last executing test programs: 3.723184897s ago: executing program 3 (id=10111): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000010000000000000002500008500000020000000850000007d0000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x22) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="4bb234571d8c62001000008b8716ac4fc494b62b5262a3"], 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (async, rerun: 32) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 32) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40086602, &(0x7f0000000000)) (async, rerun: 32) r8 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc0, 0x0, 0x4, 0x81, 0x0, 0x2, 0x800, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x2000, 0x8000000000000001, 0x80, 0x8, 0xffffffffffffffff, 0x55, 0x2, 0x0, 0x400, 0x0, 0x1}, 0xffffffffffffffff, 0xd, r8, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r9, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000640), 0x0, 0x10, &(0x7f0000000680), 0x0, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x16, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r10, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r10}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0000, 0x0, 0x0, 0x102ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x89f1, &(0x7f0000000080)) (rerun: 64) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) write$cgroup_int(r9, &(0x7f0000000000), 0x400000) (async) write$cgroup_subtree(r4, &(0x7f0000001d00)=ANY=[@ANYRESHEX, @ANYRESOCT], 0x33) (async) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000300)=0xffffffffffffff12) (async) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x9, 0x6, 0x2, 0x40, 0x0, 0x8, 0x10800, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100)}, 0x100400, 0x1e5, 0x1cef, 0x9, 0x6, 0x78, 0x401, 0x0, 0x5, 0x0, 0x6}, 0x0, 0x8, r4, 0x2) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.980629408s ago: executing program 3 (id=10122): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xe9, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000001c0), 0x0, 0x0, 0x96, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{0x1}, &(0x7f0000000480), &(0x7f00000004c0)='%pK \x00'}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000a000000000000000100000d00000000030000000300000000000000000000060400000000000000000000010000000000000000000000617f"], &(0x7f0000000300)=""/4096, 0x52, 0x1000, 0x3}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x831dd5d096269f52) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r6) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001b00)={0x0, 0xc, &(0x7f0000001ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8=r7, @ANYRES64=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 2.081916941s ago: executing program 3 (id=10116): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xb}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969f"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x15, 0x8, 0x0, 0xb620, 0x1008, 0x1}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x20e, 0xe40, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x6, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000002b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0), 0xce, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{r0}, &(0x7f0000000200), &(0x7f0000000680)='%pi6 \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000002000000000000000000000400000003000000000100000604000000000000000000000d020021000000"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xb}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969f"], 0xfdef) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x15, 0x8, 0x0, 0xb620, 0x1008, 0x1}, 0x48) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x20e, 0xe40, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x6, 0x8, 0x8}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000002b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0), 0xce, r3}, 0x38) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r4}, 0x10) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{r0}, &(0x7f0000000200), &(0x7f0000000680)='%pi6 \x00'}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000002000000000000000000000400000003000000000100000604000000000000000000000d020021000000"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2}, 0x20) (async) 1.931013053s ago: executing program 3 (id=10118): syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xffd, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f00000004c0)={&(0x7f0000000180), 0x6e, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0x20000773}], 0x1}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1.594922581s ago: executing program 2 (id=10115): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x220, 0x1}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x3aa, 0x5, 0xfffffffa, 0x0, r0, 0xf3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x5, 0xa}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32=r4, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r7 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r7, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r8, 0x8982, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x5, 0x400, 0x5, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.527465346s ago: executing program 4 (id=10120): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x86, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYBLOB="00000000001c007c4cab496d2abcec00b7080000000000007b8af8ff00000000bfa200000000000000009715000000fc671dd5dd4e30bd2135fb435ac864e98560d885db041afac5906a00167457c56facc408e8e10e55693f44f7e31c60fc9c67c651ff1b040cb3174cd4ac18b96a6931d8858b099a1aab0c1ce924cd13d641598538c191eb5db1cf4ac1db57965b06c3bf122c81ff86124162b6e748901a45"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=r0], 0x0, 0x4a5, 0x0, 0x0, 0x0, 0x10}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x20ed, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r3, @ANYRES32, @ANYBLOB="00000000000095a1825bbdd2ae0de79aa539ab0000b7080500001900007b8af8ff00000000afa200000000200007020000f8ffffff177270ca56432d7d614b0b8e"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES64=r1, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082", @ANYBLOB="3919bcc9a5b49fc634cf316681f25f0d73eacc4ea12a3666e50d82d016ccab04e86ab4332fbd5c9cceb179fcbc2485ac15233343424b35b33f3c7e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYRES8=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYRES8=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) (async) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) close(r2) (async) close(r2) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000200), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x0, 0x400, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.525273706s ago: executing program 0 (id=10124): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xffb, 0x0, 0x0, 0xffffffffffffffff, 0x8000000, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0xab}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x1a, &(0x7f0000000000)=ANY=[@ANYRES16=r2, @ANYRES32=r2, @ANYRESHEX=r2], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b7080000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x6, 0x5, 0x42}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES16=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x2, 0x7fe2, 0x1}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1802b55b8fb2ce00ff4e84ee000000000000000302000000000000181108a1eb71cc4a14b6059e699b65cb03330cdd891f81c159fa1bc9e7697c8817290c90a59061a33b4bf19044386badbf30", @ANYRES32=r4, @ANYRES32=r2], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x3}, 0x0, 0xc8, 0x0, 0x0, 0x7}, 0x0, 0x0, r6, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', r4}, 0x18) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x31, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) write$cgroup_subtree(r9, &(0x7f0000000100)=ANY=[@ANYBLOB="8fcacb7907051175f37538e486dd"], 0xfdef) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r10}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000700000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='percpu_alloc_percpu\x00', r11}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x8, 0x8, 0x8, 0x0, r0, 0x2000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffd}, 0x48) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) 1.448903613s ago: executing program 2 (id=10115): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x220, 0x1}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x3aa, 0x5, 0xfffffffa, 0x0, r0, 0xf3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x5, 0xa}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32=r4, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r7 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r7, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r8, 0x8982, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x5, 0x400, 0x5, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.385120528s ago: executing program 4 (id=10120): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x86, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYBLOB="00000000001c007c4cab496d2abcec00b7080000000000007b8af8ff00000000bfa200000000000000009715000000fc671dd5dd4e30bd2135fb435ac864e98560d885db041afac5906a00167457c56facc408e8e10e55693f44f7e31c60fc9c67c651ff1b040cb3174cd4ac18b96a6931d8858b099a1aab0c1ce924cd13d641598538c191eb5db1cf4ac1db57965b06c3bf122c81ff86124162b6e748901a45"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=r0], 0x0, 0x4a5, 0x0, 0x0, 0x0, 0x10}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x20ed, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r3, @ANYRES32, @ANYBLOB="00000000000095a1825bbdd2ae0de79aa539ab0000b7080500001900007b8af8ff00000000afa200000000200007020000f8ffffff177270ca56432d7d614b0b8e"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES64=r1, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082", @ANYBLOB="3919bcc9a5b49fc634cf316681f25f0d73eacc4ea12a3666e50d82d016ccab04e86ab4332fbd5c9cceb179fcbc2485ac15233343424b35b33f3c7e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYRES8=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYRES8=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) (async) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) close(r2) (async) close(r2) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000200), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x0, 0x400, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.258505239s ago: executing program 2 (id=10115): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x220, 0x1}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x3aa, 0x5, 0xfffffffa, 0x0, r0, 0xf3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x5, 0xa}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32=r4, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r7 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r7, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r8, 0x8982, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000073d94984f8c8702a84735917cecd325ec727fc0a9504df780944b1b0f729d1c47717519a710b32cd4ad3734f5abe716a1c97eac6546b537541ca2c99bc2c86bad6cdb21646cd5e87a12d49a9f61fff41bb88ed1c237920ba6af5566194aa413a7f68a3915cd8b7dbd6c21a499a9f326d899d596c8ccd3ab14532597fc1194a654a720eede5a696b56252db4dad94f1cff9d842be05f108cd1ad6547c8940b92f8000000000000006618c413503f174c0fe64c5ef9d7f7800d8392c00b427402047b27820a49ea92c7c401c948f5e529ec5e4b27029c10f8b777ba00048793a2c3e7ff9163265fc64d57c735ab312ee60f2cf72aa7fb57720ef984a2b045252a919cc6acb7921bbd634aa7209226b2d31753ace8ed8a94b975d1c7a438b235c08692e4daf749fa4eeb0110f713003c28b5bc797d7a24232f6f03b3de7ca4056fc741993c644dab0a36d9d56231228fbb748fc42df8361ba824d802b36f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x5, 0x400, 0x5, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.201838433s ago: executing program 0 (id=10125): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_clone(0x4d100000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000002300)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00082c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa112011"], 0xfdef) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x7, 0xfff, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55}, 0x48) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000002c0)={0x1, 0x80, 0x8, 0x7, 0x2, 0x3, 0x0, 0x3, 0x80200, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0xc}, 0x4000, 0x2, 0x3, 0x9, 0xc, 0xfffffff1, 0xa, 0x0, 0x6, 0x0, 0x1000}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 1.126533119s ago: executing program 4 (id=10120): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x86, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYBLOB="00000000001c007c4cab496d2abcec00b7080000000000007b8af8ff00000000bfa200000000000000009715000000fc671dd5dd4e30bd2135fb435ac864e98560d885db041afac5906a00167457c56facc408e8e10e55693f44f7e31c60fc9c67c651ff1b040cb3174cd4ac18b96a6931d8858b099a1aab0c1ce924cd13d641598538c191eb5db1cf4ac1db57965b06c3bf122c81ff86124162b6e748901a45"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=r0], 0x0, 0x4a5, 0x0, 0x0, 0x0, 0x10}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x20ed, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r3, @ANYRES32, @ANYBLOB="00000000000095a1825bbdd2ae0de79aa539ab0000b7080500001900007b8af8ff00000000afa200000000200007020000f8ffffff177270ca56432d7d614b0b8e"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES64=r1, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082", @ANYBLOB="3919bcc9a5b49fc634cf316681f25f0d73eacc4ea12a3666e50d82d016ccab04e86ab4332fbd5c9cceb179fcbc2485ac15233343424b35b33f3c7e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYRES8=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYRES8=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) (async) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) close(r2) (async) close(r2) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000200), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x0, 0x400, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.067260453s ago: executing program 0 (id=10126): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0xa}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0xa01, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000980)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x110, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffd92) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x17}, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x17, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000076000000bf0900000000000026090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000008500000000000000b7000000000000009500"/160], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x80000001, 0x4, 0xffffffffffffffff, 0x4000}, 0xffffffffffffff50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000ffffffff000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESOCT=r4, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x12, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r7}, 0x10) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r9}, 0x10) write$cgroup_int(r8, &(0x7f0000000200), 0x43451) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 990.85597ms ago: executing program 2 (id=10115): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x220, 