last executing test programs: 9.62304679s ago: executing program 4 (id=621): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) r3 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xb0000}, 0x805, 0xffffffff, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000bc0)='!\x00') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000bc0)='!\x00') bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r1, r2, 0x2, 0x2}, 0x10) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000004c0)=ANY=[@ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="0200000002"], 0x10) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000004c0)=ANY=[@ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="0200000002"], 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) (async) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x4) (async) sendmsg$inet(0xffffffffffffffff, 0x0, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) 9.536558492s ago: executing program 4 (id=623): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='timer_start\x00', r0}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000680)) (fail_nth: 7) 8.676165629s ago: executing program 4 (id=625): r0 = syz_clone(0x1002000, &(0x7f0000000000)="17e4202ba952433b21fa1ddf", 0xc, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="8a4b9cfeee20fc40ca378355326f073a3c9765861f55abba7e2bf0dff4453ad71b74028c73b0a9ecd55539496af3103a6a0d59cd05fe5364379ec5ed684a188d") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0xb6, 0x70, 0x5, 0x0, 0x81, 0x400, 0xf, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x10000, 0x1}, 0x1840, 0xbc5, 0xe, 0x0, 0x9, 0x3e, 0xe85, 0x0, 0x81, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x8, 0x9, 0x61, 0xb, 0x0, 0x8, 0x4, 0x7, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0xfffffffffffffffd, 0x100}, 0x280, 0xffffffff, 0x101, 0x1, 0x1, 0xfffffffa, 0x4, 0x0, 0x200, 0x0, 0x9}, r0, 0x6, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='f2fs_readpages\x00', 0xffffffffffffffff, 0x0, 0x9}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r1, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r3, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x0, '\x00', r4, r5, 0x3, 0x0, 0x5}, 0x50) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)={0x1b, 0x0, 0x0, 0x1b87673, 0x0, r5, 0x2, '\x00', r4, r5, 0x3, 0x4, 0x3}, 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000700)={0x0, 0x0}, 0x8) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x9, &(0x7f0000000740)=@raw=[@btf_id={0x18, 0xe, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0xb}, @map_fd={0x18, 0x3, 0x1, 0x0, r3}, @alu={0x4, 0x1, 0x6, 0x6, 0x7, 0xffffffffffffffe0}, @func={0x85, 0x0, 0x1, 0x0, 0x2}], &(0x7f00000007c0)='syzkaller\x00', 0x4, 0x0, &(0x7f0000000800), 0x41100, 0x1, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0x8, 0x2, 0x8}, 0x10, 0x1504a, 0xffffffffffffffff, 0x7, &(0x7f00000008c0)=[r3, r6, 0x1, r6, r6, r3, r3, r3], &(0x7f0000000900)=[{0x5, 0x2, 0x3, 0x8}, {0x5, 0x3, 0x3, 0xc}, {0x2, 0x5, 0x1, 0x7}, {0x4, 0x1, 0x9, 0x8}, {0x1, 0x1, 0xa}, {0x1, 0x1, 0xb, 0xc}, {0x5, 0x1}], 0x10, 0x5}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xa, 0x19, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x53c3, 0x0, 0x0, 0x0, 0x98}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1000}}, @map_fd={0x18, 0x8, 0x1, 0x0, r6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f00000005c0)='GPL\x00', 0x2, 0xbf, &(0x7f0000000600)=""/191, 0x40f00, 0x52, '\x00', r4, @fallback=0x36, r5, 0x8, &(0x7f00000006c0)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, r8, r9, 0x3, &(0x7f0000000a40)=[r6, r3], &(0x7f0000000a80)=[{0x3, 0x1, 0xa, 0x3}, {0x3, 0x3, 0xf, 0x4}, {0x3, 0x2, 0x9, 0x6}], 0x10, 0x1}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000d40)={r5, 0x20, &(0x7f0000000d00)={&(0x7f0000000bc0)=""/1, 0x1, 0x0, &(0x7f0000000c00)=""/246, 0xf6}}, 0x10) setsockopt$sock_attach_bpf(r12, 0x1, 0x32, &(0x7f0000000d80)=r10, 0x4) setsockopt$sock_attach_bpf(r12, 0x1, 0x32, &(0x7f0000000dc0)=r9, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001e80)={r3, &(0x7f0000000e00)="84c2ad0a24289f2f24501d37379a9645ee31a66ed1d5aa3b4fb5c49c833c1c84980949676c3d6d2dd6171a191cdc26ef518e3bf4531090f91f2da0cf8cd3408b971593b8564e30714ec64373c8c647ce734959c3b969da82ff", &(0x7f0000000e80)=""/4096, 0x4}, 0x20) close(r10) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001ec0)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0x6, '\x00', r4, r5, 0x4, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001fc0)={{r6, 0xffffffffffffffff}, &(0x7f0000001f40), &(0x7f0000001f80)=r13}, 0x20) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002280)={0x2, 0x4, 0x8, 0x1, 0x80, r6, 0x0, '\x00', r4, r5, 0x3, 0x5, 0x3}, 0x50) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000002340)={0x1c, 0x1b, &(0x7f0000002000)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x1}, @exit, @cb_func={0x18, 0x9, 0x4, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbf}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfdd5}}], &(0x7f0000002100)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000002140)=""/217, 0x41000, 0x2, '\x00', 0x0, @fallback=0xd, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002240)={0x3, 0x7, 0x8, 0x2}, 0x10, 0xffffffffffffffff, r9, 0x0, &(0x7f0000002300)=[r6, r6, r6, r7, r15], 0x0, 0x10, 0x412}, 0x94) perf_event_open(&(0x7f0000002440)={0x1, 0x80, 0x6, 0x1, 0x8, 0x8, 0x0, 0x7, 0x10, 0xd, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x21, 0x0, @perf_bp={&(0x7f0000002400), 0x3}, 0x90, 0x101, 0x20000000, 0x8, 0x6, 0x6, 0x9, 0x0, 0x3, 0x0, 0x5}, 0x0, 0xf, 0xffffffffffffffff, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002540)={{r11, 0xffffffffffffffff}, &(0x7f00000024c0), &(0x7f0000002500)=r16}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002600)={{r17}, &(0x7f0000002580), &(0x7f00000025c0)=r10}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002640)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002780)={r13, &(0x7f0000002680)="7a207de45e3357b892fe902eea03f7f5cc29cb9f2c4ace41b02ef1d9ced03b4162f199566278f6d924fbd1b08401bc034b716aed7940a9c113693b", &(0x7f00000026c0)=""/140}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000027c0)='syzkaller\x00') r18 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002a00)={0x18, 0x8, &(0x7f0000002840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x4}, [@cb_func={0x18, 0xb, 0x4, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x5d}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000002880)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41000, 0x66, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f00000028c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000002900)={0x3, 0x1, 0x400}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002940)=[r14, r17, r7, r15, r14, r3, r15, r6, r7, r3], &(0x7f0000002980)=[{0x2, 0x3, 0x5, 0x8}, {0x3, 0x5, 0x10, 0x8}, {0x2, 0x2, 0x1, 0x2}, {0x2, 0x1, 0xe, 0x6}, {0x4, 0x2, 0x0, 0x8}], 0x10, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002ac0)={&(0x7f0000002800)='cachefiles_mark_failed\x00', r18, 0x0, 0xff}, 0x18) 6.130786719s ago: executing program 4 (id=625): r0 = syz_clone(0x1002000, &(0x7f0000000000)="17e4202ba952433b21fa1ddf", 0xc, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="8a4b9cfeee20fc40ca378355326f073a3c9765861f55abba7e2bf0dff4453ad71b74028c73b0a9ecd55539496af3103a6a0d59cd05fe5364379ec5ed684a188d") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0xb6, 0x70, 0x5, 0x0, 0x81, 0x400, 0xf, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x10000, 0x1}, 0x1840, 0xbc5, 0xe, 0x0, 0x9, 0x3e, 0xe85, 0x0, 0x81, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x8, 0x9, 0x61, 0xb, 0x0, 0x8, 0x4, 0x7, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0xfffffffffffffffd, 0x100}, 0x280, 0xffffffff, 0x101, 0x1, 0x1, 0xfffffffa, 0x4, 0x0, 0x200, 0x0, 0x9}, r0, 0x6, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='f2fs_readpages\x00', 0xffffffffffffffff, 0x0, 0x9}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r1, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r3, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x0, '\x00', r4, r5, 0x3, 0x0, 0x5}, 0x50) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)={0x1b, 0x0, 0x0, 0x1b87673, 0x0, r5, 0x2, '\x00', r4, r5, 0x3, 0x4, 0x3}, 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000700)={0x0, 0x0}, 0x8) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x9, &(0x7f0000000740)=@raw=[@btf_id={0x18, 0xe, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0xb}, @map_fd={0x18, 0x3, 0x1, 0x0, r3}, @alu={0x4, 0x1, 0x6, 0x6, 0x7, 0xffffffffffffffe0}, @func={0x85, 0x0, 0x1, 0x0, 0x2}], &(0x7f00000007c0)='syzkaller\x00', 0x4, 0x0, &(0x7f0000000800), 0x41100, 0x1, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0x8, 0x2, 0x8}, 0x10, 0x1504a, 0xffffffffffffffff, 0x7, &(0x7f00000008c0)=[r3, r6, 0x1, r6, r6, r3, r3, r3], &(0x7f0000000900)=[{0x5, 0x2, 0x3, 0x8}, {0x5, 0x3, 0x3, 0xc}, {0x2, 0x5, 0x1, 0x7}, {0x4, 0x1, 0x9, 0x8}, {0x1, 0x1, 0xa}, {0x1, 0x1, 0xb, 0xc}, {0x5, 0x1}], 0x10, 0x5}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xa, 0x19, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x53c3, 0x0, 0x0, 0x0, 0x98}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1000}}, @map_fd={0x18, 0x8, 0x1, 0x0, r6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f00000005c0)='GPL\x00', 0x2, 0xbf, &(0x7f0000000600)=""/191, 0x40f00, 0x52, '\x00', r4, @fallback=0x36, r5, 0x8, &(0x7f00000006c0)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, r8, r9, 0x3, &(0x7f0000000a40)=[r6, r3], &(0x7f0000000a80)=[{0x3, 0x1, 0xa, 0x3}, {0x3, 0x3, 0xf, 0x4}, {0x3, 0x2, 0x9, 0x6}], 0x10, 0x1}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000d40)={r5, 0x20, &(0x7f0000000d00)={&(0x7f0000000bc0)=""/1, 0x1, 0x0, &(0x7f0000000c00)=""/246, 0xf6}}, 0x10) setsockopt$sock_attach_bpf(r12, 0x1, 0x32, &(0x7f0000000d80)=r10, 0x4) setsockopt$sock_attach_bpf(r12, 0x1, 0x32, &(0x7f0000000dc0)=r9, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001e80)={r3, &(0x7f0000000e00)="84c2ad0a24289f2f24501d37379a9645ee31a66ed1d5aa3b4fb5c49c833c1c84980949676c3d6d2dd6171a191cdc26ef518e3bf4531090f91f2da0cf8cd3408b971593b8564e30714ec64373c8c647ce734959c3b969da82ff", &(0x7f0000000e80)=""/4096, 0x4}, 0x20) close(r10) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001ec0)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0x6, '\x00', r4, r5, 0x4, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001fc0)={{r6, 0xffffffffffffffff}, &(0x7f0000001f40), &(0x7f0000001f80)=r13}, 0x20) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002280)={0x2, 0x4, 0x8, 0x1, 0x80, r6, 0x0, '\x00', r4, r5, 0x3, 0x5, 0x3}, 0x50) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000002340)={0x1c, 0x1b, &(0x7f0000002000)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x1}, @exit, @cb_func={0x18, 0x9, 0x4, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbf}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfdd5}}], &(0x7f0000002100)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000002140)=""/217, 0x41000, 0x2, '\x00', 0x0, @fallback=0xd, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002240)={0x3, 0x7, 0x8, 0x2}, 0x10, 0xffffffffffffffff, r9, 0x0, &(0x7f0000002300)=[r6, r6, r6, r7, r15], 0x0, 0x10, 0x412}, 0x94) perf_event_open(&(0x7f0000002440)={0x1, 0x80, 0x6, 0x1, 0x8, 0x8, 0x0, 0x7, 0x10, 0xd, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x21, 0x0, @perf_bp={&(0x7f0000002400), 0x3}, 0x90, 0x101, 0x20000000, 0x8, 0x6, 0x6, 0x9, 0x0, 0x3, 0x0, 0x5}, 0x0, 0xf, 0xffffffffffffffff, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002540)={{r11, 0xffffffffffffffff}, &(0x7f00000024c0), &(0x7f0000002500)=r16}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002600)={{r17}, &(0x7f0000002580), &(0x7f00000025c0)=r10}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002640)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002780)={r13, &(0x7f0000002680)="7a207de45e3357b892fe902eea03f7f5cc29cb9f2c4ace41b02ef1d9ced03b4162f199566278f6d924fbd1b08401bc034b716aed7940a9c113693b", &(0x7f00000026c0)=""/140}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000027c0)='syzkaller\x00') r18 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002a00)={0x18, 0x8, &(0x7f0000002840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x4}, [@cb_func={0x18, 0xb, 0x4, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x5d}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000002880)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41000, 0x66, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f00000028c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000002900)={0x3, 0x1, 0x400}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002940)=[r14, r17, r7, r15, r14, r3, r15, r6, r7, r3], &(0x7f0000002980)=[{0x2, 0x3, 0x5, 0x8}, {0x3, 0x5, 0x10, 0x8}, {0x2, 0x2, 0x1, 0x2}, {0x2, 0x1, 0xe, 0x6}, {0x4, 0x2, 0x0, 0x8}], 0x10, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002ac0)={&(0x7f0000002800)='cachefiles_mark_failed\x00', r18, 0x0, 0xff}, 0x18) 5.05739749s ago: executing program 3 (id=660): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='sit0\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 4.882348644s ago: executing program 3 (id=661): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000200)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300), 0x0, 0x88, &(0x7f0000000540), 0x0, 0x10, &(0x7f0000000580), &(0x7f0000000680), 0x8, 0xac, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0a000000880000000200000004"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="09000000030000000400010005"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1b, 0x14, &(0x7f0000000280)=ANY=[@ANYRES8=r0, @ANYRES16=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0xc, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000500000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000880)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x2, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[], 0x88}, 0x0) close(r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) 3.05979921s ago: executing program 4 (id=625): r0 = syz_clone(0x1002000, &(0x7f0000000000)="17e4202ba952433b21fa1ddf", 0xc, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="8a4b9cfeee20fc40ca378355326f073a3c9765861f55abba7e2bf0dff4453ad71b74028c73b0a9ecd55539496af3103a6a0d59cd05fe5364379ec5ed684a188d") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0xb6, 0x70, 0x5, 0x0, 0x81, 0x400, 0xf, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x10000, 0x1}, 0x1840, 0xbc5, 0xe, 0x0, 0x9, 0x3e, 0xe85, 0x0, 0x81, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x8, 0x9, 0x61, 0xb, 0x0, 0x8, 0x4, 0x7, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0xfffffffffffffffd, 0x100}, 0x280, 0xffffffff, 0x101, 0x1, 0x1, 0xfffffffa, 0x4, 0x0, 0x200, 0x0, 0x9}, r0, 0x6, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='f2fs_readpages\x00', 0xffffffffffffffff, 0x0, 0x9}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r1, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r3, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x0, '\x00', r4, r5, 0x3, 0x0, 0x5}, 0x50) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)={0x1b, 0x0, 0x0, 0x1b87673, 0x0, r5, 0x2, '\x00', r4, r5, 0x3, 0x4, 0x3}, 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000700)={0x0, 0x0}, 0x8) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x9, &(0x7f0000000740)=@raw=[@btf_id={0x18, 0xe, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0xb}, @map_fd={0x18, 0x3, 0x1, 0x0, r3}, @alu={0x4, 0x1, 0x6, 0x6, 0x7, 0xffffffffffffffe0}, @func={0x85, 0x0, 0x1, 0x0, 0x2}], &(0x7f00000007c0)='syzkaller\x00', 0x4, 0x0, &(0x7f0000000800), 0x41100, 0x1, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0x8, 0x2, 0x8}, 0x10, 0x1504a, 0xffffffffffffffff, 0x7, &(0x7f00000008c0)=[r3, r6, 0x1, r6, r6, r3, r3, r3], &(0x7f0000000900)=[{0x5, 0x2, 0x3, 0x8}, {0x5, 0x3, 0x3, 0xc}, {0x2, 0x5, 0x1, 0x7}, {0x4, 0x1, 0x9, 0x8}, {0x1, 0x1, 0xa}, {0x1, 0x1, 0xb, 0xc}, {0x5, 0x1}], 0x10, 0x5}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xa, 0x19, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x53c3, 0x0, 0x0, 0x0, 0x98}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1000}}, @map_fd={0x18, 0x8, 0x1, 0x0, r6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f00000005c0)='GPL\x00', 0x2, 0xbf, &(0x7f0000000600)=""/191, 0x40f00, 0x52, '\x00', r4, @fallback=0x36, r5, 0x8, &(0x7f00000006c0)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, r8, r9, 0x3, &(0x7f0000000a40)=[r6, r3], &(0x7f0000000a80)=[{0x3, 