last executing test programs: 7.331764952s ago: executing program 4 (id=822): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r0], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x4000) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES32=r1, @ANYBLOB="95a51c7354b792ac38530666c5", @ANYRES32=r7, @ANYRES16=r4, @ANYRES8=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r8}, 0x10) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x210, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8, 0x0, 0x58c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000005"], 0x48) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='fsi_master_gpio_cmd_rel_addr\x00'}, 0x18) (async) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x1000000}, 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) r11 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r11}, 0x10) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 7.282679596s ago: executing program 4 (id=823): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0xf) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) 7.279562206s ago: executing program 4 (id=824): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=@framed={{0x18, 0x2}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000102c0)={r5, 0xe0, &(0x7f00000101c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000010000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000010040)=[0x0, 0x0], &(0x7f0000010080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x72, &(0x7f00000100c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000010100), &(0x7f0000010140), 0x8, 0xc6, 0x8, 0x8, &(0x7f0000010180)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x7}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r2, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f0000000580)=r4}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x733f429a}, [@btf_id={0x18, 0x8, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x68, &(0x7f00000001c0)=""/104, 0x13349ff43c25823e, 0x3, '\x00', r6, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0x7, 0x0, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000600)=[r3, r7, r8, r2, r3, r3, r2, r0], 0x0, 0x10, 0x40}, 0x94) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff7) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000700)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r10}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 7.131656958s ago: executing program 4 (id=828): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x64b}, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x4d, 0x1, 0x3, 0x80000000}, {0x60, 0x8}, {}, {0x2}, {0x6, 0x0, 0x0, 0x10000000}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="190000"], 0x48) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 7.060717004s ago: executing program 4 (id=831): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x1, 0x8, 0x9602, 0x85, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f0000000540), &(0x7f0000000240), 0x800, r2}, 0x38) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590800009500000000000000400000000000"], 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r4}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r5}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r9) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r10, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000040000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r11}, 0x18) ioctl$SIOCSIFHWADDR(r9, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x1e, 0x17, &(0x7f00000007c0)=@ringbuf={{0x18, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@printk={@p, {}, {0x5}, {0x7, 0x0, 0xa}, {}, {}, {0x72, 0x9}}], {{}, {0x5}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3b, '\x00', 0x0, @sk_lookup=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) 6.905883366s ago: executing program 4 (id=838): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r3, 0x0, 0x0}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r3, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x4a, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f00000002c0)={&(0x7f0000000040)=@hci, 0x80, &(0x7f00000003c0)=[{&(0x7f0000002480)=""/4111, 0x100f}, {&(0x7f0000000300)=""/149, 0x95}, {&(0x7f0000000640)=""/137, 0x89}, {&(0x7f0000000740)=""/231, 0xe7}], 0x4}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) openat$cgroup_netprio_ifpriomap(r7, &(0x7f00000004c0), 0x2, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000400)) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r8}, 0x10) 5.717708881s ago: executing program 3 (id=861): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x67}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='qdisc_dequeue\x00', r3}, 0x18) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x4}, 0x8148}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r4 = perf_event_open(0x0, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f00000003c0)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0xb4, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="06000000040000000400000009"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0a00000004000000e47f00000100000042"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000001080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESDEC=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r9}, &(0x7f00000004c0), &(0x7f0000000500)}, 0x20) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r10}, 0x10) 5.717138351s ago: executing program 3 (id=862): perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x864, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa11, 0x10001}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r1, &(0x7f0000000300), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x800, 0xffffffffffffffff, 0x7}, 0x50) openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r2) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/net\x00') r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r3, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r4, 0x11, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={@cgroup=r5, 0x24, 0x0, 0xffff, &(0x7f0000000000)=[0x0], 0x40e8, 0x0, 0x0, 0x0, 0x0}, 0x40) 5.689337653s ago: executing program 3 (id=864): bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000000)="8cecdb43a69d49f24c69317634e908af3f6bd10b0616655bfce45dd10b781a5e625d270683bff140daf54783bb9c", &(0x7f0000000040)=""/118}, 0x20) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r6}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r7, &(0x7f0000000000), 0x2a979d) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002200)={0x7, 0x17, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0xbf}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @printk={@u}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}]}, 0x0, 0x4, 0x61, &(0x7f0000000540)=""/97, 0x41000, 0x40, '\x00', 0x0, @fallback=0x3a, r4, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2, 0x0, &(0x7f0000000980)=[r3, r4, r4, 0xffffffffffffffff, r1, 0x1, 0xffffffffffffffff, r4], 0x0, 0x10, 0x48b}, 0x94) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r9}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB="180000000100000000000000000000009500000000000000461d02562c3163536e83a7f6ac12a8b52f0d70aa97a91fa46cdcefe7534fda04c1ce6524e7e718c0b1da96d9c9fa8e9523840100cbac3c07a0bf00ff9513b150a632c33ca9a009870000000000000000000000000000002cd50db1486b80ee61ff6ddaa43468bf0609a8ef7fd07f4c556489cf61cfad63e826fff67d3299ca9f9b85cdcd75b85bb1775f4ff03b75aa7b6aa1a7e9a2b91d173d541bce370d9e6810dec2fe8300dc5edf3f6aa43810579aed4ee19fbacb5bd5e5337b507559ca6acc6471ecad2746ab01526ace07000000c1ea01c13a2406007dae5bf308287352cc53f035347270d076c93f1b1a810eb2c7d72ee9ce76e6da15600893bc36f6502f75a8acc045e2315b"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) 4.829052902s ago: executing program 3 (id=881): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0e000000040000000400000009b0"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000084ffffffff000000000300000000000000000000000200000000000009000000000000000200000000000000000000000602"], 0x0, 0x56}, 0x28) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={@cgroup, 0x26, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0]}, 0x40) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x9) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) 4.578832113s ago: executing program 3 (id=884): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000"], 0x0, 0x56}, 0x28) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="000000000000f400000000000000000400000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r4}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, 0x0, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYRES32, @ANYRES8, @ANYBLOB="00004d1f1bb7e23127ed821b2d48c93e4700"/38], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x16, 0x8, &(0x7f00000002c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @jmp={0x5, 0x0, 0x2, 0x3, 0x0, 0x6, 0x1}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffff9}], &(0x7f00000003c0)='syzkaller\x00', 0xe, 0x1000, &(0x7f0000000cc0)=""/4096, 0x40f00, 0x24, '\x00', 0x0, @flow_dissector, r1, 0x8, &(0x7f0000000700)={0x7, 0x4000003}, 0x8, 0x10, &(0x7f0000000740)={0x3, 0xb, 0x9, 0x3}, 0x10, 0x0, r3, 0x1, &(0x7f0000000780), &(0x7f00000007c0)=[{0x0, 0x1, 0x10, 0x9}], 0x10, 0x4}, 0x94) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r2, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1c, 0x0, 0x0, &(0x7f0000000300)='GPL\x00', 0x3, 0xf2, &(0x7f0000000580)=""/242, 0x41100, 0x66, '\x00', 0x0, @fallback=0xf, r2, 0x8, &(0x7f0000000340)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x10, 0x1ff, 0x1}, 0x10, 0x0, r8, 0x0, &(0x7f0000000500)=[r1, r1], 0x0, 0x10, 0x6}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000084000001"], 0x48) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r9, 0x0, 0x20000000}, 0x20) 3.779702657s ago: executing program 3 (id=886): bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="5bfd1fdb00d77dc257c6b3df026c9ebc4a087a765e74c56009d0f298627a8f662e0da599c76ec058d0a16a7fec79a83c336a010906e41f793a6a05b45945479356f69479f3784de93196361825e85d3aebe406e4b608baedec25a92acf82e9cdb75237771e71", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000085100000030000001800000000000000000000000000000095000000000000009500000000000000d5b2307878b6a5229917ebb4029a0bea3522c1f874a88524b8256e9616dc84ef9f539900f13815da3cbc479df45e1acd7454a155dd43645345f9a4cddab3d6d9d40e13de56bf656d77b7451f09e02bcb6cf96a4c0fce8ff74fe80460b51e50b4d8105ae605917a45734dbd377e5f99ad246b74853c2ec4862629a63ca0445673c32ad594e33b56f0d0fc6e3a6c84dcd0b6a6746ccfe43cab05ecc5c02583d24d43d968d74062c0f54d148107a22b928921fd"], &(0x7f0000000000)='GPL\x00'}, 0x1a) close(r1) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) socketpair(0x11, 0x3, 0x300, &(0x7f0000000000)) close(r1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x57, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x9, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000008c0)=[{0x38, 0x109, 0x2, "09d264c341196bccd5c094c9efe5a08c5a110e85eb16b39da12d88c48c98ed48b6740c18"}, {0x48, 0x1, 0x73d, "321a72703581975c8cfb11cf7f004d4d8f1c852836cae096f24f9b116ee9c27aaa29587051376765535f26388323c4a281"}, {0x58, 0x84, 0x0, "1e71c37edb00cf08e4e3a8ac4fb6bf9a53f5e2b70bdea52b090286f2f3c6b33db8699efc5c8c65f0a302293ed3b9238d981182fdfeb8812edfd5a15b2b5655825714"}, {0x28, 0x10c, 0x80, "19c358d76492c517548de2e1f87ec67847"}, {0x20, 0x119, 0xd360, "be21595b3d261a61c52a6f5ae9"}], 0x120}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0xb, 0x105, 0x400, 