0x1}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x3aa, 0x5, 0xfffffffa, 0x0, r0, 0xf3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x5, 0xa}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32=r4, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r7 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r7, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r8, 0x8982, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x5, 0x400, 0x5, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 912.969926ms ago: executing program 3 (id=10127): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007044f16c01b1fbfd000000000000008af65f0df9928941994cc8c173fac5688671085a86d143c59fed0e57feb97f422c51d8e63b4ed9e295df3ccd1a55752dfc2f32f14b6c8f0e7413c3e9caaad30dcb412d0f54623f388bb2c63d2b1f7d83cd0cc021867bb4aee9967a6ee83e1b18fd8beca7d7eddcd96634"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000000c0)={0x0, 0x1}, 0x1, 0x10, 0x0, 0xffffffb2}, 0x80) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'\x00', 0x52d35ce30131f272}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x5, &(0x7f0000000840)=ANY=[@ANYRES64, @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014001180b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x8, 0xffffffff, 0x3, 0x4, r3, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3, 0xc}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000e6286984bfd31b313dbd6f0941cebf0000008664f4cdcfbae9909dbf920deb5a8a54b8efa051dfb11a8280e30f", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r7}, 0x0, &(0x7f0000000040)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r6, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd55", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) ioctl$SIOCSIFHWADDR(r5, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000100)='kmem_cache_free\x00', r11}, 0x10) 912.608486ms ago: executing program 1 (id=10098): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1c, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000009500040000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) openat$cgroup_ro(r3, &(0x7f0000000040)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000001c0)='sched_process_wait\x00', r5}, 0x10) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x2}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000008000000000000005805000018100000", @ANYRES32=r8, @ANYBLOB="000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r7) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r7, r9, 0x4, r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x16, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7}, 0x90) 824.304854ms ago: executing program 4 (id=10120): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x86, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYBLOB="00000000001c007c4cab496d2abcec00b7080000000000007b8af8ff00000000bfa200000000000000009715000000fc671dd5dd4e30bd2135fb435ac864e98560d885db041afac5906a00167457c56facc408e8e10e55693f44f7e31c60fc9c67c651ff1b040cb3174cd4ac18b96a6931d8858b099a1aab0c1ce924cd13d641598538c191eb5db1cf4ac1db57965b06c3bf122c81ff86124162b6e748901a45"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=r0], 0x0, 0x4a5, 0x0, 0x0, 0x0, 0x10}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x20ed, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r3, @ANYRES32, @ANYBLOB="00000000000095a1825bbdd2ae0de79aa539ab0000b7080500001900007b8af8ff00000000afa200000000200007020000f8ffffff177270ca56432d7d614b0b8e"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES64=r1, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082", @ANYBLOB="3919bcc9a5b49fc634cf316681f25f0d73eacc4ea12a3666e50d82d016ccab04e86ab4332fbd5c9cceb179fcbc2485ac15233343424b35b33f3c7e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYRES8=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYRES8=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) (async) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) close(r2) (async) close(r2) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000200), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x0, 0x400, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 750.96586ms ago: executing program 0 (id=10128): perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa33"], 0xfdef) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x280, 0xe6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) r7 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r7, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r8, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r9, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x0, 0x4}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000a000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x2000000, 0x0, 0xffffffffffffff2a, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 749.41005ms ago: executing program 1 (id=10098): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1c, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000009500040000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) openat$cgroup_ro(r3, &(0x7f0000000040)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000001c0)='sched_process_wait\x00', r5}, 0x10) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x2}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000008000000000000005805000018100000", @ANYRES32=r8, @ANYBLOB="000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r7) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r7, r9, 0x4, r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x16, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7}, 0x90) 687.027775ms ago: executing program 2 (id=10115): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x220, 0x1}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x3aa, 0x5, 0xfffffffa, 0x0, r0, 0xf3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x5, 0xa}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32=r4, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r7 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r7, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r8, 0x8982, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x5, 0x400, 0x5, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 630.685049ms ago: executing program 3 (id=10129): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180), 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRESDEC=r0, @ANYRES64=r0, @ANYRES8, @ANYRES8=r0, @ANYRESHEX=r0, @ANYRESDEC=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x429}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xc, 0x200, 0x6, 0x2, 0x145b, 0xffffffffffffffff, 0xfffffff1, '\x00', 0x0, 0xffffffffffffffff, 0x21, 0x2, 0x1}, 0x48) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r4, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000380), 0xffffd6c0, r5}, 0x38) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x10002, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffc, 0x1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r6}, &(0x7f0000000380), &(0x7f00000003c0)='%+9llu \x00'}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r8}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYRES8=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r9}, &(0x7f0000000540), &(0x7f0000000580)=r10}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r11}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r9, &(0x7f0000000780)}, 0x20) 629.89587ms ago: executing program 0 (id=10130): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x4, 0x0, 0x0, 0x4000002}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0), 0x40, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x2000000, 0x7, 0x0, &(0x7f0000000200)="63eced8e46dc3f", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800030400000000000000", @ANYRES16=r0, @ANYRES16, @ANYRESHEX=r1, @ANYRES32, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000000)='ext4_mark_inode_dirty\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair(0x1f, 0x1, 0x2, &(0x7f0000000680)) r4 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10038, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000010000000, 0x8}}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40001) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb0100180000000000000055000000550000000c0000000c0000000400000f011d000005000000ffffffff080000000300000008000000f9ffffff030000000900000009002337020000000100000000000000c2000000000000000300000000030000000300000000000000000000000061002e305f2e2e002e00"], &(0x7f00000005c0)=""/90, 0x7c, 0x5a, 0x0, 0x5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c001b000000000000000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x3, 0x8}, 0x48) 627.60832ms ago: executing program 1 (id=10098): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1c, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000009500040000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) openat$cgroup_ro(r3, &(0x7f0000000040)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000001c0)='sched_process_wait\x00', r5}, 0x10) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x2}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000008000000000000005805000018100000", @ANYRES32=r8, @ANYBLOB="000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r7) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r7, r9, 0x4, r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x16, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7}, 0x90) 538.506087ms ago: executing program 4 (id=10120): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x86, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYBLOB="00000000001c007c4cab496d2abcec00b7080000000000007b8af8ff00000000bfa200000000000000009715000000fc671dd5dd4e30bd2135fb435ac864e98560d885db041afac5906a00167457c56facc408e8e10e55693f44f7e31c60fc9c67c651ff1b040cb3174cd4ac18b96a6931d8858b099a1aab0c1ce924cd13d641598538c191eb5db1cf4ac1db57965b06c3bf122c81ff86124162b6e748901a45"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=r0], 0x0, 0x4a5, 0x0, 0x0, 0x0, 0x10}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x20ed, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r3, @ANYRES32, @ANYBLOB="00000000000095a1825bbdd2ae0de79aa539ab0000b7080500001900007b8af8ff00000000afa200000000200007020000f8ffffff177270ca56432d7d614b0b8e"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES64=r1, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082", @ANYBLOB="3919bcc9a5b49fc634cf316681f25f0d73eacc4ea12a3666e50d82d016ccab04e86ab4332fbd5c9cceb179fcbc2485ac15233343424b35b33f3c7e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYRES8=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYRES8=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) (async) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) close(r2) (async) close(r2) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000200), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x0, 0x400, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 417.523557ms ago: executing program 1 (id=10098): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1c, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000009500040000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) openat$cgroup_ro(r3, &(0x7f0000000040)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000001c0)='sched_process_wait\x00', r5}, 0x10) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x2}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000008000000000000005805000018100000", @ANYRES32=r8, @ANYBLOB="000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r7) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r7, r9, 0x4, r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x16, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7}, 0x90) 317.692615ms ago: executing program 2 (id=10115): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x220, 0x1}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x3aa, 0x5, 0xfffffffa, 0x0, r0, 0xf3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x5, 0xa}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32=r4, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r7 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r7, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r8, 0x8982, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x5, 0x400, 0x5, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 227.449833ms ago: executing program 1 (id=10098): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1c, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000009500040000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) openat$cgroup_ro(r3, &(0x7f0000000040)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000001c0)='sched_process_wait\x00', r5}, 0x10) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x2}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000008000000000000005805000018100000", @ANYRES32=r8, @ANYBLOB="000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r7) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r7, r9, 0x4, r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x16, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7}, 0x90) 84.830834ms ago: executing program 4 (id=10120): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x86, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYBLOB="00000000001c007c4cab496d2abcec00b7080000000000007b8af8ff00000000bfa200000000000000009715000000fc671dd5dd4e30bd2135fb435ac864e98560d885db041afac5906a00167457c56facc408e8e10e55693f44f7e31c60fc9c67c651ff1b040cb3174cd4ac18b96a6931d8858b099a1aab0c1ce924cd13d641598538c191eb5db1cf4ac1db57965b06c3bf122c81ff86124162b6e748901a45"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=r0], 0x0, 0x4a5, 0x0, 0x0, 0x0, 0x10}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x20ed, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r3, @ANYRES32, @ANYBLOB="00000000000095a1825bbdd2ae0de79aa539ab0000b7080500001900007b8af8ff00000000afa200000000200007020000f8ffffff177270ca56432d7d614b0b8e"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES64=r1, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082", @ANYBLOB="3919bcc9a5b49fc634cf316681f25f0d73eacc4ea12a3666e50d82d016ccab04e86ab4332fbd5c9cceb179fcbc2485ac15233343424b35b33f3c7e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYRES8=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYRES8=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) (async) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) close(r2) (async) close(r2) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000200), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x0, 0x400, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 711.121µs ago: executing program 0 (id=10131): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='mm_lru_insertion\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r0, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000280)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd, &(0x7f00000004c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x72, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0xd, 0x7, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r2, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r3, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001400)={{r7}, &(0x7f0000001380), &(0x7f00000013c0)='%-010d \x00'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r7, &(0x7f0000000080), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1c007f0000009292e500000000000003a4d5de04150000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r8}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x40010) 0s ago: executing program 1 (id=10098): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1c, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000009500040000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) openat$cgroup_ro(r3, &(0x7f0000000040)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000001c0)='sched_process_wait\x00', r5}, 0x10) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x2}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000008000000000000005805000018100000", @ANYRES32=r8, @ANYBLOB="000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r7) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r7, r9, 0x4, r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x16, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7}, 0x90) kernel console output (not intermixed with test programs): t 2(bridge_slave_1) entered disabled state [ 505.115663][ T4249] device bridge_slave_0 left promiscuous mode [ 505.146781][ T4249] bridge0: port 1(bridge_slave_0) entered disabled state [ 505.163315][ T4249] device veth1_macvtap left promiscuous mode [ 505.174213][ T4249] device veth0_vlan left promiscuous mode [ 505.546696][T18408] device veth0_vlan entered promiscuous mode [ 505.611807][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 505.628980][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 505.644242][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 505.656725][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 505.665836][ T2978] bridge0: port 1(bridge_slave_0) entered blocking state [ 505.672716][ T2978] bridge0: port 1(bridge_slave_0) entered forwarding state [ 505.698504][T18457] syz.0.5670[18457] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 505.698568][T18457] syz.0.5670[18457] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 505.708964][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 505.748994][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 505.757052][ T2978] bridge0: port 2(bridge_slave_1) entered blocking state [ 505.763945][ T2978] bridge0: port 2(bridge_slave_1) entered forwarding state [ 505.779040][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 505.787022][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 505.795375][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 505.804622][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 505.812714][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 505.821080][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 505.829551][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 505.837481][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 505.845518][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 505.853824][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 505.893054][T18408] device veth1_macvtap entered promiscuous mode [ 506.008354][ T2981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 506.027708][ T2981] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 506.042801][ T2981] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 506.051844][ T2981] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 506.067430][ T2981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 506.076198][ T2981] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 506.084708][ T2981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 506.967208][T18487] device pim6reg1 entered promiscuous mode [ 508.308898][ T4249] bridge0: port 4(gretap0) entered disabled state [ 508.324662][ T4249] device gretap0 left promiscuous mode [ 508.330121][ T4249] bridge0: port 4(gretap0) entered disabled state [ 508.633016][ T4249] device bridge_slave_1 left promiscuous mode [ 508.648852][ T4249] bridge0: port 2(bridge_slave_1) entered disabled state [ 508.727129][ T4249] device bridge_slave_0 left promiscuous mode [ 508.773625][ T4249] bridge0: port 1(bridge_slave_0) entered disabled state [ 508.817150][ T4249] device veth0_to_batadv left promiscuous mode [ 508.823289][ T4249] bridge0: port 3(veth0_to_batadv) entered disabled state [ 508.831027][ T4249] device bridge_slave_1 left promiscuous mode [ 508.837025][ T4249] bridge0: port 2(bridge_slave_1) entered disabled state [ 508.845079][ T4249] device bridge_slave_0 left promiscuous mode [ 508.851192][ T4249] bridge0: port 1(bridge_slave_0) entered disabled state [ 508.874383][ T4249] device veth0_vlan left promiscuous mode [ 508.880361][ T4249] device veth1_macvtap left promiscuous mode [ 508.886420][ T4249] device veth0_vlan left promiscuous mode [ 509.101584][T18518] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 509.113480][T18526] device pim6reg1 entered promiscuous mode [ 509.333453][T18536] syz.1.5691[18536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.333513][T18536] syz.1.5691[18536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.653668][T18565] device syzkaller0 entered promiscuous mode [ 509.940274][T18579] device wg2 left promiscuous mode [ 509.971300][T18579] device wg2 entered promiscuous mode [ 510.038708][T18587] bridge0: port 2(bridge_slave_1) entered disabled state [ 510.045724][T18587] bridge0: port 1(bridge_slave_0) entered disabled state [ 510.055698][T18587] device bridge_slave_1 left promiscuous mode [ 510.063158][T18587] bridge0: port 2(bridge_slave_1) entered disabled state [ 510.070881][T18587] device bridge_slave_0 left promiscuous mode [ 510.077021][T18587] bridge0: port 1(bridge_slave_0) entered disabled state [ 510.531613][T18626] device wg2 entered promiscuous mode [ 511.158424][T18651] syz.0.5730[18651] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 511.158485][T18651] syz.0.5730[18651] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 511.305697][T18656] device syzkaller0 entered promiscuous mode [ 512.320111][T18693] device syzkaller0 entered promiscuous mode [ 513.491782][T18753] device pim6reg1 entered promiscuous mode [ 513.669366][T18769] cgroup: fork rejected by pids controller in /syz0 [ 513.809850][T18769] device pim6reg1 entered promiscuous mode [ 514.930944][T18797] bridge0: port 1(bridge_slave_0) entered blocking state [ 514.937797][T18797] bridge0: port 1(bridge_slave_0) entered disabled state [ 514.962495][T18797] device bridge_slave_0 entered promiscuous mode [ 514.969422][T18797] bridge0: port 2(bridge_slave_1) entered blocking state [ 514.976254][T18797] bridge0: port 2(bridge_slave_1) entered disabled state [ 514.983614][T18797] device bridge_slave_1 entered promiscuous mode [ 515.323795][T18837] device wg2 left promiscuous mode [ 515.372693][T18837] device wg2 entered promiscuous mode [ 515.420295][T18841] device pim6reg1 entered promiscuous mode [ 515.462633][ T4249] device bridge_slave_1 left promiscuous mode [ 515.469916][ T4249] bridge0: port 2(bridge_slave_1) entered disabled state [ 515.478974][ T4249] device bridge_slave_0 left promiscuous mode [ 515.485090][ T4249] bridge0: port 1(bridge_slave_0) entered disabled state [ 515.493666][ T4249] device veth0_vlan left promiscuous mode [ 515.613285][ T2631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 515.620598][ T2631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 515.627834][ T2631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 515.636005][ T2631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 515.644109][ T2631] bridge0: port 1(bridge_slave_0) entered blocking state [ 515.650969][ T2631] bridge0: port 1(bridge_slave_0) entered forwarding state [ 515.670898][T18854] device syzkaller0 entered promiscuous mode [ 515.702156][T10173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 515.710442][T10173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 515.718634][T10173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 515.726652][T10173] bridge0: port 2(bridge_slave_1) entered blocking state [ 515.733539][T10173] bridge0: port 2(bridge_slave_1) entered forwarding state [ 515.776640][ T2631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 515.784727][ T2631] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 515.792756][ T2631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 515.801971][ T2631] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 515.821635][ T1240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 515.842680][ T1240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 515.857981][T18797] device veth0_vlan entered promiscuous mode [ 515.898452][T13718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 515.928203][T13718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 515.985324][T18797] device veth1_macvtap entered promiscuous mode [ 516.021021][T10173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 516.037954][T10173] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 516.050271][T10173] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 516.088094][ T2631] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 516.108543][ T2631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 516.149130][ T2631] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 516.157173][ T2631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 516.401022][T18880] device wg2 entered promiscuous mode [ 516.798339][T18896] device syzkaller0 entered promiscuous mode [ 519.176256][T18950] device veth0_vlan left promiscuous mode [ 519.182304][T18950] device veth0_vlan entered promiscuous mode [ 519.189500][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 519.198183][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 519.248913][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 521.157425][T19013] device syzkaller0 entered promiscuous mode [ 521.390217][T19036] device macsec0 entered promiscuous mode [ 522.746128][T19087] device wg2 left promiscuous mode [ 522.827239][T19087] device wg2 entered promiscuous mode [ 523.988391][T19120] device pim6reg1 entered promiscuous mode [ 524.257465][T19122] device syzkaller0 entered promiscuous mode [ 524.630570][T19134] device wg2 left promiscuous mode [ 524.717509][T19134] device wg2 entered promiscuous mode [ 524.844621][T19137] device pim6reg1 entered promiscuous mode [ 525.289036][T19154] device wg2 left promiscuous mode [ 525.489468][T19154] device wg2 entered promiscuous mode [ 526.500607][T19166] device pim6reg1 entered promiscuous mode [ 526.627011][T19178] device pim6reg1 entered promiscuous mode [ 526.659798][T19177] device sit0 entered promiscuous mode [ 526.955582][T19191] device wg2 entered promiscuous mode [ 527.504331][T19207] device syzkaller0 entered promiscuous mode [ 527.782151][T19217] device sit0 left promiscuous mode [ 528.309759][T19248] device pim6reg1 entered promiscuous mode [ 529.524098][T19273] device pim6reg1 entered promiscuous mode [ 529.715010][T19285] device pim6reg1 entered promiscuous mode [ 530.004274][T19280] device syzkaller0 entered promiscuous mode [ 530.391609][T19306] device sit0 left promiscuous mode [ 531.116397][T19336] device pim6reg1 entered promiscuous mode [ 531.785073][T19373] device wg2 left promiscuous mode [ 531.864025][T19373] device wg2 entered promiscuous mode [ 532.112104][T19387] device pim6reg1 entered promiscuous mode [ 532.319815][T19401] device veth0_vlan left promiscuous mode [ 532.344180][T19401] device veth0_vlan entered promiscuous mode [ 532.364696][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 532.373211][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 532.381250][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 532.660288][T19419] device pim6reg1 entered promiscuous mode [ 533.471757][T19470] device wg2 left promiscuous mode [ 533.511540][T19470] device wg2 entered promiscuous mode [ 533.907707][T19479] device pim6reg1 entered promiscuous mode [ 534.880888][T19520] device wg2 left promiscuous mode [ 534.990277][T19520] device wg2 entered promiscuous mode [ 535.385562][T19531] device wg2 left promiscuous mode [ 535.405084][T19531] device wg2 entered promiscuous mode [ 536.942083][T19573] device pim6reg1 entered promiscuous mode [ 537.404819][T19589] device veth0_vlan left promiscuous mode [ 537.443934][T19589] device veth0_vlan entered promiscuous mode [ 537.620099][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 537.651717][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 537.716514][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 538.294712][T19613] device veth1_macvtap left promiscuous mode [ 538.412233][T19626] device wg2 left promiscuous mode [ 538.492819][T19628] device syzkaller0 entered promiscuous mode [ 538.772639][T19647] device pim6reg1 entered promiscuous mode [ 539.934315][T19689] device syzkaller0 entered promiscuous mode [ 539.949044][T19690] device pim6reg1 entered promiscuous mode [ 540.119752][T19696] bridge0: port 3(veth0_to_batadv) entered blocking state [ 540.178738][T19696] bridge0: port 3(veth0_to_batadv) entered disabled state [ 540.186154][T19696] device veth0_to_batadv entered promiscuous mode [ 540.258874][T19696] bridge0: port 3(veth0_to_batadv) entered blocking state [ 540.266006][T19696] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 540.602808][T19715] device syzkaller0 entered promiscuous mode [ 541.249965][T19725] device veth0_vlan left promiscuous mode [ 541.302962][T19725] device veth0_vlan entered promiscuous mode [ 542.093583][T19748] device pim6reg1 entered promiscuous mode [ 542.762651][T19758] syz.1.6103[19758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 542.762734][T19758] syz.1.6103[19758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 543.245601][T19770] device wg2 left promiscuous mode [ 543.412830][T19770] device wg2 entered promiscuous mode [ 543.597402][T19786] device pim6reg1 entered promiscuous mode [ 543.744396][T19792] device pim6reg1 entered promiscuous mode [ 545.278706][T19829] device pim6reg1 entered promiscuous mode [ 546.469148][T19859] FAULT_INJECTION: forcing a failure. [ 546.469148][T19859] name failslab, interval 1, probability 0, space 0, times 0 [ 546.608816][T19859] CPU: 1 PID: 19859 Comm: syz.2.6137 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 546.620010][T19859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 546.629899][T19859] Call Trace: [ 546.633034][T19859] dump_stack_lvl+0x1e2/0x24b [ 546.637541][T19859] ? bfq_pos_tree_add_move+0x43b/0x43b [ 546.642833][T19859] ? avc_has_perm+0x14d/0x400 [ 546.647344][T19859] dump_stack+0x15/0x17 [ 546.651338][T19859] should_fail+0x3c6/0x510 [ 546.655589][T19859] ? bpf_test_init+0x101/0x1b0 [ 546.660190][T19859] __should_failslab+0xa4/0xe0 [ 546.664788][T19859] should_failslab+0x9/0x20 [ 546.669134][T19859] __kmalloc+0x60/0x330 [ 546.673127][T19859] bpf_test_init+0x101/0x1b0 [ 546.677636][T19859] bpf_prog_test_run_skb+0x262/0x1410 [ 546.682849][T19859] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 546.688575][T19859] ? __kasan_check_write+0x14/0x20 [ 546.693603][T19859] ? fput_many+0x160/0x1b0 [ 546.697865][T19859] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 546.703587][T19859] __se_sys_bpf+0x5235/0x11cb0 [ 546.708187][T19859] ? stack_trace_save+0x113/0x1c0 [ 546.713133][T19859] ? terminate_walk+0x407/0x4f0 [ 546.717820][T19859] ? stack_trace_snprint+0xf0/0xf0 [ 546.722772][T19859] ? kmem_cache_free+0xa9/0x1e0 [ 546.727454][T19859] ? __kasan_check_write+0x14/0x20 [ 546.732407][T19859] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 