0x1, 0xa, 0x3}, {0x3, 0x3, 0xf, 0x4}, {0x3, 0x2, 0x9, 0x6}], 0x10, 0x1}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000d40)={r5, 0x20, &(0x7f0000000d00)={&(0x7f0000000bc0)=""/1, 0x1, 0x0, &(0x7f0000000c00)=""/246, 0xf6}}, 0x10) setsockopt$sock_attach_bpf(r12, 0x1, 0x32, &(0x7f0000000d80)=r10, 0x4) setsockopt$sock_attach_bpf(r12, 0x1, 0x32, &(0x7f0000000dc0)=r9, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001e80)={r3, &(0x7f0000000e00)="84c2ad0a24289f2f24501d37379a9645ee31a66ed1d5aa3b4fb5c49c833c1c84980949676c3d6d2dd6171a191cdc26ef518e3bf4531090f91f2da0cf8cd3408b971593b8564e30714ec64373c8c647ce734959c3b969da82ff", &(0x7f0000000e80)=""/4096, 0x4}, 0x20) close(r10) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001ec0)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0x6, '\x00', r4, r5, 0x4, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001fc0)={{r6, 0xffffffffffffffff}, &(0x7f0000001f40), &(0x7f0000001f80)=r13}, 0x20) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002280)={0x2, 0x4, 0x8, 0x1, 0x80, r6, 0x0, '\x00', r4, r5, 0x3, 0x5, 0x3}, 0x50) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000002340)={0x1c, 0x1b, &(0x7f0000002000)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x1}, @exit, @cb_func={0x18, 0x9, 0x4, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbf}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfdd5}}], &(0x7f0000002100)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000002140)=""/217, 0x41000, 0x2, '\x00', 0x0, @fallback=0xd, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002240)={0x3, 0x7, 0x8, 0x2}, 0x10, 0xffffffffffffffff, r9, 0x0, &(0x7f0000002300)=[r6, r6, r6, r7, r15], 0x0, 0x10, 0x412}, 0x94) perf_event_open(&(0x7f0000002440)={0x1, 0x80, 0x6, 0x1, 0x8, 0x8, 0x0, 0x7, 0x10, 0xd, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x21, 0x0, @perf_bp={&(0x7f0000002400), 0x3}, 0x90, 0x101, 0x20000000, 0x8, 0x6, 0x6, 0x9, 0x0, 0x3, 0x0, 0x5}, 0x0, 0xf, 0xffffffffffffffff, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002540)={{r11, 0xffffffffffffffff}, &(0x7f00000024c0), &(0x7f0000002500)=r16}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002600)={{r17}, &(0x7f0000002580), &(0x7f00000025c0)=r10}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002640)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002780)={r13, &(0x7f0000002680)="7a207de45e3357b892fe902eea03f7f5cc29cb9f2c4ace41b02ef1d9ced03b4162f199566278f6d924fbd1b08401bc034b716aed7940a9c113693b", &(0x7f00000026c0)=""/140}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000027c0)='syzkaller\x00') r18 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002a00)={0x18, 0x8, &(0x7f0000002840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x4}, [@cb_func={0x18, 0xb, 0x4, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x5d}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000002880)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41000, 0x66, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f00000028c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000002900)={0x3, 0x1, 0x400}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002940)=[r14, r17, r7, r15, r14, r3, r15, r6, r7, r3], &(0x7f0000002980)=[{0x2, 0x3, 0x5, 0x8}, {0x3, 0x5, 0x10, 0x8}, {0x2, 0x2, 0x1, 0x2}, {0x2, 0x1, 0xe, 0x6}, {0x4, 0x2, 0x0, 0x8}], 0x10, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002ac0)={&(0x7f0000002800)='cachefiles_mark_failed\x00', r18, 0x0, 0xff}, 0x18) 1.735837986s ago: executing program 0 (id=684): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x8b}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc9}, 0x80) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x2d, &(0x7f0000000040), 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x803e000000000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x8b}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc9}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) close(r0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) (async) setsockopt$sock_attach_bpf(r4, 0x1, 0x2d, &(0x7f0000000040), 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) (async) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x803e000000000000) (async) 1.733332956s ago: executing program 2 (id=685): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000340), 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r1, 0x2000012, 0xeaa, 0x7ffe, &(0x7f00000003c0)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 32) r2 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0x10, &(0x7f0000000b80)=ANY=[@ANYBLOB="1800000008000000000000000080000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702001014000000b7030000000000008500000083000000bf090000000000005509010000000000950000b521f92200850000007d00e519733d80db470000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000ac0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) (async, rerun: 64) write$cgroup_devices(r2, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x9) (rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000700000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801}, 0x94) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="09000000030000000400010005"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000002d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r5}, 0x10) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="000800000000000000000000000000ffee000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) (async, rerun: 32) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00070000f9ffff37f190e40d75ad1700000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) (rerun: 32) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000e00)=ANY=[@ANYBLOB="180800000000000000000000000000001811009900", @ANYRES32=r7, @ANYBLOB="0000000000000000b70200001c000000b7030000000000008500000005000000bca900000000000035090100000000009500000000000000b702000004000000632af8ff00000000b509000000000000c3aaf8fff1000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffc40200000800000018220000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[], 0x48) 1.560222159s ago: executing program 2 (id=686): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="850000000f0000009500000000000000141dea02fed2b50f0af040050ea87da2f56bcaf5f4f51b1034a5cc3f7c69da721e2fd23097996dce4a7e37bb8c9a8a86ec403f601d8c2178694eccc938eab450c164c46f650e7c7ff5af63f9b3b4df045a30a2143f811bbb0c7aa1"], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe9, &(0x7f0000000240)=""/233, 0x0, 0x11}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x3, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r3, 0x18000000000002a0, 0x36, 0x0, &(0x7f00000007c0)="d2205d96c717ab96f0ded75d86dd9927dad402a5852031a40676897d78362ab4c958b6f9213de17f242b046f3e8bda703073368e2b51", 0x0, 0xd5b5, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r1, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/221, 0xdd, 0x0, &(0x7f0000000340)=""/245, 0xf5}}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 1.48859248s ago: executing program 0 (id=688): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="040000000400000004000000050001"], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000880), 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r4 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) write$cgroup_subtree(r4, &(0x7f00000000c0)=ANY=[], 0x4) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 1.358841223s ago: executing program 2 (id=691): ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)=',)\x00') r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x80, 0x2, 0xf9, 0x4, 0x0, 0x0, 0x7, 0x20, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xfd, 0x1}, 0x100, 0xffff, 0x7, 0x2, 0x3, 0xd, 0x4, 0x0, 0x61f, 0x0, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000000c0)={0x2, 0x80, 0x3, 0x80, 0x9, 0x40, 0x0, 0xfffffffffffffff7, 0x4a00, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x81, 0x3, @perf_config_ext={0x941, 0x79}, 0x1, 0x2, 0x1, 0x1, 0x8, 0x5, 0xe7, 0x0, 0x9, 0x0, 0x591}) close(r0) r1 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140)=r1, 0x12) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x17, 0x7, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5c}, [@map_val={0x18, 0x2, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81}]}, &(0x7f0000000280)='GPL\x00', 0x7f, 0x1e, &(0x7f00000002c0)=""/30, 0x41000, 0x60, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xa, 0x9, 0xfffffffc}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000380)=[0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f00000003c0)=[{0x2, 0x5, 0xe, 0x4}, {0x0, 0x1, 0x9, 0xc}, {0x1, 0x2, 0x0, 0x4}, {0x1, 0x5, 0xd, 0x6}, {0x4, 0x1, 0x100, 0xb}, {0x0, 0x3, 0x7, 0x4}, {0x3, 0x5, 0xb, 0x6}], 0x10, 0x7fff}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r2, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000500)=r3}, 0x20) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={r2, 0x58, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b00)={r2, 0x20, &(0x7f0000000ac0)={&(0x7f00000008c0)=""/247, 0xf7, 0x0, &(0x7f00000009c0)=""/236, 0xec}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0xb, 0x18, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xaaf, 0x0, 0x0, 0x0, 0x418}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x8}, @map_idx_val={0x18, 0xc, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x7}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x7}, @alu={0x4, 0x1, 0x2, 0x1, 0x8, 0xffffffffffffffe0, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x1421b37c3c827848}}}, &(0x7f0000000680)='syzkaller\x00', 0x101, 0xaa, &(0x7f00000006c0)=""/170, 0x41100, 0x0, '\x00', r6, @fallback=0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x2, 0x6, 0xe, 0x8000}, 0x10, r7, r3, 0x0, &(0x7f0000000b40)=[r4], 0x0, 0x10, 0x8}, 0x94) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x8, [@enum={0x10, 0x5, 0x0, 0x6, 0x4, [{0x7, 0x2}, {0x10, 0xf}, {0x1, 0x10000}, {0xc, 0x7}, {0xe, 0x8}]}]}, {0x0, [0x2e, 0x2e, 0x2e, 0x61, 0x2e, 0x61]}}, &(0x7f0000000cc0)=""/210, 0x54, 0xd2, 0x0, 0xffffffff, 0x10000, @value=r5}, 0x28) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000e00)='\x00') bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0xf, 0x1d, &(0x7f0000000e40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xd}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000f40)='syzkaller\x00', 0x7, 0xdd, &(0x7f0000000f80)=""/221, 0x41000, 0x13, '\x00', r6, @fallback=0xf, r5, 0x8, &(0x7f0000001080)={0x3, 0x1}, 0x8, 0x10, &(0x7f00000010c0)={0x1, 0xf, 0x99d, 0x6}, 0x10, r7, r5, 0x1, 0x0, &(0x7f0000001100)=[{0x2, 0x1, 0xc, 0x5}]}, 0x94) write$cgroup_int(r5, &(0x7f0000001200)=0x6, 0x12) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001240)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x6, '\x00', 0x0, r9, 0x4, 0x2, 0x1}, 0x50) r11 = openat$tun(0xffffffffffffff9c, &(0x7f00000012c0), 0x900, 0x0) ioctl$TUNSETFILTEREBPF(r11, 0x800454e1, &(0x7f0000001300)=r8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001380)={&(0x7f0000001340)='f2fs_direct_IO_exit\x00', r3, 0x0, 0xfffffffffffff000}, 0x18) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f00000013c0)={'rose0\x00', @remote}) recvmsg$unix(r5, &(0x7f0000001740)={&(0x7f0000001400)=@abs, 0x6e, &(0x7f00000016c0)=[{&(0x7f0000001480)=""/214, 0xd6}, {&(0x7f0000001580)=""/254, 0xfe}, {&(0x7f0000001680)=""/47, 0x2f}], 0x3, &(0x7f0000001700)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}], 0x40}, 0x2221) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000017c0)=@o_path={&(0x7f0000001780)='./file0\x00', 0x0, 0x4008, r10}, 0x18) recvmsg$unix(r5, &(0x7f0000002f00)={&(0x7f0000001800)=@abs, 0x6e, &(0x7f0000002dc0)=[{&(0x7f0000001880)=""/157, 0x9d}, {&(0x7f0000001940)=""/162, 0xa2}, {&(0x7f0000001a00)=""/187, 0xbb}, {&(0x7f0000001ac0)}, {&(0x7f0000001b00)=""/201, 0xc9}, {&(0x7f0000001c00)=""/189, 0xbd}, {&(0x7f0000001cc0)=""/4096, 0x1000}, {&(0x7f0000002cc0)=""/64, 0x40}, {&(0x7f0000002d00)=""/180, 0xb4}], 0x9, &(0x7f0000002e80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x58}, 0x40002100) close(r9) write$cgroup_netprio_ifpriomap(r14, &(0x7f0000002f40)={'team_slave_0', 0x32, 0x34}, 0xf) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002f80)={0x1b, 0x0, 0x0, 0xdde4, 0x0, r13, 0xfffffffd, '\x00', 0x0, r5, 0x3, 0x0, 0x5}, 0x50) write$cgroup_pid(r14, &(0x7f0000003000)=r12, 0x12) 1.356385883s ago: executing program 2 (id=692): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00'}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)}], 0x1, 0x0, 0x0, 0x2044}, 0x60) ioctl$TUNGETVNETLE(r0, 0x40047451, &(0x7f0000000180)) 1.03192072s ago: executing program 3 (id=693): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x0, 0x5, 0x0, 0x8}, 0x0, 0xe, r0, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x5, 0x84, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 996.24842ms ago: executing program 1 (id=694): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfd6c}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x1d, &(0x7f00000001c0), 0x4) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f2, &(0x7f0000000080)) 932.100222ms ago: executing program 0 (id=695): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x17) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB="000000bed22cce"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x1, '\x00', r3, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x50) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x4, 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001bc0)={r5, 0x0, 0x138, 0x4c, &(0x7f0000001cc0)="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", &(0x7f0000001c40)=""/76, 0x4000, 0x0, 0x47, 0x50, &(0x7f0000001ac0)="9c01bd6f9a6028c80d7364240fd78867d9d62eca43c565f2c5ac65dd4a0fadceb6c65dcb07f2421e69087e0f17b4eb709e4805f2722709c46bef17c4cb9aed9fb1c342179ea349", &(0x7f0000001a40)="408fd0050dc7945b483103067eca9bd26ffbe35abf0f88a103f6893dc2b1d1cdc2195d4ae89abc04ff5fe5d2466892c81015df835a7d47be4f852161bc4015e7564b08584290fe1762f943a653008ac5", 0x1, 0x0, 0x13}, 0x22) 852.407733ms ago: executing program 2 (id=696): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) (async) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0)=0x10000000, 0xfffffdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='rpcgss_oid_to_mech\x00', r2, 0x0, 0x4ae}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x4}, 0x10000, 0x2, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x4}, 0x10000, 0x2, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNDETACHFILTER(r5, 0x401054d6, 0x0) (async) ioctl$TUNDETACHFILTER(r5, 0x401054d6, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r4, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x6, '\x00', r6, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x50) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000340)="a8", 0x1}], 0x1}, 0x4040001) (async) sendmsg$inet(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000340)="a8", 0x1}], 0x1}, 0x4040001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r9}, 0x10) recvmsg$unix(r7, &(0x7f00000038c0)={0x0, 0x0, 0x0}, 0x1) (async) recvmsg$unix(r7, &(0x7f00000038c0)={0x0, 0x0, 0x0}, 0x1) recvmsg$unix(r7, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r2, &(0x7f0000000540)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f0000000800)=[{&(0x7f00000004c0)=""/2, 0x2}, {&(0x7f0000000500)=""/39, 0x27}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f0000000880)=""/161, 0xa1}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000000700)=""/193, 0xc1}, {&(0x7f0000004900)=""/4096, 0x1000}], 0x8, &(0x7f00000009c0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x120}, 0x2) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_type(r10, 0x0, 0xfffffd37) ioctl$TUNGETFEATURES(r10, 0x800454cf, &(0x7f0000000000)) 852.094473ms ago: executing program 1 (id=697): mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_clone(0x800, &(0x7f0000000340)="4c6d67fbc19d776faf7b65d8f13f2320af07b643ffe1e3444ba5fc2ce3ac57f899ea193477cecb05e79268e5df56af953bf5706670ed1be435f8ff657c5d435a1eede30510e9a4310af5be7f27bef6f4e50bccfd0c023baab7bafadd02c0af172d90c712ddea602b413aa6fbba9c8f50a4288fb44a3f21b3b32b4feed7525189729fef3414ca5039bd4644c2721bcd6381dd3109f701b9ab432647cb5704e2b7dd0a6d22103372e233fa2e65fdd97e64056b4318303faa445327e9149e691be6762c933dbf9cf35bd5c40af9a0", 0xcd, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000880)="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") (async, rerun: 32) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) (async, rerun: 32) r1 = syz_clone(0x2c223000, &(0x7f0000000080), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="88ba53c76487cd97d3f141333fd19cd36ee72b730c324e981d4d") write$cgroup_pid(r0, &(0x7f0000000180)=r1, 0x12) perf_event_open(&(0x7f0000000800)={0x2, 0xa6, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) close(0xffffffffffffffff) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async, rerun: 64) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 783.898624ms ago: executing program 2 (id=698): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)="d3", 0x1}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b000000000000000000000000000400000000009532738fae705391ad068e89c6f3a5", @ANYRES32=0x0, @ANYBLOB='\t\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x18) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c77aa"], 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000), 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x4, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@ldst={0x3, 0x0, 0x6, 0x2, 0x2, 0x0, 0xf1}]}, &(0x7f0000000200)='syzkaller\x00', 0x3, 0x82, &(0x7f0000000240)=""/130}, 0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x101840, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000b00), 0x40001, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r10, 0x401054d5, &(0x7f0000000180)={0x4, &(0x7f00000002c0)=[{0x20, 0x0, 0x2, 0x1000000}, {0x3}, {0x0, 0xc, 0x0, 0x3}, {0x6}]}) recvmsg$unix(r9, &(0x7f0000000700)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000940)=[{&(0x7f0000000100)=""/3, 0x3}, {&(0x7f00000001c0)=""/165, 0xa5}, {&(0x7f0000000280)=""/249, 0xf9}, {&(0x7f0000000380)=""/82, 0x52}, {&(0x7f0000000400)=""/38, 0x26}, {&(0x7f0000000440)=""/222, 0xde}, {&(0x7f0000000540)=""/200, 0xc8}, {&(0x7f0000000780)=""/150, 0x96}, {&(0x7f0000000640)=""/103, 0x67}, {&(0x7f0000000840)=""/198, 0xc6}], 0xa, &(0x7f0000000a00)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf0}, 0x2001) sendmsg$inet(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000740)="cdeb", 0x2}], 0x1}, 0x1) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x97, 0x1, 0x0, 0x0, 0x0, 0x5, 0xa00, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, @perf_bp={&(0x7f0000000bc0), 0x8}, 0x10a9e1, 0x40002, 0x0, 0x9, 0x5, 0x3, 0x9, 0x0, 0x10000}, 0x0, 0xfefffffffffffffc, r11, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x72bd1de2ad10b2f3, 0x0, 0xcfb5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x84000, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 763.703375ms ago: executing program 1 (id=699): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r5}, 0x10) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305829, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1}, &(0x7f0000000340), &(0x7f0000000380)=r0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r7, 0x0, 0x10, 0x10, &(0x7f0000000080)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x30) bpf$MAP_CREATE(0x0, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r8}, 0x10) openat$cgroup_ro(r1, &(0x7f00000002c0)='pids.current\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40fd) 711.112306ms ago: executing program 0 (id=700): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d010000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) close(r2) 689.007176ms ago: executing program 0 (id=701): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x1) openat$cgroup_freezer_state(r0, &(0x7f0000000080), 0x2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0x1, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0], 0x0, 0x6f, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x24, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r3 = openat$cgroup_ro(r0, &(0x7f0000000540)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x17, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x526}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x0, 0x0, 0x0, 0x5, 0x50, 0xfffffffffffffff0}, @generic={0x4, 0x5, 0x5, 0x5, 0x7}, @call={0x85, 0x0, 0x0, 0xa2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x537}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}]}, &(0x7f00000001c0)='syzkaller\x00', 0x9, 0xb, &(0x7f0000000200)=""/11, 0x40f00, 0x44, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000580)={0xa, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f00000005c0)=[{0x5, 0x3, 0x1, 0x8}, {0x2, 0x2, 0x2, 0x9}, {0x0, 0x1, 0x6, 0x9}, {0x1, 0x2, 0x8, 0xe}, {0x2, 0x1, 0xc, 0xa}], 0x10, 0x4}, 0x94) r5 = gettid() perf_event_open(&(0x7f0000000700)={0x5, 0x80, 0x8, 0x7, 0x9, 0x88, 0x0, 0xb, 0x820, 0x9, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, @perf_config_ext={0xd4c1, 0x4}, 0x9040, 0x9, 0x4, 0x0, 0x200, 0x100, 0x3, 0x0, 0x6, 0x0, 0x4}, r5, 0x1, r3, 0x1b) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={r1, 0x58, &(0x7f0000000780)}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r3, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x18, 0x24, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc63, 0x0, 0x0, 0x0, 0xffffffff}, [@call={0x85, 0x0, 0x0, 0x75}, @jmp={0x5, 0x1, 0xd, 0x9, 0x0, 0xfffffffffffffff8}, @exit, @alu={0x7, 0x1, 0x9, 0xb, 0x1, 0x4, 0xfffffffffffffff1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f00000009c0)='GPL\x00', 0x3, 0xe8, &(0x7f0000000a00)=""/232, 0x41100, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000b40)={0x5, 0xa, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r3, r3, r3], 0x0, 0x10, 0x44}, 0x94) r7 = openat$cgroup_subtree(r3, &(0x7f0000000c80), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000cc0)={[{0x2b, 'rlimit'}, {0x2d, 'cpuset'}, {0x2d, 'pids'}]}, 0x16) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d00)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r8, &(0x7f0000000d40), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d80)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001080)={r3, 0xe0, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000dc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000e00)=[0x0], &(0x7f0000000e40)=[0x0, 0x0], 0x0, 0x29, &(0x7f0000000e80)=[{}], 0x8, 0x10, &(0x7f0000000ec0), &(0x7f0000000f00), 0x8, 0xf7, 0x8, 0x8, &(0x7f0000000f40)}}, 0x10) ioctl$TUNSETLINK(r3, 0x400454cd, 0x300) recvmsg$unix(r3, &(0x7f0000003540)={&(0x7f00000010c0), 0x6e, &(0x7f0000003440)=[{&(0x7f0000001140)=""/5, 0x5}, {&(0x7f0000001180)=""/55, 0x37}, {&(0x7f00000011c0)=""/160, 0xa0}, {&(0x7f0000001280)}, {&(0x7f00000012c0)=""/4096, 0x1000}, {&(0x7f00000022c0)=""/88, 0x58}, {&(0x7f0000002340)=""/4096, 0x1000}, {&(0x7f0000003340)=""/202, 0xca}], 0x8, &(0x7f00000034c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}, 0x10000) openat$cgroup_freezer_state(r12, &(0x7f0000003580), 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000003700)={r11, &(0x7f00000035c0)="74e0c0dcfc4f3aa3cc87e935303785ade5bad1f512b4ff279682be62d01ef573661bba909eaabfae8e8a52847d5b6399d3fb5e1030819d13dbbac8bf04a614bf4fe2910f24e29856d5d6a2dc279c0f7a686292f33359923f9a75190ce4e3a46bc50ad4d94e8a17bf58f7ec250d0e092b1179dc0e028925732e4692bdd7f87b267bc139d874", &(0x7f0000003680)=""/114, 0x4}, 0x20) write$cgroup_subtree(r7, &(0x7f0000003740)={[{0x2b, 'blkio'}, {0x2d, 'rdma'}, {0x2d, 'cpu'}]}, 0x12) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003900)={&(0x7f0000003780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8a, 0x8a, 0x5, [@fwd={0x7}, @typedef={0xa}, @restrict={0xe, 0x0, 0x0, 0xb, 0x2}, @ptr={0x7, 0x0, 0x0, 0x2, 0x2}, @datasec={0x9, 0x1, 0x0, 0xf, 0x2, [{0x5, 0x6, 0x3}], "0c96"}, @union={0x9, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xb, 0x2}]}, @ptr={0xe}, @fwd={0x1}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x43, 0x0, 0x14, 0x2}]}, {0x0, [0x5f, 0x30, 0x2e]}}, &(0x7f0000003840)=""/173, 0xa9, 0xad, 0x1, 0x8001, 0x10000, @value=r10}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003c80)={0x2, 0x0}, 0x8) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000003cc0)={r13, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000003d80)={{r14, 0xffffffffffffffff}, &(0x7f0000003d00), &(0x7f0000003d40)=r9}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000003e40)={{r13, 0xffffffffffffffff}, &(0x7f0000003dc0), &(0x7f0000003e00)='%-5lx \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000003ec0)={0x1b, 0x35, &(0x7f0000003940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x2}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r15}}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @call={0x85, 0x0, 0x0, 0x1b}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @ldst={0x1, 0x3, 0x3, 0xb, 0x3, 0x6, 0xfffffffffffffff0}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x6}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f0000003b00)='syzkaller\x00', 0x6, 0x83, &(0x7f0000003b40)=""/131, 0x40f00, 0x10, '\x00', r2, @fallback=0x1d, r10, 0x8, &(0x7f0000003c00)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000003c40)={0x2, 0x8, 0xfff, 0x289}, 0x10, r16, r4, 0x0, &(0x7f0000003e80)=[r17, r3, r6, r9, r18, r12, r19], 0x0, 0x10, 0x2}, 0x94) 688.482526ms ago: executing program 0 (id=702): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'sit0\x00', @local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x20, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x43}]}}, 0x0, 0x26}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f00000006c0)={&(0x7f0000000240)={0x2, 0x4e27, @local}, 0x10, &(0x7f0000000800)=[{&(0x7f00000022c0)="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", 0x800}, {&(0x7f0000000980)="98394755849309c480bfe4d40fdf45226dd7e2c5bc8d33c4c6544b7e033b9362065e0d967c99e7b40911fd8c2363ce70339f149b9536076be177b5605f3c30f4b483eaf594719aea8e9669235978c074000b221c10e9d7d87f3b95fc0592aeac9b62aff9161b528f7d976f542c03f40b3a0e499696b37dbab00c17a264d4587abe7c9922442d9c4a503676ef93c5492ad6aae064f97e62d77b36b6ef0ef942d6adb1765230c1b49b39b2bf0c890d3720958b05b44ea6bec04aa37a998aae00c798aeb617343cc59f5e91e0d1", 0xcc}, {&(0x7f0000000400)="b3d6559e56f50325c4611062a5c3cb8e790f756ecd08f649c9dd362b37d358d9903a1127b0ad0ffae3e4c85e22c8d9c129a5e6c1df138663a0aed9b245e81dce08e8b9210912b34361e1", 0x4a}, {&(0x7f0000000700)="d67154b3319046c876543a1821d18d5499df58e42924f4a7a3a13c275e5073130b8dd5b3b61f85ce6d920207894e3855eab7625de69ff1ef72930bd952cb20c3b519f9fec024", 0x46}, {&(0x7f0000000540)="fc9500b122857b2594df250bd9faed30f25d734d38d53f3065d30241e9421ea7557310d2e074f7f06cc4369ef00d2b646eb104f10884d0ceb9bffc114ae6bfceb042ad3c6d033b70fb86d8097beb4243338bb795ab6c25596ed9cac943a276e1c1729ddf3e1c1a4c021873bfec72def061f8db758afcd6830c702d03ac8ff8929c8f791ba4de50d0f4cf18c16396b512627e6b94b35f8b35d4d12618f8586602f8ce6a088bf44f24d7665676cc7e9c286359865a3ce360f1b8b84fdebea9bb83912f58698174c702a73cbaa9ab765b878a8c7d68c5c4d524dcc43585ca3e4771bff2654c0d05fca7bb3074315fd1b19416587dd247", 0xf5}], 0x5, &(0x7f0000000640)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}], 0x18}, 0x40) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r5}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r0}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 587.533138ms ago: executing program 1 (id=703): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) (async) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) r4 = getpid() write$cgroup_pid(r3, &(0x7f0000000040)=r4, 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r7, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000180)=r6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r8], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r9}, 0x10) (async) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r5}, 0x38) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0xfffffffffffffdf5, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r10}, 0x10) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0x203, 0x0, &(0x7f00000005c0)="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", 0x0, 0x4, 0x60000000, 0x14, 0x93, &(0x7f0000000000)="fe01178cbcc91f164d19b0ba94c8dee51710b7fc", &(0x7f0000000380)="dc8d4d12681f82c60ec9db027db7b2720e689d455b01cf36eee5030f861a665ef91a71c3c8eb30d437fea21f38460a0496ced9021251baaf9ebd9962decd43e80447d1f37a79d169b9a1077659cb0000000020c07cfa449dfdbf66fe781f5a807ece416400000000d97525e6858f1437e5414b66b21cc8e7005411803a260000000001929a565f59835ef64dc6445c09ed787c", 0x1, 0x0, 0x10000}, 0x50) 504.04407ms ago: executing program 1 (id=704): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="160000040000000000000000ed1167da1fd16015199a8c2b2510de1805194c9ad630ef45df48e87292671340ac702bc8ccafeec2b1f7dceaa25e1582ea6034b8382de5b1e378a6f2486db98c5e0016a8b5f5bd2f67d84284b474c1df22265e4f2e347d498a1f07cabd6f037ecc697aeb1e0ff72bd405ecdf5c796d495f6ef334ed54d5404f66ab70884726dcf7f829268cbd7ab5d907233c01d874d5063ccb05128040f10803437d4cb0d93bc9a9288e8075effc79667261d00da12389bb268e658e965254", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32, @ANYRES32, @ANYBLOB="000000000000000000000000000000001000"/28, @ANYRESOCT, @ANYRES64=0x0, @ANYRESOCT, @ANYRESOCT, @ANYRESOCT=0x0], 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r1) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffed8) r2 = openat$cgroup_ro(r1, &(0x7f0000000280)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000077b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, &(0x7f0000000300), &(0x7f0000000340)=r3}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000004c0)={{r2}, &(0x7f00000003c0), &(0x7f0000000400)='%ps \x00'}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1c}, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x6f1c}, 0x0, 0xffffffeffffffffe, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000000000600850000009e"], 0x0}, 0x94) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000580)='rxrpc_rtt_rx\x00', r4, 0x0, 0x4}, 0x18) write$cgroup_int(r8, &(0x7f0000000200), 0x43451) write$cgroup_int(r7, &(0x7f0000000200), 0x43451) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x80000000}, 0x0, 0xffffffffffffffff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000080)) 181.598716ms ago: executing program 3 (id=705): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0xfd, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x202, 0xc8, 0x68e7, 0x0, 0xf876, 0x10, 0xffff, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe800000000000"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) (async) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0xe, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0xe, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='nilfs2_collection_stage_transition\x00', r1, 0x0, 0x100000000}, 0x18) 100.615328ms ago: executing program 3 (id=706): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)}], 0x1, 0x0, 0x0, 0x2044}, 0x60) ioctl$TUNGETVNETLE(r1, 0x40047451, &(0x7f0000000180)) 67.887468ms ago: executing program 1 (id=707): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007b00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000004c0)='tlb_flush\x00', r0}, 0x10) r2 = syz_clone(0x40200400, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'pim6reg1\x00', 0x1}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x324) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000a80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000e80)=[{&(0x7f0000002100)="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", 0x1000}, {&(0x7f0000000b00)="8743653cf64745ea5d80e18700df2576273cc39fb63a59c1ee", 0x19}, {&(0x7f0000000b40)="96a2d8", 0x3}, {&(0x7f0000000b80)="27b66072e3ce713762ab4bc436b401adeadd2105e5935dd4db4974710d501cbc5ae9e6a8cf81beb961673d867525c06398d8ee3df47957b767749f033d0a558785a12bf9bc75ba9759b3e861e9731a1e2a1fd13ed76b62d1f8af44754c4236777abe9aebf13855694f09a2ea749539cee365a591b888f21652d0f865ccd53dc3fc1c61d5e50f4faafc7838958f8c42d2cee296b1d18a8b5fc0b7d0b654505e062f2cba5317ab20a595663ceb5b7a63d9d194e194ed0530b0c00edb262b72039ac7ea21d65ca296cf102aa66784eb246cd09464b7047258eeb38700dd5edcd80478842094638a61d76b11", 0xea}, {&(0x7f0000000c80)="b84fe3a457e82ea220137fc7e24e48b5fdefaff3518657f435abfee07b4350a56a7bbfde6bb562caab49f861562602c790b3cb13c4598323676ef3485eb16f951732b4953369b565bcbdb1b9ffadedd99a96af5f1785db2a6c072002e6dfdc375449d5c252c7ff67edd701a00062f18fa7e7c008fdb7aefb4673af3adc8dd7f6361aa0607d04fa3d2e3a1ddf2a7e56b5e8e877ecd1fcd4eefdf63208b52c3b9313ee7f786baafd05a6ded3dfaca62971a1025f3574b803d91f9655bebabdae07c99b80ecb8446a34", 0xc8}, {&(0x7f0000000d80)="5e346c25ff8cbbf7b95317893b3be53a25c99ccaeacba1052d829d9a974214a09b4b3cbe8f59de67cb96c772c77c8dc274cacdf1b58fbe4ea2035b9c140b54870d60b16354691ee08538811a4618ae4841a501eb72a665b1fb582b2ac3e9ce313e6047650f381734b28e0d5c4225ff6aa8fce1852b4fd41807090c9e6d81e84f933a3dd7e6bd54f6544c403b40e0d2d19d8a3b7685f2629db2ef51de9d191e5d239889b761173e708b22c5aaced8243aacebc598a59055d29d29029c42591a4ff9af4e9a2713f3758a4625d47cfce89c851cb1f47b764b8050da0ef04d45b55da7a7b86a45e8", 