423.682497][T10943] ? ksys_read+0x77/0x2c0 [ 423.686662][T10943] ksys_read+0x199/0x2c0 [ 423.690741][T10943] ? vfs_write+0xed0/0xed0 [ 423.694992][T10943] ? debug_smp_processor_id+0x17/0x20 [ 423.700201][T10943] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 423.706104][T10943] __x64_sys_read+0x7b/0x90 [ 423.710444][T10943] x64_sys_call+0x28/0x9a0 [ 423.714696][T10943] do_syscall_64+0x3b/0xb0 [ 423.718947][T10943] ? clear_bhb_loop+0x55/0xb0 [ 423.723464][T10943] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 423.729189][T10943] RIP: 0033:0x7ff74a98bb7c [ 423.733443][T10943] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 423.752886][T10943] RSP: 002b:00007ff74a7de030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 423.761127][T10943] RAX: ffffffffffffffda RBX: 00007ff74aba6080 RCX: 00007ff74a98bb7c [ 423.768940][T10943] RDX: 000000000000000f RSI: 00007ff74a7de0a0 RDI: 0000000000000005 [ 423.776755][T10943] RBP: 00007ff74a7de090 R08: 0000000000000000 R09: 0000000000000000 [ 423.784561][T10943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 423.792376][T10943] R13: 0000000000000000 R14: 00007ff74aba6080 R15: 00007ffebd3dbc58 [ 423.800190][T10943] [ 425.874866][T11023] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.881887][T11023] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.133630][T11030] syz.1.3076[11030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.133698][T11030] syz.1.3076[11030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.487697][T11028] device syzkaller0 entered promiscuous mode [ 426.932005][T11056] !€ÿ: renamed from bond_slave_0 [ 427.642171][T11088] device syzkaller0 entered promiscuous mode [ 429.003983][T11144] device syzkaller0 entered promiscuous mode [ 431.475893][T11192] device syzkaller0 entered promiscuous mode [ 432.306493][T11214] device syzkaller0 entered promiscuous mode [ 433.051978][T11267] device syzkaller0 entered promiscuous mode [ 434.468514][T11296] device syzkaller0 entered promiscuous mode [ 434.538718][T11317] device sit0 entered promiscuous mode [ 434.654071][T11334] device veth0_vlan left promiscuous mode [ 434.664072][T11334] device veth0_vlan entered promiscuous mode [ 434.815365][T11332] bridge0: port 1(bridge_slave_0) entered blocking state [ 434.822244][T11332] bridge0: port 1(bridge_slave_0) entered disabled state [ 434.851558][T11332] device bridge_slave_0 entered promiscuous mode [ 434.896345][T11332] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.919435][T11332] bridge0: port 2(bridge_slave_1) entered disabled state [ 434.940324][T11332] device bridge_slave_1 entered promiscuous mode [ 435.619562][T11332] bridge0: port 2(bridge_slave_1) entered blocking state [ 435.626432][T11332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 435.633526][T11332] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.640324][T11332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 435.664852][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 435.728192][ T5045] bridge0: port 1(bridge_slave_0) entered disabled state [ 435.768156][ T5045] bridge0: port 2(bridge_slave_1) entered disabled state [ 435.871361][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 435.883991][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 435.896137][ T5045] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.902977][ T5045] bridge0: port 1(bridge_slave_0) entered forwarding state [ 436.013187][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 436.047032][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 436.099720][ T5045] bridge0: port 2(bridge_slave_1) entered blocking state [ 436.106613][ T5045] bridge0: port 2(bridge_slave_1) entered forwarding state [ 436.212026][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 436.232073][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 436.240303][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 