546.737786][T19859] ? __x64_sys_bpf+0x90/0x90 [ 546.742210][T19859] ? _raw_spin_lock+0x1b0/0x1b0 [ 546.747007][T19859] ? do_sys_openat2+0x1fc/0x710 [ 546.751677][T19859] ? do_syscall_64+0x34/0x70 [ 546.756108][T19859] ? _kstrtoull+0x3a0/0x4a0 [ 546.760445][T19859] ? kstrtouint_from_user+0x20a/0x2a0 [ 546.765653][T19859] ? kstrtol_from_user+0x310/0x310 [ 546.770599][T19859] ? memset+0x35/0x40 [ 546.774417][T19859] ? __fsnotify_parent+0x4b9/0x6c0 [ 546.779367][T19859] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 546.785960][T19859] ? proc_fail_nth_write+0x20b/0x290 [ 546.791080][T19859] ? proc_fail_nth_read+0x210/0x210 [ 546.796120][T19859] ? security_file_permission+0x86/0xb0 [ 546.801584][T19859] ? rw_verify_area+0x1c3/0x360 [ 546.806271][T19859] ? preempt_count_add+0x92/0x1a0 [ 546.811131][T19859] ? vfs_write+0x852/0xe70 [ 546.815383][T19859] ? kmem_cache_free+0x1c0/0x1e0 [ 546.820156][T19859] ? kernel_write+0x3d0/0x3d0 [ 546.824671][T19859] ? __kasan_check_write+0x14/0x20 [ 546.829617][T19859] ? mutex_lock+0xa5/0x110 [ 546.833868][T19859] ? mutex_trylock+0xa0/0xa0 [ 546.838301][T19859] ? __kasan_check_write+0x14/0x20 [ 546.843331][T19859] ? fput_many+0x160/0x1b0 [ 546.847609][T19859] ? debug_smp_processor_id+0x17/0x20 [ 546.852791][T19859] __x64_sys_bpf+0x7b/0x90 [ 546.857044][T19859] do_syscall_64+0x34/0x70 [ 546.861299][T19859] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 546.867025][T19859] RIP: 0033:0x7fcd910609f9 [ 546.871280][T19859] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 546.890870][T19859] RSP: 002b:00007fcd8fce0048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 546.899110][T19859] RAX: ffffffffffffffda RBX: 00007fcd911eef80 RCX: 00007fcd910609f9 [ 546.906858][T19859] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 546.914671][T19859] RBP: 00007fcd8fce00a0 R08: 0000000000000000 R09: 0000000000000000 [ 546.922485][T19859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 546.930297][T19859] R13: 000000000000000b R14: 00007fcd911eef80 R15: 00007fff16822818 [ 547.036227][T19874] device pim6reg1 entered promiscuous mode [ 547.319198][T19896] FAULT_INJECTION: forcing a failure. [ 547.319198][T19896] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 547.443499][T19896] CPU: 1 PID: 19896 Comm: syz.3.6151 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 547.454792][T19896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 547.464762][T19896] Call Trace: [ 547.467971][T19896] dump_stack_lvl+0x1e2/0x24b [ 547.472687][T19896] ? panic+0x812/0x812 [ 547.476588][T19896] ? bfq_pos_tree_add_move+0x43b/0x43b [ 547.481979][T19896] dump_stack+0x15/0x17 [ 547.486057][T19896] should_fail+0x3c6/0x510 [ 547.490312][T19896] should_fail_usercopy+0x1a/0x20 [ 547.495171][T19896] _copy_from_user+0x20/0xd0 [ 547.499598][T19896] bpf_test_init+0x13b/0x1b0 [ 547.504112][T19896] bpf_prog_test_run_skb+0x262/0x1410 [ 547.509341][T19896] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 547.515140][T19896] ? __kasan_check_write+0x14/0x20 [ 547.520172][T19896] ? fput_many+0x160/0x1b0 [ 547.524422][T19896] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 547.530155][T19896] __se_sys_bpf+0x5235/0x11cb0 [ 547.534750][T19896] ? stack_trace_save+0x113/0x1c0 [ 547.539702][T19896] ? terminate_walk+0x407/0x4f0 [ 547.544379][T19896] ? stack_trace_snprint+0xf0/0xf0 [ 547.549332][T19896] ? kmem_cache_free+0xa9/0x1e0 [ 547.554014][T19896] ? __kasan_check_write+0x14/0x20 [ 547.559047][T19896] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 547.564343][T19896] ? __x64_sys_bpf+0x90/0x90 [ 547.568776][T19896] ? _raw_spin_lock+0x1b0/0x1b0 [ 547.573454][T19896] ? do_sys_openat2+0x1fc/0x710 [ 547.578141][T19896] ? do_syscall_64+0x34/0x70 [ 547.582569][T19896] ? _kstrtoull+0x3a0/0x4a0 [ 547.586910][T19896] ? kstrtouint_from_user+0x20a/0x2a0 [ 547.592117][T19896] ? kstrtol_from_user+0x310/0x310 [ 547.597067][T19896] ? memset+0x35/0x40 [ 547.600880][T19896] ? __fsnotify_parent+0x4b9/0x6c0 [ 547.605834][T19896] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 547.612423][T19896] ? proc_fail_nth_write+0x20b/0x290 [ 547.617549][T19896] ? proc_fail_nth_read+0x210/0x210 [ 547.622581][T19896] ? security_file_permission+0x86/0xb0 [ 547.627963][T19896] ? rw_verify_area+0x1c3/0x360 [ 547.632648][T19896] ? preempt_count_add+0x92/0x1a0 [ 547.637613][T19896] ? vfs_write+0x852/0xe70 [ 547.641851][T19896] ? kmem_cache_free+0x1c0/0x1e0 [ 547.646621][T19896] ? kernel_write+0x3d0/0x3d0 [ 547.651134][T19896] ? __kasan_check_write+0x14/0x20 [ 547.656079][T19896] ? mutex_lock+0xa5/0x110 [ 547.660334][T19896] ? mutex_trylock+0xa0/0xa0 [ 547.664768][T19896] ? __kasan_check_write+0x14/0x20 [ 547.669707][T19896] ? fput_many+0x160/0x1b0 [ 547.673969][T19896] ? debug_smp_processor_id+0x17/0x20 [ 547.679170][T19896] __x64_sys_bpf+0x7b/0x90 [ 547.683421][T19896] do_syscall_64+0x34/0x70 [ 547.687676][T19896] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 547.693402][T19896] RIP: 0033:0x7f37c9d2c9f9 [ 547.697666][T19896] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 547.717182][T19896] RSP: 002b:00007f37c89ac048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 547.725434][T19896] RAX: ffffffffffffffda RBX: 00007f37c9ebaf80 RCX: 00007f37c9d2c9f9 [ 547.733234][T19896] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 547.741050][T19896] RBP: 00007f37c89ac0a0 R08: 0000000000000000 R09: 0000000000000000 [ 547.748862][T19896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 547.756673][T19896] R13: 000000000000000b R14: 00007f37c9ebaf80 R15: 00007fff95705d38 [ 548.465268][T19932] device syzkaller0 entered promiscuous mode [ 549.645198][T19962] bridge0: port 3(veth0_to_batadv) entered blocking state [ 549.696388][T19962] bridge0: port 3(veth0_to_batadv) entered disabled state [ 549.741533][T19962] device veth0_to_batadv entered promiscuous mode [ 549.766756][T19962] bridge0: port 3(veth0_to_batadv) entered blocking state [ 549.773735][T19962] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 549.991143][T19969] device pim6reg1 entered promiscuous mode [ 550.916194][T19983] device wg2 entered promiscuous mode [ 551.078440][T19986] device wg2 left promiscuous mode [ 551.191549][T19989] device wg2 entered promiscuous mode [ 551.265052][T19993] device pim6reg1 entered promiscuous mode [ 551.955128][T20017] device wg2 left promiscuous mode [ 552.038450][T20017] device wg2 entered promiscuous mode [ 552.405753][T20055] device wg2 left promiscuous mode [ 552.521387][T20055] device wg2 entered promiscuous mode [ 552.579826][T20060] device pim6reg1 entered promiscuous mode [ 552.890278][ T24] audit: type=1400 audit(1722857365.920:180): avc: denied { create } for pid=20066 comm="syz.2.6206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 553.831569][T20093] device wg2 left promiscuous mode [ 553.851131][T20097] device pim6reg1 entered promiscuous mode [ 553.868344][T20095] device pim6reg1 entered promiscuous mode [ 553.888149][T20093] device wg2 entered promiscuous mode [ 554.408255][T20123] device wg2 left promiscuous mode [ 554.511640][T20123] device wg2 entered promiscuous mode [ 554.545731][T20129] device pim6reg1 entered promiscuous mode [ 555.544118][T20164] device wg2 left promiscuous mode [ 555.588527][T20164] device wg2 entered promiscuous mode [ 555.745059][T20186] device macsec0 left promiscuous mode [ 555.952327][T20203] device wg2 left promiscuous mode [ 556.030791][T20203] device wg2 entered promiscuous mode [ 556.278986][T20215] device syzkaller0 entered promiscuous mode [ 556.642320][T20227] bridge0: port 3(veth0_to_batadv) entered disabled state [ 556.649324][T20227] bridge0: port 2(bridge_slave_1) entered disabled state [ 556.656247][T20227] bridge0: port 1(bridge_slave_0) entered disabled state [ 561.348946][T20452] device pim6reg1 entered promiscuous mode [ 561.762031][T20485] device sit0 entered promiscuous mode [ 562.211725][T20510] bridge0: port 3(veth0_to_batadv) entered blocking state [ 562.228693][T20510] bridge0: port 3(veth0_to_batadv) entered disabled state [ 562.246237][T20510] device veth0_to_batadv entered promiscuous mode [ 562.253040][T20510] bridge0: port 3(veth0_to_batadv) entered blocking state [ 562.260007][T20510] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 562.376566][T20531] tap0: tun_chr_ioctl cmd 1074025675 [ 562.397084][T20531] tap0: persist enabled [ 562.401240][T20529] tap0: tun_chr_ioctl cmd 1074025673 [ 562.865505][T20555] device pim6reg1 entered promiscuous mode [ 563.130967][T20563] device veth0_vlan left promiscuous mode [ 563.167829][T20563] device veth0_vlan entered promiscuous mode [ 563.298188][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 563.306967][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 563.324658][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 563.399532][T20575] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 563.404996][T20575] pim6reg0: linktype set to 769 [ 563.642056][T20598] device pim6reg1 entered promiscuous mode [ 564.172162][T20647] device pim6reg1 entered promiscuous mode [ 565.344167][T20684] device syzkaller0 entered promiscuous mode [ 566.014506][T20710] device pim6reg1 entered promiscuous mode [ 567.111276][T20760] bridge_slave_0: mtu greater than device maximum [ 568.072560][T20823] device pim6reg1 entered promiscuous mode [ 569.093715][T20871] device wg2 left promiscuous mode [ 569.114130][T20873] device pim6reg1 entered promiscuous mode [ 569.141625][T20871] device wg2 entered promiscuous mode [ 570.224894][T20915] device pim6reg1 entered promiscuous mode [ 570.419850][T20918] device sit0 entered promiscuous mode [ 570.852928][T20933] tap0: tun_chr_ioctl cmd 1074025677 [ 570.858052][T20933] tap0: linktype set to 774 [ 570.863372][T20933] tap0: tun_chr_ioctl cmd 1074812117 [ 571.199832][T20945] device pim6reg1 entered promiscuous mode [ 571.558495][T20954] device syzkaller0 entered promiscuous mode [ 572.790252][T20980] device pim6reg1 entered promiscuous mode [ 574.048534][T21025] device pim6reg1 entered promiscuous mode [ 574.550713][T21055] device veth0_vlan left promiscuous mode [ 574.574760][T21055] device veth0_vlan entered promiscuous mode [ 574.737776][T21068] device pim6reg1 entered promiscuous mode [ 574.956593][T21082] device pim6reg1 entered promiscuous mode [ 576.201275][T21121] ref_ctr_offset mismatch. inode: 0x2e4 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x7602 [ 577.439445][T21172] device wg2 left promiscuous mode [ 577.562745][T21173] device wg2 entered promiscuous mode [ 581.263185][T21277] device pim6reg1 entered promiscuous mode [ 582.476569][T21318] device wg2 left promiscuous mode [ 582.507419][T21318] device wg2 entered promiscuous mode [ 583.313417][T21356] device pim6reg1 entered promiscuous mode [ 583.349486][T21353] device syzkaller0 entered promiscuous mode [ 583.469105][T21360] device pim6reg1 entered promiscuous mode [ 586.189830][T21442] FAULT_INJECTION: forcing a failure. [ 586.189830][T21442] name failslab, interval 1, probability 0, space 0, times 0 [ 586.202392][T21442] CPU: 1 PID: 21442 Comm: syz.0.6658 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 586.213520][T21442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 586.223409][T21442] Call Trace: [ 586.226553][T21442] dump_stack_lvl+0x1e2/0x24b [ 586.231060][T21442] ? bfq_pos_tree_add_move+0x43b/0x43b [ 586.236442][T21442] dump_stack+0x15/0x17 [ 586.240428][T21442] should_fail+0x3c6/0x510 [ 586.244683][T21442] ? __alloc_skb+0x80/0x510 [ 586.249017][T21442] __should_failslab+0xa4/0xe0 [ 586.253618][T21442] should_failslab+0x9/0x20 [ 586.258064][T21442] kmem_cache_alloc+0x3d/0x2e0 [ 586.262645][T21442] __alloc_skb+0x80/0x510 [ 586.266814][T21442] ? __kasan_check_write+0x14/0x20 [ 586.271769][T21442] __napi_alloc_skb+0x15d/0x2e0 [ 586.276447][T21442] napi_get_frags+0x6a/0x170 [ 586.280874][T21442] tun_get_user+0xc88/0x38f0 [ 586.285296][T21442] ? group_send_sig_info+0xa4/0x320 [ 586.290523][T21442] ? _kstrtoull+0x3a0/0x4a0 [ 586.294861][T21442] ? tun_do_read+0x1f60/0x1f60 [ 586.299446][T21442] ? kstrtouint_from_user+0x20a/0x2a0 [ 586.304656][T21442] ? kstrtol_from_user+0x310/0x310 [ 586.309607][T21442] ? bpf_do_trace_printk+0x270/0x270 [ 586.314824][T21442] ? avc_policy_seqno+0x1b/0x70 [ 586.319594][T21442] ? selinux_file_permission+0x2bb/0x560 [ 586.325077][T21442] ? fsnotify_perm+0x67/0x4e0 [ 586.329590][T21442] tun_chr_write_iter+0x1a8/0x250 [ 586.334440][T21442] vfs_write+0xb4c/0xe70 [ 586.338515][T21442] ? putname+0xe7/0x140 [ 586.342512][T21442] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 586.348151][T21442] ? kernel_write+0x3d0/0x3d0 [ 586.352752][T21442] ? __fdget_pos+0x209/0x3a0 [ 586.357254][T21442] ? ksys_write+0x77/0x2c0 [ 586.361512][T21442] ksys_write+0x199/0x2c0 [ 586.365685][T21442] ? __ia32_sys_read+0x90/0x90 [ 586.370279][T21442] ? debug_smp_processor_id+0x17/0x20 [ 586.375481][T21442] __x64_sys_write+0x7b/0x90 [ 586.379911][T21442] do_syscall_64+0x34/0x70 [ 586.384165][T21442] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 586.389888][T21442] RIP: 0033:0x7fd53a7159f9 [ 586.394148][T21442] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 586.413583][T21442] RSP: 002b:00007fd539395048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 586.421829][T21442] RAX: ffffffffffffffda RBX: 00007fd53a8a3f80 RCX: 00007fd53a7159f9 [ 586.429640][T21442] RDX: 000000000000fdef RSI: 0000000020000180 RDI: 0000000000000005 [ 586.437537][T21442] RBP: 00007fd5393950a0 R08: 0000000000000000 R09: 0000000000000000 [ 586.445350][T21442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 586.453158][T21442] R13: 000000000000000b R14: 00007fd53a8a3f80 R15: 00007ffe4cb4f468 [ 586.763500][T21467] device wg2 left promiscuous mode [ 586.804479][T21467] device wg2 entered promiscuous mode [ 587.579639][T21503] device pim6reg1 entered promiscuous mode [ 587.750454][T21510] device wg2 left promiscuous mode [ 587.843614][T21510] device wg2 entered promiscuous mode [ 588.679723][T21539] : renamed from vlan0 [ 589.743794][T21577] device pim6reg1 entered promiscuous mode [ 589.928698][T21579] device sit0 left promiscuous mode [ 590.336683][T21577] device pim6reg1 entered promiscuous mode [ 590.403283][T21584] device sit0 entered promiscuous mode [ 590.730232][T21605] device wg2 left promiscuous mode [ 590.765383][T21605] device wg2 entered promiscuous mode [ 590.980003][T21607] device veth0_vlan left promiscuous mode [ 591.055604][T21607] device veth0_vlan entered promiscuous mode [ 591.727444][T21650] ʮ}p: renamed from pim6reg1 [ 592.056825][T21660] device syzkaller0 entered promiscuous mode [ 592.142086][T21676] bridge_slave_0: mtu greater than device maximum [ 593.042844][T21698] tap0: tun_chr_ioctl cmd 1074025677 [ 593.048001][T21698] tap0: linktype set to 774 [ 593.554602][T21711] device syzkaller0 entered promiscuous mode [ 593.582692][T21713] device sit0 entered promiscuous mode [ 593.923976][T21722] device syzkaller0 entered promiscuous mode [ 594.128272][T21730] device sit0 entered promiscuous mode [ 594.523077][T21743] syz.1.6754[21743] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 594.523140][T21743] syz.1.6754[21743] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 594.702952][T21751] syz.1.6754[21751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 594.762117][T21751] syz.1.6754[21751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 595.981773][T21807] device wg2 left promiscuous mode [ 596.000691][T21809] device wg2 