last executing test programs: 10.370508669s ago: executing program 1 (id=401): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0xfe, 0x0, 0xfffffffffffffdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 10.325206805s ago: executing program 1 (id=403): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x35, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00'}, 0x3d) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r4}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 9.642684712s ago: executing program 0 (id=407): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b9cbbefce3babab}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x10000, &(0x7f0000000a00)="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", 0x1000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000340)="2b9682a93da11951cd31e17a739368d29ef8ec611259ac54c691f65f60216025302d0f5f1517a5fc69d8423c6ff56051b86888e2f5f886e175125a9efe5e5886deac34d04c2a195c8a54087adc64261ba7bbeade246e5ac43580bf798f484054810c1f") r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000800000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000000000791048000000000063ed03ff000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x21) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000003c0)='erofs_readpage\x00', r4, 0x0, 0xf5}, 0x18) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x6, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c0000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000000212000000", &(0x7f0000000300)=""/8, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r6, 0xe0, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, &(0x7f0000000540)=[0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x9b, &(0x7f00000005c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0xa7, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$TOKEN_CREATE(0x24, &(0x7f0000000900)={0x0, r5}, 0x8) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000001bc0)={0x11, 0xc, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x2d, '\x00', 0x0, @fallback=0x12, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000140)='kmem_cache_free\x00', r11}, 0x18) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 9.238148784s ago: executing program 3 (id=415): socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000480)=ANY=[@ANYRES32=r0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0500e001b4696ba8d344ea3056e8395fe60004000100000024ffffff0800000008000000a7ca4dcfff24222139001a7c9dcd10d69724fb", @ANYRES32, @ANYBLOB="00001900"/20, @ANYRES32=r2, @ANYRESHEX=r1, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808cdad740000000000004d672800003b4bf100cf001b546d64efa4e4a7", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff80000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x200007f, 0x0, 0x0, 0x40f00, 0x6b, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000500)='xprtrdma_post_recvs_err\x00', r1}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x6, 0xfe, 0x0, 0x0, 0x20000, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xf}, 0x72bd1de2ad10d6f3, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0x4, 0xfffc, 0x0, 0x84000, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305828, &(0x7f0000000040)=0x20000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000280)="c7b40b4dc10f7283e93c37614ca20594435aa71c97a25fed241b6351ba7e1197ba34a6fb192f9192eb2c20ec079063ba77c85e3682f0f05f7ae924a3c9625c1691874ecffc75b3aa2702e22c8e41e113b04cceb9bd8f7e061b5fe3a7fa8c6d12b54664937e59bb14d5446fefd204fbe704558cde836684f04ccda64bacfbf31823f356161b83bcd2d5cedd4429cdda8255f95c4dae4d89853d7c5901fa968cd73a34c94fac629d384218a921e542cdcc94c3b2564943", 0xb6}, {&(0x7f0000000340)="d4760dede5d3e3fb059659e993d2869ffbd855849425c4dacde375620bd3a0932ea5b4f3445fc6e0a87a0a519ec6", 0x2e}], 0x2, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0xf0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000440)='q\"^\xce\xf4KXH\xdd\xdf\xdc\xe5\xbcO\x992') 8.994064275s ago: executing program 1 (id=417): socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000008c50000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00'}, 0x10) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) close(r0) 8.781916883s ago: executing program 0 (id=419): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYRESHEX=r1, @ANYRES64=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb723000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x41}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, 0x0, &(0x7f0000000b00)=""/151}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x9fd, 0x84, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r2}, 0x38) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), 0x0, 0x6c, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000540)='kfree\x00', r5}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000340), 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r9, r8, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r9}, &(0x7f0000000000), &(0x7f0000000080)=r6}, 0x20) sendmsg$inet(r7, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x200000000000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) 7.288106644s ago: executing program 3 (id=421): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x50028, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x8, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x802}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1600000000000000040000000500000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000d79d007a1843145db0c3c38fbdb7e64216b37d7ed3e6f1dd168f114d2682fb2eef0c1e434adf8b1684f8c541f3ba8726655576897b45f5069900"/77, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r5}, 0x10) close(r1) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r0) 4.150399077s ago: executing program 0 (id=423): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x35, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00'}, 0x3d) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r4}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 4.077868756s ago: executing program 3 (id=426): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00'}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r8}, 0x10) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000ffffffff00000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004000000850000007d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xbd3d1606e608939d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r1) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$LINK_DETACH(0x22, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) 3.619806875s ago: executing program 3 (id=430): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000005850000008200000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100006cc70000000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) ioctl$SIOCSIFHWADDR(r7, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r6}, &(0x7f0000000180), &(0x7f00000001c0)=r5}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r11}, 0x10) 3.58063132s ago: executing program 4 (id=431): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open$cgroup(&(0x7f0000000500)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x111, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3fe, 0x486c79dd}, 0x41, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, 0x0, 0x0, 0x10, &(0x7f0000000700), &(0x7f0000000540), 0x8, 0x496, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a00)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x19, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000ac47cea628f5f88d531ef2ffff"], &(0x7f0000000440)='GPL\x00', 0x9, 0xe1, &(0x7f0000000580)=""/225, 0x41100, 0x22, '\x00', 0x0, @cgroup_sockopt, r2, 0x8, &(0x7f0000000700)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0x0, 0x3, 0x80000000}, 0x10, r3, r1, 0x2, &(0x7f0000000780)=[r0, r0, r0], &(0x7f00000007c0)=[{0x2, 0x5, 0x9, 0x8}, {0x4, 0x2, 0x2}], 0x10, 0x4a4}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES16, @ANYRES32, @ANYBLOB="0000000000000200"/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x0, 0x9, &(0x7f0000000a80)=ANY=[@ANYBLOB="1849000000000000000000000000000018420000fbffffff0000000000000000604b1800080000009500000000000000182b0000", @ANYRES32=r4, @ANYBLOB="00000000000000000000000000000000e1986bdd5d9290737c19ff050a49782d76b0005743adef9fed288045779e887370ee7c7ff0a5bf0d9b30ae8dc6792d512be1b4d3c7796da860aff6e08788eb4aa0a28a358717c1469b16d8d03a622599d736e5297d974f41a583afb947b4509d861577c8bd5fcdb1febe"], &(0x7f00000008c0)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41100, 0x63, '\x00', 0x0, @fallback=0x36, r2, 0x8, &(0x7f0000000d40)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000d80)={0x5, 0x4, 0x7ff, 0x6}, 0x10, r3, 0xffffffffffffffff, 0x2, &(0x7f0000000f00)=[r4, 0xffffffffffffffff, r0, 0xffffffffffffffff], &(0x7f0000000f40)=[{0x1, 0x4, 0x0, 0xc}, {0x0, 0x2, 0x5, 0x9}], 0x10, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00'}, 0x10) unlink(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0xbc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000001000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000ffff0000000000002700000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014001d00b7030000100000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='signal_generate\x00', r6, 0x0, 0x8001}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffd) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1200000005000000040000000200000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000058f9a67978e7c3202b71852651b93de23f73bcb650875471c230ea65ceb2234cfc956f00fd01c667017642bcd380075e9896d08bd4f0253e4ed8abb16dd361a1e80db5d3d6704eda7606b9f3d3ef0db9fd9dc4189e35897b9f4c6f1319084e76164b3e7c42541014cbf5ae9caed007ff3d3595bab052ecbdbc5acf16924b3956f9dd05437559536240d7f908c27f507846db6fcf41695549", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r7, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x23) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffffffffffff, 0x2}, 0x0, 0x0, 0xfffffffd, 0xd, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2b, 0x2, 0x8000, &(0x7f00000002c0)) r8 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f00000004c0), 0x12) 3.571121321s ago: executing program 2 (id=432): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00'/20], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.threads\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x6) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000280)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0xa0001f98, 0xaa7, 0x0, &(0x7f0000000440)="85f17444", 0x0, 