0xe6}], 0x6, &(0x7f0000000fc0)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xee01, 0xee01}}}, @rights={{0x2c, 0x1, 0x1, [r3, r0, 0xffffffffffffffff, r3, r0, r3, r1]}}, @rights={{0x24, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff, r3, r3]}}], 0x78, 0x90}, 0x4000000) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x34, 0x0, &(0x7f0000000000)="b9ff030711a5268c019e14f088a847e0ffff00124000632177fbac141416e000030a94029f030301800000ca6aab840000008100", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0xf, 0x1, 0x240, &(0x7f0000000300)={0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, 0x800}, 0x50) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socketpair(0x3, 0xa, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r9}, 0x10) syz_open_procfs$namespace(0xffffffffffffffff, 0xfffffffffffffffe) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="070000000400000000070000000700002c000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) 45.423279ms ago: executing program 3 (id=708): syz_clone(0x40000000, &(0x7f0000000280)="2a30053e1c3176348270ca8b9180188fc835645c38b5c342fa86e88edfa65351a46a96741fb8b27eb7a0bbf51c48d5e453c0f1988ab9e8ce16", 0x39, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0xe, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000080), &(0x7f00000006c0)='%-010d \x00'}, 0x20) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000340)="25b096f681cd731c3f3a9badc4e3cf5edeae1f3b5082d7ab3a97c053df68744e7c7e24d0b59997bab4bccff8363b275de3510b0ebe4275d8d2f153395668e3d608e358fc2294263c03f8dc4f8bf194e4fde4600a2dec2f483a914e2fde0cbc344a2b9fc18dd198966045a6d4d4eb8571e8bb69e6724e37fcbaa6e4c64050b47256b9bb17f5c0aa5101e015ecdcb62fec46fc0205512535", 0x97}, {&(0x7f0000000280)="d3a88bea5916e313729a3989393caca70c74cd74e62e524bdd37be131ad827f911027e70ccf679d8e7c0cd3333095f83d6d473db345ded2ac8acaa87503de74c82431758e8e11e3ecb7bce02d6cd65f4eb88cc49ceb9e39f7117eb0f62323dc9b80dea447b0c96a383f14281bb87b09de0a6153ceeaae2b50a2b0f0f41810f379f9c3a1f3938461829d716a4bda86ab11b41f754bc15d71b", 0xfed0}], 0x2}, 0x0) recvmsg$unix(r3, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@rights={{0x10}}], 0x10}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) 0s ago: executing program 4 (id=625): r0 = syz_clone(0x1002000, &(0x7f0000000000)="17e4202ba952433b21fa1ddf", 0xc, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="8a4b9cfeee20fc40ca378355326f073a3c9765861f55abba7e2bf0dff4453ad71b74028c73b0a9ecd55539496af3103a6a0d59cd05fe5364379ec5ed684a188d") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0xb6, 0x70, 0x5, 0x0, 0x81, 0x400, 0xf, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x10000, 0x1}, 0x1840, 0xbc5, 0xe, 0x0, 0x9, 0x3e, 0xe85, 0x0, 0x81, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x8, 0x9, 0x61, 0xb, 0x0, 0x8, 0x4, 0x7, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0xfffffffffffffffd, 0x100}, 0x280, 0xffffffff, 0x101, 0x1, 0x1, 0xfffffffa, 0x4, 0x0, 0x200, 0x0, 0x9}, r0, 0x6, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='f2fs_readpages\x00', 0xffffffffffffffff, 0x0, 0x9}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r1, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r3, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x0, '\x00', r4, r5, 0x3, 0x0, 0x5}, 0x50) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)={0x1b, 0x0, 0x0, 0x1b87673, 0x0, r5, 0x2, '\x00', r4, r5, 0x3, 0x4, 0x3}, 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000700)={0x0, 0x0}, 0x8) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x9, &(0x7f0000000740)=@raw=[@btf_id={0x18, 0xe, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0xb}, @map_fd={0x18, 0x3, 0x1, 0x0, r3}, @alu={0x4, 0x1, 0x6, 0x6, 0x7, 0xffffffffffffffe0}, @func={0x85, 0x0, 0x1, 0x0, 0x2}], &(0x7f00000007c0)='syzkaller\x00', 0x4, 0x0, &(0x7f0000000800), 0x41100, 0x1, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0x8, 0x2, 0x8}, 0x10, 0x1504a, 0xffffffffffffffff, 0x7, &(0x7f00000008c0)=[r3, r6, 0x1, r6, r6, r3, r3, r3], &(0x7f0000000900)=[{0x5, 0x2, 0x3, 0x8}, {0x5, 0x3, 0x3, 0xc}, {0x2, 0x5, 0x1, 0x7}, {0x4, 0x1, 0x9, 0x8}, {0x1, 0x1, 0xa}, {0x1, 0x1, 0xb, 0xc}, {0x5, 0x1}], 0x10, 0x5}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xa, 0x19, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x53c3, 0x0, 0x0, 0x0, 0x98}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1000}}, @map_fd={0x18, 0x8, 0x1, 0x0, r6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f00000005c0)='GPL\x00', 0x2, 0xbf, &(0x7f0000000600)=""/191, 0x40f00, 0x52, '\x00', r4, @fallback=0x36, r5, 0x8, &(0x7f00000006c0)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, r8, r9, 0x3, &(0x7f0000000a40)=[r6, r3], &(0x7f0000000a80)=[{0x3, 0x1, 0xa, 0x3}, {0x3, 0x3, 0xf, 0x4}, {0x3, 0x2, 0x9, 0x6}], 0x10, 0x1}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000d40)={r5, 0x20, &(0x7f0000000d00)={&(0x7f0000000bc0)=""/1, 0x1, 0x0, &(0x7f0000000c00)=""/246, 0xf6}}, 0x10) setsockopt$sock_attach_bpf(r12, 0x1, 0x32, &(0x7f0000000d80)=r10, 0x4) setsockopt$sock_attach_bpf(r12, 0x1, 0x32, &(0x7f0000000dc0)=r9, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001e80)={r3, &(0x7f0000000e00)="84c2ad0a24289f2f24501d37379a9645ee31a66ed1d5aa3b4fb5c49c833c1c84980949676c3d6d2dd6171a191cdc26ef518e3bf4531090f91f2da0cf8cd3408b971593b8564e30714ec64373c8c647ce734959c3b969da82ff", &(0x7f0000000e80)=""/4096, 0x4}, 0x20) close(r10) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001ec0)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0x6, '\x00', r4, r5, 0x4, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001fc0)={{r6, 0xffffffffffffffff}, &(0x7f0000001f40), &(0x7f0000001f80)=r13}, 0x20) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002280)={0x2, 0x4, 0x8, 0x1, 0x80, r6, 0x0, '\x00', r4, r5, 0x3, 0x5, 0x3}, 0x50) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000002340)={0x1c, 0x1b, &(0x7f0000002000)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x1}, @exit, @cb_func={0x18, 0x9, 0x4, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbf}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfdd5}}], &(0x7f0000002100)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000002140)=""/217, 0x41000, 0x2, '\x00', 0x0, @fallback=0xd, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002240)={0x3, 0x7, 0x8, 0x2}, 0x10, 0xffffffffffffffff, r9, 0x0, &(0x7f0000002300)=[r6, r6, r6, r7, r15], 0x0, 0x10, 0x412}, 0x94) perf_event_open(&(0x7f0000002440)={0x1, 0x80, 0x6, 0x1, 0x8, 0x8, 0x0, 0x7, 0x10, 0xd, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x21, 0x0, @perf_bp={&(0x7f0000002400), 0x3}, 0x90, 0x101, 0x20000000, 0x8, 0x6, 0x6, 0x9, 0x0, 0x3, 0x0, 0x5}, 0x0, 0xf, 0xffffffffffffffff, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002540)={{r11, 0xffffffffffffffff}, &(0x7f00000024c0), &(0x7f0000002500)=r16}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002600)={{r17}, &(0x7f0000002580), &(0x7f00000025c0)=r10}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002640)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002780)={r13, &(0x7f0000002680)="7a207de45e3357b892fe902eea03f7f5cc29cb9f2c4ace41b02ef1d9ced03b4162f199566278f6d924fbd1b08401bc034b716aed7940a9c113693b", &(0x7f00000026c0)=""/140}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000027c0)='syzkaller\x00') r18 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002a00)={0x18, 0x8, &(0x7f0000002840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x4}, [@cb_func={0x18, 0xb, 0x4, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x5d}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000002880)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41000, 0x66, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f00000028c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000002900)={0x3, 0x1, 0x400}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002940)=[r14, r17, r7, r15, r14, r3, r15, r6, r7, r3], &(0x7f0000002980)=[{0x2, 0x3, 0x5, 0x8}, {0x3, 0x5, 0x10, 0x8}, {0x2, 0x2, 0x1, 0x2}, {0x2, 0x1, 0xe, 0x6}, {0x4, 0x2, 0x0, 0x8}], 0x10, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002ac0)={&(0x7f0000002800)='cachefiles_mark_failed\x00', r18, 0x0, 0xff}, 0x18) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.63' (ED25519) to the list of known hosts. [ 19.251858][ T30] audit: type=1400 audit(1756808529.468:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.253464][ T273] cgroup: Unknown subsys name 'net' [ 19.256124][ T30] audit: type=1400 audit(1756808529.468:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.261116][ T30] audit: type=1400 audit(1756808529.478:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.261371][ T273] cgroup: Unknown subsys name 'devices' [ 19.417155][ T273] cgroup: Unknown subsys name 'hugetlb' [ 19.423068][ T273] cgroup: Unknown subsys name 'rlimit' [ 19.594253][ T30] audit: type=1400 audit(1756808529.808:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.618565][ T30] audit: type=1400 audit(1756808529.808:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.625843][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 19.644547][ T30] audit: type=1400 audit(1756808529.808:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 19.677589][ T30] audit: type=1400 audit(1756808529.878:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.704923][ T30] audit: type=1400 audit(1756808529.878:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.708721][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 19.731042][ T30] audit: type=1400 audit(1756808529.928:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.766353][ T30] audit: type=1400 audit(1756808529.928:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.334197][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.341373][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.349476][ T281] device bridge_slave_0 entered promiscuous mode [ 20.357854][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.365569][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.373529][ T281] device bridge_slave_1 entered promiscuous mode [ 20.445837][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.453069][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.460733][ T282] device bridge_slave_0 entered promiscuous mode [ 20.467985][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.475157][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.483498][ T282] device bridge_slave_1 entered promiscuous mode [ 20.569459][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.576934][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.584653][ T283] device bridge_slave_0 entered promiscuous mode [ 20.591664][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.599170][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.606831][ T287] device bridge_slave_0 entered promiscuous mode [ 20.621224][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.628823][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.637856][ T283] device bridge_slave_1 entered promiscuous mode [ 20.645192][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.652897][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.660679][ T287] device bridge_slave_1 entered promiscuous mode [ 20.704745][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.712159][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.720053][ T285] device bridge_slave_0 entered promiscuous mode [ 20.733411][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.741214][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.749355][ T285] device bridge_slave_1 entered promiscuous mode [ 20.824216][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.831856][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.839256][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.846532][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.925744][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.932982][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.940641][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.948021][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.962964][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.970982][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.979063][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.987048][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.996684][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.004645][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.029887][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.038776][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.046366][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.054194][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.063533][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.071064][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.078753][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.087212][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.104180][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.118336][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.127382][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.135561][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.166307][ T281] device veth0_vlan entered promiscuous mode [ 21.173841][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.196689][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.206174][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.215294][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.222419][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.230141][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.238795][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.245935][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.253476][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.261987][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.269446][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.277115][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.285908][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.293802][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.302736][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.337091][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.346178][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.354385][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.363263][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.371780][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.380225][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.388814][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.397821][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.406396][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.415440][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.424431][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.433625][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.441725][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.450783][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.473070][ T282] device veth0_vlan entered promiscuous mode [ 21.483513][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.492896][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.502076][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.509722][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.518190][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.526877][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.535651][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.543631][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.551854][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.560084][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.569085][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.577664][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.585599][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.594230][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.602771][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.610022][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.618215][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.625953][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.634084][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.642510][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.651196][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.660443][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.680063][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.689249][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.698633][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.707579][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.716409][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.723879][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.733089][ T281] device veth1_macvtap entered promiscuous mode [ 21.743738][ T283] device veth0_vlan entered promiscuous mode [ 21.752630][ T282] device veth1_macvtap entered promiscuous mode [ 21.760654][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.768765][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.777437][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.786493][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.795238][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.803699][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.812401][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.821254][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.829486][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.838281][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.847076][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.854980][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.863667][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.872464][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.894753][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.903262][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.912252][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.921759][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.930702][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.940032][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.954400][ T283] device veth1_macvtap entered promiscuous mode [ 21.972324][ T285] device veth0_vlan entered promiscuous mode [ 21.981663][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.991431][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.000735][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.009293][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.018405][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.027585][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.036376][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.046203][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.055471][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.065299][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.074167][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.083249][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.091695][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.099974][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.108054][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.117296][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.125666][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.135784][ T287] device veth0_vlan entered promiscuous mode [ 22.156421][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.165450][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.174435][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.183455][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.200130][ T281] request_module fs-gadgetfs succeeded, but still no fs? [ 22.203117][ T285] device veth1_macvtap entered promiscuous mode [ 22.219305][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.228642][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.239100][ T287] device veth1_macvtap entered promiscuous mode [ 22.275767][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.285362][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.317131][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.335918][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.344621][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.353577][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.362754][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.371954][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.566698][ C1] hrtimer: interrupt took 25389 ns [ 22.820797][ T359] device syzkaller0 entered promiscuous mode [ 23.803384][ T401] device pim6reg1 entered promiscuous mode [ 24.560545][ T30] kauditd_printk_skb: 46 callbacks suppressed [ 24.560564][ T30] audit: type=1400 audit(1756808534.768:120): avc: denied { create } for pid=407 comm="syz.1.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 26.216710][ T30] audit: type=1400 audit(1756808536.438:121): avc: denied { write } for pid=447 comm="syz.0.34" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 26.484982][ T433] device veth0_vlan left promiscuous mode [ 26.494686][ T433] device veth0_vlan entered promiscuous mode [ 26.755617][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.764138][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.774176][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.326625][ T477] device sit0 entered promiscuous mode [ 27.340789][ T479] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.898670][ T30] audit: type=1400 audit(1756808539.118:122): avc: denied { relabelfrom } for pid=502 comm="syz.0.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.923465][ T30] audit: type=1400 audit(1756808539.138:123): avc: denied { relabelto } for pid=502 comm="syz.0.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 29.852278][ T515] syz.4.51[515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.852350][ T515] syz.4.51[515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.163195][ T30] audit: type=1400 audit(1756808540.378:124): avc: denied { write } for pid=524 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.577855][ T30] audit: type=1400 audit(1756808540.778:125): avc: denied { tracepoint } for pid=529 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.965821][ T30] audit: type=1400 audit(1756808541.188:126): avc: denied { create } for pid=555 comm="syz.2.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 31.618017][ T30] audit: type=1400 audit(1756808541.838:127): avc: denied { create } for pid=585 comm="syz.0.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 32.104905][ T600] device veth1_macvtap left promiscuous mode [ 32.205076][ T600] device macsec0 entered promiscuous mode [ 32.276969][ T615] device pim6reg1 entered promiscuous mode [ 32.397829][ T633] device veth0_vlan left promiscuous mode [ 32.410868][ T633] device veth0_vlan entered promiscuous mode [ 33.209846][ T628] syz.1.91 (628) used greatest stack depth: 22064 bytes left [ 33.227381][ T655] device sit0 entered promiscuous mode [ 33.860787][ T670] device pim6reg1 entered promiscuous mode [ 33.920398][ T676] device sit0 left promiscuous mode [ 34.196839][ T30] audit: type=1400 audit(1756808544.418:128): avc: denied { create } for pid=690 comm="syz.4.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 34.546810][ T707] device pim6reg1 entered promiscuous mode [ 34.562727][ T709] syz.2.118[709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.562809][ T709] syz.2.118[709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.722078][ T727] device wg2 entered promiscuous mode [ 34.753596][ T709] device veth0_vlan left promiscuous mode [ 34.791590][ T709] device veth0_vlan entered promiscuous mode [ 35.034969][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.123836][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.237567][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.645709][ T762] device syzkaller0 entered promiscuous mode [ 35.667663][ T769] device pim6reg1 entered promiscuous mode [ 36.256379][ T775] device pim6reg1 entered promiscuous mode [ 36.642185][ T789] device syzkaller0 entered promiscuous mode [ 36.649439][ T790] device pim6reg1 entered promiscuous mode [ 36.686130][ T793] device veth0_vlan left promiscuous mode [ 36.744871][ T793] device veth0_vlan entered promiscuous mode [ 37.079550][ T800] device sit0 left promiscuous mode [ 37.940964][ T821] device pim6reg1 entered promiscuous mode [ 38.736619][ T857] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 38.942527][ T859] device syzkaller0 entered promiscuous mode [ 39.268134][ T881] device syzkaller0 entered promiscuous mode [ 39.974506][ T30] audit: type=1400 audit(1756808550.188:129): avc: denied { create } for pid=923 comm="syz.4.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 41.267613][ T30] audit: type=1400 audit(1756808551.478:130): avc: denied { create } for pid=963 comm="syz.4.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 42.372658][ T1026] device veth1_macvtap left promiscuous mode [ 42.964678][ T30] audit: type=1400 audit(1756808553.178:131): avc: denied { create } for pid=1047 comm="syz.3.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 45.276982][ T1136] FAULT_INJECTION: forcing a failure. [ 45.276982][ T1136] name failslab, interval 1, probability 0, space 0, times 1 [ 45.314386][ T1136] CPU: 0 PID: 1136 Comm: syz.2.250 Not tainted syzkaller #0 [ 45.322093][ T1136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 45.333817][ T1136] Call Trace: [ 45.337544][ T1136] [ 45.340496][ T1136] __dump_stack+0x21/0x30 [ 45.345079][ T1136] dump_stack_lvl+0xee/0x150 [ 45.350340][ T1136] ? show_regs_print_info+0x20/0x20 [ 45.356411][ T1136] ? _raw_spin_lock+0x8e/0xe0 [ 45.361157][ T1136] ? _raw_spin_trylock_bh+0x130/0x130 [ 45.366924][ T1136] ? rebalance_domains+0xb80/0xb80 [ 45.372439][ T1136] dump_stack+0x15/0x20 [ 45.376978][ T1136] should_fail+0x3c1/0x510 [ 45.381587][ T1136] __should_failslab+0xa4/0xe0 [ 45.386702][ T1136] should_failslab+0x9/0x20 [ 45.391460][ T1136] slab_pre_alloc_hook+0x3b/0xe0 [ 45.396730][ T1136] __kmalloc+0x6d/0x2c0 [ 45.400905][ T1136] ? kvmalloc_node+0x206/0x300 [ 45.405681][ T1136] kvmalloc_node+0x206/0x300 [ 45.410351][ T1136] ? vm_mmap+0xb0/0xb0 [ 45.414498][ T1136] ? sprintf+0xd6/0x120 [ 45.418654][ T1136] ? vsprintf+0x40/0x40 [ 45.423068][ T1136] alloc_netdev_mqs+0x8d/0xc90 [ 45.428174][ T1136] ? selinux_capset+0xf0/0xf0 [ 45.433099][ T1136] ? finish_task_switch+0x209/0x780 [ 45.438459][ T1136] ? reject_tg6_check+0x240/0x240 [ 45.443475][ T1136] vti6_locate+0x51f/0x640 [ 45.448151][ T1136] ? vti6_link_config+0x560/0x560 [ 45.453567][ T1136] ? memcpy+0x56/0x70 [ 45.457820][ T1136] vti6_siocdevprivate+0x6d7/0xd20 [ 45.462962][ T1136] ? preempt_count_add+0x90/0x1b0 [ 45.468165][ T1136] ? vti6_tnl_xmit+0x1870/0x1870 [ 45.473189][ T1136] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 45.480753][ T1136] ? full_name_hash+0xbd/0xf0 [ 45.485924][ T1136] dev_ifsioc+0xaf5/0xe70 [ 45.490438][ T1136] ? dev_ioctl+0xd10/0xd10 [ 45.495026][ T1136] ? __mutex_lock_slowpath+0xe/0x10 [ 45.500581][ T1136] ? mutex_lock+0x100/0x1a0 [ 45.505251][ T1136] ? wait_for_completion_killable_timeout+0x10/0x10 [ 45.512137][ T1136] ? dev_get_by_name_rcu+0xc8/0xf0 [ 45.517356][ T1136] dev_ioctl+0x5fd/0xd10 [ 45.521695][ T1136] sock_ioctl+0x64a/0x6b0 [ 45.526205][ T1136] ? sock_poll+0x3d0/0x3d0 [ 45.531191][ T1136] ? security_file_ioctl+0x84/0xa0 [ 45.536785][ T1136] ? sock_poll+0x3d0/0x3d0 [ 45.541208][ T1136] __se_sys_ioctl+0x121/0x1a0 [ 45.546233][ T1136] __x64_sys_ioctl+0x7b/0x90 [ 45.551253][ T1136] x64_sys_call+0x2f/0x9a0 [ 45.555982][ T1136] do_syscall_64+0x4c/0xa0 [ 45.560655][ T1136] ? clear_bhb_loop+0x50/0xa0 [ 45.565350][ T1136] ? clear_bhb_loop+0x50/0xa0 [ 45.570240][ T1136] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 45.576540][ T1136] RIP: 0033:0x7f2861273be9 [ 45.580953][ T1136] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.601876][ T1136] RSP: 002b:00007f285fcdc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 45.610654][ T1136] RAX: ffffffffffffffda RBX: 00007f28614aafa0 RCX: 00007f2861273be9 [ 45.619353][ T1136] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 45.627742][ T1136] RBP: 00007f285fcdc090 R08: 0000000000000000 R09: 0000000000000000 [ 45.636248][ T1136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 45.645164][ T1136] R13: 00007f28614ab038 R14: 00007f28614aafa0 R15: 00007ffd85ef2418 [ 45.653691][ T1136] [ 46.434450][ T1178] FAULT_INJECTION: forcing a failure. [ 46.434450][ T1178] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 46.575115][ T1178] CPU: 0 PID: 1178 Comm: syz.4.265 Not tainted syzkaller #0 [ 46.582643][ T1178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 46.592801][ T1178] Call Trace: [ 46.596080][ T1178] [ 46.599207][ T1178] __dump_stack+0x21/0x30 [ 46.603692][ T1178] dump_stack_lvl+0xee/0x150 [ 46.608665][ T1178] ? show_regs_print_info+0x20/0x20 [ 46.613993][ T1178] ? format_decode+0x1bb/0x1520 [ 46.619223][ T1178] dump_stack+0x15/0x20 [ 46.623392][ T1178] should_fail+0x3c1/0x510 [ 46.628131][ T1178] should_fail_usercopy+0x1a/0x20 [ 46.633594][ T1178] _copy_from_user+0x20/0xd0 [ 46.638449][ T1178] kstrtouint_from_user+0xbe/0x200 [ 46.643819][ T1178] ? kstrtol_from_user+0x260/0x260 [ 46.649450][ T1178] ? 0xffffffff81000000 [ 46.653603][ T1178] ? _copy_to_user+0x78/0x90 [ 46.658277][ T1178] ? simple_read_from_buffer+0x10f/0x160 [ 46.663912][ T1178] proc_fail_nth_write+0x85/0x1f0 [ 46.669245][ T1178] ? proc_fail_nth_read+0x210/0x210 [ 46.675048][ T1178] ? security_file_permission+0x79/0xa0 [ 46.680956][ T1178] ? security_file_permission+0x83/0xa0 [ 46.687088][ T1178] ? proc_fail_nth_read+0x210/0x210 [ 46.692912][ T1178] vfs_write+0x3ee/0xf70 [ 46.697436][ T1178] ? file_end_write+0x1b0/0x1b0 [ 46.702470][ T1178] ? __kasan_check_write+0x14/0x20 [ 46.707792][ T1178] ? mutex_lock+0x95/0x1a0 [ 46.712328][ T1178] ? wait_for_completion_killable_timeout+0x10/0x10 [ 46.718997][ T1178] ? __fget_files+0x2c4/0x320 [ 46.725990][ T1178] ? __fdget_pos+0x2d2/0x380 [ 46.730684][ T1178] ? ksys_write+0x71/0x240 [ 46.735105][ T1178] ksys_write+0x140/0x240 [ 46.739523][ T1178] ? __ia32_sys_read+0x90/0x90 [ 46.744459][ T1178] ? debug_smp_processor_id+0x17/0x20 [ 46.750340][ T1178] __x64_sys_write+0x7b/0x90 [ 46.755288][ T1178] x64_sys_call+0x8ef/0x9a0 [ 46.759889][ T1178] do_syscall_64+0x4c/0xa0 [ 46.764317][ T1178] ? clear_bhb_loop+0x50/0xa0 [ 46.769077][ T1178] ? clear_bhb_loop+0x50/0xa0 [ 46.774029][ T1178] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 46.781513][ T1178] RIP: 0033:0x7fc79e1f569f [ 46.786220][ T1178] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 46.807525][ T1178] RSP: 002b:00007fc79cc5f030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 46.816310][ T1178] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc79e1f569f [ 46.824633][ T1178] RDX: 0000000000000001 RSI: 00007fc79cc5f0a0 RDI: 0000000000000008 [ 46.833049][ T1178] RBP: 00007fc79cc5f090 R08: 0000000000000000 R09: 0000000000000000 [ 46.841502][ T1178] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 46.849663][ T1178] R13: 00007fc79e42e038 R14: 00007fc79e42dfa0 R15: 00007ffeb6b34ed8 [ 46.857738][ T1178] [ 48.183907][ T1250] device sit0 entered promiscuous mode [ 48.218341][ T1252] syz.3.284[1252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.218413][ T1252] syz.3.284[1252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.730311][ T1267] device sit0 entered promiscuous mode [ 50.191094][ T30] audit: type=1400 audit(1756808560.308:132): avc: denied { create } for pid=1297 comm="syz.1.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 50.279380][ T1308] syz.1.297[1308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.279473][ T1308] syz.1.297[1308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.362808][ T30] audit: type=1400 audit(1756808562.578:133): avc: denied { create } for pid=1347 comm="syz.3.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 52.489878][ T1355] syz.3.311[1355] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.489965][ T1355] syz.3.311[1355] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.816702][ T30] audit: type=1400 audit(1756808564.038:134): avc: denied { create } for pid=1366 comm="syz.1.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 55.019298][ T1396] syz.2.322[1396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.019386][ T1396] syz.2.322[1396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.212573][ T30] audit: type=1400 audit(1756808565.428:135): avc: denied { create } for pid=1406 comm="syz.4.324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 56.075536][ T1434] syz.0.335[1434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.075630][ T1434] syz.0.335[1434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.201675][ T1440] syz.0.335[1440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.296198][ T1440] syz.0.335[1440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.374393][ T30] audit: type=1400 audit(1756808566.588:136): avc: denied { create } for pid=1452 comm="syz.4.339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 56.416654][ T1453] device sit0 entered promiscuous mode [ 56.683358][ T30] audit: type=1400 audit(1756808566.898:137): avc: denied { ioctl } for pid=1457 comm="syz.0.341" path="socket:[18997]" dev="sockfs" ino=18997 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 56.790124][ T1466] syz.3.344[1466] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.790215][ T1466] syz.3.344[1466] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.489307][ T1483] syz.3.350[1483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.647846][ T1483] syz.3.350[1483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.663489][ T1485] device sit0 left promiscuous mode [ 57.781819][ T1488] device sit0 entered promiscuous mode [ 57.962893][ T1487] device sit0 left promiscuous mode [ 58.950604][ T30] audit: type=1400 audit(1756808569.168:138): avc: denied { create } for pid=1549 comm="syz.4.