left promiscuous mode [ 596.011993][T21813] device wg2 entered promiscuous mode [ 596.106200][T21807] device wg2 entered promiscuous mode [ 596.284094][T21844] device wg2 left promiscuous mode [ 596.407333][T21850] device wg2 left promiscuous mode [ 596.431027][T21844] device wg2 entered promiscuous mode [ 596.514366][T21850] device wg2 entered promiscuous mode [ 598.120343][T21897] device wg2 left promiscuous mode [ 598.133327][T21897] device wg2 entered promiscuous mode [ 598.323832][T21899] device syzkaller0 entered promiscuous mode [ 598.610037][T21904] device syzkaller0 entered promiscuous mode [ 599.039218][T21927] device syzkaller0 entered promiscuous mode [ 600.298160][T21964] device pim6reg1 entered promiscuous mode [ 601.067427][T21994] device wg2 left promiscuous mode [ 601.083512][T21995] device wg2 entered promiscuous mode [ 601.169439][T21997] device pim6reg1 entered promiscuous mode [ 602.622343][T22043] device sit0 left promiscuous mode [ 602.917168][T22049] device wg2 left promiscuous mode [ 602.950737][T22049] device wg2 entered promiscuous mode [ 603.749540][T22080] device wg2 left promiscuous mode [ 603.886163][T22080] device wg2 entered promiscuous mode [ 605.711502][T22112] device wg2 left promiscuous mode [ 605.853506][T22112] device wg2 entered promiscuous mode [ 606.250295][T22132] device sit0 left promiscuous mode [ 606.356411][T22137] syz.3.6887[22137] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 606.356471][T22137] syz.3.6887[22137] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 606.560325][T22135] device sit0 entered promiscuous mode [ 608.375981][T22193] FAULT_INJECTION: forcing a failure. [ 608.375981][T22193] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 608.393415][T22193] CPU: 0 PID: 22193 Comm: syz.0.6910 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 608.404603][T22193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 608.414493][T22193] Call Trace: [ 608.417630][T22193] dump_stack_lvl+0x1e2/0x24b [ 608.422142][T22193] ? bfq_pos_tree_add_move+0x43b/0x43b [ 608.427446][T22193] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 608.434216][T22193] ? proc_fail_nth_write+0x20b/0x290 [ 608.439327][T22193] dump_stack+0x15/0x17 [ 608.443317][T22193] should_fail+0x3c6/0x510 [ 608.447576][T22193] should_fail_usercopy+0x1a/0x20 [ 608.452436][T22193] _copy_from_user+0x20/0xd0 [ 608.456855][T22193] sock_do_ioctl+0x20e/0x3a0 [ 608.461278][T22193] ? sock_show_fdinfo+0xa0/0xa0 [ 608.465964][T22193] ? kernel_write+0x3d0/0x3d0 [ 608.470480][T22193] ? selinux_file_ioctl+0x3cc/0x540 [ 608.475512][T22193] sock_ioctl+0x4a6/0x760 [ 608.479681][T22193] ? sock_poll+0x340/0x340 [ 608.483933][T22193] ? security_file_ioctl+0x84/0xb0 [ 608.488873][T22193] ? sock_poll+0x340/0x340 [ 608.493127][T22193] __se_sys_ioctl+0x114/0x190 [ 608.497644][T22193] __x64_sys_ioctl+0x7b/0x90 [ 608.502069][T22193] do_syscall_64+0x34/0x70 [ 608.506495][T22193] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 608.512225][T22193] RIP: 0033:0x7fd53a7159f9 [ 608.516474][T22193] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 608.535929][T22193] RSP: 002b:00007fd539395048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 608.544168][T22193] RAX: ffffffffffffffda RBX: 00007fd53a8a3f80 RCX: 00007fd53a7159f9 [ 608.551971][T22193] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 608.559779][T22193] RBP: 00007fd5393950a0 R08: 0000000000000000 R09: 0000000000000000 [ 608.567594][T22193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 608.575407][T22193] R13: 000000000000000b R14: 00007fd53a8a3f80 R15: 00007ffe4cb4f468 [ 608.976961][T22208] device wg2 left promiscuous mode [ 609.010202][T22208] device wg2 entered promiscuous mode [ 609.490807][T22232] FAULT_INJECTION: forcing a failure. [ 609.490807][T22232] name failslab, interval 1, probability 0, space 0, times 0 [ 609.580066][T22232] CPU: 1 PID: 22232 Comm: syz.3.6923 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 609.591263][T22232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 609.601153][T22232] Call Trace: [ 609.604292][T22232] dump_stack_lvl+0x1e2/0x24b [ 609.608799][T22232] ? panic+0x812/0x812 [ 609.612706][T22232] ? bfq_pos_tree_add_move+0x43b/0x43b [ 609.618005][T22232] dump_stack+0x15/0x17 [ 609.621987][T22232] should_fail+0x3c6/0x510 [ 609.626248][T22232] ? qdisc_alloc+0x76/0x750 [ 609.630585][T22232] __should_failslab+0xa4/0xe0 [ 609.635176][T22232] should_failslab+0x9/0x20 [ 609.639516][T22232] __kmalloc+0x60/0x330 [ 609.643505][T22232] ? __kasan_check_write+0x14/0x20 [ 609.648455][T22232] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 609.653750][T22232] qdisc_alloc+0x76/0x750 [ 609.657912][T22232] ? mutex_lock+0xa5/0x110 [ 609.662196][T22232] qdisc_create_dflt+0x6b/0x3d0 [ 609.666854][T22232] ? _raw_spin_lock+0xa4/0x1b0 [ 609.671455][T22232] dev_activate+0x2e0/0x1310 [ 609.676058][T22232] __dev_open+0x3bf/0x4e0 [ 609.680223][T22232] ? dev_open+0x260/0x260 [ 609.684384][T22232] ? _raw_spin_unlock_bh+0x51/0x60 [ 609.689334][T22232] ? dev_set_rx_mode+0x245/0x2e0 [ 609.694105][T22232] ? __kasan_check_read+0x11/0x20 [ 609.698970][T22232] __dev_change_flags+0x1db/0x6e0 [ 609.703846][T22232] ? dev_get_flags+0x1e0/0x1e0 [ 609.708426][T22232] ? selinux_capable+0x2f1/0x430 [ 609.713202][T22232] ? selinux_capset+0xf0/0xf0 [ 609.717713][T22232] dev_change_flags+0x8c/0x1a0 [ 609.722313][T22232] dev_ifsioc+0x115/0xae0 [ 609.726479][T22232] ? dev_ioctl+0xb40/0xb40 [ 609.730736][T22232] ? dev_get_by_name_rcu+0xc5/0xf0 [ 609.735681][T22232] dev_ioctl+0x526/0xb40 [ 609.739760][T22232] sock_do_ioctl+0x295/0x3a0 [ 609.744186][T22232] ? sock_show_fdinfo+0xa0/0xa0 [ 609.748870][T22232] ? kernel_write+0x3d0/0x3d0 [ 609.753390][T22232] ? selinux_file_ioctl+0x3cc/0x540 [ 609.758422][T22232] sock_ioctl+0x4a6/0x760 [ 609.762587][T22232] ? sock_poll+0x340/0x340 [ 609.766854][T22232] ? security_file_ioctl+0x84/0xb0 [ 609.771786][T22232] ? sock_poll+0x340/0x340 [ 609.776037][T22232] __se_sys_ioctl+0x114/0x190 [ 609.780553][T22232] __x64_sys_ioctl+0x7b/0x90 [ 609.784980][T22232] do_syscall_64+0x34/0x70 [ 609.789254][T22232] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 609.794959][T22232] RIP: 0033:0x7f37c9d2c9f9 [ 609.799300][T22232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 609.818738][T22232] RSP: 002b:00007f37c89ac048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 609.826984][T22232] RAX: ffffffffffffffda RBX: 00007f37c9ebaf80 RCX: 00007f37c9d2c9f9 [ 609.834798][T22232] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 609.842605][T22232] RBP: 00007f37c89ac0a0 R08: 0000000000000000 R09: 0000000000000000 [ 609.850514][T22232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 609.858324][T22232] R13: 000000000000000b R14: 00007f37c9ebaf80 R15: 00007fff95705d38 [ 609.868871][T22232] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 609.876420][T22232] device pim6reg1 entered promiscuous mode [ 610.067912][T22249] device wg2 left promiscuous mode [ 610.135474][T22249] device wg2 entered promiscuous mode [ 610.302817][T22256] device syzkaller0 entered promiscuous mode [ 610.585996][T22274] FAULT_INJECTION: forcing a failure. [ 610.585996][T22274] name failslab, interval 1, probability 0, space 0, times 0 [ 610.622663][T22274] CPU: 1 PID: 22274 Comm: syz.1.6938 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 610.633857][T22274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 610.643750][T22274] Call Trace: [ 610.646890][T22274] dump_stack_lvl+0x1e2/0x24b [ 610.651392][T22274] ? bfq_pos_tree_add_move+0x43b/0x43b [ 610.656685][T22274] ? pcpu_memcg_post_alloc_hook+0x1c8/0x360 [ 610.662418][T22274] ? trace_raw_output_percpu_destroy_chunk+0xc0/0xc0 [ 610.668927][T22274] ? find_next_bit+0xc7/0x100 [ 610.673449][T22274] dump_stack+0x15/0x17 [ 610.677425][T22274] should_fail+0x3c6/0x510 [ 610.681685][T22274] ? kvmalloc_node+0x82/0x130 [ 610.686194][T22274] __should_failslab+0xa4/0xe0 [ 610.690794][T22274] should_failslab+0x9/0x20 [ 610.695135][T22274] __kmalloc+0x60/0x330 [ 610.699131][T22274] kvmalloc_node+0x82/0x130 [ 610.703465][T22274] pfifo_fast_init+0x110/0x7a0 [ 610.708067][T22274] qdisc_create_dflt+0x138/0x3d0 [ 610.712840][T22274] ? _raw_spin_lock+0xa4/0x1b0 [ 610.717438][T22274] dev_activate+0x2e0/0x1310 [ 610.721869][T22274] __dev_open+0x3bf/0x4e0 [ 610.726031][T22274] ? dev_open+0x260/0x260 [ 610.730198][T22274] ? _raw_spin_unlock_bh+0x51/0x60 [ 610.735147][T22274] ? dev_set_rx_mode+0x245/0x2e0 [ 610.739921][T22274] ? __kasan_check_read+0x11/0x20 [ 610.744785][T22274] __dev_change_flags+0x1db/0x6e0 [ 610.749644][T22274] ? dev_get_flags+0x1e0/0x1e0 [ 610.754243][T22274] ? selinux_capable+0x2f1/0x430 [ 610.759014][T22274] ? selinux_capset+0xf0/0xf0 [ 610.763530][T22274] dev_change_flags+0x8c/0x1a0 [ 610.768129][T22274] dev_ifsioc+0x115/0xae0 [ 610.772294][T22274] ? dev_ioctl+0xb40/0xb40 [ 610.776548][T22274] ? dev_get_by_name_rcu+0xc5/0xf0 [ 610.781493][T22274] dev_ioctl+0x526/0xb40 [ 610.785663][T22274] sock_do_ioctl+0x295/0x3a0 [ 610.790085][T22274] ? sock_show_fdinfo+0xa0/0xa0 [ 610.794787][T22274] ? kernel_write+0x3d0/0x3d0 [ 610.799289][T22274] ? selinux_file_ioctl+0x3cc/0x540 [ 610.804317][T22274] sock_ioctl+0x4a6/0x760 [ 610.808482][T22274] ? sock_poll+0x340/0x340 [ 610.812746][T22274] ? security_file_ioctl+0x84/0xb0 [ 610.817691][T22274] ? sock_poll+0x340/0x340 [ 610.821935][T22274] __se_sys_ioctl+0x114/0x190 [ 610.826449][T22274] __x64_sys_ioctl+0x7b/0x90 [ 610.830878][T22274] do_syscall_64+0x34/0x70 [ 610.835133][T22274] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 610.840867][T22274] RIP: 0033:0x7f5e0f2fb9f9 [ 610.845112][T22274] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 610.864549][T22274] RSP: 002b:00007f5e0df7b048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 610.872809][T22274] RAX: ffffffffffffffda RBX: 00007f5e0f489f80 RCX: 00007f5e0f2fb9f9 [ 610.880608][T22274] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 610.888418][T22274] RBP: 00007f5e0df7b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 610.896231][T22274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 610.904039][T22274] R13: 000000000000000b R14: 00007f5e0f489f80 R15: 00007ffea72ff7a8 [ 611.016945][T22274] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 611.024781][T22274] device pim6reg1 entered promiscuous mode [ 611.091026][T22281] device wg2 left promiscuous mode [ 611.149922][T22282] device wg2 entered promiscuous mode [ 611.359479][T22287] device pim6reg1 entered promiscuous mode [ 612.490838][T22335] device wg2 left promiscuous mode [ 612.516908][T22334] device pim6reg1 entered promiscuous mode [ 612.553421][T22335] device wg2 entered promiscuous mode [ 612.932648][T22346] device sit0 left promiscuous mode [ 613.285257][T22364] device pim6reg1 entered promiscuous mode [ 614.277537][T22393] device syzkaller0 entered promiscuous mode [ 614.362501][T22398] device wg2 left promiscuous mode [ 614.393928][T22400] device wg2 entered promiscuous mode [ 614.454226][T22402] device pim6reg1 entered promiscuous mode [ 614.734940][T22413] device pim6reg1 entered promiscuous mode [ 615.437912][T22442] device pim6reg1 entered promiscuous mode [ 615.455060][T22447] device wg2 left promiscuous mode [ 615.482947][T22447] device wg2 entered promiscuous mode [ 616.192342][T22489] device pim6reg1 entered promiscuous mode [ 616.242037][T22491] device syzkaller0 entered promiscuous mode [ 616.564163][T22514] device pim6reg1 entered promiscuous mode [ 617.522152][T22559] device syzkaller0 entered promiscuous mode [ 618.081512][T22588] device wg2 left promiscuous mode [ 618.156450][T22588] device wg2 entered promiscuous mode [ 619.201531][T22622] device syzkaller0 entered promiscuous mode [ 619.314266][T22633] syz.4.7064[22633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 619.314332][T22633] syz.4.7064[22633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 619.434628][T22632] syz.4.7064[22632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 619.447409][T22632] syz.4.7064[22632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 620.167344][T22673] device veth0_vlan left promiscuous mode [ 620.214401][T22673] device veth0_vlan entered promiscuous mode [ 620.351048][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 620.361698][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 620.379764][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 620.575293][T22693] syz.4.7086[22693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 620.576719][T22693] syz.4.7086[22693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 621.111908][T22713] device veth0_vlan left promiscuous mode [ 621.160533][T22713] device veth0_vlan entered promiscuous mode [ 621.893573][T22760] device syzkaller0 entered promiscuous mode [ 621.968798][T22759] device pim6reg1 entered promiscuous mode [ 622.142607][T22766] device syzkaller0 entered promiscuous mode [ 622.352998][T22776] device syzkaller0 entered promiscuous mode [ 622.489500][T22784] device wg2 left promiscuous mode [ 622.669695][T22784] device wg2 entered promiscuous mode [ 622.889072][T22803] device pim6reg1 entered promiscuous mode [ 623.779738][T22842] device pim6reg1 entered promiscuous mode [ 624.382541][T22860] device pim6reg1 entered promiscuous mode [ 625.914179][T22917] : renamed from vlan0 [ 626.172723][T22926] device wg2 left promiscuous mode [ 626.190267][T22930] device wg2 left promiscuous mode [ 626.211367][T22934] device wg2 entered promiscuous mode [ 626.281154][T22930] device wg2 entered promiscuous mode [ 626.312384][T22936] device veth0_vlan left promiscuous mode [ 626.330903][T22936] device veth0_vlan entered promiscuous mode [ 626.355338][T22942] syz.4.7161[22942] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 626.355406][T22942] syz.4.7161[22942] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 626.973520][T22970] device wg2 left promiscuous mode [ 627.053380][T22964] device pim6reg1 entered promiscuous mode [ 627.094367][T22970] device wg2 entered promiscuous mode [ 628.213680][T23040] device pim6reg1 entered promiscuous mode [ 628.541414][T23076] cgroup: fork rejected by pids controller in /syz1 [ 628.694687][T23086] syz.0.7206[23086] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 628.694733][T23086] syz.0.7206[23086] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 628.711351][T23088] device pim6reg1 entered promiscuous mode [ 629.524341][T23104] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.696476][T23104] bridge0: port 1(bridge_slave_0) entered disabled state [ 629.778109][T23104] device bridge_slave_0 entered promiscuous mode [ 629.855055][T23104] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.929545][T23104] bridge0: port 2(bridge_slave_1) entered disabled state [ 629.936881][T23104] device bridge_slave_1 entered promiscuous mode [ 630.131215][T23136] device syzkaller0 entered promiscuous mode [ 630.463041][ T288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 630.486364][ T288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 630.592887][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 630.629729][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 630.639746][ T2632] bridge0: port 1(bridge_slave_0) entered blocking state [ 630.646587][ T2632] bridge0: port 1(bridge_slave_0) entered forwarding state [ 630.654205][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 630.669564][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 