0xa70a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000480)=ANY=[@ANYRESDEC, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106fe2010ff"}) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r8}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001900)=@bpf_tracing={0x1a, 0x12, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000ad000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000185200000100000000000000fb0000002f34ffffffffffffbf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x9, 0x1000, &(0x7f0000000900)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0x3, 0x8, 0x1}, 0x10, 0xe683, r8, 0x9, &(0x7f0000000400)=[r3, r3, r3, r0, r3, r3, r3], &(0x7f0000000640)=[{0x5, 0x1, 0x0, 0x9}, {0x3, 0x2, 0x9, 0x8}, {0x4, 0x1, 0x7}, {0x3, 0x5, 0x6, 0x8}, {0x1, 0x2, 0x2, 0xc}, {0x2, 0x5, 0x6, 0x9}, {0x3, 0x3, 0x2, 0x2}, {0x0, 0x4, 0x5, 0x3}, {0x2, 0x5, 0x2, 0x2}], 0x10, 0x9}, 0x94) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000019c0)=@base={0xa, 0x7fff, 0x5, 0xca, 0xde8, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x50) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) 2.214538946s ago: executing program 4 (id=433): openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f00000002c0)={0x0, r6}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000018110000008a0d862c4493af5ca812476765e02656eefda65c7468f00a27bd890e19a00f8577794a4460920a9b122f2ba4f524c537df7d111e89ed4e15546751096dc5d778ad5112d1a04a8c5f3cfebeeb71278162aba01241a5137bb0c122", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_open_procfs$namespace(0x0, &(0x7f0000001540)='ns/net\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000088fe508a8500000004000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='blkio.throttle.io_serviced\x00', 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000400)={r9, r4, 0x4, r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.016256961s ago: executing program 1 (id=434): socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000480)=ANY=[@ANYRES32=r0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0500e001b4696ba8d344ea3056e8395fe60004000100000024ffffff0800000008000000a7ca4dcfff24222139001a7c9dcd10d69724fb", @ANYRES32, @ANYBLOB="00001900"/20, @ANYRES32=r2, @ANYRESHEX=r1, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808cdad740000000000004d672800003b4bf100cf001b546d64efa4e4a7", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff80000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x200007f, 0x0, 0x0, 0x40f00, 0x6b, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000500)='xprtrdma_post_recvs_err\x00', r1}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x6, 0xfe, 0x0, 0x0, 0x20000, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xf}, 0x72bd1de2ad10d6f3, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0x4, 0xfffc, 0x0, 0x84000, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305828, &(0x7f0000000040)=0x20000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000280)="c7b40b4dc10f7283e93c37614ca20594435aa71c97a25fed241b6351ba7e1197ba34a6fb192f9192eb2c20ec079063ba77c85e3682f0f05f7ae924a3c9625c1691874ecffc75b3aa2702e22c8e41e113b04cceb9bd8f7e061b5fe3a7fa8c6d12b54664937e59bb14d5446fefd204fbe704558cde836684f04ccda64bacfbf31823f356161b83bcd2d5cedd4429cdda8255f95c4dae4d89853d7c5901fa968cd73a34c94fac629d384218a921e542cdcc94c3b2564943", 0xb6}, {&(0x7f0000000340)="d4760dede5d3e3fb059659e993d2869ffbd855849425c4dacde375620bd3a0932ea5b4f3445fc6e0a87a0a519ec6577faf5b106bdf0a", 0x36}], 0x2, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0xf0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000440)='q\"^\xce\xf4KXH\xdd\xdf\xdc\xe5\xbcO\x992') 1.835040545s ago: executing program 2 (id=435): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffd}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x2d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10038, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x395}, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000000000000, 0x2}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0x6c0000000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d0000008500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.810850157s ago: executing program 4 (id=436): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = syz_clone(0x880, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, r1, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/ipc\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) socketpair(0x1e, 0x1, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x6, 0x10, &(0x7f0000000e40)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000300000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0xfffff000, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x2f00, 0x7000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.715472759s ago: executing program 3 (id=437): socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x3, 0xa, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) syz_open_procfs$namespace(0x0, &(0x7f0000000740)='ns/mnt\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/mnt\x00') bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0), 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r7, 0x5}, 0x10) recvmsg$unix(r2, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000000280)=""/19, 0x13}, {&(0x7f0000000880)=""/100, 0x64}, {&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f0000001a00)=""/97, 0x61}, {&(0x7f0000000440)=""/26, 0x1a}], 0x5, &(0x7f0000001bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf0}, 0x2000) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r6, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r5}, 0x20) sendmsg$inet(r4, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1, 0x0, 0x0, 0x6000}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001cc0)={r8, 0x58, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x7, 0x9, 0x0, 0x5, 0x2400, 0xffffffffffffffff, 0xdf, '\x00', r12, r9, 0x0, 0x3}, 0x50) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000029c0)={0x6, 0xc, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, [@map_idx_val={0x18, 0x8, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0xe, 0x3, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x4a}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @ldst={0x0, 0x2, 0x2, 0xb, 0x9, 0xc, 0x1}, @map_fd={0x18, 0x4, 0x1, 0x0, r10}]}, &(0x7f0000000500)='GPL\x00', 0x9, 0xb0, &(0x7f0000000780)=""/176, 0x40f00, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x4, 0xa, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880), 0x0, 0x10, 0x1}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r13, @ANYRES32=r11, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r13}, &(0x7f0000000000), &(0x7f0000000080)=r3}, 0x20) 1.532020453s ago: executing program 0 (id=438): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffd}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x2d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10038, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x395}, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000000000000, 0x2}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0x6c0000000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d0000008500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.32074613s ago: executing program 1 (id=439): socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000480)=ANY=[@ANYRES32=r0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0500e001b4696ba8d344ea3056e8395fe60004000100000024ffffff0800000008000000a7ca4dcfff24222139001a7c9dcd10d69724fb", @ANYRES32, @ANYBLOB="00001900"/20, @ANYRES32=r2, @ANYRESHEX=r1, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808cdad740000000000004d672800003b4bf100cf001b546d64efa4e4a7", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff80000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x200007f, 0x0, 0x0, 0x40f00, 0x6b, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000500)='xprtrdma_post_recvs_err\x00', r1}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x6, 0xfe, 0x0, 0x0, 0x20000, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xf}, 0x72bd1de2ad10d6f3, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0x4, 0xfffc, 0x0, 0x84000, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305828, &(0x7f0000000040)=0x20000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000280)="c7b40b4dc10f7283e93c37614ca20594435aa71c97a25fed241b6351ba7e1197ba34a6fb192f9192eb2c20ec079063ba77c85e3682f0f05f7ae924a3c9625c1691874ecffc75b3aa2702e22c8e41e113b04cceb9bd8f7e061b5fe3a7fa8c6d12b54664937e59bb14d5446fefd204fbe704558cde836684f04ccda64bacfbf31823f356161b83bcd2d5cedd4429cdda8255f95c4dae4d89853d7c5901fa968cd73a34c94fac629d384218a921e542cdcc94c3b2564943", 0xb6}, {&(0x7f0000000340)="d4760dede5d3e3fb059659e993d2869ffbd855849425c4dacde375620bd3a0932ea5b4f3445fc6e0a87a0a519ec6", 0x2e}], 0x2, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0xf0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000440)='q\"^\xce\xf4KXH\xdd\xdf\xdc\xe5\xbcO\x992') 1.290826544s ago: executing program 4 (id=440): openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008bd6000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r7, 0x4004743d, 0x110e22fff6) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYRES64=r6, @ANYRES8=r5, @ANYRESDEC=r5], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) write$cgroup_type(r7, &(0x7f0000000280), 0xfffffeed) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r9}, 0x10) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) close(r10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000100000000000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x50) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf}, 0x0, 0x0, 0x100000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r12, 0xfe, 0x0, 0xfffffffffffffdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r13, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x24004000) 1.030857657s ago: executing program 2 (id=441): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r0, @ANYRES64=r1, @ANYRES32=r1, @ANYRES32=r0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) openat$cgroup_freezer_state(r4, &(0x7f00000005c0), 0x2, 0x0) r6 = openat$cgroup_freezer_state(r4, &(0x7f0000000280), 0x2, 0x0) close(r6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x18) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_bp={0x0, 0x9}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xfffffffffffffe1e, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89a2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) 984.400813ms ago: executing program 4 (id=442): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000001c000000000000ea04850000007b00"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001800)={&(0x7f0000001680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x5, [@enum={0x2, 0x5, 