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 60.497064][ T1622] bpf_get_probe_write_proto: 6 callbacks suppressed [ 60.497108][ T1622] syz.2.395[1622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.513724][ T1622] syz.2.395[1622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.770565][ T30] audit: type=1400 audit(1756808570.988:139): avc: denied { create } for pid=1633 comm="syz.3.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 61.595173][ T1656] syz.2.406[1656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.595257][ T1656] syz.2.406[1656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.048544][ T1691] device sit0 entered promiscuous mode [ 63.130442][ T30] audit: type=1400 audit(1756808573.348:140): avc: denied { create } for pid=1692 comm="syz.3.416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 63.237121][ T1695] device veth1_macvtap left promiscuous mode [ 63.273148][ T1696] device veth1_macvtap entered promiscuous mode [ 63.280787][ T1696] device macsec0 entered promiscuous mode [ 63.705600][ T1720] device pim6reg1 entered promiscuous mode [ 63.809770][ T1726] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.817876][ T1726] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.042083][ T1737] device syzkaller0 entered promiscuous mode [ 64.495524][ T1757] device pim6reg1 entered promiscuous mode [ 64.573439][ T30] audit: type=1400 audit(1756808574.788:141): avc: denied { create } for pid=1762 comm="syz.1.443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 64.704552][ T1776] device pim6reg1 entered promiscuous mode [ 65.821760][ T1800] device pim6reg1 entered promiscuous mode [ 66.038144][ T1813] syz.3.460[1813] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.038241][ T1813] syz.3.460[1813] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.053128][ T30] audit: type=1400 audit(1756808576.278:142): avc: denied { create } for pid=1807 comm="syz.1.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 66.113584][ T1808] device syzkaller0 entered promiscuous mode [ 66.131022][ T20] syzkaller0: tun_net_xmit 48 [ 66.816352][ T1819] syz.1.462 (1819) used greatest stack depth: 20872 bytes left [ 66.910199][ T1839] device pim6reg1 entered promiscuous mode [ 67.158023][ T1843] device syzkaller0 entered promiscuous mode [ 68.008863][ T1875] device pim6reg1 entered promiscuous mode [ 69.126995][ T1904] syzkaller1: tun_chr_ioctl cmd 1074025673 [ 69.134975][ T1902] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 69.141126][ T1902] syzkaller1: linktype set to 780 [ 69.671061][ T1916] device pim6reg1 entered promiscuous mode [ 70.092298][ T1920] syz.0.495[1920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.092431][ T1920] syz.0.495[1920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.210201][ T30] audit: type=1400 audit(1756808580.428:143): avc: denied { create } for pid=1921 comm="syz.3.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 70.598380][ T1926] syz.0.497[1926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.598468][ T1926] syz.0.497[1926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.767346][ T1927] FAULT_INJECTION: forcing a failure. [ 70.767346][ T1927] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 70.793008][ T1927] CPU: 1 PID: 1927 Comm: syz.0.497 Not tainted syzkaller #0 [ 70.801242][ T1927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 70.812126][ T1927] Call Trace: [ 70.815507][ T1927] [ 70.818813][ T1927] __dump_stack+0x21/0x30 [ 70.823821][ T1927] dump_stack_lvl+0xee/0x150 [ 70.828517][ T1927] ? show_regs_print_info+0x20/0x20 [ 70.834010][ T1927] ? __activate_page+0xd40/0xd40 [ 70.838954][ T1927] dump_stack+0x15/0x20 [ 70.843213][ T1927] should_fail+0x3c1/0x510 [ 70.847723][ T1927] should_fail_usercopy+0x1a/0x20 [ 70.852846][ T1927] copy_page_from_iter_atomic+0x3fb/0x1350 [ 70.858744][ T1927] ? pipe_zero+0x370/0x370 [ 70.863363][ T1927] generic_perform_write+0x307/0x670 [ 70.868843][ T1927] ? grab_cache_page_write_begin+0xb0/0xb0 [ 70.874913][ T1927] ? file_remove_privs+0x590/0x590 [ 70.880119][ T1927] ? rwsem_write_trylock+0x130/0x300 [ 70.885546][ T1927] ? putname+0x111/0x160 [ 70.889792][ T1927] ? clear_nonspinnable+0x60/0x60 [ 70.895018][ T1927] ? avc_policy_seqno+0x1b/0x70 [ 70.900167][ T1927] __generic_file_write_iter+0x268/0x480 [ 70.906295][ T1927] generic_file_write_iter+0xa9/0x1d0 [ 70.912382][ T1927] vfs_write+0x802/0xf70 [ 70.917720][ T1927] ? file_end_write+0x1b0/0x1b0 [ 70.922859][ T1927] ? wait_for_completion_killable_timeout+0x10/0x10 [ 70.930153][ T1927] ? __fget_files+0x2c4/0x320 [ 70.934953][ T1927] ? __fdget_pos+0x2d2/0x380 [ 70.939923][ T1927] ? ksys_write+0x71/0x240 [ 70.944798][ T1927] ksys_write+0x140/0x240 [ 70.949411][ T1927] ? __ia32_sys_read+0x90/0x90 [ 70.954335][ T1927] ? debug_smp_processor_id+0x17/0x20 [ 70.960591][ T1927] __x64_sys_write+0x7b/0x90 [ 70.965652][ T1927] x64_sys_call+0x8ef/0x9a0 [ 70.970525][ T1927] do_syscall_64+0x4c/0xa0 [ 70.975880][ T1927] ? clear_bhb_loop+0x50/0xa0 [ 70.981180][ T1927] ? clear_bhb_loop+0x50/0xa0 [ 70.985933][ T1927] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 70.992303][ T1927] RIP: 0033:0x7f5e12beebe9 [ 70.997197][ T1927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 71.018379][ T1927] RSP: 002b:00007f5e11636038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 71.027460][ T1927] RAX: ffffffffffffffda RBX: 00007f5e12e26090 RCX: 00007f5e12beebe9 [ 71.036183][ T1927] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 71.044766][ T1927] RBP: 00007f5e11636090 R08: 0000000000000000 R09: 0000000000000000 [ 71.053466][ T1927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 71.062536][ T1927] R13: 00007f5e12e26128 R14: 00007f5e12e26090 R15: 00007fff9aa48478 [ 71.071210][ T1927] [ 72.805361][ T1945] device veth0_vlan left promiscuous mode [ 72.841906][ T1945] device veth0_vlan entered promiscuous mode [ 72.880933][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.893533][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.921335][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 72.943737][ T1956] device pim6reg1 entered promiscuous mode [ 73.048491][ T1970] syz.0.508[1970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.048541][ T1970] syz.0.508[1970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.064316][ T1970] FAULT_INJECTION: forcing a failure. [ 73.064316][ T1970] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 73.090154][ T1970] CPU: 1 PID: 1970 Comm: syz.0.508 Not tainted syzkaller #0 [ 73.097552][ T1970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 73.108142][ T1970] Call Trace: [ 73.111427][ T1970] [ 73.114530][ T1970] __dump_stack+0x21/0x30 [ 73.119365][ T1970] dump_stack_lvl+0xee/0x150 [ 73.124333][ T1970] ? show_regs_print_info+0x20/0x20 [ 73.130435][ T1970] ? __activate_page+0xd40/0xd40 [ 73.136166][ T1970] dump_stack+0x15/0x20 [ 73.141181][ T1970] should_fail+0x3c1/0x510 [ 73.145819][ T1970] should_fail_usercopy+0x1a/0x20 [ 73.151294][ T1970] copy_page_from_iter_atomic+0x3fb/0x1350 [ 73.157471][ T1970] ? pipe_zero+0x370/0x370 [ 73.162207][ T1970] generic_perform_write+0x307/0x670 [ 73.167547][ T1970] ? grab_cache_page_write_begin+0xb0/0xb0 [ 73.173636][ T1970] ? file_remove_privs+0x590/0x590 [ 73.179031][ T1970] ? rwsem_write_trylock+0x130/0x300 [ 73.184662][ T1970] ? putname+0x111/0x160 [ 73.189246][ T1970] ? clear_nonspinnable+0x60/0x60 [ 73.194360][ T1970] ? avc_policy_seqno+0x1b/0x70 [ 73.199906][ T1970] __generic_file_write_iter+0x268/0x480 [ 73.206061][ T1970] generic_file_write_iter+0xa9/0x1d0 [ 73.212298][ T1970] vfs_write+0x802/0xf70 [ 73.217260][ T1970] ? file_end_write+0x1b0/0x1b0 [ 73.222838][ T1970] ? wait_for_completion_killable_timeout+0x10/0x10 [ 73.230078][ T1970] ? __fget_files+0x2c4/0x320 [ 73.234932][ T1970] ? __fdget_pos+0x2d2/0x380 [ 73.239596][ T1970] ? ksys_write+0x71/0x240 [ 73.244647][ T1970] ksys_write+0x140/0x240 [ 73.249172][ T1970] ? __ia32_sys_read+0x90/0x90 [ 73.254863][ T1970] ? debug_smp_processor_id+0x17/0x20 [ 73.260966][ T1970] __x64_sys_write+0x7b/0x90 [ 73.265634][ T1970] x64_sys_call+0x8ef/0x9a0 [ 73.270317][ T1970] do_syscall_64+0x4c/0xa0 [ 73.275265][ T1970] ? clear_bhb_loop+0x50/0xa0 [ 73.281258][ T1970] ? clear_bhb_loop+0x50/0xa0 [ 73.286847][ T1970] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 73.293560][ T1970] RIP: 0033:0x7f5e12beebe9 [ 73.299204][ T1970] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 73.325396][ T1970] RSP: 002b:00007f5e11657038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 73.335728][ T1970] RAX: ffffffffffffffda RBX: 00007f5e12e25fa0 RCX: 00007f5e12beebe9 [ 73.344530][ T1970] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 73.353910][ T1970] RBP: 00007f5e11657090 R08: 0000000000000000 R09: 0000000000000000 [ 73.363518][ T1970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 73.372665][ T1970] R13: 00007f5e12e26038 R14: 00007f5e12e25fa0 R15: 00007fff9aa48478 [ 73.382100][ T1970] [ 73.705002][ T1985] ref_ctr_offset mismatch. inode: 0x204 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 74.257827][ T1989] device syzkaller0 entered promiscuous mode [ 74.491444][ T2010] device pim6reg1 entered promiscuous mode [ 74.511837][ T2014] syz.1.525[2014] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.511930][ T2014] syz.1.525[2014] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.546933][ T2014] FAULT_INJECTION: forcing a failure. [ 74.546933][ T2014] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 74.573524][ T2014] CPU: 0 PID: 2014 Comm: syz.1.525 Not tainted syzkaller #0 [ 74.581127][ T2014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 74.591710][ T2014] Call Trace: [ 74.595208][ T2014] [ 74.598636][ T2014] __dump_stack+0x21/0x30 [ 74.603425][ T2014] dump_stack_lvl+0xee/0x150 [ 74.608106][ T2014] ? show_regs_print_info+0x20/0x20 [ 74.613824][ T2014] ? __activate_page+0xd40/0xd40 [ 74.618769][ T2014] dump_stack+0x15/0x20 [ 74.623279][ T2014] should_fail+0x3c1/0x510 [ 74.628053][ T2014] should_fail_usercopy+0x1a/0x20 [ 74.633296][ T2014] copy_page_from_iter_atomic+0x3fb/0x1350 [ 74.639462][ T2014] ? pipe_zero+0x370/0x370 [ 74.644153][ T2014] generic_perform_write+0x307/0x670 [ 74.650005][ T2014] ? grab_cache_page_write_begin+0xb0/0xb0 [ 74.656148][ T2014] ? file_remove_privs+0x590/0x590 [ 74.661581][ T2014] ? rwsem_write_trylock+0x130/0x300 [ 74.667285][ T2014] ? putname+0x111/0x160 [ 74.671633][ T2014] ? clear_nonspinnable+0x60/0x60 [ 74.676958][ T2014] ? avc_policy_seqno+0x1b/0x70 [ 74.682133][ T2014] __generic_file_write_iter+0x268/0x480 [ 74.687970][ T2014] generic_file_write_iter+0xa9/0x1d0 [ 74.693568][ T2014] vfs_write+0x802/0xf70 [ 74.697820][ T2014] ? file_end_write+0x1b0/0x1b0 [ 74.702713][ T2014] ? wait_for_completion_killable_timeout+0x10/0x10 [ 74.709865][ T2014] ? __fget_files+0x2c4/0x320 [ 74.714820][ T2014] ? __fdget_pos+0x2d2/0x380 [ 74.719681][ T2014] ? ksys_write+0x71/0x240 [ 74.725610][ T2014] ksys_write+0x140/0x240 [ 74.730126][ T2014] ? __ia32_sys_read+0x90/0x90 [ 74.734988][ T2014] ? debug_smp_processor_id+0x17/0x20 [ 74.740397][ T2014] __x64_sys_write+0x7b/0x90 [ 74.744997][ T2014] x64_sys_call+0x8ef/0x9a0 [ 74.749701][ T2014] do_syscall_64+0x4c/0xa0 [ 74.754289][ T2014] ? clear_bhb_loop+0x50/0xa0 [ 74.759247][ T2014] ? clear_bhb_loop+0x50/0xa0 [ 74.764101][ T2014] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 74.770356][ T2014] RIP: 0033:0x7f546bb1dbe9 [ 74.775732][ T2014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 74.796873][ T2014] RSP: 002b:00007f546a586038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 74.806807][ T2014] RAX: ffffffffffffffda RBX: 00007f546bd54fa0 RCX: 00007f546bb1dbe9 [ 74.815325][ T2014] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 74.824568][ T2014] RBP: 00007f546a586090 R08: 0000000000000000 R09: 0000000000000000 [ 74.833469][ T2014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 74.841888][ T2014] R13: 00007f546bd55038 R14: 00007f546bd54fa0 R15: 00007ffc622d10b8 [ 74.850304][ T2014] [ 74.937005][ T2025] syz.1.529[2025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.937098][ T2025] syz.1.529[2025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.095122][ T2025] bond_slave_1: mtu less than device minimum [ 75.186477][ T2042] FAULT_INJECTION: forcing a failure. [ 75.186477][ T2042] name failslab, interval 1, probability 0, space 0, times 0 [ 75.202736][ T2042] CPU: 1 PID: 2042 Comm: syz.4.535 Not tainted syzkaller #0 [ 75.211186][ T2042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 75.221517][ T2042] Call Trace: [ 75.226202][ T2042] [ 75.229692][ T2042] __dump_stack+0x21/0x30 [ 75.235117][ T2042] dump_stack_lvl+0xee/0x150 [ 75.240148][ T2042] ? show_regs_print_info+0x20/0x20 [ 75.245735][ T2042] ? avc_has_perm+0x158/0x240 [ 75.250916][ T2042] ? security_file_permission+0x79/0xa0 [ 75.257023][ T2042] dump_stack+0x15/0x20 [ 75.261388][ T2042] should_fail+0x3c1/0x510 [ 75.266421][ T2042] __should_failslab+0xa4/0xe0 [ 75.271534][ T2042] should_failslab+0x9/0x20 [ 75.276393][ T2042] slab_pre_alloc_hook+0x3b/0xe0 [ 75.281965][ T2042] ? sock_alloc_inode+0x1b/0xb0 [ 75.287066][ T2042] kmem_cache_alloc+0x44/0x260 [ 75.292004][ T2042] ? sockfs_init_fs_context+0xb0/0xb0 [ 75.298072][ T2042] sock_alloc_inode+0x1b/0xb0 [ 75.303279][ T2042] ? sockfs_init_fs_context+0xb0/0xb0 [ 75.309186][ T2042] new_inode_pseudo+0x62/0x210 [ 75.314546][ T2042] __sock_create+0x12c/0x7a0 [ 75.319413][ T2042] __sys_socketpair+0x1a1/0x590 [ 75.324440][ T2042] __x64_sys_socketpair+0x9b/0xb0 [ 75.329979][ T2042] x64_sys_call+0x36/0x9a0 [ 75.334385][ T2042] do_syscall_64+0x4c/0xa0 [ 75.338908][ T2042] ? clear_bhb_loop+0x50/0xa0 [ 75.343761][ T2042] ? clear_bhb_loop+0x50/0xa0 [ 75.348626][ T2042] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 75.355138][ T2042] RIP: 0033:0x7fc79e1f6be9 [ 75.359721][ T2042] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 75.380903][ T2042] RSP: 002b:00007fc79cc5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 75.389589][ T2042] RAX: ffffffffffffffda RBX: 00007fc79e42dfa0 RCX: 00007fc79e1f6be9 [ 75.397833][ T2042] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 75.406490][ T2042] RBP: 00007fc79cc5f090 R08: 0000000000000000 R09: 0000000000000000 [ 75.430349][ T2042] R10: 0000200000000680 R11: 0000000000000246 R12: 0000000000000001 [ 75.438725][ T2042] R13: 00007fc79e42e038 R14: 00007fc79e42dfa0 R15: 00007ffeb6b34ed8 [ 75.447192][ T2042] [ 75.466909][ T2042] socket: no more sockets [ 75.511984][ T2057] device pim6reg1 entered promiscuous mode [ 75.574601][ T2062] syz.1.541[2062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.574671][ T2062] syz.1.541[2062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.630046][ T2062] FAULT_INJECTION: forcing a failure. [ 75.630046][ T2062] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 75.656104][ T2062] CPU: 1 PID: 2062 Comm: syz.1.541 Not tainted syzkaller #0 [ 75.664004][ T2062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 75.674942][ T2062] Call Trace: [ 75.678574][ T2062] [ 75.682841][ T2062] __dump_stack+0x21/0x30 [ 75.687600][ T2062] dump_stack_lvl+0xee/0x150 [ 75.692922][ T2062] ? show_regs_print_info+0x20/0x20 [ 75.698227][ T2062] ? __activate_page+0xd40/0xd40 [ 75.704293][ T2062] dump_stack+0x15/0x20 [ 75.708639][ T2062] should_fail+0x3c1/0x510 [ 75.714025][ T2062] should_fail_usercopy+0x1a/0x20 [ 75.719263][ T2062] copy_page_from_iter_atomic+0x3fb/0x1350 [ 75.725503][ T2062] ? pipe_zero+0x370/0x370 [ 75.730288][ T2062] generic_perform_write+0x307/0x670 [ 75.735933][ T2062] ? grab_cache_page_write_begin+0xb0/0xb0 [ 75.742457][ T2062] ? file_remove_privs+0x590/0x590 [ 75.747956][ T2062] ? rwsem_write_trylock+0x130/0x300 [ 75.753439][ T2062] ? clear_nonspinnable+0x60/0x60 [ 75.758737][ T2062] ? avc_policy_seqno+0x1b/0x70 [ 75.763771][ T2062] __generic_file_write_iter+0x268/0x480 [ 75.769432][ T2062] generic_file_write_iter+0xa9/0x1d0 [ 75.775010][ T2062] vfs_write+0x802/0xf70 [ 75.779721][ T2062] ? file_end_write+0x1b0/0x1b0 [ 75.785770][ T2062] ? wait_for_completion_killable_timeout+0x10/0x10 [ 75.793104][ T2062] ? __fget_files+0x2c4/0x320 [ 75.798253][ T2062] ? __fdget_pos+0x2d2/0x380 [ 75.803180][ T2062] ? ksys_write+0x71/0x240 [ 75.807768][ T2062] ksys_write+0x140/0x240 [ 75.812429][ T2062] ? __ia32_sys_read+0x90/0x90 [ 75.817592][ T2062] ? debug_smp_processor_id+0x17/0x20 [ 75.823194][ T2062] __x64_sys_write+0x7b/0x90 [ 75.827918][ T2062] x64_sys_call+0x8ef/0x9a0 [ 75.832672][ T2062] do_syscall_64+0x4c/0xa0 [ 75.837256][ T2062] ? clear_bhb_loop+0x50/0xa0 [ 75.842103][ T2062] ? clear_bhb_loop+0x50/0xa0 [ 75.847202][ T2062] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 75.853518][ T2062] RIP: 0033:0x7f546bb1dbe9 [ 75.857944][ T2062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 75.877815][ T2062] RSP: 002b:00007f546a586038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 75.886323][ T2062] RAX: ffffffffffffffda RBX: 00007f546bd54fa0 RCX: 00007f546bb1dbe9 [ 75.894543][ T2062] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 75.902896][ T2062] RBP: 00007f546a586090 R08: 0000000000000000 R09: 0000000000000000 [ 75.911040][ T2062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 75.919377][ T2062] R13: 00007f546bd55038 R14: 00007f546bd54fa0 R15: 00007ffc622d10b8 [ 75.928382][ T2062] [ 76.268246][ T2092] FAULT_INJECTION: forcing a failure. [ 76.268246][ T2092] name failslab, interval 1, probability 0, space 0, times 0 [ 76.356274][ T2092] CPU: 0 PID: 2092 Comm: syz.0.549 Not tainted syzkaller #0 [ 76.364339][ T2092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 76.375070][ T2092] Call Trace: [ 76.378464][ T2092] [ 76.382129][ T2092] __dump_stack+0x21/0x30 [ 76.389680][ T2092] dump_stack_lvl+0xee/0x150 [ 76.394989][ T2092] ? show_regs_print_info+0x20/0x20 [ 76.400912][ T2092] dump_stack+0x15/0x20 [ 76.405530][ T2092] should_fail+0x3c1/0x510 [ 76.410525][ T2092] __should_failslab+0xa4/0xe0 [ 76.415931][ T2092] should_failslab+0x9/0x20 [ 76.420649][ T2092] slab_pre_alloc_hook+0x3b/0xe0 [ 76.425790][ T2092] ? security_inode_alloc+0x33/0x110 [ 76.431884][ T2092] kmem_cache_alloc+0x44/0x260 [ 76.436845][ T2092] security_inode_alloc+0x33/0x110 [ 76.442060][ T2092] inode_init_always+0x711/0x990 [ 76.447385][ T2092] new_inode_pseudo+0x91/0x210 [ 76.452355][ T2092] __sock_create+0x12c/0x7a0 [ 76.457082][ T2092] __sys_socketpair+0x1a1/0x590 [ 76.462224][ T2092] __x64_sys_socketpair+0x9b/0xb0 [ 76.467271][ T2092] x64_sys_call+0x36/0x9a0 [ 76.471777][ T2092] do_syscall_64+0x4c/0xa0 [ 76.476204][ T2092] ? clear_bhb_loop+0x50/0xa0 [ 76.481055][ T2092] ? clear_bhb_loop+0x50/0xa0 [ 76.485950][ T2092] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 76.492341][ T2092] RIP: 0033:0x7f5e12beebe9 [ 76.496959][ T2092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 76.517711][ T2092] RSP: 002b:00007f5e11657038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 76.526877][ T2092] RAX: ffffffffffffffda RBX: 00007f5e12e25fa0 RCX: 00007f5e12beebe9 [ 76.536100][ T2092] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 76.545147][ T2092] RBP: 00007f5e11657090 R08: 0000000000000000 R09: 0000000000000000 [ 76.554263][ T2092] R10: 0000200000000680 R11: 0000000000000246 R12: 0000000000000001 [ 76.562712][ T2092] R13: 00007f5e12e26038 R14: 00007f5e12e25fa0 R15: 00007fff9aa48478 [ 76.570788][ T2092] [ 76.594887][ T2092] socket: no more sockets [ 77.564043][ T2118] device pim6reg1 entered promiscuous mode [ 77.930672][ T2131] FAULT_INJECTION: forcing a failure. [ 77.930672][ T2131] name failslab, interval 1, probability 0, space 0, times 0 [ 78.086624][ T2131] CPU: 0 PID: 2131 Comm: syz.0.560 Not tainted syzkaller #0 [ 78.094216][ T2131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 78.104924][ T2131] Call Trace: [ 78.108238][ T2131] [ 78.111356][ T2131] __dump_stack+0x21/0x30 [ 78.115873][ T2131] dump_stack_lvl+0xee/0x150 [ 78.120574][ T2131] ? show_regs_print_info+0x20/0x20 [ 78.126129][ T2131] ? security_inode_alloc+0x33/0x110 [ 78.131830][ T2131] ? new_inode_pseudo+0x91/0x210 [ 78.137078][ T2131] ? __sock_create+0x12c/0x7a0 [ 78.142023][ T2131] ? __sys_socketpair+0x1a1/0x590 [ 78.147322][ T2131] ? x64_sys_call+0x36/0x9a0 [ 78.152662][ T2131] ? do_syscall_64+0x4c/0xa0 [ 78.157437][ T2131] dump_stack+0x15/0x20 [ 78.161769][ T2131] should_fail+0x3c1/0x510 [ 78.166809][ T2131] __should_failslab+0xa4/0xe0 [ 78.172016][ T2131] should_failslab+0x9/0x20 [ 78.176889][ T2131] slab_pre_alloc_hook+0x3b/0xe0 [ 78.182271][ T2131] ? sk_prot_alloc+0x5f/0x320 [ 78.187121][ T2131] kmem_cache_alloc+0x44/0x260 [ 78.192246][ T2131] sk_prot_alloc+0x5f/0x320 [ 78.197204][ T2131] sk_alloc+0x38/0x430 [ 78.201707][ T2131] tipc_sk_create+0xe6/0x1df0 [ 78.206503][ T2131] ? __kasan_check_write+0x14/0x20 [ 78.211719][ T2131] ? _raw_spin_lock+0x8e/0xe0 [ 78.216740][ T2131] ? _raw_spin_trylock_bh+0x130/0x130 [ 78.222185][ T2131] ? security_inode_alloc+0xc0/0x110 [ 78.227729][ T2131] ? inode_init_always+0x729/0x990 [ 78.233218][ T2131] __sock_create+0x38d/0x7a0 [ 78.238104][ T2131] __sys_socketpair+0x1a1/0x590 [ 78.243330][ T2131] __x64_sys_socketpair+0x9b/0xb0 [ 78.248445][ T2131] x64_sys_call+0x36/0x9a0 [ 78.253047][ T2131] do_syscall_64+0x4c/0xa0 [ 78.257539][ T2131] ? clear_bhb_loop+0x50/0xa0 [ 78.262428][ T2131] ? clear_bhb_loop+0x50/0xa0 [ 78.267445][ T2131] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 78.273698][ T2131] RIP: 0033:0x7f5e12beebe9 [ 78.278124][ T2131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.299919][ T2131] RSP: 002b:00007f5e11657038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 78.309144][ T2131] RAX: ffffffffffffffda RBX: 00007f5e12e25fa0 RCX: 00007f5e12beebe9 [ 78.317947][ T2131] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 78.327151][ T2131] RBP: 00007f5e11657090 R08: 0000000000000000 R09: 0000000000000000 [ 78.336076][ T2131] R10: 0000200000000680 R11: 0000000000000246 R12: 0000000000000001 [ 78.344391][ T2131] R13: 00007f5e12e26038 R14: 00007f5e12e25fa0 R15: 00007fff9aa48478 [ 78.353091][ T2131] [ 78.764861][ T2150] device sit0 left promiscuous mode [ 79.838685][ T30] audit: type=1400 audit(1756808590.038:144): avc: denied { create } for pid=2158 comm="syz.0.570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 79.930289][ T2164] device pim6reg1 entered promiscuous mode [ 80.495212][ T2181] FAULT_INJECTION: forcing a failure. [ 80.495212][ T2181] name failslab, interval 1, probability 0, space 0, times 0 [ 80.512872][ T30] audit: type=1400 audit(1756808590.728:145): avc: denied { ioctl } for pid=2176 comm="syz.2.577" path="pid:[4026532286]" dev="nsfs" ino=4026532286 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.614848][ T2181] CPU: 1 PID: 2181 Comm: syz.4.576 Not tainted syzkaller #0 [ 80.622375][ T2181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 80.632521][ T2181] Call Trace: [ 80.635984][ T2181] [ 80.638916][ T2181] __dump_stack+0x21/0x30 [ 80.643348][ T2181] dump_stack_lvl+0xee/0x150 [ 80.648215][ T2181] ? show_regs_print_info+0x20/0x20 [ 80.653411][ T2181] dump_stack+0x15/0x20 [ 80.657915][ T2181] should_fail+0x3c1/0x510 [ 80.662613][ T2181] __should_failslab+0xa4/0xe0 [ 80.667397][ T2181] should_failslab+0x9/0x20 [ 80.672101][ T2181] slab_pre_alloc_hook+0x3b/0xe0 [ 80.677319][ T2181] kmem_cache_alloc_trace+0x48/0x270 [ 80.683405][ T2181] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 80.689955][ T2181] selinux_sk_alloc_security+0x7e/0x1a0 [ 80.695925][ T2181] security_sk_alloc+0x72/0xa0 [ 80.701068][ T2181] sk_prot_alloc+0x108/0x320 [ 80.705779][ T2181] sk_alloc+0x38/0x430 [ 80.710219][ T2181] tipc_sk_create+0xe6/0x1df0 [ 80.715243][ T2181] ? __kasan_check_write+0x14/0x20 [ 80.720457][ T2181] ? _raw_spin_lock+0x8e/0xe0 [ 80.725235][ T2181] ? _raw_spin_trylock_bh+0x130/0x130 [ 80.730973][ T2181] ? security_inode_alloc+0xc0/0x110 [ 80.736982][ T2181] ? inode_init_always+0x729/0x990 [ 80.742473][ T2181] __sock_create+0x38d/0x7a0 [ 80.747515][ T2181] __sys_socketpair+0x1a1/0x590 [ 80.752900][ T2181] __x64_sys_socketpair+0x9b/0xb0 [ 80.758275][ T2181] x64_sys_call+0x36/0x9a0 [ 80.763139][ T2181] do_syscall_64+0x4c/0xa0 [ 80.767655][ T2181] ? clear_bhb_loop+0x50/0xa0 [ 80.773263][ T2181] ? clear_bhb_loop+0x50/0xa0 [ 80.780675][ T2181] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 80.787214][ T2181] RIP: 0033:0x7fc79e1f6be9 [ 80.792350][ T2181] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.814640][ T2181] RSP: 002b:00007fc79cc5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 80.823695][ T2181] RAX: ffffffffffffffda RBX: 00007fc79e42dfa0 RCX: 00007fc79e1f6be9 [ 80.832046][ T2181] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 80.840548][ T2181] RBP: 00007fc79cc5f090 R08: 0000000000000000 R09: 0000000000000000 [ 80.848810][ T2181] R10: 0000200000000680 R11: 0000000000000246 R12: 0000000000000001 [ 80.857335][ T2181] R13: 00007fc79e42e038 R14: 00007fc79e42dfa0 R15: 00007ffeb6b34ed8 [ 80.865695][ T2181] [ 81.015271][ T2204] device pim6reg1 entered promiscuous mode [ 81.022875][ T2215] device sit0 left promiscuous mode [ 81.177793][ T2218] device sit0 entered promiscuous mode [ 81.844412][ T2230] syz.3.591[2230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.844613][ T2231] syz.3.591[2231] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.844683][ T2231] syz.3.591[2231] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.073450][ T2230] syz.3.591[2230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.235224][ T2231] bond_slave_1: mtu less than device minimum [ 82.447572][ T2246] FAULT_INJECTION: forcing a failure. [ 82.447572][ T2246] name failslab, interval 1, probability 0, space 0, times 0 [ 82.530592][ T2246] CPU: 1 PID: 2246 Comm: syz.0.596 Not tainted syzkaller #0 [ 82.538642][ T2246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 82.548882][ T2246] Call Trace: [ 82.552468][ T2246] [ 82.555540][ T2246] __dump_stack+0x21/0x30 [ 82.559898][ T2246] dump_stack_lvl+0xee/0x150 [ 82.564579][ T2246] ? show_regs_print_info+0x20/0x20 [ 82.570259][ T2246] ? avc_has_perm+0x158/0x240 [ 82.575062][ T2246] dump_stack+0x15/0x20 [ 82.579324][ T2246] should_fail+0x3c1/0x510 [ 82.584028][ T2246] __should_failslab+0xa4/0xe0 [ 82.589062][ T2246] should_failslab+0x9/0x20 [ 82.593583][ T2246] slab_pre_alloc_hook+0x3b/0xe0 [ 82.598744][ T2246] ? sock_alloc_inode+0x1b/0xb0 [ 82.603706][ T2246] kmem_cache_alloc+0x44/0x260 [ 82.608828][ T2246] ? sockfs_init_fs_context+0xb0/0xb0 [ 82.614305][ T2246] sock_alloc_inode+0x1b/0xb0 [ 82.619090][ T2246] ? sockfs_init_fs_context+0xb0/0xb0 [ 82.624585][ T2246] new_inode_pseudo+0x62/0x210 [ 82.629456][ T2246] __sock_create+0x12c/0x7a0 [ 82.634381][ T2246] __sys_socketpair+0x218/0x590 [ 82.639533][ T2246] __x64_sys_socketpair+0x9b/0xb0 [ 82.644684][ T2246] x64_sys_call+0x36/0x9a0 [ 82.649226][ T2246] do_syscall_64+0x4c/0xa0 [ 82.653653][ T2246] ? clear_bhb_loop+0x50/0xa0 [ 82.658630][ T2246] ? clear_bhb_loop+0x50/0xa0 [ 82.663897][ T2246] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 82.670048][ T2246] RIP: 0033:0x7f5e12beebe9 [ 82.674584][ T2246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 82.695911][ T2246] RSP: 002b:00007f5e11657038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 82.704991][ T2246] RAX: ffffffffffffffda RBX: 00007f5e12e25fa0 RCX: 00007f5e12beebe9 [ 82.713268][ T2246] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 82.721350][ T2246] RBP: 00007f5e11657090 R08: 0000000000000000 R09: 0000000000000000 [ 82.729434][ T2246] R10: 0000200000000680 R11: 0000000000000246 R12: 0000000000000001 [ 82.737888][ T2246] R13: 00007f5e12e26038 R14: 00007f5e12e25fa0 R15: 00007fff9aa48478 [ 82.746235][ T2246] [ 82.965018][ T2246] socket: no more sockets [ 83.057416][ T2249] device veth0_vlan left promiscuous mode [ 83.219055][ T2249] device veth0_vlan entered promiscuous mode [ 83.323985][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.334311][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.344748][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 83.400183][ T2263] device pim6reg1 entered promiscuous mode [ 84.763129][ T2285] FAULT_INJECTION: forcing a failure. [ 84.763129][ T2285] name failslab, interval 1, probability 0, space 0, times 0 [ 85.027520][ T2285] CPU: 1 PID: 2285 Comm: syz.3.610 Not tainted syzkaller #0 [ 85.036111][ T2285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 85.047480][ T2285] Call Trace: [ 85.051038][ T2285] [ 85.054239][ T2285] __dump_stack+0x21/0x30 [ 85.059181][ T2285] dump_stack_lvl+0xee/0x150 [ 85.064744][ T2285] ? show_regs_print_info+0x20/0x20 [ 85.070838][ T2285] dump_stack+0x15/0x20 [ 85.075319][ T2285] should_fail+0x3c1/0x510 [ 85.080435][ T2285] __should_failslab+0xa4/0xe0 [ 85.085627][ T2285] should_failslab+0x9/0x20 [ 85.090291][ T2285] slab_pre_alloc_hook+0x3b/0xe0 [ 85.095402][ T2285] ? security_inode_alloc+0x33/0x110 [ 85.101128][ T2285] kmem_cache_alloc+0x44/0x260 [ 85.106247][ T2285] security_inode_alloc+0x33/0x110 [ 85.111603][ T2285] inode_init_always+0x711/0x990 [ 85.117064][ T2285] new_inode_pseudo+0x91/0x210 [ 85.122166][ T2285] __sock_create+0x12c/0x7a0 [ 85.126920][ T2285] __sys_socketpair+0x218/0x590 [ 85.132121][ T2285] __x64_sys_socketpair+0x9b/0xb0 [ 85.137688][ T2285] x64_sys_call+0x36/0x9a0 [ 85.142202][ T2285] do_syscall_64+0x4c/0xa0 [ 85.147256][ T2285] ? clear_bhb_loop+0x50/0xa0 [ 85.152205][ T2285] ? clear_bhb_loop+0x50/0xa0 [ 85.157234][ T2285] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 85.163464][ T2285] RIP: 0033:0x7ff054f50be9 [ 85.168218][ T2285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 85.190711][ T2285] RSP: 002b:00007ff0539b9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 85.199211][ T2285] RAX: ffffffffffffffda RBX: 00007ff055187fa0 RCX: 00007ff054f50be9 [ 85.207539][ T2285] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 85.216120][ T2285] RBP: 00007ff0539b9090 R08: 0000000000000000 R09: 0000000000000000 [ 85.224814][ T2285] R10: 0000200000000680 R11: 0000000000000246 R12: 0000000000000001 [ 85.233506][ T2285] R13: 00007ff055188038 R14: 00007ff055187fa0 R15: 00007fff915a42a8 [ 85.241970][ T2285] [ 85.296152][ T2285] socket: no more sockets [ 86.055920][ T30] audit: type=1400 audit(1756808596.278:146): avc: denied { create } for pid=2288 comm="syz.4.611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 86.398378][ T2306] device pim6reg1 entered promiscuous mode [ 86.945547][ T2322] device syzkaller0 entered promiscuous mode [ 87.007017][ T2312] bond_slave_1: mtu less than device minimum [ 87.093714][ T2333] device syzkaller0 entered promiscuous mode [ 87.401541][ T2339] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.419399][ T2339] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.431911][ T2339] device bridge_slave_0 entered promiscuous mode [ 87.451062][ T2346] device pim6reg1 entered promiscuous mode [ 87.486836][ T2339] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.494720][ T2339] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.576814][ T2339] device bridge_slave_1 entered promiscuous mode [ 88.250385][ T30] audit: type=1400 audit(1756808598.468:147): avc: denied { create } for pid=2339 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.491465][ T30] audit: type=1400 audit(1756808598.528:148): avc: denied { write } for pid=2339 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.591046][ T30] audit: type=1400 audit(1756808598.528:149): avc: denied { read } for pid=2339 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.673346][ T30] audit: type=1400 audit(1756808598.638:150): avc: denied { create } for pid=2358 comm="syz.0.631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 88.788820][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.798211][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.836426][ T2379] device pim6reg1 entered promiscuous mode [ 88.966416][ T2362] device syzkaller0 entered promiscuous mode [ 89.105062][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.115968][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.125865][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.133274][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.141725][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.150530][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.163540][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.171377][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.179628][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.277301][ T30] audit: type=1400 