436.248237][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 436.280346][T11411] device pim6reg1 entered promiscuous mode [ 436.360395][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 436.371752][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 436.386944][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 436.412587][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 436.483955][T11332] device veth0_vlan entered promiscuous mode [ 436.501077][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 436.530284][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 436.692352][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 436.705102][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 436.716207][T11332] device veth1_macvtap entered promiscuous mode [ 436.767808][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 436.815645][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 436.895173][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 437.039461][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 440.619172][T11577] device veth0_vlan left promiscuous mode [ 440.649720][T11577] device veth0_vlan entered promiscuous mode [ 441.299200][T11617] syz.3.3242 (11617) used greatest stack depth: 20768 bytes left [ 441.567244][T11622] device pim6reg1 entered promiscuous mode [ 443.248004][T11693] device veth1_macvtap left promiscuous mode [ 444.186286][T11740] device pim6reg1 entered promiscuous mode [ 444.583701][T11777] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 444.731523][T11777] device syzkaller0 entered promiscuous mode [ 445.223894][T11819] device sit0 entered promiscuous mode [ 451.128054][T11982] FAULT_INJECTION: forcing a failure. [ 451.128054][T11982] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 451.307373][T11982] CPU: 1 PID: 11982 Comm: syz.7.3346 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 451.317097][T11982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 451.326992][T11982] Call Trace: [ 451.330116][T11982] [ 451.332892][T11982] dump_stack_lvl+0x151/0x1b7 [ 451.337411][T11982] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 451.342702][T11982] dump_stack+0x15/0x18 [ 451.346693][T11982] should_fail_ex+0x3d0/0x520 [ 451.351209][T11982] ? vlan_exit_net+0x20/0x20 [ 451.355632][T11982] should_fail+0xb/0x10 [ 451.359624][T11982] should_fail_usercopy+0x1a/0x20 [ 451.364486][T11982] _copy_from_user+0x1e/0xc0 [ 451.368913][T11982] ? vlan_exit_net+0x20/0x20 [ 451.373338][T11982] vlan_ioctl_handler+0xa2/0x9c0 [ 451.378112][T11982] ? vlan_exit_net+0x20/0x20 [ 451.382545][T11982] ? mutex_lock+0xb1/0x1e0 [ 451.386795][T11982] ? selinux_file_ioctl+0x3cc/0x540 [ 451.391827][T11982] ? vlan_exit_net+0x20/0x20 [ 451.396251][T11982] sock_ioctl+0x511/0x740 [ 451.400418][T11982] ? sock_poll+0x400/0x400 [ 451.404670][T11982] ? __fget_files+0x2cb/0x330 [ 451.409186][T11982] ? security_file_ioctl+0x84/0xb0 [ 451.414129][T11982] ? sock_poll+0x400/0x400 [ 451.418383][T11982] __se_sys_ioctl+0x114/0x190 [ 451.422903][T11982] __x64_sys_ioctl+0x7b/0x90 [ 451.427324][T11982] x64_sys_call+0x98/0x9a0 [ 451.431579][T11982] do_syscall_64+0x3b/0xb0 [ 451.435828][T11982] ? clear_bhb_loop+0x55/0xb0 [ 451.440341][T11982] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 451.446070][T11982] RIP: 0033:0x7fcb04b8d169 [ 451.450322][T11982] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 451.469763][T11982] RSP: 002b:00007fcb05971038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 451.478011][T11982] RAX: ffffffffffffffda RBX: 00007fcb04da5fa0 RCX: 00007fcb04b8d169 [ 451.485823][T11982] RDX: 0000400000000080 RSI: 0000000000008982 RDI: 0000000000000006 [ 451.493632][T11982] RBP: 00007fcb05971090 R08: 0000000000000000 R09: 0000000000000000 [ 451.501442][T11982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 451.509253][T11982] R13: 0000000000000000 R14: 00007fcb04da5fa0 