0x0, 0x6, 0x4, [{0xf, 0xffff}, {0xa, 0x3}, {0xd, 0x5}, {0x1, 0x3a4f}, {0x1, 0x101}]}]}, {0x0, [0x30, 0x2e, 0x5f]}}, &(0x7f0000001700)=""/251, 0x51, 0xfb, 0x1, 0xe, 0x10000}, 0x28) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x80) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 927.088251ms ago: executing program 2 (id=443): bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg(r0, 0x0, 0x20004004) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000008000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000400)='consume_skb\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) 901.445044ms ago: executing program 4 (id=444): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffd}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x2d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10038, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x395}, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000000000000, 0x2}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0x6c0000000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d0000008500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 758.459263ms ago: executing program 3 (id=445): ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_clone(0x40000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r6, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x95, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000002c0), &(0x7f00000003c0), 0x8, 0x62, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000400000000000000000011ad8baf0000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x4010, r9}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r8}, 0x10) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'hsr0\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000080)) 702.67209ms ago: executing program 2 (id=446): bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg(r0, 0x0, 0x20004004) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000008000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000400)='consume_skb\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x12, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) 630.591229ms ago: executing program 0 (id=447): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00'/20], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.threads\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x6) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000280)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0xa0001f98, 0xaa7, 0x0, &(0x7f0000000440)="85f17444", 0x0, 0xa70a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000480)=ANY=[@ANYRESDEC, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106fe2010ff"}) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r8}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001900)=@bpf_tracing={0x1a, 0x12, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000ad000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000185200000100000000000000fb0000002f34ffffffffffffbf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x9, 0x1000, &(0x7f0000000900)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0x3, 0x8, 0x1}, 0x10, 0xe683, r8, 0x9, &(0x7f0000000400)=[r3, r3, r3, r0, r3, r3, r3], &(0x7f0000000640)=[{0x5, 0x1, 0x0, 0x9}, {0x3, 0x2, 0x9, 0x8}, {0x4, 0x1, 0x7}, {0x3, 0x5, 0x6, 0x8}, {0x1, 0x2, 0x2, 0xc}, {0x2, 0x5, 0x6, 0x9}, {0x3, 0x3, 0x2, 0x2}, {0x0, 0x4, 0x5, 0x3}, {0x2, 0x5, 0x2, 0x2}], 0x10, 0x9}, 0x94) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000019c0)=@base={0xa, 0x7fff, 0x5, 0xca, 0xde8, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x50) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) 564.741887ms ago: executing program 2 (id=448): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffd}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x2d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10038, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x395}, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000000000000, 0x2}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0x6c0000000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d0000008500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 243.253238ms ago: executing program 1 (id=449): socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000480)=ANY=[@ANYRES32=r0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0500e001b4696ba8d344ea3056e8395fe60004000100000024ffffff0800000008000000a7ca4dcfff24222139001a7c9dcd10d69724fb", @ANYRES32, @ANYBLOB="00001900"/20, @ANYRES32=r2, @ANYRESHEX=r1, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808cdad740000000000004d672800003b4bf100cf001b546d64efa4e4a7", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff80000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x200007f, 0x0, 0x0, 0x40f00, 0x6b, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000500)='xprtrdma_post_recvs_err\x00', r1}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x6, 0xfe, 0x0, 0x0, 0x20000, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xf}, 0x72bd1de2ad10d6f3, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0x4, 0xfffc, 0x0, 0x84000, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305828, &(0x7f0000000040)=0x20000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000280)="c7b40b4dc10f7283e93c37614ca20594435aa71c97a25fed241b6351ba7e1197ba34a6fb192f9192eb2c20ec079063ba77c85e3682f0f05f7ae924a3c9625c1691874ecffc75b3aa2702e22c8e41e113b04cceb9bd8f7e061b5fe3a7fa8c6d12b54664937e59bb14d5446fefd204fbe704558cde836684f04ccda64bacfbf31823f356161b83bcd2d5cedd4429cdda8255f95c4dae4d89853d7c5901fa968cd73a34c94fac629d384218a921e542cdcc94c3b2564943", 0xb6}, {&(0x7f0000000340)="d4760dede5d3e3fb059659e993d2869ffbd855849425c4dacde375620bd3a0932ea5b4f3445fc6e0a87a0a519ec6577faf5b106bdf0a", 0x36}], 0x2, &(0x7f0000000640)=ANY=[@ANYBLOB="110000000000000000000000010000009100000000000000d4000000000000000000000007000000865b00000002070c76dede4319aa4896a66f000a7cc999dbf8748ca60504434f000fdcd15cd469f9f02be7ed06a31511b60fd7001d21b789010209971e6957617087011235c4ceb36937eba51fa09738b40ceb81020a81a881025a12631c0607039308326a830bf000000000ac1e0101891769ac1414bbe0000001ffffffff64010102000000008617000000030711f01a597d7ec687e680970e010fad880094040100018923317f000001e0000002ac1414bb7f00000164010102ac1414aa7f000001000000000004fcca00000300000000"], 0xf0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000440)='q\"^\xce\xf4KXH\xdd\xdf\xdc\xe5\xbcO\x992') 0s ago: executing program 0 (id=450): socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000480)=ANY=[@ANYRES32=r0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0500e001b4696ba8d344ea3056e8395fe60004000100000024ffffff0800000008000000a7ca4dcfff24222139001a7c9dcd10d69724fb", @ANYRES32, @ANYBLOB="00001900"/20, @ANYRES32=r2, @ANYRESHEX=r1, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808cdad740000000000004d672800003b4bf100cf001b546d64efa4e4a7", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff80000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x200007f, 0x0, 0x0, 0x40f00, 0x6b, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000500)='xprtrdma_post_recvs_err\x00', r1}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x6, 0xfe, 0x0, 0x0, 0x20000, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xf}, 0x72bd1de2ad10d6f3, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0x4, 0xfffc, 0x0, 0x84000, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305828, &(0x7f0000000040)=0x20000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000280)="c7b40b4dc10f7283e93c37614ca20594435aa71c97a25fed241b6351ba7e1197ba34a6fb192f9192eb2c20ec079063ba77c85e3682f0f05f7ae924a3c9625c1691874ecffc75b3aa2702e22c8e41e113b04cceb9bd8f7e061b5fe3a7fa8c6d12b54664937e59bb14d5446fefd204fbe704558cde836684f04ccda64bacfbf31823f356161b83bcd2d5cedd4429cdda8255f95c4dae4d89853d7c5901fa968cd73a34c94fac629d384218a921e542cdcc94c3b2564943", 0xb6}, {&(0x7f0000000340)="d4760dede5d3e3fb059659e993d2869ffbd855849425c4dacde375620bd3a0932ea5b4f3445fc6e0a87a0a519ec6577faf5b106bdf0a", 0x36}], 0x2, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0xf0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000440)='q\"^\xce\xf4KXH\xdd\xdf\xdc\xe5\xbcO\x992') kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.124' (ED25519) to the list of known hosts. [ 21.523587][ T30] audit: type=1400 audit(1768848414.705:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.527542][ T273] cgroup: Unknown subsys name 'net' [ 21.546390][ T30] audit: type=1400 audit(1768848414.705:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.573928][ T30] audit: type=1400 audit(1768848414.735:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.574399][ T273] cgroup: Unknown subsys name 'devices' [ 21.812519][ T273] cgroup: Unknown subsys name 'hugetlb' [ 21.818153][ T273] cgroup: Unknown subsys name 'rlimit' [ 22.018172][ T30] audit: type=1400 audit(1768848415.195:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.041854][ T30] audit: type=1400 audit(1768848415.195:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.066891][ T30] audit: type=1400 audit(1768848415.195:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 22.127982][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.136966][ T30] audit: type=1400 audit(1768848415.315:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.162394][ T30] audit: type=1400 audit(1768848415.315:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.181449][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.189107][ T30] audit: type=1400 audit(1768848415.355:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.222203][ T30] audit: type=1400 audit(1768848415.355:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.096365][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.103492][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.111010][ T281] device bridge_slave_0 entered promiscuous mode [ 23.119514][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.126656][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.134239][ T281] device bridge_slave_1 entered promiscuous mode [ 23.172296][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.179361][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.186912][ T283] device bridge_slave_0 entered promiscuous mode [ 23.210449][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.217548][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.225056][ T283] device bridge_slave_1 entered promiscuous mode [ 23.270619][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.277799][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.285381][ T284] device bridge_slave_0 entered promiscuous mode [ 23.301959][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.309024][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.316506][ T282] device bridge_slave_0 entered promiscuous mode [ 23.323397][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.330619][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.337998][ T284] device bridge_slave_1 entered promiscuous mode [ 23.359273][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.366384][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.373884][ T282] device bridge_slave_1 entered promiscuous mode [ 23.408287][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.415396][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.423057][ T285] device bridge_slave_0 entered promiscuous mode [ 23.429943][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.437054][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.444631][ T285] device bridge_slave_1 entered promiscuous mode [ 23.566148][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.573271][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.580607][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.587656][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.616807][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.623886][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.631213][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.638249][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.671732][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.678820][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.686149][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.693208][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.704645][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.711821][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.719112][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.726185][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.761609][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.768935][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.776343][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.783669][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.791101][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.798661][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.807134][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.814387][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.821699][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.843249][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.850731][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.858117][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.866593][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.873693][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.891229][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.899016][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.907520][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.914569][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.926354][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.936913][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.955762][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.964697][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.971807][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.979406][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.987720][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.994794][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.002464][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.010646][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.018597][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.026983][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.034052][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.067430][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.075991][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.083087][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.092289][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.100278][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.108558][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.117423][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.126016][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.134288][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.141329][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.148779][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.157286][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.165345][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.173435][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.181480][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.188880][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.196483][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.204841][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.227571][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.236064][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.244507][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.251614][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.259153][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.268200][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.276571][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.284930][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.293315][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.300345][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.307872][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.315866][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.324293][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.332050][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.339486][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.348830][ T281] device veth0_vlan entered promiscuous mode [ 24.361447][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.369420][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.377742][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.386281][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.394854][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.402438][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.410796][ T284] device veth0_vlan entered promiscuous mode [ 24.424342][ T284] device veth1_macvtap entered promiscuous mode [ 24.433414][ T283] device veth0_vlan entered promiscuous mode [ 24.441682][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.449838][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.458051][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.466337][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.474575][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.482775][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.491109][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.498680][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.506725][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.514851][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.523377][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.531929][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.539387][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.550184][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.558463][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.577810][ T281] device veth1_macvtap entered promiscuous mode [ 24.584636][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.592462][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.601102][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.609381][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.617681][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.626199][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.634333][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.642494][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.649955][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.665162][ T282] device veth0_vlan entered promiscuous mode [ 24.673300][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.681622][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.689875][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.700675][ T283] device veth1_macvtap entered promiscuous mode [ 24.719460][ T284] request_module fs-gadgetfs succeeded, but still no fs? [ 24.728449][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.737479][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.745968][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.754515][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.762950][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.771468][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.779621][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.795951][ T282] device veth1_macvtap entered promiscuous mode [ 24.811736][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.825208][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.834055][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.842554][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.850068][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.858653][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.867308][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.875846][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.889131][ T285] device veth0_vlan entered promiscuous mode [ 24.953257][ C0] hrtimer: interrupt took 26126 ns [ 24.960355][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.993844][ T285] device veth1_macvtap entered promiscuous mode [ 25.016833][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.025665][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.059872][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.093502][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.772983][ T101] udevd[101]: worker [379] terminated by signal 33 (Unknown signal 33) [ 26.808158][ T101] udevd[101]: worker [379] failed while handling '/devices/virtual/block/loop0' [ 26.834014][ T30] kauditd_printk_skb: 38 callbacks suppressed [ 26.834031][ T30] audit: type=1400 audit(1768848420.015:112): avc: denied { create } for pid=398 comm="syz.0.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 26.907129][ T405] device pim6reg1 entered promiscuous mode [ 27.392922][ T30] audit: type=1400 audit(1768848420.575:113): avc: denied { setopt } for pid=419 comm="syz.4.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 29.489388][ T30] audit: type=1400 audit(1768848422.665:114): avc: denied { write } for pid=447 comm="syz.1.29" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.310329][ T463] Â: renamed from pim6reg1 [ 30.455159][ T465] GPL: port 1(erspan0) entered blocking state [ 30.461383][ T465] GPL: port 1(erspan0) entered disabled state [ 30.478259][ T465] device erspan0 entered promiscuous mode [ 30.564261][ T465] GPL: port 1(erspan0) entered blocking state [ 30.570441][ T465] GPL: port 1(erspan0) entered forwarding state [ 30.720675][ T30] audit: type=1400 audit(1768848423.895:115): avc: denied { create } for pid=470 comm="syz.2.