0xd, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.48958728s ago: executing program 2 (id=903): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r2, &(0x7f0000001b80), 0x0}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0x22, 0x0, &(0x7f0000000140)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x1d, 0x7, &(0x7f00000011c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x80000000}, [@call={0x85, 0x0, 0x0, 0xb4}, @call={0x85, 0x0, 0x0, 0x9a}, @call={0x85, 0x0, 0x0, 0x69}, @call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f0000001200)='syzkaller\x00', 0x6, 0xfc, &(0x7f0000001240)=""/252, 0x41100, 0x40, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000001340)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000001380)={0x0, 0x6, 0x100, 0x5d}, 0x10, 0x0, r3, 0x1, &(0x7f0000001580)=[r1, r2, r1, r4, r0], &(0x7f00000015c0)=[{0x5, 0x4, 0x4, 0xc}], 0x10, 0xb}, 0x94) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) r7 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r6}, 0x8) close(r7) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r7, r6, 0x4, r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55, 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) 1.834550013s ago: executing program 1 (id=908): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000900000000000000ff03000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000023b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000000000691142000000000004000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000280)='timer_start\x00', r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x12, 0xffffffffffffffff, 0x260}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001100)={{r2}, &(0x7f0000001080), &(0x7f00000001c0)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 1.751117429s ago: executing program 1 (id=911): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000001c0)="88"}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) r3 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12144, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r6}, 0x10) close(r4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 1.514964189s ago: executing program 2 (id=912): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=@base={0xf, 0x4, 0x8, 0x1}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xe, &(0x7f0000001440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000ff0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018000000000000000000000000000000950000002304f866"], &(0x7f0000000200)='syzkaller\x00', 0x6, 0xe1, &(0x7f0000000240)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe66}, 0x22) 1.458903073s ago: executing program 0 (id=913): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x10000}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) syz_clone(0x40089000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000005509", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000007d000000bf0900000000000066090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000002000000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000180)}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000079122800000000009500000000004000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r6}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40010) openat$cgroup_ro(r5, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x2a020600, &(0x7f0000000440)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f60bdd3c2aa9601456e3bdfd0d883f01ff4b38bc7e0302ffc3a39d616b8f204f4e6067102b48bf64b442ded12f27d5c1fefd49050ae9b46d11c86ae78e3f153dacb1199b2571171df725d2ec1048be9f8fdf137", 0x6c, &(0x7f0000000280), &(0x7f00000003c0), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89a1, 0x0) 1.378085319s ago: executing program 2 (id=914): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000c40), 0x12) syz_clone(0xc2164000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000005c0), 0x12) 1.37370832s ago: executing program 1 (id=915): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="06517dc2e6ea"}) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40010000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x85, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00'}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000080), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[], 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) 1.138811518s ago: executing program 1 (id=916): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000"], 0x0, 0x56}, 0x28) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="000000000000f400000000000000000400000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r4}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, 0x0, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYRES32, @ANYRES8, @ANYBLOB="00004d1f1bb7e23127ed821b2d48c93e4700"/38], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x16, 0x8, &(0x7f00000002c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @jmp={0x5, 0x0, 0x2, 0x3, 0x0, 0x6, 0x1}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffff9}], &(0x7f00000003c0)='syzkaller\x00', 0xe, 0x1000, &(0x7f0000000cc0)=""/4096, 0x40f00, 0x24, '\x00', 0x0, @flow_dissector, r1, 0x8, &(0x7f0000000700)={0x7, 0x4000003}, 0x8, 0x10, &(0x7f0000000740)={0x3, 0xb, 0x9, 0x3}, 0x10, 0x0, r3, 0x1, &(0x7f0000000780), &(0x7f00000007c0)=[{0x0, 0x1, 0x10, 0x9}], 0x10, 0x4}, 0x94) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r2, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1c, 0x0, 0x0, &(0x7f0000000300)='GPL\x00', 0x3, 0xf2, &(0x7f0000000580)=""/242, 0x41100, 0x66, '\x00', 0x0, @fallback=0xf, r2, 0x8, &(0x7f0000000340)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x10, 0x1ff, 0x1}, 0x10, 0x0, r8, 0x0, &(0x7f0000000500)=[r1, r1], 0x0, 0x10, 0x6}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000084000001"], 0x48) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r9, 0x0, 0x20000000}, 0x20) 1.028074288s ago: executing program 0 (id=917): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0e000000040000000400000009b0"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000084ffffffff000000000300000000000000000000000200000000000009000000000000000200000000000000000000000602"], 0x0, 0x56}, 0x28) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x9) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) 799.883316ms ago: executing program 0 (id=918): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b70300001f0000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x2}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0xe, 0x0, &(0x7f00000004c0)="b9180bb7600a030c009e40f086dd", 0x0, 0x2d, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x5}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f00000004c0)=ANY=[], 0xfdef) 678.196405ms ago: executing program 0 (id=919): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x14}, 0x0, 0x3, 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100, 0x0, 0x10}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000680)='ns/cgroup\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r1, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000007"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xb, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008000008500000006000000954e9df9eddd76131f0e7c86892e5e1734da3165988f2c02c1de8a5f5d4f98122f8f27040983cfb8383d5b88e295e7b24dca5f65fc1ad5ee0749814aaa20de2baaf76f4a015593123b7d93e386b6f66350abd0122a31d3393f858ecd0483"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x57, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r5) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000009000000030000000900000001000000", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000040000000c0000000000eb000000000000000000"], 0x50) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r6) r10 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r2}, 0x8) close(r10) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 443.876744ms ago: executing program 2 (id=920): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x5, 0x4, 0x1000, 0xa, 0x0, 0xffffffffffffffff, 0xd}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) close(0x3) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f00000001c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x100000000}, 0x480, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x1, 0x9, 0xae}, 0x48) r8 = bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4002, 0x0, r7, 0x1e, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x11}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r8, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @fallback, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0xf5010000}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r3, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0], 0x0, 0x19, &(0x7f0000000600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0xf3, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x800, 0x0, r0, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x19, 0x10, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000300)='GPL\x00', 0x8, 0x7, &(0x7f0000000340)=""/7, 0x40f00, 0x20, '\x00', r9, @cgroup_sockopt=0x16, r10, 0x8, &(0x7f00000004c0)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x3, 0x6, 0x4}, 0x10, r11, r5, 0x6, &(0x7f0000000a00)=[r12, r2, r4, r0, r4], &(0x7f0000000a40)=[{0x1, 0x4, 0x9, 0x5}, {0x0, 0x4, 0x8, 0xa}, {0x1, 0x4, 0x5, 0x3}, {0x3, 0x5, 0x10, 0x7}, {0x1, 0x5, 0xc, 0x6}, {0x3, 0x3, 0x10, 0x4}], 0x10, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) close(0xffffffffffffffff) 233.976311ms ago: executing program 0 (id=921): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000240), 0x12) r2 = openat$cgroup_int(r0, &(0x7f0000000280)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f00000007c0)=ANY=[], 0x6) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x4, 0x6, 0x23, 0x0, 0x1, 0x3}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0x4, 0x6, 0x1}, 0x50) close(0x3) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8000005, r5}, 0x38) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x20, 0x19, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, {}, {}, [@ldst={0x2, 0x1, 0x1, 0x9, 0xa, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xf}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r10}, 0x10) 216.717543ms ago: executing program 1 (id=922): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000900c0000000000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000400000085000000060000009500000300000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x301) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000140)={'syzkaller0\x00', @random="371692e7f7ef"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRESDEC=0x0], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x7, 0xc, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd24, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="170000000000000004000000ff", @ANYRESDEC=r7, @ANYRES8=r5, @ANYRESHEX, @ANYRESHEX=r6, @ANYRES8=r7, @ANYRES64], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x80000, 0x0, 0x0, 0x41100}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x1, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058", @ANYRESHEX], 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r10}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="1900000004000000040000002bc8563b279795a77c854a23469a45554006082597b03f0ab9463e474becfb0a75d324e1e65a001dfc7a7b251bc563882fbd58a01905c05eec06004fda9cff4cd0b3b7cbc443f772c50074d1f734dd0f7b20e0a0e4761bb363c6c4283d57a58f2b24c5a4b65409d489d4fb5693", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) 