630.684123][ T2632] bridge0: port 2(bridge_slave_1) entered blocking state [ 630.691024][ T2632] bridge0: port 2(bridge_slave_1) entered forwarding state [ 630.700527][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 630.837268][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 630.849971][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 630.857446][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 631.022555][T23104] device veth0_vlan entered promiscuous mode [ 631.032458][ T2628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 631.040564][ T2628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 631.053901][ T2628] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 631.068466][ T2628] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 631.195916][T23104] device veth1_macvtap entered promiscuous mode [ 631.207710][ T2624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 631.216569][ T2624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 631.224662][ T2624] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 631.286785][T23201] device syzkaller0 entered promiscuous mode [ 631.337421][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 631.345726][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 631.485560][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 631.495823][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 632.173288][ T312] device veth1_macvtap left promiscuous mode [ 632.198782][ T312] device veth0_vlan left promiscuous mode [ 633.116752][T23240] device syzkaller0 entered promiscuous mode [ 633.770610][T23270] device wg2 left promiscuous mode [ 633.850686][T23270] device wg2 entered promiscuous mode [ 634.416109][T23296] tap0: tun_chr_ioctl cmd 1074025675 [ 634.421267][T23296] tap0: persist enabled [ 634.662931][T23311] device syzkaller0 entered promiscuous mode [ 635.229542][T23334] syz.4.7281[23334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 635.229594][T23334] syz.4.7281[23334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 635.248994][T23334] syz.4.7281[23334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 635.263760][T23334] syz.4.7281[23334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 635.280416][T23334] syz.4.7281[23334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 635.295234][T23334] syz.4.7281[23334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 635.389639][T23336] device sit0 entered promiscuous mode [ 636.345785][T23367] device pim6reg1 entered promiscuous mode [ 636.427022][T23377] device syzkaller0 entered promiscuous mode [ 636.460339][T23381] device wg2 left promiscuous mode [ 636.469094][T23383] device pim6reg1 entered promiscuous mode [ 636.489219][T23381] device wg2 entered promiscuous mode [ 636.547916][T23386] device wg2 left promiscuous mode [ 636.565659][T23390] device wg2 left promiscuous mode [ 636.607013][T23386] device wg2 entered promiscuous mode [ 636.729306][T23390] device wg2 entered promiscuous mode [ 636.873530][T23409] device syzkaller0 entered promiscuous mode [ 636.889771][T23413] device wg2 left promiscuous mode [ 636.905698][T23413] device wg2 entered promiscuous mode [ 636.972275][T23419] device pim6reg1 entered promiscuous mode [ 637.621308][T23471] device syzkaller0 entered promiscuous mode [ 637.639151][T23484] device pim6reg1 entered promiscuous mode [ 637.689185][T23498] device syzkaller0 entered promiscuous mode [ 638.039446][T23508] syz.4.7345[23508] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 638.039505][T23508] syz.4.7345[23508] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 638.509087][T23534] device syzkaller0 entered promiscuous mode [ 638.527762][T23528] bridge0: port 1(bridge_slave_0) entered blocking state [ 638.565190][T23528] bridge0: port 1(bridge_slave_0) entered disabled state [ 638.588375][T23528] device bridge_slave_0 entered promiscuous mode [ 638.616872][T23538] device team_slave_1 entered promiscuous mode [ 638.629817][T23528] bridge0: port 2(bridge_slave_1) entered blocking state [ 638.637843][T23528] bridge0: port 2(bridge_slave_1) entered disabled state [ 638.650975][T23528] device bridge_slave_1 entered promiscuous mode [ 638.662358][ T2621] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 638.675112][ T2621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 638.932326][T23544] device syzkaller0 entered promiscuous mode [ 638.939909][T23543] device syzkaller0 left promiscuous mode [ 639.119244][T23528] bridge0: port 2(bridge_slave_1) entered blocking state [ 639.126120][T23528] bridge0: port 2(bridge_slave_1) entered forwarding state [ 639.133226][T23528] bridge0: port 1(bridge_slave_0) entered blocking state [ 639.139998][T23528] bridge0: port 1(bridge_slave_0) entered forwarding state [ 639.186154][ T2629] bridge0: port 1(bridge_slave_0) entered disabled state [ 639.210249][ T2629] bridge0: port 2(bridge_slave_1) entered disabled state [ 639.300560][ T2629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 639.307888][ T2629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 639.365618][ T2622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 639.381212][ T2622] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 639.429303][ T2622] bridge0: port 1(bridge_slave_0) entered blocking state [ 639.436181][ T2622] bridge0: port 1(bridge_slave_0) entered forwarding state [ 639.498321][ T2622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 639.506726][ T2622] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 639.514788][ T2622] bridge0: port 2(bridge_slave_1) entered blocking state [ 639.521640][ T2622] bridge0: port 2(bridge_slave_1) entered forwarding state [ 639.718466][T23570] device syzkaller0 entered promiscuous mode [ 639.739788][ T2620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 639.747707][ T2620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 639.770577][ T2620] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 639.789631][ T2620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 639.807129][T23572] device wg2 left promiscuous mode [ 639.836438][T23528] device veth0_vlan entered promiscuous mode [ 639.852118][T23574] device wg2 entered promiscuous mode [ 639.897232][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 639.906801][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 639.915028][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 639.922887][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 639.937008][T23528] device veth1_macvtap entered promiscuous mode [ 639.968978][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 639.976340][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 639.989284][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 640.007457][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 640.015548][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 640.036742][ T2622] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 640.048944][ T2622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 640.057655][ T2622] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 640.071857][ T2622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 640.420346][T23609] device wg2 entered promiscuous mode [ 640.767993][T23612] device pim6reg1 entered promiscuous mode [ 641.177437][T23646] device wg2 entered promiscuous mode [ 641.658485][T23681] device wg2 left promiscuous mode [ 641.680671][T23681] device wg2 entered promiscuous mode [ 641.829944][T23683] device pim6reg1 entered promiscuous mode [ 642.335087][T23719] device sit0 entered promiscuous mode [ 642.687387][T23732] syz.0.7426[23732] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 642.690695][T23732] syz.0.7426[23732] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 642.985490][T23754] device veth0_vlan left promiscuous mode [ 643.117872][T23754] device veth0_vlan entered promiscuous mode [ 643.208367][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 643.218028][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 643.227857][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 643.939236][T23804] device syzkaller0 entered promiscuous mode [ 644.349550][T23825] syz.1.7463[23825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 644.349607][T23825] syz.1.7463[23825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 645.175465][T23886] device wg2 left promiscuous mode [ 645.218164][T23886] device wg2 entered promiscuous mode [ 645.610549][T23914] bridge0: port 3(veth0_to_batadv) entered blocking state [ 645.617560][T23914] bridge0: port 3(veth0_to_batadv) entered disabled state [ 645.630520][T23914] device veth0_to_batadv entered promiscuous mode [ 645.639099][T23914] bridge0: port 3(veth0_to_batadv) entered blocking state [ 645.646064][T23914] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 646.480785][T23941] device wg2 left promiscuous mode [ 646.491589][T23946] device wg2 entered promiscuous mode [ 646.904233][T23978] : renamed from vlan0 [ 647.093504][T23998] device wg2 left promiscuous mode [ 647.121448][T23998] device wg2 entered promiscuous mode [ 647.542472][T24025] device wg2 left promiscuous mode [ 647.606682][T24025] device wg2 entered promiscuous mode [ 647.945205][T24056] device syzkaller0 entered promiscuous mode [ 648.190237][T24064] device sit0 entered promiscuous mode [ 648.335024][T24076] device wg2 left promiscuous mode [ 648.347089][T24077] device wg2 entered promiscuous mode [ 648.585563][T24090] device veth0_to_batadv left promiscuous mode [ 648.596444][T24090] bridge0: port 3(veth0_to_batadv) entered disabled state [ 648.885091][T24107] device pim6reg1 entered promiscuous mode [ 649.901183][T24167] device pim6reg1 entered promiscuous mode [ 649.956672][T24169] device syzkaller0 entered promiscuous mode [ 649.984714][T24169] syzkaller0: create flow: hash 3332040875 index 0 [ 650.027372][T13074] syzkaller0: tun_net_xmit 48 [ 650.111143][T24176] device pim6reg1 entered promiscuous mode [ 650.169084][T24179] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 650.327202][T24195] device syzkaller0 entered promiscuous mode [ 651.591662][T24236] syz.0.7590[24236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 651.593377][T24236] syz.0.7590[24236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 651.681859][T24238] device veth0_vlan left promiscuous mode [ 651.719616][T24238] device veth0_vlan entered promiscuous mode [ 651.800475][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 651.830544][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 651.909082][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 652.779492][T24270] bridge0: port 2(bridge_slave_1) entered disabled state [ 652.786706][T24270] bridge0: port 1(bridge_slave_0) entered disabled state [ 652.960347][T24286] syz.4.7606[24286] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 652.960407][T24286] syz.4.7606[24286] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 653.296175][T24293] device syzkaller0 entered promiscuous mode [ 653.445444][T24309] device pim6reg1 entered promiscuous mode [ 653.830156][T24323] syz.3.7620[24323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 653.835718][T24323] syz.3.7620[24323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 653.870343][T24326] device sit0 left promiscuous mode [ 654.034950][T24326] device sit0 entered promiscuous mode [ 654.742428][T24362] device pim6reg1 entered promiscuous mode [ 655.078453][T24380] device wg2 left promiscuous mode [ 655.091529][T24375] syz.2.7633[24375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 655.091675][T24375] syz.2.7633[24375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 655.120907][T24380] device wg2 entered promiscuous mode [ 655.191163][T24384] device veth1_macvtap left promiscuous mode [ 655.455059][T24395] bridge0: port 1(bridge_slave_0) entered blocking state [ 655.464010][T24395] bridge0: port 1(bridge_slave_0) entered disabled state [ 655.481534][T24395] device bridge_slave_0 entered promiscuous mode [ 655.494327][T24395] bridge0: port 2(bridge_slave_1) entered blocking state [ 655.503745][T24395] bridge0: port 2(bridge_slave_1) entered disabled state [ 655.511246][T24395] device bridge_slave_1 entered promiscuous mode [ 655.840264][T24395] bridge0: port 2(bridge_slave_1) entered blocking state [ 655.847133][T24395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 655.854281][T24395] bridge0: port 1(bridge_slave_0) entered blocking state [ 655.861129][T24395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 655.889844][T24421] syz.0.7649[24421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 655.889907][T24421] syz.0.7649[24421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 656.209197][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 656.228030][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 656.236647][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 656.308666][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 656.317754][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 656.361787][T24395] device veth0_vlan entered promiscuous mode [ 656.411477][T24427] device syzkaller0 entered promiscuous mode [ 656.422203][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 656.431090][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 656.440834][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 656.450867][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 656.461288][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 656.469028][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 656.519037][T13074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 656.529779][T13074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 656.541927][T24395] device veth1_macvtap entered promiscuous mode [ 656.616629][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 656.625411][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 656.636592][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 656.645497][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 656.657065][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 656.828181][T24441] device pim6reg1 entered promiscuous mode [ 657.032989][T24456] device syzkaller0 entered promiscuous mode [ 657.042235][T24461] syz.4.7660[24461] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 657.042318][T24461] syz.4.7660[24461] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 657.257601][T24466] device pim6reg1 entered promiscuous mode [ 658.039001][ T110] device veth0_to_batadv left promiscuous mode [ 658.047312][ T110] bridge0: port 3(veth0_to_batadv) entered disabled state [ 658.060568][ T110] device bridge_slave_1 left promiscuous mode [ 658.071025][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.092658][ T110] device bridge_slave_0 left promiscuous mode [ 658.100504][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.319459][T24505] syz.1.7674[24505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 658.319519][T24505] syz.1.7674[24505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 658.341643][T24494] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.360139][T24494] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.367525][T24494] device bridge_slave_0 entered promiscuous mode [ 658.375979][T24494] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.382999][T24494] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.390664][T24494] device bridge_slave_1 entered promiscuous mode [ 