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 30.817950][ T30] audit: type=1400 audit(1768848423.995:116): avc: denied { relabelfrom } for pid=473 comm="syz.0.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 30.894115][ T30] audit: type=1400 audit(1768848423.995:117): avc: denied { relabelto } for pid=473 comm="syz.0.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 32.380375][ C1] sched: RT throttling activated [ 32.497512][ T30] audit: type=1400 audit(1768848425.675:118): avc: denied { create } for pid=480 comm="syz.3.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 32.991278][ T507] device veth0_vlan left promiscuous mode [ 32.997598][ T507] device veth0_vlan entered promiscuous mode [ 35.101538][ T551] device pim6reg1 entered promiscuous mode [ 35.567825][ T566] GPL: port 1(erspan0) entered blocking state [ 35.574102][ T566] GPL: port 1(erspan0) entered disabled state [ 35.580786][ T566] device erspan0 entered promiscuous mode [ 35.588199][ T566] GPL: port 1(erspan0) entered blocking state [ 35.594336][ T566] GPL: port 1(erspan0) entered forwarding state [ 36.035959][ T580] device pim6reg1 entered promiscuous mode [ 36.345127][ T586] syz.4.74 (586) used obsolete PPPIOCDETACH ioctl [ 36.463712][ T593] FAULT_INJECTION: forcing a failure. [ 36.463712][ T593] name failslab, interval 1, probability 0, space 0, times 1 [ 36.550559][ T593] CPU: 0 PID: 593 Comm: syz.4.77 Not tainted syzkaller #0 [ 36.557734][ T593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 36.567830][ T593] Call Trace: [ 36.571136][ T593] [ 36.574098][ T593] __dump_stack+0x21/0x30 [ 36.578480][ T593] dump_stack_lvl+0x110/0x170 [ 36.583196][ T593] ? show_regs_print_info+0x20/0x20 [ 36.588435][ T593] ? kasan_set_track+0x5b/0x70 [ 36.593229][ T593] ? kasan_set_free_info+0x23/0x40 [ 36.598359][ T593] ? ____kasan_slab_free+0x125/0x160 [ 36.603662][ T593] ? __kasan_slab_free+0x11/0x20 [ 36.608621][ T593] ? kmem_cache_free+0x100/0x320 [ 36.613583][ T593] ? putname+0x111/0x160 [ 36.617842][ T593] ? do_sys_openat2+0x6df/0x7f0 [ 36.622723][ T593] ? __x64_sys_openat+0x136/0x160 [ 36.627867][ T593] dump_stack+0x15/0x20 [ 36.632049][ T593] should_fail+0x3c1/0x510 [ 36.636490][ T593] __should_failslab+0xa4/0xe0 [ 36.641442][ T593] should_failslab+0x9/0x20 [ 36.645973][ T593] slab_pre_alloc_hook+0x3b/0xe0 [ 36.650934][ T593] __kmalloc+0x6d/0x2c0 [ 36.655112][ T593] ? bpf_test_init+0x100/0x1c0 [ 36.659903][ T593] bpf_test_init+0x100/0x1c0 [ 36.664514][ T593] bpf_prog_test_run_skb+0x193/0x1150 [ 36.669917][ T593] ? __kasan_check_write+0x14/0x20 [ 36.675049][ T593] ? fput_many+0x15a/0x1a0 [ 36.679505][ T593] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 36.685430][ T593] bpf_prog_test_run+0x3d5/0x630 [ 36.690386][ T593] ? bpf_prog_query+0x230/0x230 [ 36.695263][ T593] ? selinux_bpf+0xce/0xf0 [ 36.699718][ T593] ? security_bpf+0x82/0xa0 [ 36.704247][ T593] __sys_bpf+0x590/0x7d0 [ 36.708523][ T593] ? bpf_link_show_fdinfo+0x330/0x330 [ 36.714072][ T593] ? debug_smp_processor_id+0x17/0x20 [ 36.719480][ T593] __x64_sys_bpf+0x7c/0x90 [ 36.723952][ T593] x64_sys_call+0x4b9/0x9a0 [ 36.728476][ T593] do_syscall_64+0x4c/0xa0 [ 36.732919][ T593] ? clear_bhb_loop+0x50/0xa0 [ 36.737614][ T593] ? clear_bhb_loop+0x50/0xa0 [ 36.742309][ T593] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 36.748229][ T593] RIP: 0033:0x7fa1a9270cb9 [ 36.752665][ T593] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 36.772303][ T593] RSP: 002b:00007fa1a7ccd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 36.780770][ T593] RAX: ffffffffffffffda RBX: 00007fa1a94ebfa0 RCX: 00007fa1a9270cb9 [ 36.788770][ T593] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 36.796765][ T593] RBP: 00007fa1a7ccd090 R08: 0000000000000000 R09: 0000000000000000 [ 36.804759][ T593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 36.812758][ T593] R13: 00007fa1a94ec038 R14: 00007fa1a94ebfa0 R15: 00007fffd49dd348 [ 36.820764][ T593] [ 37.114785][ T613] GPL: mtu less than device minimum [ 37.437855][ T615] device wg2 entered promiscuous mode [ 37.604447][ T628] FAULT_INJECTION: forcing a failure. [ 37.604447][ T628] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 37.710835][ T628] CPU: 0 PID: 628 Comm: syz.4.90 Not tainted syzkaller #0 [ 37.718023][ T628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 37.728214][ T628] Call Trace: [ 37.731524][ T628] [ 37.734531][ T628] __dump_stack+0x21/0x30 [ 37.738898][ T628] dump_stack_lvl+0x110/0x170 [ 37.743603][ T628] ? show_regs_print_info+0x20/0x20 [ 37.748921][ T628] dump_stack+0x15/0x20 [ 37.753109][ T628] should_fail+0x3c1/0x510 [ 37.757555][ T628] should_fail_usercopy+0x1a/0x20 [ 37.762641][ T628] _copy_from_user+0x20/0xd0 [ 37.767270][ T628] bpf_test_init+0x13d/0x1c0 [ 37.771882][ T628] bpf_prog_test_run_skb+0x193/0x1150 [ 37.777292][ T628] ? __kasan_check_write+0x14/0x20 [ 37.782435][ T628] ? fput_many+0x15a/0x1a0 [ 37.786888][ T628] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 37.792810][ T628] bpf_prog_test_run+0x3d5/0x630 [ 37.797780][ T628] ? bpf_prog_query+0x230/0x230 [ 37.802657][ T628] ? selinux_bpf+0xce/0xf0 [ 37.807102][ T628] ? security_bpf+0x82/0xa0 [ 37.811633][ T628] __sys_bpf+0x590/0x7d0 [ 37.815901][ T628] ? bpf_link_show_fdinfo+0x330/0x330 [ 37.821296][ T628] ? debug_smp_processor_id+0x17/0x20 [ 37.826698][ T628] __x64_sys_bpf+0x7c/0x90 [ 37.831140][ T628] x64_sys_call+0x4b9/0x9a0 [ 37.835668][ T628] do_syscall_64+0x4c/0xa0 [ 37.840123][ T628] ? clear_bhb_loop+0x50/0xa0 [ 37.844822][ T628] ? clear_bhb_loop+0x50/0xa0 [ 37.849535][ T628] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 37.855539][ T628] RIP: 0033:0x7fa1a9270cb9 [ 37.859978][ T628] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 37.879613][ T628] RSP: 002b:00007fa1a7ccd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 37.888065][ T628] RAX: ffffffffffffffda RBX: 00007fa1a94ebfa0 RCX: 00007fa1a9270cb9 [ 37.896059][ T628] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 37.904063][ T628] RBP: 00007fa1a7ccd090 R08: 0000000000000000 R09: 0000000000000000 [ 37.912056][ T628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 37.920177][ T628] R13: 00007fa1a94ec038 R14: 00007fa1a94ebfa0 R15: 00007fffd49dd348 [ 37.928265][ T628] [ 38.276079][ T641] device pim6reg1 entered promiscuous mode [ 38.439512][ T659] GPL: mtu less than device minimum [ 38.515987][ T666] FAULT_INJECTION: forcing a failure. [ 38.515987][ T666] name failslab, interval 1, probability 0, space 0, times 0 [ 38.528813][ T666] CPU: 0 PID: 666 Comm: syz.0.105 Not tainted syzkaller #0 [ 38.536041][ T666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 38.546361][ T666] Call Trace: [ 38.549677][ T666] [ 38.552632][ T666] __dump_stack+0x21/0x30 [ 38.556987][ T666] dump_stack_lvl+0x110/0x170 [ 38.561690][ T666] ? show_regs_print_info+0x20/0x20 [ 38.566993][ T666] dump_stack+0x15/0x20 [ 38.571171][ T666] should_fail+0x3c1/0x510 [ 38.575602][ T666] __should_failslab+0xa4/0xe0 [ 38.580384][ T666] should_failslab+0x9/0x20 [ 38.584906][ T666] slab_pre_alloc_hook+0x3b/0xe0 [ 38.589854][ T666] __kmalloc+0x6d/0x2c0 [ 38.594029][ T666] ? sk_prot_alloc+0xed/0x320 [ 38.598719][ T666] sk_prot_alloc+0xed/0x320 [ 38.603231][ T666] sk_alloc+0x38/0x430 [ 38.607398][ T666] bpf_prog_test_run_skb+0x24b/0x1150 [ 38.612792][ T666] ? __kasan_check_write+0x14/0x20 [ 38.617918][ T666] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 38.623824][ T666] bpf_prog_test_run+0x3d5/0x630 [ 38.628773][ T666] ? bpf_prog_query+0x230/0x230 [ 38.633635][ T666] ? selinux_bpf+0xce/0xf0 [ 38.638069][ T666] ? security_bpf+0x82/0xa0 [ 38.642582][ T666] __sys_bpf+0x590/0x7d0 [ 38.646839][ T666] ? bpf_link_show_fdinfo+0x330/0x330 [ 38.652232][ T666] ? debug_smp_processor_id+0x17/0x20 [ 38.657620][ T666] __x64_sys_bpf+0x7c/0x90 [ 38.662050][ T666] x64_sys_call+0x4b9/0x9a0 [ 38.666568][ T666] do_syscall_64+0x4c/0xa0 [ 38.670998][ T666] ? clear_bhb_loop+0x50/0xa0 [ 38.675697][ T666] ? clear_bhb_loop+0x50/0xa0 [ 38.680405][ T666] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 38.686330][ T666] RIP: 0033:0x7f2dbeffbcb9 [ 38.690823][ T666] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 38.710533][ T666] RSP: 002b:00007f2dbda58028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 38.718963][ T666] RAX: ffffffffffffffda RBX: 00007f2dbf276fa0 RCX: 00007f2dbeffbcb9 [ 38.726950][ T666] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 38.734933][ T666] RBP: 00007f2dbda58090 R08: 0000000000000000 R09: 0000000000000000 [ 38.742916][ T666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 38.750897][ T666] R13: 00007f2dbf277038 R14: 00007f2dbf276fa0 R15: 00007ffe4b3b92e8 [ 38.758887][ T666] [ 38.799083][ T670] device team_slave_1 entered promiscuous mode [ 38.805926][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 38.814522][ T670] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 38.836467][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 38.964075][ T30] audit: type=1400 audit(1768848432.145:119): avc: denied { create } for pid=671 comm="syz.0.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 39.262677][ T678] device pim6reg1 entered promiscuous mode [ 39.797734][ T30] audit: type=1400 audit(1768848432.975:120): avc: denied { create } for pid=688 comm="syz.4.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 40.023929][ T30] audit: type=1400 audit(1768848433.205:121): avc: denied { create } for pid=693 comm="syz.4.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 40.280350][ T30] audit: type=1400 audit(1768848433.455:122): avc: denied { create } for pid=719 comm="syz.1.