R15: 00007ffde9180ec8 [ 451.517070][T11982] [ 455.759890][T12068] device veth0_vlan left promiscuous mode [ 455.798575][T12068] device veth0_vlan entered promiscuous mode [ 455.932591][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 455.954049][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 455.976444][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 457.287480][T12099] device syzkaller0 entered promiscuous mode [ 457.977753][T12135] device syzkaller0 entered promiscuous mode [ 460.264625][T12197] device veth0_vlan left promiscuous mode [ 460.292758][T12197] device veth0_vlan entered promiscuous mode [ 465.317952][T12337] ÿÿÿÿÿÿ: renamed from bond_slave_0 [ 465.916605][T12345] device pim6reg1 entered promiscuous mode [ 466.392355][T12356] device sit0 left promiscuous mode [ 467.022538][T12364] device sit0 entered promiscuous mode [ 470.422323][T12462] device sit0 entered promiscuous mode [ 472.650666][T12532] bond_slave_1: mtu less than device minimum [ 474.926970][ T360] device bridge_slave_1 left promiscuous mode [ 474.932937][ T360] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.099090][ T360] device bridge_slave_0 left promiscuous mode [ 475.158850][ T360] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.296761][ T360] device veth0_vlan left promiscuous mode [ 478.589681][ T28] audit: type=1400 audit(1741257696.758:172): avc: denied { create } for pid=12677 comm="syz.3.3555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 478.669769][T12673] device ip6gretap0 entered promiscuous mode [ 482.256757][T12764] FAULT_INJECTION: forcing a failure. [ 482.256757][T12764] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 482.294870][T12764] CPU: 0 PID: 12764 Comm: syz.1.3580 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 482.304593][T12764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 482.314487][T12764] Call Trace: [ 482.317614][T12764] [ 482.320391][T12764] dump_stack_lvl+0x151/0x1b7 [ 482.325426][T12764] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 482.330723][T12764] dump_stack+0x15/0x18 [ 482.334711][T12764] should_fail_ex+0x3d0/0x520 [ 482.339221][T12764] ? vlan_exit_net+0x20/0x20 [ 482.343647][T12764] should_fail+0xb/0x10 [ 482.347639][T12764] should_fail_usercopy+0x1a/0x20 [ 482.352498][T12764] _copy_from_user+0x1e/0xc0 [ 482.356925][T12764] ? vlan_exit_net+0x20/0x20 [ 482.361353][T12764] vlan_ioctl_handler+0xa2/0x9c0 [ 482.366128][T12764] ? vlan_exit_net+0x20/0x20 [ 482.370551][T12764] ? mutex_lock+0xb1/0x1e0 [ 482.374807][T12764] ? selinux_file_ioctl+0x3cc/0x540 [ 482.379839][T12764] ? vlan_exit_net+0x20/0x20 [ 482.384270][T12764] sock_ioctl+0x511/0x740 [ 482.388431][T12764] ? sock_poll+0x400/0x400 [ 482.392686][T12764] ? __fget_files+0x2cb/0x330 [ 482.397200][T12764] ? security_file_ioctl+0x84/0xb0 [ 482.402143][T12764] ? sock_poll+0x400/0x400 [ 482.406396][T12764] __se_sys_ioctl+0x114/0x190 [ 482.410910][T12764] __x64_sys_ioctl+0x7b/0x90 [ 482.415336][T12764] x64_sys_call+0x98/0x9a0 [ 482.419588][T12764] do_syscall_64+0x3b/0xb0 [ 482.423840][T12764] ? clear_bhb_loop+0x55/0xb0 [ 482.428355][T12764] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 482.434084][T12764] RIP: 0033:0x7f08a1f8d169 [ 482.438337][T12764] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 482.457779][T12764] RSP: 002b:00007f08a2e56038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 482.466027][T12764] RAX: ffffffffffffffda RBX: 00007f08a21a5fa0 RCX: 00007f08a1f8d169 [ 482.473832][T12764] RDX: 0000400000000080 RSI: 0000000000008982 RDI: 0000000000000006 [ 482.481646][T12764] RBP: 00007f08a2e56090 R08: 0000000000000000 R09: 0000000000000000 [ 482.489455][T12764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 482.497266][T12764] R13: 0000000000000000 R14: 00007f08a21a5fa0 R15: 00007ffc2cb1d7b8 [ 482.505083][T12764] [ 485.266603][T12820] FAULT_INJECTION: forcing a failure. [ 