audit(1756808599.498:151): avc: denied { create } for pid=2388 comm="syz.0.637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 89.298651][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 89.315260][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 89.339208][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 89.386836][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 89.417858][ T2399] device pim6reg1 entered promiscuous mode [ 89.443698][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 89.468177][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 89.503962][ T2339] device veth0_vlan entered promiscuous mode [ 89.565928][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 89.577423][ T30] audit: type=1400 audit(1756808599.778:152): avc: denied { read } for pid=2395 comm="syz.3.639" dev="nsfs" ino=4026532374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 89.607010][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 89.615288][ T30] audit: type=1400 audit(1756808599.818:153): avc: denied { open } for pid=2395 comm="syz.3.639" path="mnt:[4026532374]" dev="nsfs" ino=4026532374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 89.649699][ T2339] device veth1_macvtap entered promiscuous mode [ 89.660934][ T343] device bridge_slave_1 left promiscuous mode [ 89.668360][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.676817][ T343] device bridge_slave_0 left promiscuous mode [ 89.683227][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.706807][ T343] device veth1_macvtap left promiscuous mode [ 89.713204][ T343] device veth0_vlan left promiscuous mode [ 89.880284][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 89.935193][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 89.958730][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 90.035199][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 90.055108][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 90.073154][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 90.082128][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 90.212758][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 90.221967][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 90.341010][ T2424] device pim6reg1 entered promiscuous mode [ 91.328941][ T2437] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.349826][ T2437] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.368855][ T2437] device bridge_slave_0 entered promiscuous mode [ 91.521353][ T2437] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.529761][ T2437] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.538309][ T2437] device bridge_slave_1 entered promiscuous mode [ 91.631157][ T2469] device sit0 entered promiscuous mode [ 91.732885][ T2437] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.740200][ T2437] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.748298][ T2437] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.755717][ T2437] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.780712][ T758] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.791614][ T758] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.804114][ T2482] syz.2.663[2482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.804180][ T2482] syz.2.663[2482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.845169][ T2482] FAULT_INJECTION: forcing a failure. [ 91.845169][ T2482] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 91.870417][ T2482] CPU: 1 PID: 2482 Comm: syz.2.663 Not tainted syzkaller #0 [ 91.878268][ T2482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 91.888770][ T2482] Call Trace: [ 91.892240][ T2482] [ 91.895183][ T2482] __dump_stack+0x21/0x30 [ 91.899796][ T2482] dump_stack_lvl+0xee/0x150 [ 91.904759][ T2482] ? show_regs_print_info+0x20/0x20 [ 91.910924][ T2482] ? __activate_page+0xd40/0xd40 [ 91.916360][ T2482] dump_stack+0x15/0x20 [ 91.920804][ T2482] should_fail+0x3c1/0x510 [ 91.925818][ T2482] should_fail_usercopy+0x1a/0x20 [ 91.931613][ T2482] copy_page_from_iter_atomic+0x3fb/0x1350 [ 91.938056][ T2482] ? pipe_zero+0x370/0x370 [ 91.943467][ T2482] generic_perform_write+0x307/0x670 [ 91.949962][ T2482] ? grab_cache_page_write_begin+0xb0/0xb0 [ 91.956062][ T2482] ? file_remove_privs+0x590/0x590 [ 91.961818][ T2482] ? rwsem_write_trylock+0x130/0x300 [ 91.967221][ T2482] ? bpf_get_current_ancestor_cgroup_id+0x169/0x190 [ 91.974078][ T2482] ? clear_nonspinnable+0x60/0x60 [ 91.979200][ T2482] ? avc_policy_seqno+0x1b/0x70 [ 91.984163][ T2482] __generic_file_write_iter+0x268/0x480 [ 91.989999][ T2482] generic_file_write_iter+0xa9/0x1d0 [ 91.995556][ T2482] vfs_write+0x802/0xf70 [ 91.999800][ T2482] ? file_end_write+0x1b0/0x1b0 [ 92.005118][ T2482] ? wait_for_completion_killable_timeout+0x10/0x10 [ 92.012053][ T2482] ? __fget_files+0x2c4/0x320 [ 92.016852][ T2482] ? __fdget_pos+0x2d2/0x380 [ 92.021676][ T2482] ? ksys_write+0x71/0x240 [ 92.026082][ T2482] ksys_write+0x140/0x240 [ 92.031225][ T2482] ? __ia32_sys_read+0x90/0x90 [ 92.036120][ T2482] ? debug_smp_processor_id+0x17/0x20 [ 92.041770][ T2482] __x64_sys_write+0x7b/0x90 [ 92.046813][ T2482] x64_sys_call+0x8ef/0x9a0 [ 92.051763][ T2482] do_syscall_64+0x4c/0xa0 [ 92.056346][ T2482] ? clear_bhb_loop+0x50/0xa0 [ 92.061225][ T2482] ? clear_bhb_loop+0x50/0xa0 [ 92.065983][ T2482] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 92.072265][ T2482] RIP: 0033:0x7f2861273be9 [ 92.076956][ T2482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 92.096989][ T2482] RSP: 002b:00007f285fcdc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 92.106347][ T2482] RAX: ffffffffffffffda RBX: 00007f28614aafa0 RCX: 00007f2861273be9 [ 92.114926][ T2482] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 92.123146][ T2482] RBP: 00007f285fcdc090 R08: 0000000000000000 R09: 0000000000000000 [ 92.131540][ T2482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.140551][ T2482] R13: 00007f28614ab038 R14: 00007f28614aafa0 R15: 00007ffd85ef2418 [ 92.149029][ T2482] [ 92.193173][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.201876][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.223871][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 92.233737][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.254488][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.261715][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.316508][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 92.335387][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.354863][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.362299][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.399389][ T2437] device veth0_vlan entered promiscuous mode [ 92.552898][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 92.585586][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 92.594375][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 92.603013][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 92.620261][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 92.631066][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 92.640851][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 92.652363][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 92.662732][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 92.670989][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 92.842140][ T2437] device veth1_macvtap entered promiscuous mode [ 92.897252][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 92.906549][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 92.916381][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 92.925234][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 92.934499][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 92.961206][ T2505] device pim6reg1 entered promiscuous mode [ 92.986811][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 92.995649][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 93.678442][ T343] device bridge_slave_1 left promiscuous mode [ 93.685889][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.694967][ T343] device bridge_slave_0 left promiscuous mode [ 93.701788][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.711382][ T343] device veth1_macvtap left promiscuous mode [ 93.718233][ T343] device veth0_vlan left promiscuous mode [ 93.968992][ T2533] syz.2.677[2533] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.969058][ T2533] syz.2.677[2533] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.984371][ T2533] FAULT_INJECTION: forcing a failure. [ 93.984371][ T2533] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 94.013490][ T2533] CPU: 0 PID: 2533 Comm: syz.2.677 Not tainted syzkaller #0 [ 94.021600][ T2533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 94.035503][ T2533] Call Trace: [ 94.039494][ T2533] [ 94.043041][ T2533] __dump_stack+0x21/0x30 [ 94.049488][ T2533] dump_stack_lvl+0xee/0x150 [ 94.055647][ T2533] ? show_regs_print_info+0x20/0x20 [ 94.062080][ T2533] ? __activate_page+0xd40/0xd40 [ 94.069032][ T2533] dump_stack+0x15/0x20 [ 94.074401][ T2533] should_fail+0x3c1/0x510 [ 94.080084][ T2533] should_fail_usercopy+0x1a/0x20 [ 94.086808][ T2533] copy_page_from_iter_atomic+0x3fb/0x1350 [ 94.093638][ T2533] ? pipe_zero+0x370/0x370 [ 94.099656][ T2533] generic_perform_write+0x307/0x670 [ 94.106348][ T2533] ? grab_cache_page_write_begin+0xb0/0xb0 [ 94.112710][ T2533] ? file_remove_privs+0x590/0x590 [ 94.118024][ T2533] ? rwsem_write_trylock+0x130/0x300 [ 94.123609][ T2533] ? putname+0x111/0x160 [ 94.128533][ T2533] ? clear_nonspinnable+0x60/0x60 [ 94.134270][ T2533] ? avc_policy_seqno+0x1b/0x70 [ 94.140079][ T2533] __generic_file_write_iter+0x268/0x480 [ 94.146756][ T2533] generic_file_write_iter+0xa9/0x1d0 [ 94.153274][ T2533] vfs_write+0x802/0xf70 [ 94.158159][ T2533] ? file_end_write+0x1b0/0x1b0 [ 94.163252][ T2533] ? wait_for_completion_killable_timeout+0x10/0x10 [ 94.170832][ T2533] ? __fget_files+0x2c4/0x320 [ 94.175884][ T2533] ? __fdget_pos+0x2d2/0x380 [ 94.181588][ T2533] ? ksys_write+0x71/0x240 [ 94.186452][ T2533] ksys_write+0x140/0x240 [ 94.191375][ T2533] ? __ia32_sys_read+0x90/0x90 [ 94.196430][ T2533] ? debug_smp_processor_id+0x17/0x20 [ 94.202041][ T2533] __x64_sys_write+0x7b/0x90 [ 94.206950][ T2533] x64_sys_call+0x8ef/0x9a0 [ 94.211640][ T2533] do_syscall_64+0x4c/0xa0 [ 94.216147][ T2533] ? clear_bhb_loop+0x50/0xa0 [ 94.221002][ T2533] ? clear_bhb_loop+0x50/0xa0 [ 94.226866][ T2533] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 94.233361][ T2533] RIP: 0033:0x7f2861273be9 [ 94.237809][ T2533] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 94.259020][ T2533] RSP: 002b:00007f285fcdc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 94.267531][ T2533] RAX: ffffffffffffffda RBX: 00007f28614aafa0 RCX: 00007f2861273be9 [ 94.275680][ T2533] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 94.283929][ T2533] RBP: 00007f285fcdc090 R08: 0000000000000000 R09: 0000000000000000 [ 94.292397][ T2533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 94.300582][ T2533] R13: 00007f28614ab038 R14: 00007f28614aafa0 R15: 00007ffd85ef2418 [ 94.308839][ T2533] [ 94.393676][ T2524] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.404790][ T2524] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.412941][ T2524] device bridge_slave_0 entered promiscuous mode [ 94.481651][ T2524] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.488982][ T2524] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.496656][ T2524] device bridge_slave_1 entered promiscuous mode [ 94.517757][ T2539] device veth0_vlan left promiscuous mode [ 94.541731][ T2539] device veth0_vlan entered promiscuous mode [ 94.556642][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.566428][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.574366][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 94.587084][ T2547] device sit0 left promiscuous mode [ 94.662153][ T2547] device sit0 entered promiscuous mode [ 94.748568][ T2552] syz.2.682[2552] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.748645][ T2552] syz.2.682[2552] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.847650][ T2554] device pim6reg1 entered promiscuous mode [ 95.216745][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 95.235343][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.308285][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 95.336576][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.437517][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.445350][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.563689][ T2586] device veth0_vlan left promiscuous mode [ 95.579769][ T2586] device veth0_vlan entered promiscuous mode [ 95.633122][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 95.645571][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 95.654430][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.662968][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.670147][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.684246][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 95.693032][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 95.701087][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 95.724138][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 95.735009][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 95.772362][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 95.782127][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 95.798820][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 95.807722][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 95.817024][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 95.826231][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 95.834836][ T2524] device veth0_vlan entered promiscuous mode [ 95.852026][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 95.873382][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 95.903077][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 95.912167][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 95.927704][ T2524] device veth1_macvtap entered promiscuous mode [ 95.967111][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 95.975809][ T2623] device sit0 left promiscuous mode [ 96.004115][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 96.024632][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 96.037536][ T2623] device sit0 entered promiscuous mode [ 96.169322][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 96.179824][ T758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 96.193953][ T343] device bridge_slave_1 left promiscuous mode [ 96.203769][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.213124][ T343] device bridge_slave_0 left promiscuous mode [ 96.220099][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.229121][ T343] device veth1_macvtap left promiscuous mode [ 96.236389][ T343] device veth0_vlan left promiscuous mode [ 96.469209][ T2628] syz.0.702[2628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.066585][ T343] device bridge_slave_1 left promiscuous mode [ 98.085489][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.093306][ T343] device bridge_slave_0 left promiscuous mode [ 98.100029][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.108421][ T343] device bridge_slave_1 left promiscuous mode [ 98.115373][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.123019][ T343] device bridge_slave_0 left promiscuous mode [ 98.129568][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.138582][ T343] device veth0_vlan left promiscuous mode [ 98.145041][ T343] device veth1_macvtap left promiscuous mode [ 98.151645][ T343] device veth0_vlan left promiscuous mode [ 99.945887][ T343] device bridge_slave_1 left promiscuous mode [ 99.952701][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.960962][ T343] device bridge_slave_0 left promiscuous mode [ 99.967841][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.976633][ T343] device bridge_slave_1 left promiscuous mode [ 99.983518][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.991926][ T343] device bridge_slave_0 left promiscuous mode [ 99.998404][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.007138][ T343] device bridge_slave_1 left promiscuous mode [ 100.013778][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.021995][ T343] device bridge_slave_0 left promiscuous mode [ 100.029180][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.037471][ T343] device veth0_vlan left promiscuous mode [ 100.043858][ T343] device veth1_macvtap left promiscuous mode [ 100.050569][ T343] device veth0_vlan left promiscuous mode [ 100.056800][ T343] device veth1_macvtap left promiscuous mode