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 40.390171][ T30] audit: type=1400 audit(1768848433.565:123): avc: denied { ioctl } for pid=728 comm="syz.1.126" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 41.701773][ T747] syz.0.132 (747) used greatest stack depth: 22128 bytes left [ 41.972328][ T775] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.979617][ T775] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.167181][ T775] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 42.194670][ T775] device syzkaller0 entered promiscuous mode [ 43.914375][ T823] FAULT_INJECTION: forcing a failure. [ 43.914375][ T823] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 43.941530][ T823] CPU: 1 PID: 823 Comm: syz.2.161 Not tainted syzkaller #0 [ 43.948790][ T823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 43.958888][ T823] Call Trace: [ 43.962188][ T823] [ 43.965138][ T823] __dump_stack+0x21/0x30 [ 43.969508][ T823] dump_stack_lvl+0x110/0x170 [ 43.974212][ T823] ? show_regs_print_info+0x20/0x20 [ 43.979444][ T823] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 43.984973][ T823] dump_stack+0x15/0x20 [ 43.989191][ T823] should_fail+0x3c1/0x510 [ 43.993647][ T823] should_fail_usercopy+0x1a/0x20 [ 43.998707][ T823] _copy_to_user+0x20/0x90 [ 44.003158][ T823] bpf_test_finish+0x1e8/0x3c0 [ 44.007964][ T823] ? convert_skb_to___skb+0x360/0x360 [ 44.013454][ T823] ? convert_skb_to___skb+0x203/0x360 [ 44.018908][ T823] bpf_prog_test_run_skb+0xbba/0x1150 [ 44.024314][ T823] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 44.030233][ T823] bpf_prog_test_run+0x3d5/0x630 [ 44.035199][ T823] ? bpf_prog_query+0x230/0x230 [ 44.040083][ T823] ? selinux_bpf+0xce/0xf0 [ 44.044524][ T823] ? security_bpf+0x82/0xa0 [ 44.049090][ T823] __sys_bpf+0x590/0x7d0 [ 44.053363][ T823] ? bpf_link_show_fdinfo+0x330/0x330 [ 44.058781][ T823] ? debug_smp_processor_id+0x17/0x20 [ 44.064285][ T823] __x64_sys_bpf+0x7c/0x90 [ 44.068723][ T823] x64_sys_call+0x4b9/0x9a0 [ 44.073395][ T823] do_syscall_64+0x4c/0xa0 [ 44.077847][ T823] ? clear_bhb_loop+0x50/0xa0 [ 44.082567][ T823] ? clear_bhb_loop+0x50/0xa0 [ 44.087274][ T823] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 44.093199][ T823] RIP: 0033:0x7f6e1e29dcb9 [ 44.097652][ T823] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 44.117296][ T823] RSP: 002b:00007f6e1ccfa028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 44.125733][ T823] RAX: ffffffffffffffda RBX: 00007f6e1e518fa0 RCX: 00007f6e1e29dcb9 [ 44.133722][ T823] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 44.141705][ T823] RBP: 00007f6e1ccfa090 R08: 0000000000000000 R09: 0000000000000000 [ 44.149691][ T823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 44.157669][ T823] R13: 00007f6e1e519038 R14: 00007f6e1e518fa0 R15: 00007ffdf99d2d98 [ 44.165664][ T823] [ 44.249867][ T833] GPL: port 1(erspan0) entered blocking state [ 44.265713][ T833] GPL: port 1(erspan0) entered disabled state [ 44.276538][ T833] device erspan0 entered promiscuous mode [ 44.285403][ T803] syz.4.152 (803) used greatest stack depth: 21808 bytes left [ 44.300034][ T837] device pim6reg1 entered promiscuous mode [ 44.472646][ T30] audit: type=1400 audit(1768848437.655:124): avc: denied { read } for pid=857 comm="syz.0.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 44.512963][ T860] device wg2 entered promiscuous mode [ 44.673419][ T871] device sit0 entered promiscuous mode [ 44.987430][ T874] FAULT_INJECTION: forcing a failure. [ 44.987430][ T874] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 45.010525][ T874] CPU: 0 PID: 874 Comm: syz.3.180 Not tainted syzkaller #0 [ 45.017789][ T874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 45.027866][ T874] Call Trace: [ 45.031179][ T874] [ 45.034195][ T874] __dump_stack+0x21/0x30 [ 45.038541][ T874] dump_stack_lvl+0x110/0x170 [ 45.043251][ T874] ? show_regs_print_info+0x20/0x20 [ 45.048472][ T874] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 45.053947][ T874] dump_stack+0x15/0x20 [ 45.058117][ T874] should_fail+0x3c1/0x510 [ 45.062547][ T874] should_fail_usercopy+0x1a/0x20 [ 45.067594][ T874] _copy_to_user+0x20/0x90 [ 45.072029][ T874] bpf_test_finish+0x217/0x3c0 [ 45.076817][ T874] ? convert_skb_to___skb+0x360/0x360 [ 45.082202][ T874] ? convert_skb_to___skb+0x203/0x360 [ 45.087592][ T874] bpf_prog_test_run_skb+0xbba/0x1150 [ 45.092982][ T874] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 45.098898][ T874] bpf_prog_test_run+0x3d5/0x630 [ 45.103864][ T874] ? bpf_prog_query+0x230/0x230 [ 45.108742][ T874] ? selinux_bpf+0xce/0xf0 [ 45.113463][ T874] ? security_bpf+0x82/0xa0 [ 45.117985][ T874] __sys_bpf+0x590/0x7d0 [ 45.122239][ T874] ? bpf_link_show_fdinfo+0x330/0x330 [ 45.127669][ T874] ? debug_smp_processor_id+0x17/0x20 [ 45.133057][ T874] __x64_sys_bpf+0x7c/0x90 [ 45.137484][ T874] x64_sys_call+0x4b9/0x9a0 [ 45.142005][ T874] do_syscall_64+0x4c/0xa0 [ 45.146434][ T874] ? clear_bhb_loop+0x50/0xa0 [ 45.151121][ T874] ? clear_bhb_loop+0x50/0xa0 [ 45.155828][ T874] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 45.161742][ T874] RIP: 0033:0x7f8ec1d0dcb9 [ 45.166182][ T874] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 45.185937][ T874] RSP: 002b:00007f8ec076a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 45.194367][ T874] RAX: ffffffffffffffda RBX: 00007f8ec1f88fa0 RCX: 00007f8ec1d0dcb9 [ 45.202354][ T874] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 45.210454][ T874] RBP: 00007f8ec076a090 R08: 0000000000000000 R09: 0000000000000000 [ 45.218452][ T874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 45.226444][ T874] R13: 00007f8ec1f89038 R14: 00007f8ec1f88fa0 R15: 00007fffa3eaab88 [ 45.234438][ T874] [ 46.034729][ T913] FAULT_INJECTION: forcing a failure. [ 46.034729][ T913] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 46.070518][ T913] CPU: 1 PID: 913 Comm: syz.4.193 Not tainted syzkaller #0 [ 46.077860][ T913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 46.087950][ T913] Call Trace: [ 46.091252][ T913] [ 46.094211][ T913] __dump_stack+0x21/0x30 [ 46.098570][ T913] dump_stack_lvl+0x110/0x170 [ 46.103278][ T913] ? show_regs_print_info+0x20/0x20 [ 46.108519][ T913] dump_stack+0x15/0x20 [ 46.112698][ T913] should_fail+0x3c1/0x510 [ 46.117139][ T913] should_fail_usercopy+0x1a/0x20 [ 46.122212][ T913] _copy_to_user+0x20/0x90 [ 46.126659][ T913] simple_read_from_buffer+0xe9/0x160 [ 46.132056][ T913] proc_fail_nth_read+0x1a6/0x220 [ 46.137109][ T913] ? proc_fault_inject_write+0x310/0x310 [ 46.142775][ T913] ? security_file_permission+0x83/0xa0 [ 46.148356][ T913] ? proc_fault_inject_write+0x310/0x310 [ 46.154018][ T913] vfs_read+0x28d/0xc40 [ 46.158207][ T913] ? kernel_read+0x1f0/0x1f0 [ 46.162829][ T913] ? __kasan_check_write+0x14/0x20 [ 46.167983][ T913] ? mutex_lock+0x9b/0x1c0 [ 46.172434][ T913] ? wait_for_completion_killable_timeout+0x10/0x10 [ 46.179054][ T913] ? __fget_files+0x2c4/0x320 [ 46.183766][ T913] ? __fdget_pos+0x2d2/0x380 [ 46.188388][ T913] ? ksys_read+0x71/0x250 [ 46.192743][ T913] ksys_read+0x149/0x250 [ 46.197018][ T913] ? vfs_write+0xfd0/0xfd0 [ 46.201460][ T913] ? __kasan_check_write+0x14/0x20 [ 46.206606][ T913] ? switch_fpu_return+0x15d/0x2c0 [ 46.211741][ T913] __x64_sys_read+0x7b/0x90 [ 46.216268][ T913] x64_sys_call+0x96d/0x9a0 [ 46.220802][ T913] do_syscall_64+0x4c/0xa0 [ 46.225247][ T913] ? clear_bhb_loop+0x50/0xa0 [ 46.229962][ T913] ? clear_bhb_loop+0x50/0xa0 [ 46.234670][ T913] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 46.240601][ T913] RIP: 0033:0x7fa1a923158e [ 46.245039][ T913] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 46.264675][ T913] RSP: 002b:00007fa1a7cccfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 46.273121][ T913] RAX: ffffffffffffffda RBX: 00007fa1a7ccd6c0 RCX: 00007fa1a923158e [ 46.281229][ T913] RDX: 000000000000000f RSI: 00007fa1a7ccd0a0 RDI: 0000000000000007 [ 46.289228][ T913] RBP: 00007fa1a7ccd090 R08: 0000000000000000 R09: 0000000000000000 [ 46.297236][ T913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 46.305341][ T913] R13: 00007fa1a94ec038 R14: 00007fa1a94ebfa0 R15: 00007fffd49dd348 [ 46.313349][ T913] [ 46.573891][ T928] device syzkaller0 entered promiscuous mode [ 46.711712][ T938] device veth1_macvtap left promiscuous mode [ 46.759719][ T30] audit: type=1400 audit(1768848439.935:125): avc: denied { create } for pid=935 comm="syz.1.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 47.386744][ T948] syz.1.203[948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.386820][ T948] syz.1.203[948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.447665][ T948] device pim6reg1 entered promiscuous mode [ 47.568352][ T951] device veth0_vlan left promiscuous mode [ 47.758566][ T951] device veth0_vlan entered promiscuous mode [ 47.864595][ T958] FAULT_INJECTION: forcing a failure. [ 47.864595][ T958] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 47.981330][ T958] CPU: 1 PID: 958 Comm: syz.2.205 Not tainted syzkaller #0 [ 47.988595][ T958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 47.998673][ T958] Call Trace: [ 48.001970][ T958] [ 48.004923][ T958] __dump_stack+0x21/0x30 [ 48.009299][ T958] dump_stack_lvl+0x110/0x170 [ 48.014013][ T958] ? show_regs_print_info+0x20/0x20 [ 48.019253][ T958] dump_stack+0x15/0x20 [ 48.023444][ T958] should_fail+0x3c1/0x510 [ 48.027904][ T958] should_fail_usercopy+0x1a/0x20 [ 48.032960][ T958] _copy_to_user+0x20/0x90 [ 48.037413][ T958] simple_read_from_buffer+0xe9/0x160 [ 48.042812][ T958] proc_fail_nth_read+0x1a6/0x220 [ 48.047867][ T958] ? proc_fault_inject_write+0x310/0x310 [ 48.053531][ T958] ? security_file_permission+0x83/0xa0 [ 48.059104][ T958] ? proc_fault_inject_write+0x310/0x310 [ 48.064765][ T958] vfs_read+0x28d/0xc40 [ 48.068956][ T958] ? kernel_read+0x1f0/0x1f0 [ 48.073575][ T958] ? __kasan_check_write+0x14/0x20 [ 48.078803][ T958] ? mutex_lock+0x9b/0x1c0 [ 48.083242][ T958] ? wait_for_completion_killable_timeout+0x10/0x10 [ 48.089851][ T958] ? __fget_files+0x2c4/0x320 [ 48.094559][ T958] ? __fdget_pos+0x2d2/0x380 [ 48.099176][ T958] ? ksys_read+0x71/0x250 [ 48.103573][ T958] ksys_read+0x149/0x250 [ 48.107863][ T958] ? vfs_write+0xfd0/0xfd0 [ 48.112299][ T958] ? debug_smp_processor_id+0x17/0x20 [ 48.117692][ T958] __x64_sys_read+0x7b/0x90 [ 48.122227][ T958] x64_sys_call+0x96d/0x9a0 [ 48.126754][ T958] do_syscall_64+0x4c/0xa0 [ 48.131192][ T958] ? clear_bhb_loop+0x50/0xa0 [ 48.135879][ T958] ? clear_bhb_loop+0x50/0xa0 [ 48.140591][ T958] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 48.146500][ T958] RIP: 0033:0x7f6e1e25e58e [ 48.150929][ T958] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 48.170988][ T958] RSP: 002b:00007f6e1ccb7fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 48.179415][ T958] RAX: ffffffffffffffda RBX: 00007f6e1ccb86c0 RCX: 00007f6e1e25e58e [ 48.187397][ T958] RDX: 000000000000000f RSI: 00007f6e1ccb80a0 RDI: 0000000000000007 [ 48.195377][ T958] RBP: 00007f6e1ccb8090 R08: 0000000000000000 R09: 0000000000000000 [ 48.203357][ T958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 48.211347][ T958] R13: 00007f6e1e519218 R14: 00007f6e1e519180 R15: 00007ffdf99d2d98 [ 48.219452][ T958] [ 49.337345][ T979] device syzkaller0 entered promiscuous mode [ 49.448613][ T990] device syzkaller0 entered promiscuous mode [ 49.556786][ T996] device syzkaller0 entered promiscuous mode [ 49.797730][ T1004] FAULT_INJECTION: forcing a failure. [ 49.797730][ T1004] name failslab, interval 1, probability 0, space 0, times 0 [ 49.825785][ T1004] CPU: 0 PID: 1004 Comm: syz.1.219 Not tainted syzkaller #0 [ 49.833126][ T1004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 