485.266603][T12820] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 485.280991][T12820] CPU: 1 PID: 12820 Comm: syz.3.3599 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 485.290699][T12820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 485.300594][T12820] Call Trace: [ 485.303717][T12820] [ 485.306496][T12820] dump_stack_lvl+0x151/0x1b7 [ 485.311008][T12820] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 485.316299][T12820] ? mutex_unlock+0xb2/0x260 [ 485.320735][T12820] dump_stack+0x15/0x18 [ 485.324720][T12820] should_fail_ex+0x3d0/0x520 [ 485.329238][T12820] should_fail+0xb/0x10 [ 485.333229][T12820] should_fail_usercopy+0x1a/0x20 [ 485.338091][T12820] _copy_to_user+0x1e/0x90 [ 485.342342][T12820] simple_read_from_buffer+0xc7/0x150 [ 485.347548][T12820] proc_fail_nth_read+0x1a3/0x210 [ 485.352411][T12820] ? proc_fault_inject_write+0x390/0x390 [ 485.357877][T12820] ? fsnotify_perm+0x269/0x5b0 [ 485.362477][T12820] ? security_file_permission+0x86/0xb0 [ 485.367855][T12820] ? proc_fault_inject_write+0x390/0x390 [ 485.373326][T12820] vfs_read+0x26c/0xae0 [ 485.377321][T12820] ? kernel_read+0x1f0/0x1f0 [ 485.381742][T12820] ? mutex_lock+0xb1/0x1e0 [ 485.385996][T12820] ? bit_wait_io_timeout+0x120/0x120 [ 485.391119][T12820] ? __fdget_pos+0x2e2/0x390 [ 485.395546][T12820] ? ksys_read+0x77/0x2c0 [ 485.399711][T12820] ksys_read+0x199/0x2c0 [ 485.403792][T12820] ? vfs_write+0xed0/0xed0 [ 485.408043][T12820] ? debug_smp_processor_id+0x17/0x20 [ 485.413249][T12820] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 485.419155][T12820] __x64_sys_read+0x7b/0x90 [ 485.423491][T12820] x64_sys_call+0x28/0x9a0 [ 485.427745][T12820] do_syscall_64+0x3b/0xb0 [ 485.431997][T12820] ? clear_bhb_loop+0x55/0xb0 [ 485.436509][T12820] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 485.442235][T12820] RIP: 0033:0x7f7928d8bb7c [ 485.446486][T12820] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 485.465928][T12820] RSP: 002b:00007f7929c43030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 485.474175][T12820] RAX: ffffffffffffffda RBX: 00007f7928fa5fa0 RCX: 00007f7928d8bb7c [ 485.481993][T12820] RDX: 000000000000000f RSI: 00007f7929c430a0 RDI: 0000000000000007 [ 485.489800][T12820] RBP: 00007f7929c43090 R08: 0000000000000000 R09: 0000000000000000 [ 485.497607][T12820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 485.505419][T12820] R13: 0000000000000000 R14: 00007f7928fa5fa0 R15: 00007fffeb44b2e8 [ 485.513236][T12820] [ 486.869789][T12851] device wg2 left promiscuous mode [ 486.942100][T12847] device wg2 entered promiscuous mode [ 488.307289][T12872] device veth1_macvtap left promiscuous mode [ 488.325064][T12872] device veth1_macvtap entered promiscuous mode [ 488.348785][T12872] device macsec0 entered promiscuous mode [ 488.375099][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 490.229128][T12921] FAULT_INJECTION: forcing a failure. [ 490.229128][T12921] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 490.257484][T12921] CPU: 1 PID: 12921 Comm: syz.0.3627 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 490.267203][T12921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 490.277098][T12921] Call Trace: [ 490.280222][T12921] [ 490.282999][T12921] dump_stack_lvl+0x151/0x1b7 [ 490.287516][T12921] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 490.292810][T12921] ? vfs_write+0x952/0xed0 [ 490.297061][T12921] ? __kasan_slab_free+0x11/0x20 [ 490.301834][T12921] dump_stack+0x15/0x18 [ 490.305826][T12921] should_fail_ex+0x3d0/0x520 [ 490.310341][T12921] should_fail+0xb/0x10 [ 490.314330][T12921] should_fail_usercopy+0x1a/0x20 [ 490.319190][T12921] _copy_from_user+0x1e/0xc0 [ 490.323620][T12921] __sys_bpf+0x23b/0x7f0 [ 490.327695][T12921] ? bpf_link_show_fdinfo+0x300/0x300 [ 490.332907][T12921] ? __ia32_sys_read+0x90/0x90 [ 490.337502][T12921] ? debug_smp_processor_id+0x17/0x20 [ 