658.504781][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 658.512583][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 658.530766][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 658.540105][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 658.548111][ T2979] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.554977][ T2979] bridge0: port 1(bridge_slave_0) entered forwarding state [ 658.566792][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 658.575072][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 658.609210][ T2979] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.616074][ T2979] bridge0: port 2(bridge_slave_1) entered forwarding state [ 658.643909][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 658.651870][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 658.828803][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 658.836308][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 658.846284][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 658.854466][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 658.869062][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 658.880263][T24494] device veth0_vlan entered promiscuous mode [ 658.890700][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 658.909132][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 658.916422][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 658.929426][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 658.939491][T24494] device veth1_macvtap entered promiscuous mode [ 658.956650][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 658.965823][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 658.988329][T13074] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 659.029184][T13074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 659.558856][T24548] device wg2 left promiscuous mode [ 659.582457][T24540] bridge0: port 3(veth0_to_batadv) entered blocking state [ 659.592782][T24540] bridge0: port 3(veth0_to_batadv) entered disabled state [ 659.611879][T24540] device veth0_to_batadv entered promiscuous mode [ 659.620853][T24540] bridge0: port 3(veth0_to_batadv) entered blocking state [ 659.628001][T24540] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 659.663555][T24548] device wg2 entered promiscuous mode [ 660.120851][ T110] device veth0_to_batadv left promiscuous mode [ 660.126898][ T110] bridge0: port 3(veth0_to_batadv) entered disabled state [ 660.150120][ T110] device bridge_slave_1 left promiscuous mode [ 660.156096][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 660.200055][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 660.209322][ T110] device veth0_vlan left promiscuous mode [ 661.337663][T24606] tap0: tun_chr_ioctl cmd 1074025692 [ 662.073467][T24659] device wg2 left promiscuous mode [ 662.685957][T24698] device veth0_vlan left promiscuous mode [ 662.724614][T24698] device veth0_vlan entered promiscuous mode [ 662.798706][T24700] bridge0: port 2(bridge_slave_1) entered disabled state [ 662.805744][T24700] bridge0: port 1(bridge_slave_0) entered disabled state [ 662.888336][T24702] bridge0: port 2(bridge_slave_1) entered blocking state [ 662.895406][T24702] bridge0: port 2(bridge_slave_1) entered forwarding state [ 662.904314][T24702] bridge0: port 1(bridge_slave_0) entered blocking state [ 662.911490][T24702] bridge0: port 1(bridge_slave_0) entered forwarding state [ 663.018814][T24702] device bridge0 entered promiscuous mode [ 663.803998][T24736] device syzkaller0 entered promiscuous mode [ 663.845942][ T2979] syzkaller0: tun_net_xmit 48 [ 663.968188][T24742] device wg2 left promiscuous mode [ 663.989306][T24742] device wg2 entered promiscuous mode [ 664.740279][T24772] device wg2 left promiscuous mode [ 664.760902][T24772] device wg2 entered promiscuous mode [ 666.144260][T24800] device pim6reg1 entered promiscuous mode [ 666.369566][T24806] syz.1.7775[24806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 666.369628][T24806] syz.1.7775[24806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 666.557097][T24825] device syzkaller0 entered promiscuous mode [ 666.613112][ T25] syzkaller0: tun_net_xmit 76 [ 666.617716][ T25] syzkaller0: tun_net_xmit 48 [ 666.638613][ C1] syzkaller0: tun_net_xmit 76 [ 666.718736][T24831] FAULT_INJECTION: forcing a failure. [ 666.718736][T24831] name failslab, interval 1, probability 0, space 0, times 0 [ 666.731344][T24831] CPU: 1 PID: 24831 Comm: syz.3.7781 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 666.742519][T24831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 666.752403][T24831] Call Trace: [ 666.755540][T24831] dump_stack_lvl+0x1e2/0x24b [ 666.760064][T24831] ? bfq_pos_tree_add_move+0x43b/0x43b [ 666.765352][T24831] ? kmem_cache_free+0xa9/0x1e0 [ 666.770027][T24831] ? kasan_set_track+0x5d/0x70 [ 666.774627][T24831] ? kasan_set_free_info+0x23/0x40 [ 666.779702][T24831] dump_stack+0x15/0x17 [ 666.783659][T24831] should_fail+0x3c6/0x510 [ 666.787922][T24831] ? dup_task_struct+0x57/0xc30 [ 666.792692][T24831] __should_failslab+0xa4/0xe0 [ 666.797296][T24831] should_failslab+0x9/0x20 [ 666.801628][T24831] kmem_cache_alloc+0x3d/0x2e0 [ 666.806229][T24831] ? __kasan_check_write+0x14/0x20 [ 666.811169][T24831] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 666.816116][T24831] dup_task_struct+0x57/0xc30 [ 666.820625][T24831] ? __kasan_check_write+0x14/0x20 [ 666.825575][T24831] copy_process+0x5c8/0x3340 [ 666.829999][T24831] ? proc_fail_nth_write+0x20b/0x290 [ 666.835120][T24831] ? proc_fail_nth_read+0x210/0x210 [ 666.840154][T24831] ? security_file_permission+0x86/0xb0 [ 666.845539][T24831] ? rw_verify_area+0x1c3/0x360 [ 666.850222][T24831] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 666.855166][T24831] ? vfs_write+0x852/0xe70 [ 666.859452][T24831] ? kmem_cache_free+0xa9/0x1e0 [ 666.864109][T24831] kernel_clone+0x21e/0x9e0 [ 666.868452][T24831] ? __kasan_check_write+0x14/0x20 [ 666.873394][T24831] ? create_io_thread+0x1e0/0x1e0 [ 666.878263][T24831] __x64_sys_clone+0x23f/0x290 [ 666.882942][T24831] ? __do_sys_vfork+0x130/0x130 [ 666.887637][T24831] ? debug_smp_processor_id+0x17/0x20 [ 666.892931][T24831] do_syscall_64+0x34/0x70 [ 666.897179][T24831] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 666.902906][T24831] RIP: 0033:0x7f2aba4ea9f9 [ 666.907162][T24831] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 666.926688][T24831] RSP: 002b:00007f2ab9169ff8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 666.934929][T24831] RAX: ffffffffffffffda RBX: 00007f2aba678f80 RCX: 00007f2aba4ea9f9 [ 666.942742][T24831] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000004d100000 [ 666.950554][T24831] RBP: 00007f2ab916a0a0 R08: 0000000000000000 R09: 0000000000000000 [ 666.958364][T24831] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 666.966177][T24831] R13: 000000000000000b R14: 00007f2aba678f80 R15: 00007fffaed72848 [ 667.897470][T24856] device syzkaller0 entered promiscuous mode [ 668.000901][T24858] : renamed from vlan0 [ 668.542900][T24876] syz.3.7798[24876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 668.542967][T24876] syz.3.7798[24876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 668.615017][T24876] syz.3.7798[24876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 668.769484][T24876] syz.3.7798[24876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 669.516339][T24906] device wg2 entered promiscuous mode [ 673.134858][T25031] device syzkaller0 entered promiscuous mode [ 673.319305][T25037] device pim6reg1 entered promiscuous mode [ 673.912727][T25045] device syzkaller0 entered promiscuous mode [ 674.003296][T25054] device wg2 entered promiscuous mode [ 674.850304][T25080] device pim6reg1 entered promiscuous mode [ 676.110515][T25129] device pim6reg1 entered promiscuous mode [ 676.485643][T25145] device syzkaller0 entered promiscuous mode [ 676.579708][T25145] device pim6reg1 entered promiscuous mode [ 677.358481][T25200] device pim6reg1 entered promiscuous mode [ 677.575479][T25211] geneve1: tun_chr_ioctl cmd 1074025681 [ 677.828381][T25220] device pim6reg1 entered promiscuous mode [ 678.249872][T25235] device syzkaller0 entered promiscuous mode [ 678.929841][T25249] device wg2 entered promiscuous mode [ 679.146015][T25260] device pim6reg1 entered promiscuous mode [ 679.369618][T25267] device sit0 left promiscuous mode [ 680.835915][T25279] device wg2 left promiscuous mode [ 680.861984][T25279] device wg2 entered promiscuous mode [ 681.651914][T25297] syz.3.7925[25297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 681.651975][T25297] syz.3.7925[25297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 681.833496][T25299] bridge0: port 3(veth0_to_batadv) entered blocking state [ 681.881991][T25299] bridge0: port 3(veth0_to_batadv) entered disabled state [ 681.913678][T25299] device veth0_to_batadv entered promiscuous mode [ 681.915009][T25297] syz.3.7925[25297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 681.925236][T25297] syz.3.7925[25297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 681.956620][T25305] device wg2 left promiscuous mode [ 681.981805][T25301] device veth0_to_batadv left promiscuous mode [ 681.993575][T25301] bridge0: port 3(veth0_to_batadv) entered disabled state [ 682.179261][T25327] device pim6reg1 entered promiscuous mode [ 682.269888][T25323] device pim6reg1 entered promiscuous mode [ 682.387873][ T24] audit: type=1400 audit(1722857495.420:181): avc: denied { setattr } for pid=25328 comm="syz.4.7938" path="/dev/ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 682.794825][T25353] device wg2 left promiscuous mode [ 683.235588][T25363] device pim6reg1 entered promiscuous mode [ 683.940722][T25386] device syzkaller0 entered promiscuous mode [ 683.947418][ T25] syzkaller0: tun_net_xmit 48 [ 683.994888][T25386] syzkaller0: create flow: hash 2167636728 index 0 [ 684.024765][T25388] device wg2 left promiscuous mode [ 684.051347][T25388] device wg2 entered promiscuous mode [ 684.082461][T25384] syzkaller0 (unregistered): delete flow: hash 2167636728 index 0 [ 684.389167][T25398] bridge0: port 3(veth0_to_batadv) entered disabled state [ 684.396425][T25398] bridge0: port 2(bridge_slave_1) entered disabled state [ 684.403794][T25398] bridge0: port 1(bridge_slave_0) entered disabled state [ 685.709762][T25446] bridge0: port 2(bridge_slave_1) entered disabled state [ 685.716688][T25446] bridge0: port 1(bridge_slave_0) entered disabled state [ 685.724015][T25446] device bridge0 left promiscuous mode [ 685.785981][T25447] device bridge_slave_1 left promiscuous mode [ 685.792052][T25447] bridge0: port 2(bridge_slave_1) entered disabled state [ 685.799809][T25447] device bridge_slave_0 left promiscuous mode [ 685.805813][T25447] bridge0: port 1(bridge_slave_0) entered disabled state [ 685.871073][T25451] device syzkaller0 entered promiscuous mode [ 686.016398][T25466] device pim6reg1 entered promiscuous mode [ 687.436812][T25528] device veth0_vlan left promiscuous mode [ 687.489138][T25528] device veth0_vlan entered promiscuous mode [ 689.238870][T25558] syzkaller0: create flow: hash 2167636728 index 0 [ 689.351647][T25557] device syzkaller0 entered promiscuous mode [ 689.395759][T10172] syzkaller0: tun_net_xmit 48 [ 689.558622][T25556] syzkaller0 (unregistered): delete flow: hash 2167636728 index 0 [ 689.921481][T25561] device wg2 left promiscuous mode [ 690.063175][T25562] device wg2 entered promiscuous mode [ 691.362722][T25649] device syzkaller0 entered promiscuous mode [ 691.456877][T25652] device pim6reg1 entered promiscuous mode [ 691.512895][T25657] device syzkaller0 entered promiscuous mode [ 693.053516][T25724] syzkaller0: create flow: hash 3332040875 index 0 [ 693.102926][T25721] device syzkaller0 entered promiscuous mode [ 693.121859][T25725] device pim6reg1 entered promiscuous mode [ 693.128370][ T2979] syzkaller0: tun_net_xmit 48 [ 693.240463][T25720] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 693.838809][T25746] gretap0: refused to change device tx_queue_len [ 697.104450][T25799] device syzkaller0 entered promiscuous mode [ 697.124842][ T25] syzkaller0: tun_net_xmit 48 [ 697.182501][T25799] syzkaller0: create flow: hash 3332040875 index 0 [ 697.290852][T25797] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 697.907597][T25839] device syzkaller0 entered promiscuous mode [ 697.914132][ T25] syzkaller0: tun_net_xmit 48 [ 697.927868][T25839] syzkaller0: create flow: hash 3332040875 index 0 [ 697.973357][T25850] device veth0_vlan left promiscuous mode [ 697.978660][T25838] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 697.984275][T25850] device veth0_vlan entered promiscuous mode [ 698.004456][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 698.013068][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 698.020718][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 699.990059][T25943] syzkaller0: create flow: hash 3332040875 index 0 [ 700.069277][T25935] device syzkaller0 entered promiscuous mode [ 700.105108][T13083] syzkaller0: tun_net_xmit 48 [ 700.123079][T25944] device syzkaller0 entered promiscuous mode [ 700.198621][T25929] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 700.467200][T25961] device sit0 left promiscuous mode [ 701.448821][T26002] syzkaller0: create flow: hash 3332040875 index 0 [ 701.469262][T26000] device syzkaller0 entered promiscuous mode [ 701.550620][ T2617] syzkaller0: tun_net_xmit 48 [ 701.602228][T26016] device pim6reg1 entered promiscuous mode [ 701.608738][T25999] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 702.269742][T26048] syz.1.8184[26048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 702.269801][T26048] syz.1.8184[26048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 702.544719][T26068] device syzkaller0 entered promiscuous mode [ 702.564635][T26068] syzkaller0: create flow: hash 3332040875 index 0 [ 702.589415][ T561] syzkaller0: tun_net_xmit 48 [ 702.720329][T26067] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 702.990981][T26089] syz.0.8200[26089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 702.991041][T26089] syz.0.8200[26089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 703.045359][T26092] device veth0_vlan left promiscuous mode [ 703.097960][T26092] device veth0_vlan entered promiscuous mode [ 703.154905][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 703.164134][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 703.177707][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 703.714102][T26111] device syzkaller0 entered promiscuous mode [ 703.940972][T26151] syz.3.8218[26151] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 703.941035][T26151] syz.3.8218[26151] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.081495][T26154] device pim6reg1 entered promiscuous mode [ 704.273607][T26158] : renamed from pim6reg1 [ 704.388734][T26181] device syzkaller0 entered promiscuous mode [ 704.418893][T26181] syzkaller0: create flow: hash 3332040875 index 0 [ 704.434134][ T2979] syzkaller0: tun_net_xmit 48 [ 704.439165][T26189] pim6reg: tun_chr_ioctl cmd 1074025677 [ 704.444536][T26189] pim6reg: linktype set to 780 [ 704.460029][T26189] syz.4.8228[26189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.460090][T26189] syz.4.8228[26189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.480100][T26189] syz.4.8228[26189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.511306][T26189] syz.4.8228[26189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.668479][T26180] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 