49.843212][ T1004] Call Trace: [ 49.846525][ T1004] [ 49.849479][ T1004] __dump_stack+0x21/0x30 [ 49.853841][ T1004] dump_stack_lvl+0x110/0x170 [ 49.858547][ T1004] ? show_regs_print_info+0x20/0x20 [ 49.863797][ T1004] ? __kmalloc+0x13d/0x2c0 [ 49.868217][ T1004] ? qdisc_create_dflt+0x6b/0x3a0 [ 49.873246][ T1004] ? dev_activate+0x124/0x1060 [ 49.878013][ T1004] ? __dev_open+0x3ea/0x500 [ 49.882526][ T1004] ? dev_change_flags+0x88/0x1a0 [ 49.887488][ T1004] ? dev_ifsioc+0x14b/0xf90 [ 49.892198][ T1004] ? dev_ioctl+0x560/0xd10 [ 49.896641][ T1004] ? sock_do_ioctl+0x241/0x310 [ 49.901428][ T1004] dump_stack+0x15/0x20 [ 49.905626][ T1004] should_fail+0x3c1/0x510 [ 49.910076][ T1004] __should_failslab+0xa4/0xe0 [ 49.914871][ T1004] should_failslab+0x9/0x20 [ 49.919406][ T1004] slab_pre_alloc_hook+0x3b/0xe0 [ 49.924381][ T1004] __kmalloc+0x6d/0x2c0 [ 49.928997][ T1004] ? mq_init+0x159/0x680 [ 49.933278][ T1004] mq_init+0x159/0x680 [ 49.937382][ T1004] ? __kmalloc+0x13d/0x2c0 [ 49.941827][ T1004] ? local_bh_enable+0x30/0x30 [ 49.946889][ T1004] ? __kasan_check_write+0x14/0x20 [ 49.952027][ T1004] ? qdisc_alloc+0x59d/0x770 [ 49.956652][ T1004] qdisc_create_dflt+0x142/0x3a0 [ 49.961636][ T1004] dev_activate+0x124/0x1060 [ 49.966259][ T1004] ? _raw_spin_unlock_bh+0x51/0x60 [ 49.971406][ T1004] ? dev_set_rx_mode+0x212/0x2c0 [ 49.976376][ T1004] __dev_open+0x3ea/0x500 [ 49.980741][ T1004] ? dev_open+0x240/0x240 [ 49.985093][ T1004] ? _raw_spin_unlock_bh+0x51/0x60 [ 49.990230][ T1004] ? dev_set_rx_mode+0x212/0x2c0 [ 49.995418][ T1004] ? __kasan_check_read+0x11/0x20 [ 50.000477][ T1004] __dev_change_flags+0x20d/0x6a0 [ 50.005794][ T1004] ? dev_get_flags+0x1e0/0x1e0 [ 50.010598][ T1004] ? __asan_set_shadow_00+0xe/0x10 [ 50.016131][ T1004] ? do_vfs_ioctl+0x1c19/0x1d80 [ 50.021024][ T1004] dev_change_flags+0x88/0x1a0 [ 50.025828][ T1004] dev_ifsioc+0x14b/0xf90 [ 50.030281][ T1004] ? dev_ioctl+0xd10/0xd10 [ 50.034743][ T1004] ? __mutex_lock_slowpath+0xe/0x10 [ 50.039973][ T1004] ? mutex_lock+0x112/0x1c0 [ 50.044510][ T1004] ? wait_for_completion_killable_timeout+0x10/0x10 [ 50.051146][ T1004] ? dev_get_by_name_rcu+0xc8/0xf0 [ 50.056292][ T1004] dev_ioctl+0x560/0xd10 [ 50.060579][ T1004] sock_do_ioctl+0x241/0x310 [ 50.065203][ T1004] ? sock_show_fdinfo+0xa0/0xa0 [ 50.070090][ T1004] ? selinux_file_ioctl+0x3a0/0x4d0 [ 50.075372][ T1004] sock_ioctl+0x4ae/0x6f0 [ 50.080304][ T1004] ? sock_poll+0x3f0/0x3f0 [ 50.084762][ T1004] ? __fget_files+0x2c4/0x320 [ 50.089485][ T1004] ? security_file_ioctl+0x84/0xa0 [ 50.094639][ T1004] ? sock_poll+0x3f0/0x3f0 [ 50.099095][ T1004] __se_sys_ioctl+0x121/0x1a0 [ 50.103847][ T1004] __x64_sys_ioctl+0x7b/0x90 [ 50.108482][ T1004] x64_sys_call+0x2f/0x9a0 [ 50.112939][ T1004] do_syscall_64+0x4c/0xa0 [ 50.117387][ T1004] ? clear_bhb_loop+0x50/0xa0 [ 50.122093][ T1004] ? clear_bhb_loop+0x50/0xa0 [ 50.126812][ T1004] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 50.132750][ T1004] RIP: 0033:0x7f8d40838cb9 [ 50.137572][ T1004] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 50.157295][ T1004] RSP: 002b:00007f8d3f295028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 50.165755][ T1004] RAX: ffffffffffffffda RBX: 00007f8d40ab3fa0 RCX: 00007f8d40838cb9 [ 50.173780][ T1004] RDX: 0000200000000080 RSI: 0000000000008914 RDI: 0000000000000008 [ 50.181810][ T1004] RBP: 00007f8d3f295090 R08: 0000000000000000 R09: 0000000000000000 [ 50.189850][ T1004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 50.198255][ T1004] R13: 00007f8d40ab4038 R14: 00007f8d40ab3fa0 R15: 00007ffc59c26c88 [ 50.206291][ T1004] [ 50.218471][ T1004] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 50.227731][ T1004] device syzkaller0 entered promiscuous mode [ 50.268481][ T1005] device pim6reg1 entered promiscuous mode [ 50.734824][ T1021] device pim6reg1 entered promiscuous mode [ 51.532497][ T1048] device syzkaller0 entered promiscuous mode [ 51.855523][ T1058] device pim6reg1 entered promiscuous mode [ 53.491849][ T1097] device syzkaller0 entered promiscuous mode [ 53.527378][ T578] syzkaller0: tun_net_xmit 48 [ 54.308123][ T1119] device pim6reg1 entered promiscuous mode [ 54.644353][ T1128] GPL: port 1(erspan0) entered blocking state [ 54.650532][ T1128] GPL: port 1(erspan0) entered forwarding state [ 54.997121][ T1136] device syzkaller0 entered promiscuous mode [ 55.295839][ T1141] device pim6reg1 entered promiscuous mode [ 55.630515][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 55.820953][ T1138] syz.4.261 (1138) used greatest stack depth: 21680 bytes left [ 56.051673][ T1155] device syzkaller0 entered promiscuous mode [ 56.961423][ T30] audit: type=1400 audit(1768848450.135:126): avc: denied { create } for pid=1179 comm="syz.0.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 58.304278][ T1235] device pim6reg1 entered promiscuous mode [ 58.982201][ T1251] device pim6reg1 entered promiscuous mode [ 59.726647][ T1271] device pim6reg1 entered promiscuous mode [ 60.888448][ T1313] device pim6reg1 entered promiscuous mode [ 60.989243][ T1305] device wg2 entered promiscuous mode [ 61.040694][ T1307] device veth0_vlan left promiscuous mode [ 61.046735][ T1307] device veth0_vlan entered promiscuous mode [ 61.113304][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 61.124422][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 61.145493][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 61.764023][ T1353] device pim6reg1 entered promiscuous mode [ 62.023732][ T30] audit: type=1400 audit(1768848455.205:127): avc: denied { create } for pid=1355 comm="syz.1.326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 62.340215][ T1381] device syzkaller0 entered promiscuous mode [ 62.819836][ T30] audit: type=1400 audit(1768848455.995:128): avc: denied { create } for pid=1394 comm="syz.1.338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 63.007403][ T1399] device pim6reg1 entered promiscuous mode [ 63.146135][ T1408] device syzkaller0 entered promiscuous mode [ 63.589780][ T1415] device pim6reg1 entered promiscuous mode [ 63.873422][ T30] audit: type=1400 audit(1768848457.055:129): avc: denied { create } for pid=1427 comm="syz.4.348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 63.939701][ T1428] device veth1_macvtap left promiscuous mode [ 64.420558][ T1440] device bridge_slave_1 left promiscuous mode [ 64.427343][ T1440] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.435337][ T1440] device bridge_slave_0 left promiscuous mode [ 64.442792][ T1440] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.891438][ T1448] device syzkaller0 entered promiscuous mode [ 65.701673][ T1471] device pim6reg1 entered promiscuous mode [ 65.760755][ T1473] GPL: port 1(erspan0) entered blocking state [ 65.771706][ T1473] GPL: port 1(erspan0) entered disabled state [ 65.785920][ T1473] device erspan0 entered promiscuous mode [ 65.813499][ T1473] GPL: port 1(erspan0) entered blocking state [ 65.819654][ T1473] GPL: port 1(erspan0) entered forwarding state [ 66.259941][ T1491] FAULT_INJECTION: forcing a failure. [ 66.259941][ T1491] name failslab, interval 1, probability 0, space 0, times 0 [ 66.290445][ T1491] CPU: 0 PID: 1491 Comm: syz.4.368 Not tainted syzkaller #0 [ 66.297790][ T1491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 66.307877][ T1491] Call Trace: [ 66.311178][ T1491] [ 66.314133][ T1491] __dump_stack+0x21/0x30 [ 66.318492][ T1491] dump_stack_lvl+0x110/0x170 [ 66.323196][ T1491] ? show_regs_print_info+0x20/0x20 [ 66.328428][ T1491] dump_stack+0x15/0x20 [ 66.332607][ T1491] should_fail+0x3c1/0x510 [ 66.337050][ T1491] __should_failslab+0xa4/0xe0 [ 66.341841][ T1491] should_failslab+0x9/0x20 [ 66.346365][ T1491] slab_pre_alloc_hook+0x3b/0xe0 [ 66.351333][ T1491] __kmalloc+0x6d/0x2c0 [ 66.355511][ T1491] ? kvmalloc_node+0x211/0x320 [ 66.360296][ T1491] kvmalloc_node+0x211/0x320 [ 66.364925][ T1491] ? vm_mmap+0xb0/0xb0 [ 66.369017][ T1491] ? __kasan_check_write+0x14/0x20 [ 66.374149][ T1491] pfifo_fast_init+0x112/0x7a0 [ 66.378940][ T1491] qdisc_create_dflt+0x142/0x3a0 [ 66.383928][ T1491] mq_init+0x2de/0x680 [ 66.388027][ T1491] ? local_bh_enable+0x30/0x30 [ 66.392921][ T1491] ? __kasan_check_write+0x14/0x20 [ 66.398074][ T1491] ? qdisc_alloc+0x59d/0x770 [ 66.402695][ T1491] qdisc_create_dflt+0x142/0x3a0 [ 66.407658][ T1491] dev_activate+0x124/0x1060 [ 66.412288][ T1491] ? _raw_spin_unlock_bh+0x51/0x60 [ 66.417448][ T1491] ? dev_set_rx_mode+0x212/0x2c0 [ 66.422414][ T1491] __dev_open+0x3ea/0x500 [ 66.426767][ T1491] ? dev_open+0x240/0x240 [ 66.431123][ T1491] ? _raw_spin_unlock_bh+0x51/0x60 [ 66.436257][ T1491] ? dev_set_rx_mode+0x212/0x2c0 [ 66.441215][ T1491] ? __kasan_check_read+0x11/0x20 [ 66.446266][ T1491] __dev_change_flags+0x20d/0x6a0 [ 66.451316][ T1491] ? dev_get_flags+0x1e0/0x1e0 [ 66.456111][ T1491] ? __asan_set_shadow_00+0xe/0x10 [ 66.461313][ T1491] ? do_vfs_ioctl+0x1c19/0x1d80 [ 66.466198][ T1491] dev_change_flags+0x88/0x1a0 [ 66.470997][ T1491] dev_ifsioc+0x14b/0xf90 [ 66.475358][ T1491] ? dev_ioctl+0xd10/0xd10 [ 66.479808][ T1491] ? __kasan_check_write+0x14/0x20 [ 66.484962][ T1491] ? mutex_lock+0x9b/0x1c0 [ 66.489400][ T1491] ? wait_for_completion_killable_timeout+0x10/0x10 [ 66.496019][ T1491] ? dev_get_by_name_rcu+0xc8/0xf0 [ 66.501167][ T1491] dev_ioctl+0x560/0xd10 [ 66.505448][ T1491] sock_do_ioctl+0x241/0x310 [ 66.510069][ T1491] ? sock_show_fdinfo+0xa0/0xa0 [ 66.514958][ T1491] ? selinux_file_ioctl+0x3a0/0x4d0 [ 66.520195][ T1491] sock_ioctl+0x4ae/0x6f0 [ 66.524553][ T1491] ? sock_poll+0x3f0/0x3f0 [ 66.528993][ T1491] ? __fget_files+0x2c4/0x320 [ 66.533723][ T1491] ? security_file_ioctl+0x84/0xa0 [ 66.538888][ T1491] ? sock_poll+0x3f0/0x3f0 [ 66.543330][ T1491] __se_sys_ioctl+0x121/0x1a0 [ 66.548050][ T1491] __x64_sys_ioctl+0x7b/0x90 [ 66.552670][ T1491] x64_sys_call+0x2f/0x9a0 [ 66.557115][ T1491] do_syscall_64+0x4c/0xa0 [ 66.561563][ T1491] ? clear_bhb_loop+0x50/0xa0 [ 66.566269][ T1491] ? clear_bhb_loop+0x50/0xa0 [ 66.570966][ T1491] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 66.576898][ T1491] RIP: 0033:0x7fa1a9270cb9 [ 66.581366][ T1491] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 66.600994][ T1491] RSP: 002b:00007fa1a7ccd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 66.609453][ T1491] RAX: ffffffffffffffda RBX: 00007fa1a94ebfa0 RCX: 00007fa1a9270cb9 [ 66.617453][ T1491] RDX: 0000200000000080 RSI: 0000000000008914 RDI: 0000000000000008 [ 66.625445][ T1491] RBP: 00007fa1a7ccd090 R08: 0000000000000000 R09: 0000000000000000 [ 66.633440][ T1491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 66.641436][ T1491] R13: 00007fa1a94ec038 R14: 00007fa1a94ebfa0 R15: 00007fffd49dd348 [ 66.649453][ T1491] [ 66.770512][ T1491] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 66.779578][ T1491] device