201.564573ms ago: executing program 2 (id=923): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1, 0xf, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000400000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000048500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000000), &(0x7f0000000140)=r1}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7030000000000008500000018000000b70000002000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r5, 0x4) sendmsg$inet(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 122.01511ms ago: executing program 2 (id=924): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0b00000008000000020000000400000005000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000012855b6b52b0e3e31cad23c2f9e2e755ec5544b9a7cf699f5517a415470fde916f6a970e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r4, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="001300"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x730, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r8) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x2d) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 121.73029ms ago: executing program 0 (id=925): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@bloom_filter={0x1e, 0x3, 0x1000, 0x6, 0x2, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x5, 0xf}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r0, 0xffffffffffffffff}, &(0x7f00000004c0), &(0x7f0000000500)}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000400), &(0x7f0000000340)=""/173}, 0x20) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) (async, rerun: 32) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) (rerun: 32) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000008600850000001b000000b70000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x15, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0xe0600, 0x22, '\x00', 0x0, @fallback=0x29bbc621bafcdcbe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x10, 0x8000}, 0x94) (async) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r10 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r9}, 0x8) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e0000003c0d0000ff0f00004f00000020000000", @ANYRES32=r10, @ANYBLOB="0900000071448ba60000000000000000000000003ef0fe7aecad0dfb856b5ef8761def378d6e06d9dd7f3a17613a0b858afb", @ANYRES32=0x0, @ANYRES32=r10, @ANYBLOB="0400000005000000050000000800"/28], 0x50) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r10, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x8, 0x0, r11, 0x1, '\x00', r12, r8, 0x4, 0x1, 0x3}, 0x50) (async) close(r10) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r9, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r10, 0x0, 0x0}, 0x10) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000c40)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018440000f9ffffff000000000000", @ANYBLOB="00000000ff0f0000184a00000700000000000000000000009500000000000000186b000002000000000000000300e4ff8420000005000000b7080000000000007b8af8ff00000000b7080000010000007b8af0ff00000000bfa1000000ad000007010000f8ffffffbfa400000000000007040000f0ffffffb702000008000000182300005aea531658a8ae7fd68992536d59a7f66c123c25451fe864dcfa1c2ca597aa828fbb0ec440b73f3228febbb50db451314cd3dab4b84d17275961d391", @ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000580)={0x0, 0xa, 0x7, 0x800}, 0x10, 0x1f078, r5, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff], 0x0, 0x10, 0x1}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 32) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r13 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000600f000000000000", @ANYRES32=r1, @ANYBLOB="018000000000001f0000000000000000f30011008d418f02cdddee329fa14a89afb961066c0e1576ff7154a70e8c19a4f6694623672815c2464deb3c66f50855d342b2f74abe4e7f672631e390a7499730de17ad8b4d8d952232c2347eee0d1419c02489dc243ed68cceca19d02aa20d5fed6a4b76b105510facd71de335dcb62baf9f17d66e49993d4c34e34b8900"/154, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="01000000010000000400"/28], 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000005c0)={@map=r13, 0x1d, 0x0, 0x5, &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0]}, 0x40) 0s ago: executing program 1 (id=926): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) sendmsg$tipc(r1, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$tipc(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) (async) sendmsg$tipc(r1, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 32) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f00000001c0), 0x4) (rerun: 32) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x10) (async) close(r1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x8, 0xdd, 0xff}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r5}, 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r4}, &(0x7f0000000180), &(0x7f00000003c0)=r5}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x75, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x9c}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) (async) recvmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.48' (ED25519) to the list of known hosts. [ 19.645042][ T24] audit: type=1400 audit(1755580691.590:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.646055][ T267] cgroup: Unknown subsys name 'net' [ 19.648402][ T24] audit: type=1400 audit(1755580691.590:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.653072][ T24] audit: type=1400 audit(1755580691.590:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.653211][ T267] cgroup: Unknown subsys name 'devices' [ 19.744534][ T267] cgroup: Unknown subsys name 'hugetlb' [ 19.750135][ T267] cgroup: Unknown subsys name 'rlimit' [ 19.917402][ T24] audit: type=1400 audit(1755580691.860:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.940540][ T24] audit: type=1400 audit(1755580691.860:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.965289][ T24] audit: type=1400 audit(1755580691.860:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 19.991735][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 20.000603][ T24] audit: type=1400 audit(1755580691.940:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.026108][ T24] audit: type=1400 audit(1755580691.940:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.062726][ T24] audit: type=1400 audit(1755580692.010:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.088276][ T24] audit: type=1400 audit(1755580692.010:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.114405][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.818774][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.825892][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.833269][ T275] device bridge_slave_0 entered promiscuous mode [ 20.840068][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.847208][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.854610][ T275] device bridge_slave_1 entered promiscuous mode [ 20.921826][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.929085][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.936591][ T276] device bridge_slave_0 entered promiscuous mode [ 20.958590][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.965661][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.973031][ T276] device bridge_slave_1 entered promiscuous mode [ 21.014962][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.022079][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.029521][ T277] device bridge_slave_0 entered promiscuous mode [ 21.036546][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.043851][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.051146][ T277] device bridge_slave_1 entered promiscuous mode [ 21.074244][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.081286][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.088760][ T278] device bridge_slave_0 entered promiscuous mode [ 21.095700][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.102774][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.110122][ T278] device bridge_slave_1 entered promiscuous mode [ 21.121595][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.128764][ T280] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.136081][ T280] device bridge_slave_0 entered promiscuous mode [ 21.142944][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.149959][ T280] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.157411][ T280] device bridge_slave_1 entered promiscuous mode [ 21.168445][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.175506][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.182787][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.189799][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.285280][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.292328][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.299594][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.306615][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.330902][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.337963][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.345211][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.352384][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.365635][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.372692][ T280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.380107][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.387161][ T280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.399798][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.407364][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.414648][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.421768][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.429349][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.436507][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.443843][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.450930][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.458648][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.466027][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.497627][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.506020][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.513084][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.521121][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.529727][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.536772][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.544092][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.573341][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.581887][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.589968][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.598753][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.607088][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.615353][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.622372][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.629865][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.638073][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.645099][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.652390][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.659879][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.668142][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.675186][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.682558][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.690779][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.697918][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.705233][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.713359][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.720376][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.727952][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.736257][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.743272][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.750619][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.763821][ T275] device veth0_vlan entered promiscuous mode [ 21.771895][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.779975][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.787580][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.795572][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.823861][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.831945][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.840184][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.848470][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.857315][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.865592][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.873501][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.881718][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.890024][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.898537][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.906969][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.915208][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.923283][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.931481][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.939523][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.947049][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.954633][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.963031][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.971077][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.978095][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.985454][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.993844][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.001959][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.008987][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.018989][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.026931][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.039273][ T275] device veth1_macvtap entered promiscuous mode [ 22.047230][ T276] device veth0_vlan entered promiscuous mode [ 22.053667][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.061094][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.068551][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.076869][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.084960][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.093022][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.100860][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.109011][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.117095][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.127330][ T278] device veth0_vlan entered promiscuous mode [ 22.141636][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.149606][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.157491][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.166144][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.174979][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.183282][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.191498][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.199075][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.206999][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.215010][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.227388][ T276] device veth1_macvtap entered promiscuous mode [ 22.237011][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.244565][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.252028][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.260505][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.269302][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.277702][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.285880][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.296565][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.305239][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.314979][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.323327][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.331871][ T280] device veth0_vlan entered promiscuous mode [ 22.344035][ T278] device veth1_macvtap entered promiscuous mode [ 22.344952][ T275] request_module fs-gadgetfs succeeded, but still no fs? [ 22.360423][ T277] device veth0_vlan entered promiscuous mode [ 22.367149][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.374905][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.382812][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.390802][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.400312][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.408775][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.417276][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.425725][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.433205][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.441529][ T275] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 22.458199][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.470573][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.479199][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.487889][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.511915][ T280] device veth1_macvtap entered promiscuous mode [ 22.526168][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.545236][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.553779][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.562031][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.570575][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.579989][ T277] device veth1_macvtap entered promiscuous mode [ 22.597939][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.605939][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.614277][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.623384][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.631684][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.652774][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.662362][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.671209][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.680100][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.932605][ C1] hrtimer: interrupt took 27399 ns [ 23.456716][ T350] cgroup: syz.4.15 (350) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 23.501213][ T350] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 24.788199][ T24] kauditd_printk_skb: 39 callbacks suppressed [ 24.788207][ T24] audit: type=1400 audit(1755580696.730:113): avc: denied { read } for pid=413 comm="syz.3.36" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 24.827679][ T24] audit: type=1400 audit(1755580696.730:114): avc: denied { open } for pid=413 comm="syz.3.36" path="/dev/ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.106260][ T24] audit: type=1400 audit(1755580697.050:115): avc: denied { cpu } for pid=432 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 25.718064][ T24] audit: type=1400 audit(1755580697.660:116): avc: denied { read } for pid=460 comm="syz.4.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 25.773653][ T458] device pim6reg1 entered promiscuous mode [ 26.901609][ T497] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.908863][ T497] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.183256][ T508] device syzkaller0 entered promiscuous mode [ 27.195708][ T24] audit: type=1400 audit(1755580699.140:117): avc: denied { create } for pid=530 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 27.315741][ T550] syz.1.80[550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.316691][ T550] syz.1.80[550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.442259][ T553] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.473115][ T553] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.495577][ T24] audit: type=1400 audit(1755580699.440:118): avc: denied { write } for pid=561 comm="syz.0.84" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.628983][ T24] audit: type=1400 audit(1755580699.460:119): avc: denied { ioctl } for pid=561 comm="syz.0.84" path="/dev/ppp" dev="devtmpfs" ino=153 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.655036][ T573] device veth1_macvtap left promiscuous mode [ 27.664636][ T573] device macsec0 entered promiscuous mode [ 27.942910][ T593] syz.4.90[593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.942961][ T593] syz.4.90[593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.058112][ T600] device veth1_macvtap left promiscuous mode [ 28.557604][ T615] device wg2 entered promiscuous mode [ 29.348385][ T651] device sit0 entered promiscuous mode [ 29.367906][ T24] audit: type=1400 audit(1755580701.310:120): avc: denied { create } for pid=659 comm="syz.3.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.087403][ T663] device pim6reg1 entered promiscuous mode [ 30.232107][ T24] audit: type=1400 audit(1755580702.170:121): avc: denied { relabelfrom } for pid=693 comm="syz.4.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 30.302388][ T24] audit: type=1400 audit(1755580702.170:122): avc: denied { relabelto } for pid=693 comm="syz.4.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 30.457277][ T24] audit: type=1400 audit(1755580702.380:123): avc: denied { create } for pid=704 comm="syz.3.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 30.691702][ T24] audit: type=1400 audit(1755580702.630:124): avc: denied { attach_queue } for pid=715 comm="syz.1.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 33.533548][ T24] audit: type=1400 audit(1755580705.450:125): avc: denied { create } for pid=775 comm="syz.0.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 34.906900][ T828] €Â0: renamed from pim6reg1 [ 35.490628][ T841] device pim6reg1 entered promiscuous mode [ 35.825553][ T864] syz.4.177[864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.825606][ T864] syz.4.177[864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.032755][ T877] device pim6reg1 entered promiscuous mode [ 36.255607][ T910] syz.0.194[910] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.255660][ T910] syz.0.194[910] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.863233][ T932] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 37.722114][ T995] device veth1_macvtap left promiscuous mode [ 37.733486][ T995] device macsec0 entered promiscuous mode [ 37.972932][ T1011] device pim6reg1 entered promiscuous mode [ 38.215500][ T1019] device macsec0 left promiscuous mode [ 38.801979][ T1037] device pim6reg1 entered promiscuous mode [ 39.021036][ T24] audit: type=1400 audit(1755580710.960:126): avc: denied { create } for pid=1050 comm="syz.1.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 40.089864][ T1074] device syzkaller0 entered promiscuous mode [ 41.344950][ T24] audit: type=1400 audit(1755580713.290:127): avc: denied { create } for pid=1105 comm="syz.1.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 41.654881][ T24] audit: type=1400 audit(1755580713.600:129): avc: denied { create } for pid=1113 comm="syz.0.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 41.751442][ T24] audit: type=1400 audit(1755580713.590:128): avc: denied { create } for pid=1105 comm="syz.1.