490.342708][T12921] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 490.348615][T12921] __x64_sys_bpf+0x7c/0x90 [ 490.352865][T12921] x64_sys_call+0x87f/0x9a0 [ 490.357205][T12921] do_syscall_64+0x3b/0xb0 [ 490.361456][T12921] ? clear_bhb_loop+0x55/0xb0 [ 490.365969][T12921] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 490.371698][T12921] RIP: 0033:0x7f8bf738d169 [ 490.375952][T12921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 490.395393][T12921] RSP: 002b:00007f8bf82d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 490.403635][T12921] RAX: ffffffffffffffda RBX: 00007f8bf75a5fa0 RCX: 00007f8bf738d169 [ 490.411446][T12921] RDX: 0000000000000010 RSI: 0000400000000000 RDI: 0000000000000011 [ 490.419260][T12921] RBP: 00007f8bf82d7090 R08: 0000000000000000 R09: 0000000000000000 [ 490.427070][T12921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 490.434883][T12921] R13: 0000000000000000 R14: 00007f8bf75a5fa0 R15: 00007fff184429b8 [ 490.442696][T12921] [ 490.472656][T12924] bond_slave_1: mtu less than device minimum [ 492.216159][T12966] device sit0 left promiscuous mode [ 493.814500][T12975] FAULT_INJECTION: forcing a failure. [ 493.814500][T12975] name failslab, interval 1, probability 0, space 0, times 0 [ 493.827290][T12975] CPU: 0 PID: 12975 Comm: syz.0.3644 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 493.836995][T12975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 493.846900][T12975] Call Trace: [ 493.850011][T12975] [ 493.852787][T12975] dump_stack_lvl+0x151/0x1b7 [ 493.857304][T12975] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 493.862597][T12975] ? stack_trace_save+0x1c0/0x1c0 [ 493.867454][T12975] ? kernel_text_address+0xa9/0xe0 [ 493.872405][T12975] dump_stack+0x15/0x18 [ 493.876395][T12975] should_fail_ex+0x3d0/0x520 [ 493.880911][T12975] __should_failslab+0xaf/0xf0 [ 493.885508][T12975] ? bpf_tracing_prog_attach+0x34f/0xff0 [ 493.890979][T12975] should_failslab+0x9/0x20 [ 493.895317][T12975] __kmem_cache_alloc_node+0x3d/0x2a0 [ 493.900525][T12975] ? kstrtoull+0x1cd/0x2e0 [ 493.904778][T12975] ? bpf_tracing_prog_attach+0x34f/0xff0 [ 493.910253][T12975] kmalloc_trace+0x2a/0xa0 [ 493.914498][T12975] bpf_tracing_prog_attach+0x34f/0xff0 [ 493.919794][T12975] ? putname+0xfa/0x150 [ 493.923786][T12975] ? bpf_raw_tp_link_attach+0x6b0/0x6b0 [ 493.929169][T12975] ? _kstrtol+0x150/0x150 [ 493.933332][T12975] ? memcpy+0x56/0x70 [ 493.937149][T12975] ? avc_has_perm_noaudit+0x2dd/0x430 [ 493.942358][T12975] bpf_raw_tp_link_attach+0x428/0x6b0 [ 493.947566][T12975] ? bpf_insn_prepare_dump+0x950/0x950 [ 493.952864][T12975] ? __kasan_check_write+0x14/0x20 [ 493.957806][T12975] ? fput+0x15b/0x1b0 [ 493.961627][T12975] bpf_raw_tracepoint_open+0x22d/0x4a0 [ 493.966921][T12975] ? bpf_obj_get_info_by_fd+0x3e60/0x3e60 [ 493.972474][T12975] ? selinux_bpf+0xd2/0x100 [ 493.976817][T12975] ? security_bpf+0x82/0xb0 [ 493.981153][T12975] __sys_bpf+0x4f5/0x7f0 [ 493.985234][T12975] ? bpf_link_show_fdinfo+0x300/0x300 [ 493.990443][T12975] ? __ia32_sys_read+0x90/0x90 [ 493.995044][T12975] ? debug_smp_processor_id+0x17/0x20 [ 494.000248][T12975] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 494.006150][T12975] __x64_sys_bpf+0x7c/0x90 [ 494.010403][T12975] x64_sys_call+0x87f/0x9a0 [ 494.014742][T12975] do_syscall_64+0x3b/0xb0 [ 494.018994][T12975] ? clear_bhb_loop+0x55/0xb0 [ 494.023508][T12975] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 494.029248][T12975] RIP: 0033:0x7f8bf738d169 [ 494.033497][T12975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 494.052942][T12975] RSP: 002b:00007f8bf82d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 494.061181][T12975] RAX: ffffffffffffffda RBX: 00007f8bf75a5fa0 RCX: 00007f8bf738d169 [ 494.068994][T12975] RDX: 0000000000000010 RSI: 0000400000000000 RDI: 0000000000000011 [ 494.076798][T12975] RBP: 00007f8bf82d7090 R08: 0000000000000000 R09: 