syzkaller0 entered promiscuous mode [ 67.665418][ T1525] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 68.159705][ T1533] device syzkaller0 entered promiscuous mode [ 68.217914][ T1538] device pim6reg1 entered promiscuous mode [ 68.376189][ T1540] FAULT_INJECTION: forcing a failure. [ 68.376189][ T1540] name failslab, interval 1, probability 0, space 0, times 0 [ 68.450498][ T1540] CPU: 0 PID: 1540 Comm: syz.3.384 Not tainted syzkaller #0 [ 68.457842][ T1540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 68.467928][ T1540] Call Trace: [ 68.471231][ T1540] [ 68.474178][ T1540] __dump_stack+0x21/0x30 [ 68.478522][ T1540] dump_stack_lvl+0x110/0x170 [ 68.483217][ T1540] ? show_regs_print_info+0x20/0x20 [ 68.488436][ T1540] dump_stack+0x15/0x20 [ 68.492603][ T1540] should_fail+0x3c1/0x510 [ 68.497139][ T1540] __should_failslab+0xa4/0xe0 [ 68.501948][ T1540] should_failslab+0x9/0x20 [ 68.506475][ T1540] slab_pre_alloc_hook+0x3b/0xe0 [ 68.511428][ T1540] __kmalloc+0x6d/0x2c0 [ 68.515598][ T1540] ? kvmalloc_node+0x211/0x320 [ 68.520408][ T1540] kvmalloc_node+0x211/0x320 [ 68.525017][ T1540] ? vm_mmap+0xb0/0xb0 [ 68.529113][ T1540] ? __kasan_check_write+0x14/0x20 [ 68.534260][ T1540] pfifo_fast_init+0x260/0x7a0 [ 68.539061][ T1540] qdisc_create_dflt+0x142/0x3a0 [ 68.544025][ T1540] mq_init+0x2de/0x680 [ 68.548116][ T1540] ? local_bh_enable+0x30/0x30 [ 68.552897][ T1540] ? __kasan_check_write+0x14/0x20 [ 68.558029][ T1540] ? qdisc_alloc+0x59d/0x770 [ 68.562635][ T1540] qdisc_create_dflt+0x142/0x3a0 [ 68.567625][ T1540] dev_activate+0x124/0x1060 [ 68.572240][ T1540] ? _raw_spin_unlock_bh+0x51/0x60 [ 68.577364][ T1540] ? dev_set_rx_mode+0x212/0x2c0 [ 68.582314][ T1540] __dev_open+0x3ea/0x500 [ 68.586662][ T1540] ? dev_open+0x240/0x240 [ 68.590998][ T1540] ? _raw_spin_unlock_bh+0x51/0x60 [ 68.596123][ T1540] ? dev_set_rx_mode+0x212/0x2c0 [ 68.601095][ T1540] ? __kasan_check_read+0x11/0x20 [ 68.606138][ T1540] __dev_change_flags+0x20d/0x6a0 [ 68.611173][ T1540] ? dev_get_flags+0x1e0/0x1e0 [ 68.615954][ T1540] ? __asan_set_shadow_00+0xe/0x10 [ 68.621093][ T1540] ? do_vfs_ioctl+0x1c19/0x1d80 [ 68.625967][ T1540] dev_change_flags+0x88/0x1a0 [ 68.630756][ T1540] dev_ifsioc+0x14b/0xf90 [ 68.635110][ T1540] ? dev_ioctl+0xd10/0xd10 [ 68.639545][ T1540] ? __kasan_check_write+0x14/0x20 [ 68.644667][ T1540] ? mutex_lock+0x9b/0x1c0 [ 68.649105][ T1540] ? wait_for_completion_killable_timeout+0x10/0x10 [ 68.655699][ T1540] ? dev_get_by_name_rcu+0xc8/0xf0 [ 68.661004][ T1540] dev_ioctl+0x560/0xd10 [ 68.665270][ T1540] sock_do_ioctl+0x241/0x310 [ 68.669895][ T1540] ? sock_show_fdinfo+0xa0/0xa0 [ 68.674759][ T1540] ? selinux_file_ioctl+0x3a0/0x4d0 [ 68.679988][ T1540] sock_ioctl+0x4ae/0x6f0 [ 68.684327][ T1540] ? sock_poll+0x3f0/0x3f0 [ 68.688896][ T1540] ? __fget_files+0x2c4/0x320 [ 68.693717][ T1540] ? security_file_ioctl+0x84/0xa0 [ 68.698872][ T1540] ? sock_poll+0x3f0/0x3f0 [ 68.703306][ T1540] __se_sys_ioctl+0x121/0x1a0 [ 68.708002][ T1540] __x64_sys_ioctl+0x7b/0x90 [ 68.712607][ T1540] x64_sys_call+0x2f/0x9a0 [ 68.717037][ T1540] do_syscall_64+0x4c/0xa0 [ 68.721465][ T1540] ? clear_bhb_loop+0x50/0xa0 [ 68.726171][ T1540] ? clear_bhb_loop+0x50/0xa0 [ 68.730863][ T1540] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 68.736771][ T1540] RIP: 0033:0x7f8ec1d0dcb9 [ 68.741195][ T1540] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 68.760808][ T1540] RSP: 002b:00007f8ec076a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 68.769237][ T1540] RAX: ffffffffffffffda RBX: 00007f8ec1f88fa0 RCX: 00007f8ec1d0dcb9 [ 68.777221][ T1540] RDX: 0000200000000080 RSI: 0000000000008914 RDI: 0000000000000008 [ 68.785209][ T1540] RBP: 00007f8ec076a090 R08: 0000000000000000 R09: 0000000000000000 [ 68.793220][ T1540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 68.801469][ T1540] R13: 00007f8ec1f89038 R14: 00007f8ec1f88fa0 R15: 00007fffa3eaab88 [ 68.809459][ T1540] [ 69.146335][ T1540] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 69.164258][ T1540] device syzkaller0 entered promiscuous mode [ 69.471795][ T30] audit: type=1400 audit(1768848462.655:130): avc: denied { create } for pid=1554 comm="syz.4.390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 69.614592][ T30] audit: type=1400 audit(1768848462.665:131): avc: denied { tracepoint } for pid=1551 comm="syz.3.389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 70.291360][ T1579] device pim6reg1 entered promiscuous mode [ 70.451927][ T1593] device pim6reg1 entered promiscuous mode [ 70.527663][ T1595] device pim6reg1 entered promiscuous mode [ 71.166346][ T1607] device syzkaller0 entered promiscuous mode [ 71.766846][ T1635] device syzkaller0 entered promiscuous mode [ 76.931318][ T1672] device pim6reg1 entered promiscuous mode [ 78.432914][ T30] audit: type=1400 audit(1768848471.615:132): avc: denied { create } for pid=1683 comm="syz.4.431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 78.534169][ T1682] device veth0_vlan left promiscuous mode [ 78.558064][ T1682] device veth0_vlan entered promiscuous mode [ 78.668075][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 78.693103][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 78.729241][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 78.795955][ T1686] device veth0_vlan left promiscuous mode [ 78.802390][ T1686] device veth0_vlan entered promiscuous mode [ 80.365802][ T1728] device veth0_vlan left promiscuous mode [ 80.410385][ T1728] device veth0_vlan entered promiscuous mode [ 80.802588][ T1723] general protection fault, probably for non-canonical address 0xdffffc0000000018: 0000 [#1] PREEMPT SMP KASAN [ 80.814481][ T1723] KASAN: null-ptr-deref in range [0x00000000000000c0-0x00000000000000c7] [ 80.822922][ T1723] CPU: 1 PID: 1723 Comm: syz.3.445 Not tainted syzkaller #0 [ 80.830223][ T1723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 80.840286][ T1723] RIP: 0010:sk_psock_verdict_data_ready+0x143/0x1d0 [ 80.846900][ T1723] Code: 24 50 48 c7 44 24 48 01 00 00 00 43 80 3c 2e 00 74 08 4c 89 ff e8 cd 1b d1 fd 41 bc c0 00 00 00 4d 03 27 4c 89 e0 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 e7 e8 ae 1b d1 fd 48 8b 7c 24 18 48 8d [ 80.866700][ T1723] RSP: 0018:ffffc90000c4f7e0 EFLAGS: 00010206 [ 80.872799][ T1723] RAX: 0000000000000018 RBX: 1ffff92000189f00 RCX: 0000000000080000 [ 80.880788][ T1723] RDX: ffffc90002730000 RSI: 000000000002ac38 RDI: 000000000002ac39 [ 80.888781][ T1723] RBP: ffffc90000c4f8b0 R08: ffffc90000c4f83f R09: ffffc90000c4f820 [ 80.896770][ T1723] R10: dffffc0000000000 R11: fffff52000189f08 R12: 00000000000000c0 [ 80.904772][ T1723] R13: dffffc0000000000 R14: 1ffff110253c7d84 R15: ffff888129e3ec20 [ 80.912759][ T1723] FS: 00007f8ec076a6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 80.921791][ T1723] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 80.928392][ T1723] CR2: 000020000060e000 CR3: 000000012da9c000 CR4: 00000000003506a0 [ 80.936378][ T1723] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 80.944359][ T1723] DR3: 0000000000000000 DR6: 00000000ffff0ff1 DR7: 0000000000000600 [ 80.952340][ T1723] Call Trace: [ 80.955642][ T1723] [ 80.958579][ T1723] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 80.964410][ T1723] ? sk_psock_start_verdict+0xc0/0xc0 [ 80.969839][ T1723] unix_stream_sendmsg+0x7d1/0xc90 [ 80.974972][ T1723] ? unix_stream_sendmsg+0x7d1/0xc90 [ 80.980276][ T1723] ? unix_show_fdinfo+0xa0/0xa0 [ 80.985143][ T1723] ? unix_show_fdinfo+0xa0/0xa0 [ 80.990003][ T1723] ____sys_sendmsg+0x5b7/0x8f0 [ 80.994790][ T1723] ? __sys_sendmsg_sock+0x40/0x40 [ 80.999839][ T1723] ? import_iovec+0x7c/0xb0 [ 81.004356][ T1723] ___sys_sendmsg+0x236/0x2e0 [ 81.009052][ T1723] ? __sys_sendmsg+0x280/0x280 [ 81.013846][ T1723] ? __fdget+0x1a1/0x230 [ 81.018105][ T1723] __x64_sys_sendmsg+0x206/0x2f0 [ 81.023054][ T1723] ? ___sys_sendmsg+0x2e0/0x2e0 [ 81.027928][ T1723] x64_sys_call+0x4b/0x9a0 [ 81.032356][ T1723] do_syscall_64+0x4c/0xa0 [ 81.036787][ T1723] ? clear_bhb_loop+0x50/0xa0 [ 81.041481][ T1723] ? clear_bhb_loop+0x50/0xa0 [ 81.046168][ T1723] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 81.052083][ T1723] RIP: 0033:0x7f8ec1d0dcb9 [ 81.056516][ T1723] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 81.076134][ T1723] RSP: 002b:00007f8ec076a028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 81.084566][ T1723] RAX: ffffffffffffffda RBX: 00007f8ec1f88fa0 RCX: 00007f8ec1d0dcb9 [ 81.092550][ T1723] RDX: 0000000000000003 RSI: 0000200000000980 RDI: 0000000000000005 [ 81.100532][ T1723] RBP: 00007f8ec1d7bbf7 R08: 0000000000000000 R09: 0000000000000000 [ 81.108517][ T1723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 81.116502][ T1723] R13: 00007f8ec1f89038 R14: 00007f8ec1f88fa0 R15: 00007fffa3eaab88 [ 81.124623][ T1723] [ 81.127664][ T1723] Modules linked in: [ 81.139439][ T30] audit: type=1400 audit(1768848474.315:133): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 81.162046][ T1723] ---[ end trace b11b8982b35e1beb ]--- [ 81.167560][ T1723] RIP: 0010:sk_psock_verdict_data_ready+0x143/0x1d0 [ 81.253384][ T1723] Code: 24 50 48 c7 44 24 48 01 00 00 00 43 80 3c 2e 00 74 08 4c 89 ff e8 cd 1b d1 fd 41 bc c0 00 00 00 4d 03 27 4c 89 e0 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 e7 e8 ae 1b d1 fd 48 8b 7c 24 18 48 8d [ 81.279372][ T30] audit: type=1400 audit(1768848474.315:134): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 81.350653][ T1723] RSP: 0018:ffffc90000c4f7e0 EFLAGS: 00010206 [ 81.418766][ T1723] RAX: 0000000000000018 RBX: 1ffff92000189f00 RCX: 0000000000080000 [ 81.450560][ T1723] RDX: ffffc90002730000 RSI: 000000000002ac38 RDI: 000000000002ac39 [ 81.451490][ T30] audit: type=1400 audit(1768848474.315:135): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 81.492878][ T1723] RBP: ffffc90000c4f8b0 R08: ffffc90000c4f83f R09: ffffc90000c4f820 [ 81.518499][ T1723] R10: dffffc0000000000 R11: fffff52000189f08 R12: 00000000000000c0 [ 81.527012][ T1723] R13: dffffc0000000000 R14: 1ffff110253c7d84 R15: ffff888129e3ec20 [ 81.537487][ T30] audit: type=1400 audit(1768848474.315:136): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 81.558251][ T1723] FS: 00007f8ec076a6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 81.567307][ T1723] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 81.574153][ T1723] CR2: ffffffffd88f0000 CR3: 000000012da9c000 CR4: 00000000003506b0 [ 81.582310][ T30] audit: type=1400 audit(1768848474.315:137): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 81.617187][ T1723] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 81.625262][ T1723] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 81.633530][ T1723] Kernel panic - not syncing: Fatal exception [ 81.639909][ T1723] Kernel Offset: disabled [ 81.644242][ T1723] Rebooting in 86400 seconds..