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 41.944155][ T1114] ªªªªªª: renamed from vlan0 [ 45.794218][ T1202] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 46.872518][ T1222] device macsec0 entered promiscuous mode [ 46.922054][ T1229] device wg2 left promiscuous mode [ 47.277912][ T24] audit: type=1400 audit(1755580719.220:130): avc: denied { create } for pid=1266 comm="syz.1.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 47.434809][ T24] audit: type=1400 audit(1755580719.340:131): avc: denied { create } for pid=1270 comm="syz.4.303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 48.042526][ T1301] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.054396][ T1301] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.096279][ T1309] device bridge_slave_1 left promiscuous mode [ 48.111393][ T1309] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.299175][ T1309] device bridge_slave_0 left promiscuous mode [ 48.414123][ T1309] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.074083][ T24] audit: type=1400 audit(1755580721.010:132): avc: denied { create } for pid=1318 comm="syz.3.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 49.314818][ T1338] syz.4.323[1338] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.314873][ T1338] syz.4.323[1338] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.406187][ T1344] device pim6reg1 entered promiscuous mode [ 49.493068][ T24] audit: type=1400 audit(1755580721.440:133): avc: denied { create } for pid=1354 comm="syz.3.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 49.834815][ T1371] syz.0.336[1371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.834869][ T1371] syz.0.336[1371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.857079][ T1372] device pim6reg1 entered promiscuous mode [ 49.896390][ T24] audit: type=1400 audit(1755580721.840:134): avc: denied { create } for pid=1366 comm="syz.2.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 50.450721][ T1388] device wg2 entered promiscuous mode [ 50.645029][ T1409] syz.3.347[1409] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.645082][ T1409] syz.3.347[1409] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.273073][ T1452] syz.4.362[1452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.298044][ T1452] syz.4.362[1452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.359227][ T1452] FAULT_INJECTION: forcing a failure. [ 51.359227][ T1452] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 51.373852][ T1457] syz.1.363[1457] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.395263][ T1457] syz.1.363[1457] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.407502][ T1452] CPU: 0 PID: 1452 Comm: syz.4.362 Not tainted 5.10.240-syzkaller #0 [ 51.426871][ T1452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 51.436929][ T1452] Call Trace: [ 51.440212][ T1452] __dump_stack+0x21/0x24 [ 51.444557][ T1452] dump_stack_lvl+0x169/0x1d8 [ 51.449233][ T1452] ? show_regs_print_info+0x18/0x18 [ 51.454421][ T1452] ? kstrtouint_from_user+0x1a0/0x200 [ 51.459767][ T1452] dump_stack+0x15/0x1c [ 51.463896][ T1452] should_fail+0x3c1/0x510 [ 51.468282][ T1452] should_fail_usercopy+0x1a/0x20 [ 51.473278][ T1452] _copy_from_user+0x20/0xd0 [ 51.477839][ T1452] ___sys_recvmsg+0x129/0x4f0 [ 51.482486][ T1452] ? __sys_recvmsg+0x250/0x250 [ 51.487220][ T1452] ? __fdget+0x1a1/0x230 [ 51.491435][ T1452] __x64_sys_recvmsg+0x1dd/0x2a0 [ 51.496343][ T1452] ? fput+0x1a/0x20 [ 51.500123][ T1452] ? ___sys_recvmsg+0x4f0/0x4f0 [ 51.504959][ T1452] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 51.511074][ T1452] do_syscall_64+0x31/0x40 [ 51.515464][ T1452] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 51.521501][ T1452] RIP: 0033:0x7f7e2636ebe9 [ 51.525905][ T1452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.545483][ T1452] RSP: 002b:00007f7e24dd7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 51.553870][ T1452] RAX: ffffffffffffffda RBX: 00007f7e26595fa0 RCX: 00007f7e2636ebe9 [ 51.561814][ T1452] RDX: 00000000000040fd RSI: 0000200000000b00 RDI: 0000000000000005 [ 51.569758][ T1452] RBP: 00007f7e24dd7090 R08: 0000000000000000 R09: 0000000000000000 [ 51.577700][ T1452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 51.585645][ T1452] R13: 00007f7e26596038 R14: 00007f7e26595fa0 R15: 00007ffdcfa51c08 [ 51.656147][ T1462] device pim6reg1 entered promiscuous mode [ 51.858811][ T1493] FAULT_INJECTION: forcing a failure. [ 51.858811][ T1493] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 51.905187][ T1493] CPU: 1 PID: 1493 Comm: syz.3.376 Not tainted 5.10.240-syzkaller #0 [ 51.913279][ T1493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 51.923332][ T1493] Call Trace: [ 51.926619][ T1493] __dump_stack+0x21/0x24 [ 51.930944][ T1493] dump_stack_lvl+0x169/0x1d8 [ 51.935616][ T1493] ? show_regs_print_info+0x18/0x18 [ 51.940803][ T1493] dump_stack+0x15/0x1c [ 51.944976][ T1493] should_fail+0x3c1/0x510 [ 51.949366][ T1493] should_fail_usercopy+0x1a/0x20 [ 51.954452][ T1493] _copy_from_user+0x20/0xd0 [ 51.959013][ T1493] iovec_from_user+0x1bc/0x2f0 [ 51.963765][ T1493] ? kstrtouint_from_user+0x1a0/0x200 [ 51.969113][ T1493] __import_iovec+0x71/0x390 [ 51.973787][ T1493] ? memset+0x35/0x40 [ 51.977763][ T1493] import_iovec+0x7c/0xb0 [ 51.982085][ T1493] ___sys_recvmsg+0x420/0x4f0 [ 51.986753][ T1493] ? __sys_recvmsg+0x250/0x250 [ 51.991506][ T1493] ? __fdget+0x1a1/0x230 [ 51.995722][ T1493] __x64_sys_recvmsg+0x1dd/0x2a0 [ 52.000647][ T1493] ? fput+0x1a/0x20 [ 52.004433][ T1493] ? ___sys_recvmsg+0x4f0/0x4f0 [ 52.009359][ T1493] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 52.015404][ T1493] do_syscall_64+0x31/0x40 [ 52.019807][ T1493] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 52.025671][ T1493] RIP: 0033:0x7f9ccd0aabe9 [ 52.030061][ T1493] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.049639][ T1493] RSP: 002b:00007f9ccbb13038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 52.058025][ T1493] RAX: ffffffffffffffda RBX: 00007f9ccd2d1fa0 RCX: 00007f9ccd0aabe9 [ 52.065971][ T1493] RDX: 00000000000040fd RSI: 0000200000000b00 RDI: 0000000000000006 [ 52.073940][ T1493] RBP: 00007f9ccbb13090 R08: 0000000000000000 R09: 0000000000000000 [ 52.081886][ T1493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 52.089919][ T1493] R13: 00007f9ccd2d2038 R14: 00007f9ccd2d1fa0 R15: 00007ffc7e70df08 [ 52.411966][ T1517] device syzkaller0 entered promiscuous mode [ 52.603433][ T1545] FAULT_INJECTION: forcing a failure. [ 52.603433][ T1545] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 52.627492][ T1545] CPU: 0 PID: 1545 Comm: syz.1.393 Not tainted 5.10.240-syzkaller #0 [ 52.635578][ T1545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 52.645631][ T1545] Call Trace: [ 52.648922][ T1545] __dump_stack+0x21/0x24 [ 52.653256][ T1545] dump_stack_lvl+0x169/0x1d8 [ 52.657922][ T1545] ? show_regs_print_info+0x18/0x18 [ 52.663114][ T1545] ? avc_has_perm+0x234/0x360 [ 52.667824][ T1545] dump_stack+0x15/0x1c [ 52.671980][ T1545] should_fail+0x3c1/0x510 [ 52.676390][ T1545] should_fail_usercopy+0x1a/0x20 [ 52.681397][ T1545] _copy_to_iter+0x1df/0xa40 [ 52.685976][ T1545] ? __kasan_check_write+0x14/0x20 [ 52.691093][ T1545] ? __check_object_size+0x2f4/0x3c0 [ 52.696384][ T1545] simple_copy_to_iter+0x50/0x70 [ 52.701319][ T1545] __skb_datagram_iter+0xdb/0x700 [ 52.706336][ T1545] ? tipc_sk_anc_data_recv+0xa6/0x680 [ 52.711699][ T1545] ? skb_copy_datagram_iter+0x150/0x150 [ 52.717406][ T1545] skb_copy_datagram_iter+0x43/0x150 [ 52.722765][ T1545] tipc_recvmsg+0x79b/0x13a0 [ 52.727348][ T1545] ? tipc_send_packet+0xa0/0xa0 [ 52.732241][ T1545] ? security_socket_recvmsg+0x87/0xb0 [ 52.737776][ T1545] ? tipc_send_packet+0xa0/0xa0 [ 52.742615][ T1545] ____sys_recvmsg+0x291/0x580 [ 52.747373][ T1545] ? __sys_recvmsg_sock+0x50/0x50 [ 52.752398][ T1545] ? import_iovec+0x7c/0xb0 [ 52.756899][ T1545] ___sys_recvmsg+0x1af/0x4f0 [ 52.761587][ T1545] ? __sys_recvmsg+0x250/0x250 [ 52.766345][ T1545] ? __fdget+0x1a1/0x230 [ 52.770582][ T1545] __x64_sys_recvmsg+0x1dd/0x2a0 [ 52.775494][ T1545] ? fput+0x1a/0x20 [ 52.779276][ T1545] ? ___sys_recvmsg+0x4f0/0x4f0 [ 52.784209][ T1545] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 52.790257][ T1545] do_syscall_64+0x31/0x40 [ 52.794653][ T1545] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 52.800689][ T1545] RIP: 0033:0x7ff5054c7be9 [ 52.805080][ T1545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.824656][ T1545] RSP: 002b:00007ff503f30038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 52.833042][ T1545] RAX: ffffffffffffffda RBX: 00007ff5056eefa0 RCX: 00007ff5054c7be9 [ 52.840986][ T1545] RDX: 00000000000040fd RSI: 0000200000000b00 RDI: 0000000000000006 [ 52.848945][ T1545] RBP: 00007ff503f30090 R08: 0000000000000000 R09: 0000000000000000 [ 52.856978][ T1545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 52.864925][ T1545] R13: 00007ff5056ef038 R14: 00007ff5056eefa0 R15: 00007ffd1e2849a8 [ 52.980835][ T24] audit: type=1400 audit(1755580724.920:135): avc: denied { create } for pid=1591 comm="syz.3.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 53.278844][ T1649] device syzkaller0 entered promiscuous mode [ 54.762002][ T1704] device veth0_vlan left promiscuous mode [ 54.771070][ T1704] device veth0_vlan entered promiscuous mode [ 54.780112][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 54.788908][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 54.796822][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 56.188932][ T1777] bpf_get_probe_write_proto: 14 callbacks suppressed [ 56.188942][ T1777] syz.2.457[1777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.262432][ T1773] device wg2 entered promiscuous mode [ 56.273858][ T1777] syz.2.457[1777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.363067][ T1777] device pim6reg1 entered promiscuous mode [ 56.746625][ T24] audit: type=1400 audit(1755580728.690:136): avc: denied { tracepoint } for pid=1792 comm="syz.3.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 57.511298][ T1835] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.518397][ T1835] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.525722][ T1835] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.532931][ T1835] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.295246][ T1862] device veth0_vlan left promiscuous mode [ 58.353531][ T1862] device veth0_vlan entered promiscuous mode [ 58.360944][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.015408][ T1877] syz.0.487[1877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.015463][ T1877] syz.0.487[1877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.143364][ T24] audit: type=1400 audit(1755580731.080:137): avc: denied { create } for pid=1874 comm="syz.4.