0000000000000000 [ 494.084614][T12975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 494.092425][T12975] R13: 0000000000000000 R14: 00007f8bf75a5fa0 R15: 00007fff184429b8 [ 494.100240][T12975] [ 498.395013][T13040] FAULT_INJECTION: forcing a failure. [ 498.395013][T13040] name failslab, interval 1, probability 0, space 0, times 0 [ 498.476436][T13040] CPU: 1 PID: 13040 Comm: syz.1.3662 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 498.486146][T13040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 498.496041][T13040] Call Trace: [ 498.499165][T13040] [ 498.501941][T13040] dump_stack_lvl+0x151/0x1b7 [ 498.506456][T13040] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 498.511750][T13040] ? stack_trace_save+0x113/0x1c0 [ 498.516611][T13040] dump_stack+0x15/0x18 [ 498.520603][T13040] should_fail_ex+0x3d0/0x520 [ 498.525117][T13040] __should_failslab+0xaf/0xf0 [ 498.529717][T13040] should_failslab+0x9/0x20 [ 498.534054][T13040] slab_pre_alloc_hook+0x2e/0x1b0 [ 498.538917][T13040] ? delete_node+0x736/0x790 [ 498.543341][T13040] ? kasan_save_alloc_info+0x1f/0x30 [ 498.548463][T13040] kmem_cache_alloc_lru+0x49/0x270 [ 498.553409][T13040] ? __d_alloc+0x34/0x700 [ 498.557577][T13040] __d_alloc+0x34/0x700 [ 498.561568][T13040] ? radix_tree_iter_tag_clear+0x69/0x80 [ 498.567039][T13040] d_alloc_pseudo+0x1d/0x70 [ 498.571375][T13040] alloc_file_pseudo+0x131/0x2f0 [ 498.576152][T13040] ? alloc_empty_file_noaccount+0x80/0x80 [ 498.581703][T13040] ? __kasan_check_write+0x14/0x20 [ 498.586651][T13040] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 498.591513][T13040] anon_inode_getfile+0xa7/0x180 [ 498.596287][T13040] bpf_link_prime+0xed/0x250 [ 498.600712][T13040] bpf_tracing_prog_attach+0x7c6/0xff0 [ 498.606006][T13040] ? putname+0xfa/0x150 [ 498.609998][T13040] ? bpf_raw_tp_link_attach+0x6b0/0x6b0 [ 498.615379][T13040] ? _kstrtol+0x150/0x150 [ 498.619547][T13040] ? memcpy+0x56/0x70 [ 498.623364][T13040] ? avc_has_perm_noaudit+0x2dd/0x430 [ 498.628573][T13040] bpf_raw_tp_link_attach+0x428/0x6b0 [ 498.633780][T13040] ? bpf_insn_prepare_dump+0x950/0x950 [ 498.639076][T13040] ? __kasan_check_write+0x14/0x20 [ 498.644020][T13040] ? fput+0x15b/0x1b0 [ 498.647843][T13040] bpf_raw_tracepoint_open+0x22d/0x4a0 [ 498.653134][T13040] ? bpf_obj_get_info_by_fd+0x3e60/0x3e60 [ 498.658688][T13040] ? selinux_bpf+0xd2/0x100 [ 498.663028][T13040] ? security_bpf+0x82/0xb0 [ 498.667368][T13040] __sys_bpf+0x4f5/0x7f0 [ 498.671447][T13040] ? bpf_link_show_fdinfo+0x300/0x300 [ 498.676657][T13040] ? __ia32_sys_read+0x90/0x90 [ 498.681254][T13040] ? debug_smp_processor_id+0x17/0x20 [ 498.686461][T13040] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 498.692363][T13040] __x64_sys_bpf+0x7c/0x90 [ 498.696616][T13040] x64_sys_call+0x87f/0x9a0 [ 498.700955][T13040] do_syscall_64+0x3b/0xb0 [ 498.705208][T13040] ? clear_bhb_loop+0x55/0xb0 [ 498.709722][T13040] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 498.715449][T13040] RIP: 0033:0x7f08a1f8d169 [ 498.719704][T13040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 498.739144][T13040] RSP: 002b:00007f08a2e56038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 498.747388][T13040] RAX: ffffffffffffffda RBX: 00007f08a21a5fa0 RCX: 00007f08a1f8d169 [ 498.755200][T13040] RDX: 0000000000000010 RSI: 0000400000000000 RDI: 0000000000000011 [ 498.763014][T13040] RBP: 00007f08a2e56090 R08: 0000000000000000 R09: 0000000000000000 [ 498.770828][T13040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 498.778634][T13040] R13: 0000000000000000 R14: 00007f08a21a5fa0 R15: 00007ffc2cb1d7b8 [ 498.786450][T13040] [ 501.276624][T13097] FAULT_INJECTION: forcing a failure. [ 501.276624][T13097] name failslab, interval 1, probability 0, space 0, times 0 [ 501.325022][T13097] CPU: 0 PID: 13097 Comm: syz.1.3680 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 