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 59.851063][ T24] audit: type=1400 audit(1755580731.790:138): avc: denied { create } for pid=1904 comm="syz.1.495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 60.496046][ T24] audit: type=1400 audit(1755580732.440:139): avc: denied { create } for pid=1917 comm="syz.0.501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 60.735279][ T1925] device sit0 entered promiscuous mode [ 61.188742][ T1932] syz.0.504[1932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.188794][ T1932] syz.0.504[1932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.564066][ T1957] device pim6reg1 entered promiscuous mode [ 61.819690][ T1969] device veth1_macvtap left promiscuous mode [ 61.832878][ T1969] device macsec0 entered promiscuous mode [ 62.146268][ T1986] syz.2.521[1986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.146319][ T1986] syz.2.521[1986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.884761][ T2017] syz.1.532[2017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.041620][ T2017] syz.1.532[2017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.192140][ T2025] device veth0_vlan left promiscuous mode [ 63.621520][ T2025] device veth0_vlan entered promiscuous mode [ 63.861218][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 63.892302][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 63.924777][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 64.463013][ T2057] device sit0 entered promiscuous mode [ 65.983065][ T2125] device wg2 entered promiscuous mode [ 66.167396][ T24] audit: type=1400 audit(1755580738.110:140): avc: denied { create } for pid=2154 comm="syz.4.576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 66.852716][ T2178] device syzkaller0 entered promiscuous mode [ 66.859901][ T2185] device macsec0 entered promiscuous mode [ 68.720244][ T24] audit: type=1400 audit(1755580740.660:141): avc: denied { create } for pid=2262 comm="syz.2.611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 69.272004][ T24] audit: type=1400 audit(1755580741.210:142): avc: denied { create } for pid=2291 comm="syz.2.622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 71.181015][ T24] audit: type=1400 audit(1755580743.120:143): avc: denied { create } for pid=2376 comm="syz.2.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 71.300999][ T2379] device syzkaller0 entered promiscuous mode [ 72.223064][ T2416] FAULT_INJECTION: forcing a failure. [ 72.223064][ T2416] name failslab, interval 1, probability 0, space 0, times 1 [ 72.282668][ T2416] CPU: 1 PID: 2416 Comm: syz.4.665 Not tainted 5.10.240-syzkaller #0 [ 72.290751][ T2416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 72.300808][ T2416] Call Trace: [ 72.304104][ T2416] __dump_stack+0x21/0x24 [ 72.308541][ T2416] dump_stack_lvl+0x169/0x1d8 [ 72.313203][ T2416] ? show_regs_print_info+0x18/0x18 [ 72.318554][ T2416] dump_stack+0x15/0x1c [ 72.322689][ T2416] should_fail+0x3c1/0x510 [ 72.327079][ T2416] ? selinux_sk_alloc_security+0x63/0x140 [ 72.332773][ T2416] __should_failslab+0xa4/0xe0 [ 72.337507][ T2416] should_failslab+0x9/0x20 [ 72.341980][ T2416] kmem_cache_alloc_trace+0x3a/0x2e0 [ 72.347237][ T2416] ? sk_prot_alloc+0x5c/0x340 [ 72.351972][ T2416] selinux_sk_alloc_security+0x63/0x140 [ 72.357488][ T2416] security_sk_alloc+0x72/0xa0 [ 72.362220][ T2416] sk_prot_alloc+0x138/0x340 [ 72.366780][ T2416] sk_alloc+0x38/0x4e0 [ 72.370829][ T2416] tipc_sk_create+0xe6/0x1df0 [ 72.375479][ T2416] ? kmem_cache_alloc+0x165/0x2e0 [ 72.380472][ T2416] ? __kasan_check_write+0x14/0x20 [ 72.385677][ T2416] ? _raw_spin_lock+0x8e/0xe0 [ 72.390424][ T2416] ? _raw_spin_trylock_bh+0x130/0x130 [ 72.395778][ T2416] ? security_inode_alloc+0xc0/0x110 [ 72.401073][ T2416] __sock_create+0x38d/0x770 [ 72.405661][ T2416] __sys_socketpair+0x1a1/0x590 [ 72.410754][ T2416] __x64_sys_socketpair+0x9b/0xb0 [ 72.415752][ T2416] do_syscall_64+0x31/0x40 [ 72.420142][ T2416] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 72.426004][ T2416] RIP: 0033:0x7f7e2636ebe9 [ 72.430405][ T2416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 72.450082][ T2416] RSP: 002b:00007f7e24dd7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 72.458472][ T2416] RAX: ffffffffffffffda RBX: 00007f7e26595fa0 RCX: 00007f7e2636ebe9 [ 72.466427][ T2416] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 72.474394][ T2416] RBP: 00007f7e24dd7090 R08: 0000000000000000 R09: 0000000000000000 [ 72.482423][ T2416] R10: 0000200000000940 R11: 0000000000000246 R12: 0000000000000001 [ 72.490388][ T2416] R13: 00007f7e26596038 R14: 00007f7e26595fa0 R15: 00007ffdcfa51c08 [ 72.575866][ T24] audit: type=1400 audit(1755580744.520:144): avc: denied { ioctl } for pid=2406 comm="syz.3.663" path="mnt:[4026532458]" dev="nsfs" ino=4026532458 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 73.330865][ T24] audit: type=1400 audit(1755580745.270:145): avc: denied { ioctl } for pid=2467 comm="syz.1.682" path="socket:[22005]" dev="sockfs" ino=22005 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 73.383278][ T2471] device macsec0 left promiscuous mode [ 73.432996][ T2477] device pim6reg1 entered promiscuous mode [ 74.837439][ T2554] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.844660][ T2554] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.410182][ T2566] device syzkaller0 entered promiscuous mode [ 75.590084][ T2578] device syzkaller0 entered promiscuous mode [ 76.275935][ T2607] FAULT_INJECTION: forcing a failure. [ 76.275935][ T2607] name failslab, interval 1, probability 0, space 0, times 0 [ 76.394417][ T2607] CPU: 0 PID: 2607 Comm: syz.4.729 Not tainted 5.10.240-syzkaller #0 [ 76.402541][ T2607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 76.412584][ T2607] Call Trace: [ 76.415889][ T2607] __dump_stack+0x21/0x24 [ 76.420239][ T2607] dump_stack_lvl+0x169/0x1d8 [ 76.424926][ T2607] ? thaw_kernel_threads+0x220/0x220 [ 76.430203][ T2607] ? __sys_socketpair+0x218/0x590 [ 76.435218][ T2607] ? show_regs_print_info+0x18/0x18 [ 76.440422][ T2607] dump_stack+0x15/0x1c [ 76.444579][ T2607] should_fail+0x3c1/0x510 [ 76.448989][ T2607] ? sk_prot_alloc+0x5c/0x340 [ 76.453645][ T2607] __should_failslab+0xa4/0xe0 [ 76.458383][ T2607] should_failslab+0x9/0x20 [ 76.462878][ T2607] kmem_cache_alloc+0x3d/0x2e0 [ 76.467628][ T2607] sk_prot_alloc+0x5c/0x340 [ 76.472108][ T2607] sk_alloc+0x38/0x4e0 [ 76.476159][ T2607] tipc_sk_create+0xe6/0x1df0 [ 76.481329][ T2607] ? kmem_cache_alloc+0x165/0x2e0 [ 76.486333][ T2607] ? __kasan_check_write+0x14/0x20 [ 76.491417][ T2607] ? _raw_spin_lock+0x8e/0xe0 [ 76.496063][ T2607] ? _raw_spin_trylock_bh+0x130/0x130 [ 76.501412][ T2607] ? security_inode_alloc+0xc0/0x110 [ 76.506696][ T2607] __sock_create+0x38d/0x770 [ 76.511268][ T2607] __sys_socketpair+0x218/0x590 [ 76.516096][ T2607] __x64_sys_socketpair+0x9b/0xb0 [ 76.521095][ T2607] do_syscall_64+0x31/0x40 [ 76.525485][ T2607] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 76.531397][ T2607] RIP: 0033:0x7f7e2636ebe9 [ 76.535788][ T2607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 76.555564][ T2607] RSP: 002b:00007f7e24db6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 76.563976][ T2607] RAX: ffffffffffffffda RBX: 00007f7e26596090 RCX: 00007f7e2636ebe9 [ 76.571935][ T2607] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 76.579896][ T2607] RBP: 00007f7e24db6090 R08: 0000000000000000 R09: 0000000000000000 [ 76.587880][ T2607] R10: 0000200000000940 R11: 0000000000000246 R12: 0000000000000001 [ 76.596102][ T2607] R13: 00007f7e26596128 R14: 00007f7e26596090 R15: 00007ffdcfa51c08 [ 77.259338][ T2651] syz.0.745[2651] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.259393][ T2651] syz.0.745[2651] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.721535][ T2669] FAULT_INJECTION: forcing a failure. [ 77.721535][ T2669] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 77.865046][ T2669] CPU: 0 PID: 2669 Comm: syz.0.750 Not tainted 5.10.240-syzkaller #0 [ 77.873133][ T2669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 77.883183][ T2669] Call Trace: [ 77.886483][ T2669] __dump_stack+0x21/0x24 [ 77.890808][ T2669] dump_stack_lvl+0x169/0x1d8 [ 77.895583][ T2669] ? show_regs_print_info+0x18/0x18 [ 77.900784][ T2669] ? __hrtimer_run_queues+0x903/0x960 [ 77.906144][ T2669] dump_stack+0x15/0x1c [ 77.910284][ T2669] should_fail+0x3c1/0x510 [ 77.914672][ T2669] should_fail_usercopy+0x1a/0x20 [ 77.919756][ T2669] _copy_from_user+0x20/0xd0 [ 77.924326][ T2669] __se_sys_bpf+0x181/0x680 [ 77.928810][ T2669] ? __x64_sys_bpf+0x90/0x90 [ 77.933468][ T2669] ? debug_smp_processor_id+0x17/0x20 [ 77.938823][ T2669] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 77.944857][ T2669] __x64_sys_bpf+0x7b/0x90 [ 77.949250][ T2669] do_syscall_64+0x31/0x40 [ 77.953638][ T2669] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 77.959500][ T2669] RIP: 0033:0x7f75a42c7be9 [ 77.963916][ T2669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 77.983494][ T2669] RSP: 002b:00007f75a2d30038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 77.991880][ T2669] RAX: ffffffffffffffda RBX: 00007f75a44eefa0 RCX: 00007f75a42c7be9 [ 77.999824][ T2669] RDX: 0000000000000048 RSI: 00002000000008c0 RDI: 0c00000000000000 [ 78.007853][ T2669] RBP: 00007f75a2d30090 R08: 0000000000000000 R09: 0000000000000000 [ 78.015793][ T2669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 78.023739][ T2669] R13: 00007f75a44ef038 R14: 00007f75a44eefa0 R15: 00007ffcf69abb18 [ 78.104252][ T2695] syz.2.758[2695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.104306][ T2695] syz.2.758[2695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.438715][ T2703] device veth0_vlan left promiscuous mode [ 78.455992][ T2703] device veth0_vlan entered promiscuous mode [ 78.485776][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 78.494121][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 78.504835][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 78.904446][ T2729] FAULT_INJECTION: forcing a failure. [ 78.904446][ T2729] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 79.079740][ T2729] CPU: 0 PID: 2729 Comm: syz.2.769 Not tainted 5.10.240-syzkaller #0 [ 79.087823][ T2729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 79.097862][ T2729] Call Trace: [ 79.101146][ T2729] __dump_stack+0x21/0x24 [ 79.105462][ T2729] dump_stack_lvl+0x169/0x1d8 [ 79.110138][ T2729] ? thaw_kernel_threads+0x220/0x220 [ 79.115413][ T2729] ? vsnprintf+0x1871/0x1960 [ 79.120016][ T2729] ? show_regs_print_info+0x18/0x18 [ 79.125203][ T2729] dump_stack+0x15/0x1c [ 79.129354][ T2729] should_fail+0x3c1/0x510 [ 79.133755][ T2729] should_fail_usercopy+0x1a/0x20 [ 79.138769][ T2729] _copy_to_user+0x20/0x90 [ 79.143175][ T2729] simple_read_from_buffer+0xe9/0x160 [ 79.148536][ T2729] proc_fail_nth_read+0x19a/0x210 [ 79.153558][ T2729] ? proc_fault_inject_write+0x2f0/0x2f0 [ 79.159184][ T2729] ? rw_verify_area+0x1c0/0x360 [ 79.164024][ T2729] ? proc_fault_inject_write+0x2f0/0x2f0 [ 79.169656][ T2729] vfs_read+0x1fe/0xa10 [ 79.173798][ T2729] ? bpf_map_meta_alloc+0x47/0x760 [ 79.178978][ T2729] ? kernel_read+0x70/0x70 [ 79.183391][ T2729] ? __kasan_check_write+0x14/0x20 [ 79.188491][ T2729] ? mutex_lock+0x8c/0xe0 [ 79.192812][ T2729] ? mutex_trylock+0xa0/0xa0 [ 79.197391][ T2729] ? __fget_files+0x2c4/0x320 [ 79.202061][ T2729] ? __fdget_pos+0x2d2/0x380 [ 79.206641][ T2729] ? ksys_read+0x71/0x240 [ 79.210966][ T2729] ksys_read+0x140/0x240 [ 79.215200][ T2729] ? vfs_write+0xd60/0xd60 [ 79.219614][ T2729] __x64_sys_read+0x7b/0x90 [ 79.224113][ T2729] do_syscall_64+0x31/0x40 [ 79.228526][ T2729] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 79.234417][ T2729] RIP: 0033:0x7fd96dd9c5fc [ 79.238834][ T2729] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 79.258433][ T2729] RSP: 002b:00007fd96c7e5030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 79.266841][ T2729] RAX: ffffffffffffffda RBX: 00007fd96dfc5090 RCX: 00007fd96dd9c5fc [ 79.274808][ T2729] RDX: 000000000000000f RSI: 00007fd96c7e50a0 RDI: 0000000000000006 [ 79.282772][ T2729] RBP: 00007fd96c7e5090 R08: 0000000000000000 R09: 0000000000000000 [ 79.290852][ T2729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 79.298829][ T2729] R13: 00007fd96dfc5128 R14: 00007fd96dfc5090 R15: 00007ffcaf716698 [ 79.862499][ T2767] syz.4.782[2767] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.870695][ T2767] syz.4.782[2767] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.925166][ T2765] device veth1_macvtap entered promiscuous mode [ 79.975191][ T2765] device macsec0 entered promiscuous mode [ 80.190036][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 80.223875][ T2785] syz.0.789[2785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.223921][ T2785] syz.0.789[2785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.391505][ T2794] syz.4.793[2794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.527989][ T2794] syz.4.793[2794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.158660][ T2910] device wg2 entered promiscuous mode [ 82.618502][ T2955] syz.3.845[2955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.618555][ T2955] syz.3.845[2955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.788481][ T2984] syz.1.856[2984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.800025][ T2984] syz.1.856[2984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.763495][ T3013] device pim6reg1 entered promiscuous mode [ 83.912132][ T3023] device wg2 left promiscuous mode [ 83.928165][ T3023] device wg2 entered promiscuous mode [ 83.938439][ T3024] device wg2 left promiscuous mode [ 84.197702][ T3030] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.204905][ T3030] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.343963][ T3032] device bridge_slave_1 left promiscuous mode [ 84.350683][ T3032] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.363131][ T3032] device bridge_slave_0 left promiscuous mode [ 84.369933][ T3032] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.628697][ T3054] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.635880][ T3054] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.985326][ T3054] device syzkaller0 entered promiscuous mode [ 85.214011][ T3057] device bridge_slave_1 left promiscuous mode [ 85.286919][ T3057] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.419792][ T3057] device bridge_slave_0 left promiscuous mode [ 85.491547][ T3057] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.541811][ T3070] syz.3.886[3070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.541888][ T3070] syz.3.886[3070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.982024][ T3099] syz.2.895[3099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.986229][ T3097] device veth1_macvtap left promiscuous mode [ 85.993714][ T3099] syz.2.895[3099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.150527][ T3099] device pim6reg1 entered promiscuous mode [ 86.386148][ T3111] FAULT_INJECTION: forcing a failure. [ 86.386148][ T3111] name failslab, interval 1, probability 0, space 0, times 0 [ 86.604900][ T3111] CPU: 0 PID: 3111 Comm: syz.2.900 Not tainted 5.10.240-syzkaller #0 [ 86.613075][ T3111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 86.623117][ T3111] Call Trace: [ 86.626405][ T3111] __dump_stack+0x21/0x24 [ 86.630723][ T3111] dump_stack_lvl+0x169/0x1d8 [ 86.635395][ T3111] ? show_regs_print_info+0x18/0x18 [ 86.640584][ T3111] dump_stack+0x15/0x1c [ 86.644828][ T3111] should_fail+0x3c1/0x510 [ 86.649232][ T3111] ? __alloc_file+0x28/0x320 [ 86.653810][ T3111] __should_failslab+0xa4/0xe0 [ 86.658657][ T3111] should_failslab+0x9/0x20 [ 86.663154][ T3111] kmem_cache_alloc+0x3d/0x2e0 [ 86.667902][ T3111] ? _raw_spin_trylock_bh+0x130/0x130 [ 86.673259][ T3111] __alloc_file+0x28/0x320 [ 86.677676][ T3111] alloc_empty_file+0x97/0x180 [ 86.682423][ T3111] alloc_file+0x59/0x540 [ 86.686660][ T3111] alloc_file_pseudo+0x17a/0x1f0 [ 86.691594][ T3111] ? alloc_empty_file_noaccount+0x80/0x80 [ 86.697322][ T3111] ? tipc_sk_finish_conn+0x571/0x7d0 [ 86.702700][ T3111] sock_alloc_file+0xba/0x260 [ 86.707371][ T3111] __sys_socketpair+0x386/0x590 [ 86.712217][ T3111] __x64_sys_socketpair+0x9b/0xb0 [ 86.717234][ T3111] do_syscall_64+0x31/0x40 [ 86.721743][ T3111] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 86.727634][ T3111] RIP: 0033:0x7fd96dd9dbe9 [ 86.732044][ T3111] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 86.751835][ T3111] RSP: 002b:00007fd96c806038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 86.760259][ T3111] RAX: ffffffffffffffda RBX: 00007fd96dfc4fa0 RCX: 00007fd96dd9dbe9 [ 86.768231][ T3111] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 86.776203][ T3111] RBP: 00007fd96c806090 R08: 0000000000000000 R09: 0000000000000000 [ 86.784176][ T3111] R10: 0000200000000940 R11: 0000000000000246 R12: 0000000000000002 [ 86.792150][ T3111] R13: 00007fd96dfc5038 R14: 00007fd96dfc4fa0 R15: 00007ffcaf716698 [ 88.853238][ T3171] device pim6reg1 entered promiscuous mode [ 89.106968][ T3178] device pim6reg1 left promiscuous mode [ 189.332535][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 189.339176][ C0] rcu: 0-...!: (1 GPs behind) idle=b3a/1/0x4000000000000000 softirq=11302/11304 fqs=0 last_accelerate: ad66/d477 dyntick_enabled: 1 [ 189.352774][ C0] (t=10003 jiffies g=12061 q=124) [ 189.357856][ C0] rcu: rcu_preempt kthread starved for 10003 jiffies! g12061 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=1 [ 189.369394][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 189.379337][ C0] rcu: RCU grace-period kthread stack dump: [ 189.385198][ C0] task:rcu_preempt state:I stack: 0 pid: 13 ppid: 2 flags:0x00004000 [ 189.394384][ C0] Call Trace: [ 189.397666][ C0] __schedule+0xb47/0x1310 [ 189.402051][ C0] ? release_firmware_map_entry+0x190/0x190 [ 189.407920][ C0] ? __mod_timer+0x7ae/0xb30 [ 189.412477][ C0] schedule+0x13c/0x1d0 [ 189.416598][ C0] schedule_timeout+0x12c/0x2d0 [ 189.421414][ C0] ? console_conditional_schedule+0x10/0x10 [ 189.427279][ C0] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 189.432704][ C0] ? run_local_timers+0x160/0x160 [ 189.437720][ C0] ? prepare_to_swait_event+0x320/0x340 [ 189.443236][ C0] rcu_gp_kthread+0x100a/0x26a0 [ 189.448050][ C0] ? rcu_barrier_callback+0x50/0x50 [ 189.453216][ C0] ? __kasan_check_read+0x11/0x20 [ 189.458206][ C0] ? __kthread_parkme+0xb9/0x1c0 [ 189.463112][ C0] kthread+0x346/0x3d0 [ 189.467147][ C0] ? rcu_barrier_callback+0x50/0x50 [ 189.472308][ C0] ? kthread_blkcg+0xd0/0xd0 [ 189.476949][ C0] ret_from_fork+0x1f/0x30 [ 189.481376][ C0] NMI backtrace for cpu 0 [ 189.485779][ C0] CPU: 0 PID: 3194 Comm: syz.1.926 Not tainted 5.10.240-syzkaller #0 [ 189.493803][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 189.503825][ C0] Call Trace: [ 189.507075][ C0] [ 189.509899][ C0] __dump_stack+0x21/0x24 [ 189.514195][ C0] dump_stack_lvl+0x169/0x1d8 [ 189.518841][ C0] ? show_regs_print_info+0x18/0x18 [ 189.524003][ C0] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 189.529428][ C0] ? _raw_spin_lock+0xe0/0xe0 [ 189.534161][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 189.540192][ C0] dump_stack+0x15/0x1c [ 189.544316][ C0] nmi_trigger_cpumask_backtrace+0x27f/0x2c0 [ 189.550261][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 189.556118][ C0] rcu_dump_cpu_stacks+0x19c/0x2c0 [ 189.561213][ C0] rcu_sched_clock_irq+0xf79/0x1870 [ 189.566377][ C0] ? rcutree_dead_cpu+0x2f0/0x2f0 [ 189.571368][ C0] ? hrtimer_run_queues+0x166/0x430 [ 189.576540][ C0] update_process_times+0x198/0x200 [ 189.581703][ C0] tick_sched_timer+0x17c/0x240 [ 189.586519][ C0] ? tick_setup_sched_timer+0x450/0x450 [ 189.592038][ C0] __hrtimer_run_queues+0x37a/0x960 [ 189.597298][ C0] ? hrtimer_interrupt+0xdc0/0xdc0 [ 189.602373][ C0] ? ktime_get_update_offsets_now+0x293/0x2b0 [ 189.608407][ C0] hrtimer_interrupt+0x3a6/0xdc0 [ 189.613347][ C0] __sysvec_apic_timer_interrupt+0xfa/0x3f0 [ 189.619206][ C0] asm_call_irq_on_stack+0xf/0x20 [ 189.624237][ C0] [ 189.627170][ C0] sysvec_apic_timer_interrupt+0x85/0xe0 [ 189.632781][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 189.638754][ C0] RIP: 0010:__rcu_read_lock+0x17/0x50 [ 189.644193][ C0] Code: fc ff df 0f 85 d4 fb ff ff e8 21 a8 ae ff e9 ca fb ff ff 55 48 89 e5 53 65 48 8b 1d a3 aa b0 7e 48 81 c3 08 04 00 00 48 89 d8 <48> c1 e8 03 48 b9 00 00 00 00 00 fc ff df 0f b6 04 08 84 c0 75 05 [ 189.663858][ C0] RSP: 0018:ffffc90000de6728 EFLAGS: 00000282 [ 189.669999][ C0] RAX: ffff888118c497c8 RBX: ffff888118c497c8 RCX: ffff888118c493c0 [ 189.677941][ C0] RDX: 0000000000000000 RSI: 00000000dfb30586 RDI: ffff8881252eb9c0 [ 189.687713][ C0] RBP: ffffc90000de6730 R08: 0000000000000004 R09: 0000000000000003 [ 189.695653][ C0] R10: fffff520001bccf8 R11: 1ffff920001bccf8 R12: dffffc0000000000 [ 189.703591][ C0] R13: ffffc90000de6cb0 R14: 0000000000000022 R15: 00000000dfb30586 [ 189.711662][ C0] tipc_sk_lookup+0xa1/0x5f0 [ 189.716272][ C0] ? __kasan_check_write+0x14/0x20 [ 189.721617][ C0] ? _raw_spin_lock_bh+0x8e/0xe0 [ 189.726532][ C0] ? tipc_sk_rcv+0x1ef0/0x1ef0 [ 189.731269][ C0] tipc_sk_rcv+0x3eb/0x1ef0 [ 189.735766][ C0] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 189.741557][ C0] ? __stack_depot_save+0x479/0x4c0 [ 189.746817][ C0] ? kasan_set_track+0x5b/0x70 [ 189.751570][ C0] ? kasan_set_track+0x4a/0x70 [ 189.756316][ C0] ? ____kasan_slab_free+0x125/0x160 [ 189.761568][ C0] ? __kasan_slab_free+0x11/0x20 [ 189.766500][ C0] ? kmem_cache_free+0x100/0x2d0 [ 189.771412][ C0] ? kfree_skbmem+0x10c/0x180 [ 189.776054][ C0] ? kfree_skb+0xc1/0x2f0 [ 189.780353][ C0] ? tipc_sk_backlog_rcv+0x16f/0x1f0 [ 189.785602][ C0] ? __release_sock+0x146/0x360 [ 189.790417][ C0] ? __sys_setsockopt+0x265/0x460 [ 189.795407][ C0] ? __skb_queue_purge+0x170/0x170 [ 189.800486][ C0] tipc_node_xmit+0x256/0xcd0 [ 189.805136][ C0] ? debug_smp_processor_id+0x17/0x20 [ 189.810475][ C0] ? tipc_node_get_linkname+0x1a0/0x1a0 [ 189.816003][ C0] ? ____kasan_slab_free+0x130/0x160 [ 189.821266][ C0] ? __kasan_slab_free+0x11/0x20 [ 189.826173][ C0] ? slab_free_freelist_hook+0xc5/0x190 [ 189.831704][ C0] ? kfree_skbmem+0x10c/0x180 [ 189.836353][ C0] tipc_node_distr_xmit+0x292/0x390 [ 189.841519][ C0] ? tipc_node_xmit_skb+0x130/0x130 [ 189.846684][ C0] ? trace_tipc_sk_rej_msg+0x2c/0x6d0 [ 189.852021][ C0] tipc_sk_rcv+0x19b9/0x1ef0 [ 189.856581][ C0] ? __skb_queue_purge+0x170/0x170 [ 189.861689][ C0] tipc_node_xmit+0x256/0xcd0 [ 189.866335][ C0] ? tipc_node_get_linkname+0x1a0/0x1a0 [ 189.871848][ C0] tipc_sk_push_backlog+0x4dd/0x790 [ 189.877024][ C0] tipc_sk_proto_rcv+0x98d/0x1ac0 [ 189.882040][ C0] ? trace_tipc_sk_dump+0x6c0/0x6c0 [ 189.887217][ C0] ? __kasan_check_write+0x14/0x20 [ 189.892313][ C0] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 189.897743][ C0] ? _raw_spin_lock+0xe0/0xe0 [ 189.902413][ C0] tipc_sk_filter_rcv+0x30ac/0x3850 [ 189.907611][ C0] ? __stack_depot_save+0x479/0x4c0 [ 189.912781][ C0] ? kasan_set_track+0x5b/0x70 [ 189.917515][ C0] ? kasan_set_track+0x4a/0x70 [ 189.922246][ C0] ? kasan_set_free_info+0x23/0x40 [ 189.927322][ C0] ? ____kasan_slab_free+0x125/0x160 [ 189.932584][ C0] ? __kasan_slab_free+0x11/0x20 [ 189.937489][ C0] ? slab_free_freelist_hook+0xc5/0x190 [ 189.943008][ C0] ? kmem_cache_free+0x100/0x2d0 [ 189.947915][ C0] ? kfree_skb+0xc1/0x2f0 [ 189.952209][ C0] ? tipc_msg_reverse+0x698/0x900 [ 189.957201][ C0] ? tipc_sk_filter_rcv+0xca0/0x3850 [ 189.962576][ C0] ? tipc_sk_backlog_rcv+0x109/0x1f0 [ 189.967943][ C0] ? __release_sock+0x146/0x360 [ 189.972764][ C0] ? __sys_setsockopt+0x265/0x460 [ 189.977864][ C0] ? __x64_sys_setsockopt+0xbf/0xd0 [ 189.983030][ C0] ? do_syscall_64+0x31/0x40 [ 189.987593][ C0] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 189.993631][ C0] ? tipc_sk_dump+0xfc0/0xfc0 [ 189.998363][ C0] ? __kasan_check_write+0x14/0x20 [ 190.003439][ C0] ? _raw_spin_lock_bh+0x8e/0xe0 [ 190.008341][ C0] tipc_sk_rcv+0x7cc/0x1ef0 [ 190.012814][ C0] ? slab_free_freelist_hook+0xc5/0x190 [ 190.018332][ C0] ? kmem_cache_free+0x100/0x2d0 [ 190.023241][ C0] ? __skb_queue_purge+0x170/0x170 [ 190.028316][ C0] ? tipc_sk_filter_rcv+0x3034/0x3850 [ 190.033655][ C0] tipc_node_xmit+0x256/0xcd0 [ 190.038305][ C0] ? tipc_node_get_linkname+0x1a0/0x1a0 [ 190.043820][ C0] tipc_node_distr_xmit+0x292/0x390 [ 190.048984][ C0] ? tipc_node_xmit_skb+0x130/0x130 [ 190.054160][ C0] ? selinux_capable+0x29c/0x380 [ 190.059062][ C0] tipc_sk_backlog_rcv+0x16f/0x1f0 [ 190.064228][ C0] ? tipc_sk_timeout+0x970/0x970 [ 190.069149][ C0] ? __local_bh_enable_ip+0x53/0x80 [ 190.074314][ C0] ? lock_sock_nested+0x1f5/0x290 [ 190.079344][ C0] __release_sock+0x146/0x360 [ 190.084011][ C0] sock_setsockopt+0x125e/0x2350 [ 190.088920][ C0] ? __sock_set_mark+0x160/0x160 [ 190.093826][ C0] ? selinux_socket_setsockopt+0x21c/0x300 [ 190.099596][ C0] ? selinux_socket_getsockopt+0x2e0/0x2e0 [ 190.105370][ C0] ? __fget_files+0x2c4/0x320 [ 190.110012][ C0] ? security_socket_setsockopt+0x82/0xa0 [ 190.115698][ C0] __sys_setsockopt+0x265/0x460 [ 190.120514][ C0] ? __ia32_sys_recv+0xb0/0xb0 [ 190.125252][ C0] ? debug_smp_processor_id+0x17/0x20 [ 190.130586][ C0] __x64_sys_setsockopt+0xbf/0xd0 [ 190.135589][ C0] do_syscall_64+0x31/0x40 [ 190.139972][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 190.145831][ C0] RIP: 0033:0x7ff5054c7be9 [ 190.150229][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 190.169893][ C0] RSP: 002b:00007ff503eee038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 190.178362][ C0] RAX: ffffffffffffffda RBX: 00007ff5056ef180 RCX: 00007ff5054c7be9 [ 190.186397][ C0] RDX: 0000000000000021 RSI: 0000000000000001 RDI: 0000000000000003 [ 190.194347][ C0] RBP: 00007ff50554ae19 R08: 0000000000000004 R09: 0000000000000000 [ 190.202320][ C0] R10: 00002000000001c0 R11: 0000000000000246 R12: 0000000000000000 [ 190.210282][ C0] R13: 00007ff5056ef218 R14: 00007ff5056ef180 R15: 00007ffd1e2849a8 [ 242.937106][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 123s! [syz.1.926:3193] [ 242.945284][ C1] Modules linked in: [ 242.949165][ C1] CPU: 1 PID: 3193 Comm: syz.1.926 Not tainted 5.10.240-syzkaller #0 [ 242.957200][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 242.967249][ C1] RIP: 0010:kvm_wait+0xc2/0x120 [ 242.972077][ C1] Code: 38 f0 75 26 41 f7 c4 00 02 00 00 75 0f 0f 1f 44 00 00 0f 00 2d ff 98 98 03 f4 eb 0e 0f 1f 44 00 00 0f 00 2d f0 98 98 03 fb f4 <4c> 89 64 24 18 ff 74 24 18 9d 48 c7 44 24 20 0e 36 e0 45 4b c7 04 [ 242.992184][ C1] RSP: 0018:ffffc900013476e0 EFLAGS: 00000246 [ 242.998232][ C1] RAX: 0000000000000003 RBX: ffff888125bded88 RCX: ffffffff814b22ca [ 243.006182][ C1] RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffff888125bded88 [ 243.014134][ C1] RBP: ffffc90001347790 R08: dffffc0000000000 R09: ffffed1024b7bdb2 [ 243.022087][ C1] R10: ffffed1024b7bdb2 R11: 1ffff11024b7bdb1 R12: 0000000000000246 [ 243.030036][ C1] R13: 1ffff11024b7bdb1 R14: dffffc0000000000 R15: 1ffff92000268ee0 [ 243.037988][ C1] FS: 00007ff503f0f6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 243.046894][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 243.053454][ C1] CR2: ffffffffd88f0000 CR3: 00000001163de000 CR4: 00000000003506a0 [ 243.061405][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 243.069356][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff1 DR7: 0000000000000600 [ 243.077304][ C1] Call Trace: [ 243.080584][ C1] ? asm_common_interrupt+0x1e/0x40 [ 243.085761][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 243.090850][ C1] ? __pv_queued_spin_lock_slowpath+0x6ba/0xb70 [ 243.097079][ C1] __pv_queued_spin_lock_slowpath+0x714/0xb70 [ 243.103129][ C1] ? memcpy+0x56/0x70 [ 243.107098][ C1] ? __pv_queued_spin_unlock_slowpath+0x280/0x280 [ 243.113491][ C1] ? avc_has_perm_noaudit+0x240/0x240 [ 243.118841][ C1] queued_spin_lock_slowpath+0x47/0x50 [ 243.124280][ C1] _raw_spin_lock_bh+0xd8/0xe0 [ 243.129020][ C1] ? _raw_spin_lock_irq+0xe0/0xe0 [ 243.134198][ C1] lock_sock_nested+0x92/0x290 [ 243.138945][ C1] ? sock_init_data+0xc0/0xc0 [ 243.143602][ C1] ? memset+0x35/0x40 [ 243.147570][ C1] ? bpf_probe_read_compat+0x156/0x180 [ 243.153005][ C1] tipc_sendstream+0x47/0x70 [ 243.157571][ C1] ? tipc_getsockopt+0x4c0/0x4c0 [ 243.162488][ C1] ____sys_sendmsg+0x5a2/0x8c0 [ 243.167239][ C1] ? __sys_sendmsg_sock+0x40/0x40 [ 243.172257][ C1] ? import_iovec+0x7c/0xb0 [ 243.176745][ C1] ___sys_sendmsg+0x1f0/0x260 [ 243.181417][ C1] ? __sys_sendmsg+0x250/0x250 [ 243.186175][ C1] ? __fdget+0x1a1/0x230 [ 243.190401][ C1] __x64_sys_sendmsg+0x1e2/0x2a0 [ 243.195317][ C1] ? ___sys_sendmsg+0x260/0x260 [ 243.200146][ C1] ? switch_fpu_return+0x197/0x340 [ 243.205238][ C1] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 243.211280][ C1] do_syscall_64+0x31/0x40 [ 243.215680][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 243.221555][ C1] RIP: 0033:0x7ff5054c7be9 [ 243.226029][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 243.245730][ C1] RSP: 002b:00007ff503f0f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 243.254156][ C1] RAX: ffffffffffffffda RBX: 00007ff5056ef090 RCX: 00007ff5054c7be9 [ 243.262131][ C1] RDX: 0000000000000000 RSI: 0000200000002700 RDI: 0000000000000004 [ 243.270100][ C1] RBP: 00007ff50554ae19 R08: 0000000000000000 R09: 0000000000000000 [ 243.278055][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 243.286096][ C1] R13: 00007ff5056ef128 R14: 00007ff5056ef090 R15: 00007ffd1e2849a8 [ 243.294143][ C1] Sending NMI from CPU 1 to CPUs 0: [ 243.300166][ C0] NMI backtrace for cpu 0 [ 243.300171][ C0] CPU: 0 PID: 3194 Comm: syz.1.926 Not tainted 5.10.240-syzkaller #0 [ 243.300176][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 243.300179][ C0] RIP: 0010:__sanitizer_cov_trace_const_cmp4+0x10/0x90 [ 243.300188][ C0] Code: 18 4a 89 44 01 20 48 ff c2 48 89 11 5d c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 55 48 89 e5 48 8b 45 08 65 48 8b 15 50 c9 9e 7e <65> 8b 0d 55 c9 9e 7e f7 c1 00 01 ff 00 74 11 f7 c1 00 01 00 00 74 [ 243.300192][ C0] RSP: 0018:ffffc90000de6730 EFLAGS: 00000246 [ 243.300199][ C0] RAX: ffffffff845d06d6 RBX: ffff888125bded80 RCX: ffffffff845d06bd [ 243.300203][ C0] RDX: ffff888118c493c0 RSI: 0000000000000004 RDI: 0000000000000000 [ 243.300207][ C0] RBP: ffffc90000de6730 R08: dffffc0000000000 R09: ffffed1024b7bdb1 [ 243.300211][ C0] R10: ffffed1024b7bdb1 R11: 1ffff11024b7bdb0 R12: dffffc0000000000 [ 243.300215][ C0] R13: ffff888125bded00 R14: 0000000000000004 R15: fffffffffffffc18 [ 243.300219][ C0] FS: 00007ff503eee6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 243.300223][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 243.300227][ C0] CR2: ffffffffd88f0000 CR3: 00000001163de000 CR4: 00000000003506b0 [ 243.300231][ C0] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 243.300235][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 243.300237][ C0] Call Trace: [ 243.300239][ C0] tipc_sk_lookup+0x4f6/0x5f0 [ 243.300242][ C0] ? tipc_sk_rcv+0x1ef0/0x1ef0 [ 243.300245][ C0] tipc_sk_rcv+0x3eb/0x1ef0 [ 243.300248][ C0] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 243.300251][ C0] ? __stack_depot_save+0x479/0x4c0 [ 243.300253][ C0] ? kasan_set_track+0x5b/0x70 [ 243.300256][ C0] ? kasan_set_track+0x4a/0x70 [ 243.300259][ C0] ? ____kasan_slab_free+0x125/0x160 [ 243.300262][ C0] ? __kasan_slab_free+0x11/0x20 [ 243.300264][ C0] ? kmem_cache_free+0x100/0x2d0 [ 243.300267][ C0] ? kfree_skbmem+0x10c/0x180 [ 243.300269][ C0] ? kfree_skb+0xc1/0x2f0 [ 243.300272][ C0] ? tipc_sk_backlog_rcv+0x16f/0x1f0 [ 243.300275][ C0] ? __release_sock+0x146/0x360 [ 243.300278][ C0] ? __sys_setsockopt+0x265/0x460 [ 243.300281][ C0] ? __skb_queue_purge+0x170/0x170 [ 243.300284][ C0] tipc_node_xmit+0x256/0xcd0 [ 243.300287][ C0] ? debug_smp_processor_id+0x17/0x20 [ 243.300290][ C0] ? tipc_node_get_linkname+0x1a0/0x1a0 [ 243.300293][ C0] ? ____kasan_slab_free+0x130/0x160 [ 243.300296][ C0] ? __kasan_slab_free+0x11/0x20 [ 243.300299][ C0] ? slab_free_freelist_hook+0xc5/0x190 [ 243.300302][ C0] ? kfree_skbmem+0x10c/0x180 [ 243.300305][ C0] tipc_node_distr_xmit+0x292/0x390 [ 243.300307][ C0] ? tipc_node_xmit_skb+0x130/0x130 [ 243.300310][ C0] ? trace_tipc_sk_rej_msg+0x2c/0x6d0 [ 243.300313][ C0] tipc_sk_rcv+0x19b9/0x1ef0 [ 243.300316][ C0] ? __skb_queue_purge+0x170/0x170 [ 243.300318][ C0] tipc_node_xmit+0x256/0xcd0 [ 243.300321][ C0] ? tipc_node_get_linkname+0x1a0/0x1a0 [ 243.300324][ C0] tipc_sk_push_backlog+0x4dd/0x790 [ 243.300326][ C0] tipc_sk_proto_rcv+0x98d/0x1ac0 [ 243.300328][ C0] ? trace_tipc_sk_dump+0x6c0/0x6c0 [ 243.300330][ C0] ? __kasan_check_write+0x14/0x20 [ 243.300333][ C0] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 243.300335][ C0] ? _raw_spin_lock+0xe0/0xe0 [ 243.300337][ C0] tipc_sk_filter_rcv+0x30ac/0x3850 [ 243.300339][ C0] ? __stack_depot_save+0x479/0x4c0 [ 243.300341][ C0] ? kasan_set_track+0x5b/0x70 [ 243.300343][ C0] ? kasan_set_track+0x4a/0x70 [ 243.300346][ C0] ? kasan_set_free_info+0x23/0x40 [ 243.300348][ C0] ? ____kasan_slab_free+0x125/0x160 [ 243.300350][ C0] ? __kasan_slab_free+0x11/0x20 [ 243.300352][ C0] ? slab_free_freelist_hook+0xc5/0x190 [ 243.300355][ C0] ? kmem_cache_free+0x100/0x2d0 [ 243.300357][ C0] ? kfree_skb+0xc1/0x2f0 [ 243.300359][ C0] ? tipc_msg_reverse+0x698/0x900 [ 243.300361][ C0] ? tipc_sk_filter_rcv+0xca0/0x3850 [ 243.300363][ C0] ? tipc_sk_backlog_rcv+0x109/0x1f0 [ 243.300366][ C0] ? __release_sock+0x146/0x360 [ 243.300368][ C0] ? __sys_setsockopt+0x265/0x460 [ 243.300370][ C0] ? __x64_sys_setsockopt+0xbf/0xd0 [ 243.300372][ C0] ? do_syscall_64+0x31/0x40 [ 243.300374][ C0] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 243.300376][ C0] ? tipc_sk_dump+0xfc0/0xfc0 [ 243.300379][ C0] ? __kasan_check_write+0x14/0x20 [ 243.300381][ C0] ? _raw_spin_lock_bh+0x8e/0xe0 [ 243.300383][ C0] tipc_sk_rcv+0x7cc/0x1ef0 [ 243.300385][ C0] ? slab_free_freelist_hook+0xc5/0x190 [ 243.300387][ C0] ? kmem_cache_free+0x100/0x2d0 [ 243.300390][ C0] ? __skb_queue_purge+0x170/0x170 [ 243.300392][ C0] ? tipc_sk_filter_rcv+0x3034/0x3850 [ 243.300394][ C0] tipc_node_xmit+0x256/0xcd0 [ 243.300397][ C0] ? tipc_node_get_linkname+0x1a0/0x1a0 [ 243.300399][ C0] tipc_node_distr_xmit+0x292/0x390 [ 243.300401][ C0] ? tipc_node_xmit_skb+0x130/0x130 [ 243.300403][ C0] ? selinux_capable+0x29c/0x380 [ 243.300405][ C0] tipc_sk_backlog_rcv+0x16f/0x1f0 [ 243.300408][ C0] ? tipc_sk_timeout+0x970/0x970 [ 243.300410][ C0] ? __local_bh_enable_ip+0x53/0x80 [ 243.300412][ C0] ? lock_sock_nested+0x1f5/0x290 [ 243.300414][ C0] __release_sock+0x146/0x360 [ 243.300416][ C0] sock_setsockopt+0x125e/0x2350 [ 243.300418][ C0] ? __sock_set_mark+0x160/0x160 [ 243.300421][ C0] ? selinux_socket_setsockopt+0x21c/0x300 [ 243.300423][ C0] ? selinux_socket_getsockopt+0x2e0/0x2e0 [ 243.300425][ C0] ? __fget_files+0x2c4/0x320 [ 243.300427][ C0] ? security_socket_setsockopt+0x82/0xa0 [ 243.300430][ C0] __sys_setsockopt+0x265/0x460 [ 243.300432][ C0] ? __ia32_sys_recv+0xb0/0xb0 [ 243.300434][ C0] ? debug_smp_processor_id+0x17/0x20 [ 243.300436][ C0] __x64_sys_setsockopt+0xbf/0xd0 [ 243.300438][ C0] do_syscall_64+0x31/0x40 [ 243.300441][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 243.300443][ C0] RIP: 0033:0x7ff5054c7be9 [ 243.300449][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 243.300452][ C0] RSP: 002b:00007ff503eee038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 243.300458][ C0] RAX: ffffffffffffffda RBX: 00007ff5056ef180 RCX: 00007ff5054c7be9 [ 243.300461][ C0] RDX: 0000000000000021 RSI: 0000000000000001 RDI: 0000000000000003 [ 243.300464][ C0] RBP: 00007ff50554ae19 R08: 0000000000000004 R09: 0000000000000000 [ 243.300467][ C0] R10: 00002000000001c0 R11: 0000000000000246 R12: 0000000000000000 [ 243.300470][ C0] R13: 00007ff5056ef218 R14: 00007ff5056ef180 R15: 00007ffd1e2849a8