501.334743][T13097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 501.344639][T13097] Call Trace: [ 501.347761][T13097] [ 501.350537][T13097] dump_stack_lvl+0x151/0x1b7 [ 501.355052][T13097] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 501.360346][T13097] dump_stack+0x15/0x18 [ 501.364335][T13097] should_fail_ex+0x3d0/0x520 [ 501.368849][T13097] ? __alloc_file+0x29/0x2a0 [ 501.373276][T13097] __should_failslab+0xaf/0xf0 [ 501.377876][T13097] should_failslab+0x9/0x20 [ 501.382216][T13097] kmem_cache_alloc+0x3b/0x320 [ 501.386819][T13097] ? _raw_spin_trylock_bh+0x190/0x190 [ 501.392024][T13097] __alloc_file+0x29/0x2a0 [ 501.396282][T13097] alloc_empty_file+0x95/0x180 [ 501.400877][T13097] alloc_file+0x5a/0x5e0 [ 501.404957][T13097] alloc_file_pseudo+0x259/0x2f0 [ 501.409738][T13097] ? alloc_empty_file_noaccount+0x80/0x80 [ 501.415288][T13097] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 501.420148][T13097] anon_inode_getfile+0xa7/0x180 [ 501.424917][T13097] bpf_link_prime+0xed/0x250 [ 501.429346][T13097] bpf_tracing_prog_attach+0x7c6/0xff0 [ 501.434636][T13097] ? putname+0xfa/0x150 [ 501.438632][T13097] ? bpf_raw_tp_link_attach+0x6b0/0x6b0 [ 501.444012][T13097] ? _kstrtol+0x150/0x150 [ 501.448177][T13097] ? memcpy+0x56/0x70 [ 501.451998][T13097] ? avc_has_perm_noaudit+0x2dd/0x430 [ 501.457205][T13097] bpf_raw_tp_link_attach+0x428/0x6b0 [ 501.462418][T13097] ? bpf_insn_prepare_dump+0x950/0x950 [ 501.467713][T13097] ? __kasan_check_write+0x14/0x20 [ 501.472651][T13097] ? fput+0x15b/0x1b0 [ 501.476470][T13097] bpf_raw_tracepoint_open+0x22d/0x4a0 [ 501.481767][T13097] ? bpf_obj_get_info_by_fd+0x3e60/0x3e60 [ 501.487321][T13097] ? selinux_bpf+0xd2/0x100 [ 501.491658][T13097] ? security_bpf+0x82/0xb0 [ 501.496002][T13097] __sys_bpf+0x4f5/0x7f0 [ 501.500079][T13097] ? bpf_link_show_fdinfo+0x300/0x300 [ 501.505290][T13097] ? __ia32_sys_read+0x90/0x90 [ 501.509887][T13097] ? debug_smp_processor_id+0x17/0x20 [ 501.515093][T13097] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 501.520996][T13097] __x64_sys_bpf+0x7c/0x90 [ 501.525247][T13097] x64_sys_call+0x87f/0x9a0 [ 501.529586][T13097] do_syscall_64+0x3b/0xb0 [ 501.533839][T13097] ? clear_bhb_loop+0x55/0xb0 [ 501.538357][T13097] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 501.544082][T13097] RIP: 0033:0x7f08a1f8d169 [ 501.548337][T13097] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 501.567777][T13097] RSP: 002b:00007f08a2e56038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 501.576020][T13097] RAX: ffffffffffffffda RBX: 00007f08a21a5fa0 RCX: 00007f08a1f8d169 [ 501.583832][T13097] RDX: 0000000000000010 RSI: 0000400000000000 RDI: 0000000000000011 [ 501.591644][T13097] RBP: 00007f08a2e56090 R08: 0000000000000000 R09: 0000000000000000 [ 501.599456][T13097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 501.607266][T13097] R13: 0000000000000000 R14: 00007f08a21a5fa0 R15: 00007ffc2cb1d7b8 [ 501.615085][T13097] [ 503.893714][T13122] device wg2 entered promiscuous mode [ 504.039915][T13141] FAULT_INJECTION: forcing a failure. [ 504.039915][T13141] name failslab, interval 1, probability 0, space 0, times 0 [ 504.075117][T13141] CPU: 1 PID: 13141 Comm: syz.1.3694 Not tainted 6.1.128-syzkaller-00041-g471a10d3af3b #0 [ 504.084844][T13141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 504.094739][T13141] Call Trace: [ 504.097858][T13141] [ 504.100638][T13141] dump_stack_lvl+0x151/0x1b7 [ 504.105151][T13141] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 504.110446][T13141] dump_stack+0x15/0x18 [ 504.114435][T13141] should_fail_ex+0x3d0/0x520 [ 504.118951][T13141] ? security_file_alloc+0x29/0x120 [ 504.123985][T13141] __should_failslab+0xaf/0xf0 [ 504.128585][T13141] should_failslab+0x9/0x20 [ 504.132924][T13141] kmem_cache_alloc+0x3b/0x320 [ 504.137524][T13141] ? __alloc_file+0x29/0x2a0 [ 504.141952][T13141] security_file_alloc+0x29/0x120 [ 504.146813][T13141] __alloc_file+0xb2/0x2a0 [ 504.151064][T13141] alloc_empty_file+0x95/0x180 [ 504.155663][T13141] alloc_file+0x5a/0x5e0 [ 504.159744][T13141] alloc_file_pseudo+0x259/0x2f0 [ 504.164517][T13141] ? alloc_empty_file_noaccount+0x80/0x80 [ 504.170071][T13141] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 504.174933][T13141] anon_inode_getfile+0xa7/0x180 [ 504.179708][T13141] bpf_link_prime+0xed/0x250 [ 504.184129][T13141] bpf_tracing_prog_attach+0x7c6/0xff0 [ 504.189423][T13141] ? putname+0xfa/0x150 [ 504.193419][T13141] ? bpf_raw_tp_link_attach+0x6b0/0x6b0 [ 504.198800][T13141] ? _kstrtol+0x150/0x150 [ 504.202967][T13141] ? memcpy+0x56/0x70 [ 504.206782][T13141] ? avc_has_perm_noaudit+0x2dd/0x430 [ 504.212003][T13141] bpf_raw_tp_link_attach+0x428/0x6b0 [ 504.217200][T13141] ? bpf_insn_prepare_dump+0x950/0x950 [ 504.222498][T13141] ? __kasan_check_write+0x14/0x20 [ 504.227439][T13141] ? fput+0x15b/0x1b0 [ 504.231261][T13141] bpf_raw_tracepoint_open+0x22d/0x4a0 [ 504.236557][T13141] ? bpf_obj_get_info_by_fd+0x3e60/0x3e60 [ 504.242108][T13141] ? selinux_bpf+0xd2/0x100 [ 504.246446][T13141] ? security_bpf+0x82/0xb0 [ 504.250788][T13141] __sys_bpf+0x4f5/0x7f0 [ 504.254866][T13141] ? bpf_link_show_fdinfo+0x300/0x300 [ 504.260079][T13141] ? __ia32_sys_read+0x90/0x90 [ 504.264674][T13141] ? debug_smp_processor_id+0x17/0x20 [ 504.269881][T13141] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 504.275783][T13141] __x64_sys_bpf+0x7c/0x90 [ 504.280037][T13141] x64_sys_call+0x87f/0x9a0 [ 504.284375][T13141] do_syscall_64+0x3b/0xb0 [ 504.288628][T13141] ? clear_bhb_loop+0x55/0xb0 [ 504.293143][T13141] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 504.298869][T13141] RIP: 0033:0x7f08a1f8d169 [ 504.303123][T13141] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 504.322563][T13141] RSP: 002b:00007f08a2e56038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 504.330807][T13141] RAX: ffffffffffffffda RBX: 00007f08a21a5fa0 RCX: 00007f08a1f8d169 [ 504.338620][T13141] RDX: 0000000000000010 RSI: 0000400000000000 RDI: 0000000000000011 [ 504.346430][T13141] RBP: 00007f08a2e56090 R08: 0000000000000000 R09: 0000000000000000 [ 504.354242][T13141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 504.362052][T13141] R13: 0000000000000000 R14: 00007f08a21a5fa0 R15: 00007ffc2cb1d7b8 [ 504.369870][T13141] SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=7 req=3512 state=3 status=67 (errno 9: Bad file descriptor) [ 507.715437][ T5045] device bridge_slave_1 left promiscuous mode [ 507.721345][ T5045] bridge0: port 2(bridge_slave_1) entered disabled state [ 507.728581][ T5045] device bridge_slave_0 left promiscuous mode [ 507.734478][ T5045] bridge0: port 1(bridge_slave_0) entered disabled state [ 507.742180][ T5045] device bridge_slave_1 left promiscuous mode [ 507.748142][ T5045] bridge0: port 2(bridge_slave_1) entered disabled state [ 507.755272][ T5045] device bridge_slave_0 left promiscuous mode [ 507.761187][ T5045] bridge0: port 1(bridge_slave_0) entered disabled state [ 507.769056][ T5045] bridge0: port 2(bridge_slave_1) entered disabled state [ 507.776140][ T5045] device bridge_slave_0 left promiscuous mode [ 507.782025][ T5045] bridge0: port 1(bridge_slave_0) entered disabled state [ 507.789836][ T5045] device veth0_vlan left promiscuous mode [ 507.795684][ T5045] device veth1_macvtap left promiscuous mode [ 507.801476][ T5045] device veth0_vlan left promiscuous mode [ 507.807437][ T5045] device veth0_vlan left promiscuous mode [ 508.965307][ T5045] device bridge_slave_1 left promiscuous mode [ 508.971217][ T5045] bridge0: port 2(bridge_slave_1) entered disabled state [ 508.978384][ T5045] device bridge_slave_0 left promiscuous mode [ 508.984283][ T5045] bridge0: port 1(bridge_slave_0) entered disabled state [ 508.991901][ T5045] device veth1_macvtap left promiscuous mode [ 508.997715][ T5045] device veth0_vlan left promiscuous mode