705.239173][T26207] device pim6reg1 entered promiscuous mode [ 706.609227][T26243] device pim6reg1 entered promiscuous mode [ 707.417114][T26274] device syzkaller0 entered promiscuous mode [ 708.049613][T26308] bridge0: port 3(veth0_to_batadv) entered blocking state [ 708.068743][T26308] bridge0: port 3(veth0_to_batadv) entered disabled state [ 708.076254][T26308] device veth0_to_batadv entered promiscuous mode [ 708.083076][T26308] bridge0: port 3(veth0_to_batadv) entered blocking state [ 708.090121][T26308] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 708.368951][T26311] device veth0_to_batadv left promiscuous mode [ 708.375311][T26311] bridge0: port 3(veth0_to_batadv) entered disabled state [ 710.643435][T26418] bridge0: port 3(veth0_to_batadv) entered blocking state [ 710.651074][T26418] bridge0: port 3(veth0_to_batadv) entered disabled state [ 710.686350][T26418] device veth0_to_batadv entered promiscuous mode [ 710.713363][T26418] bridge0: port 3(veth0_to_batadv) entered blocking state [ 710.720442][T26418] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 711.109678][T26442] bpf_get_probe_write_proto: 4 callbacks suppressed [ 711.109690][T26442] syz.3.8298[26442] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 711.119138][T26442] syz.3.8298[26442] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 711.308113][T26437] syzkaller0: create flow: hash 2167636728 index 0 [ 711.331063][T26444] device syzkaller0 entered promiscuous mode [ 711.347486][ T2632] syzkaller0: tun_net_xmit 48 [ 711.519038][T26436] syzkaller0 (unregistered): delete flow: hash 2167636728 index 0 [ 714.125718][T26584] syz.1.8341[26584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 714.125778][T26584] syz.1.8341[26584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.103205][T26626] syz.4.8355[26626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.114687][T26626] syz.4.8355[26626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.127541][T26626] syz.4.8355[26626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.139648][T26626] syz.4.8355[26626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.417836][T26659] syz.2.8363[26659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.448226][T26659] syz.2.8363[26659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 717.271872][T26759] syz.2.8392[26759] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 717.359113][T26759] syz.2.8392[26759] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 717.398591][T26762] device veth1_macvtap left promiscuous mode [ 717.418015][T26762] device macsec0 entered promiscuous mode [ 717.597175][T26770] device veth0_vlan left promiscuous mode [ 717.623368][T26770] device veth0_vlan entered promiscuous mode [ 718.417035][T26809] device sit0 entered promiscuous mode [ 718.733048][T26816] device syzkaller0 entered promiscuous mode [ 718.893245][T26803] device syzkaller0 entered promiscuous mode [ 718.931105][T26822] device syzkaller0 entered promiscuous mode [ 718.937481][ T2977] syzkaller0: tun_net_xmit 48 [ 718.949094][T26822] syzkaller0: create flow: hash 3332040875 index 0 [ 719.019398][T26832] device veth0_vlan left promiscuous mode [ 719.041814][T26821] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 719.053465][T26832] device veth0_vlan entered promiscuous mode [ 719.163886][T26840] syzkaller0: create flow: hash 2167636728 index 0 [ 719.270500][T26830] device syzkaller0 entered promiscuous mode [ 719.318821][T26844] device wg2 left promiscuous mode [ 719.374882][ T2979] syzkaller0: tun_net_xmit 48 [ 719.448628][T26829] syzkaller0 (unregistered): delete flow: hash 2167636728 index 0 [ 719.592028][T26877] device syzkaller0 entered promiscuous mode [ 719.598382][T26884] syzkaller0: create flow: hash 3332040875 index 0 [ 719.620733][ T25] syzkaller0: tun_net_xmit 48 [ 719.694192][T26876] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 720.576517][T26967] device syzkaller0 entered promiscuous mode [ 721.040275][T27006] syz.2.8471[27006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 721.040324][T27006] syz.2.8471[27006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 721.178857][T27007] bridge0: port 2(bridge_slave_1) entered blocking state [ 721.196940][T27007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 721.204096][T27007] bridge0: port 1(bridge_slave_0) entered blocking state [ 721.210962][T27007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 721.220142][T27007] device bridge0 entered promiscuous mode [ 721.243343][T27014] device sit0 entered promiscuous mode [ 721.490023][T13074] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 721.810736][T27041] device pim6reg1 entered promiscuous mode [ 721.992854][ T24] audit: type=1400 audit(1722857535.030:182): avc: denied { create } for pid=27051 comm="syz.3.8489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 722.070964][T27067] device syzkaller0 entered promiscuous mode [ 722.083675][T13074] syzkaller0: tun_net_xmit 48 [ 722.100789][T27067] syzkaller0: create flow: hash 3332040875 index 0 [ 722.198784][T27066] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 722.265963][T27075] device pim6reg1 entered promiscuous mode [ 722.576639][T27102] device syzkaller0 entered promiscuous mode [ 722.588223][T27111] syz.1.8511[27111] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 722.588285][T27111] syz.1.8511[27111] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 722.591760][T27102] syzkaller0: create flow: hash 3332040875 index 0 [ 722.621564][ T2977] syzkaller0: tun_net_xmit 48 [ 722.688898][T27098] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 723.361725][T27163] device pim6reg1 entered promiscuous mode [ 723.370795][T27166] syz.4.8529[27166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 723.370850][T27166] syz.4.8529[27166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 725.666438][T27234] syzkaller0: create flow: hash 3332040875 index 0 [ 725.718639][T27233] device syzkaller0 entered promiscuous mode [ 725.778610][ T2984] syzkaller0: tun_net_xmit 48 [ 726.071431][T27232] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 726.287571][T27243] syz.3.8553[27243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 726.287633][T27243] syz.3.8553[27243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 726.624457][T27252] device syzkaller0 entered promiscuous mode [ 726.713315][T27257] device syzkaller0 entered promiscuous mode [ 726.846615][T27262] device veth0_vlan left promiscuous mode [ 726.855693][T27262] device veth0_vlan entered promiscuous mode [ 727.094114][T27270] bridge0: port 3(veth0_to_batadv) entered blocking state [ 727.107266][T27270] bridge0: port 3(veth0_to_batadv) entered disabled state [ 727.144219][T27270] device veth0_to_batadv entered promiscuous mode [ 727.229570][T27270] bridge0: port 3(veth0_to_batadv) entered blocking state [ 727.236553][T27270] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 727.830869][T27288] syz.4.8566[27288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 727.830918][T27288] syz.4.8566[27288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 728.642394][T27308] bridge0: port 3(veth0_to_batadv) entered disabled state [ 728.660609][T27308] bridge0: port 2(bridge_slave_1) entered disabled state [ 728.667589][T27308] bridge0: port 1(bridge_slave_0) entered disabled state [ 728.911459][T27313] bridge0: port 3(veth0_to_batadv) entered blocking state [ 728.918428][T27313] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 728.925680][T27313] bridge0: port 2(bridge_slave_1) entered blocking state [ 728.932547][T27313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 728.939632][T27313] bridge0: port 1(bridge_slave_0) entered blocking state [ 728.946407][T27313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 728.957447][T27313] device bridge0 entered promiscuous mode [ 729.080247][T27323] syz.2.8577[27323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 729.080305][T27323] syz.2.8577[27323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 729.444217][T27323] syz.2.8577[27323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 729.462695][T27323] syz.2.8577[27323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 729.479991][T27337] device sit0 left promiscuous mode [ 729.582873][T27336] device sit0 entered promiscuous mode [ 729.938073][T27347] device syzkaller0 entered promiscuous mode [ 730.167769][T27365] syz.1.8588[27365] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 730.167830][T27365] syz.1.8588[27365] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 730.847298][T27389] device syzkaller0 entered promiscuous mode [ 730.870077][ T563] syzkaller0: tun_net_xmit 48 [ 730.885501][T27389] syzkaller0: create flow: hash 3332040875 index 0 [ 730.969370][T27387] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 731.937699][T27452] device syzkaller0 entered promiscuous mode [ 731.947560][T27452] syzkaller0: create flow: hash 2167636728 index 0 [ 731.995332][ T561] syzkaller0: tun_net_xmit 48 [ 732.058751][T27451] syzkaller0 (unregistered): delete flow: hash 2167636728 index 0 [ 733.228839][T27513] syzkaller0: create flow: hash 3332040875 index 0 [ 733.341353][T27508] device syzkaller0 entered promiscuous mode [ 733.423814][ T563] syzkaller0: tun_net_xmit 48 [ 733.549178][T27507] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 733.895180][ T24] audit: type=1400 audit(1722857546.930:183): avc: denied { create } for pid=27526 comm="syz.4.8636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 734.022823][T27535] syz.4.8638[27535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 734.022879][T27535] syz.4.8638[27535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 734.556200][T27560] device veth0_to_batadv left promiscuous mode [ 734.573634][T27560] bridge0: port 3(veth0_to_batadv) entered disabled state [ 734.584349][T27558] device pim6reg1 entered promiscuous mode [ 735.553253][T27578] syz.0.8652[27578] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 735.553305][T27578] syz.0.8652[27578] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 735.984673][T27594] syz.0.8657[27594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 736.049234][T27594] syz.0.8657[27594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 736.099047][T27601] syz.0.8657[27601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 736.194094][T27601] syz.0.8657[27601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 736.208904][T27603] device wg2 entered promiscuous mode [ 736.443043][T27616] device syzkaller0 entered promiscuous mode [ 736.735834][T27631] device sit0 left promiscuous mode [ 736.981620][T27641] device sit0 entered promiscuous mode [ 737.046129][T27640] device sit0 entered promiscuous mode [ 738.686698][T27711] device veth0_to_batadv left promiscuous mode [ 738.726654][T27711] bridge0: port 3(veth0_to_batadv) entered disabled state [ 739.574285][T27726] device syzkaller0 entered promiscuous mode [ 740.759156][T27831] device macsec0 entered promiscuous mode [ 740.881194][T27840] device pim6reg1 entered promiscuous mode [ 741.368171][T27868] device syzkaller0 entered promiscuous mode [ 741.590050][T27880] device sit0 entered promiscuous mode [ 741.619466][T27878] syz.2.8739[27878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 741.619558][T27878] syz.2.8739[27878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 743.049119][T27946] device pim6reg1 entered promiscuous mode [ 743.121970][T27952] syz.3.8763[27952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 743.122032][T27952] syz.3.8763[27952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 745.051632][T28028] device syzkaller0 entered promiscuous mode [ 745.075962][T28028] syzkaller0: create flow: hash 3332040875 index 0 [ 745.094613][ T2617] syzkaller0: tun_net_xmit 48 [ 745.118226][T28033] device macsec0 left promiscuous mode [ 745.185408][T28039] device pim6reg1 entered promiscuous mode [ 745.228750][T28027] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 746.341688][T28082] bridge0: port 3(veth0_to_batadv) entered blocking state [ 746.353411][T28082] bridge0: port 3(veth0_to_batadv) entered disabled state [ 746.382691][T28082] device veth0_to_batadv entered promiscuous mode [ 746.389634][T28082] bridge0: port 3(veth0_to_batadv) entered blocking state [ 746.396600][T28082] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 746.430230][T28083] syzkaller0: create flow: hash 2167636728 index 0 [ 746.452746][T28079] device syzkaller0 entered promiscuous mode [ 746.678808][T28078] syzkaller0 (unregistered): delete flow: hash 2167636728 index 0 [ 747.362940][T28105] device syzkaller0 entered promiscuous mode [ 748.016924][T28114] device syzkaller0 entered promiscuous mode [ 748.397662][T28134] device syzkaller0 entered promiscuous mode [ 748.412183][T28134] syzkaller0: create flow: hash 3332040875 index 0 [ 748.498580][ T2617] syzkaller0: tun_net_xmit 48 [ 748.680046][T28137] device syzkaller0 entered promiscuous mode [ 748.699759][T28133] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 748.965124][T28149] device syzkaller0 entered promiscuous mode [ 749.503603][T28167] bridge0: port 1(bridge_slave_0) entered blocking state [ 749.510646][T28167] bridge0: port 1(bridge_slave_0) entered disabled state [ 749.517927][T28167] device bridge_slave_0 entered promiscuous mode [ 749.610981][T28167] bridge0: port 2(bridge_slave_1) entered blocking state [ 749.617846][T28167] bridge0: port 2(bridge_slave_1) entered disabled state [ 749.625458][T28167] device bridge_slave_1 entered promiscuous mode [ 750.391495][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 750.401059][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 750.409860][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 750.417100][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 750.424672][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 750.432996][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 750.441252][ T561] bridge0: port 1(bridge_slave_0) entered blocking state [ 750.448082][ T561] bridge0: port 1(bridge_slave_0) entered forwarding state [ 750.455750][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 750.464010][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 750.473289][ T561] bridge0: port 2(bridge_slave_1) entered blocking state [ 750.480142][ T561] bridge0: port 2(bridge_slave_1) entered forwarding state [ 750.553696][T28167] device veth0_vlan entered promiscuous mode [ 750.560034][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 750.568130][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 750.576361][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 750.583805][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 750.591288][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 750.649150][T28167] device veth1_macvtap entered promiscuous mode [ 750.655810][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 750.664512][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 750.672860][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 750.688790][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 750.696898][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 750.729281][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 750.737431][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 750.980934][T28188] device syzkaller0 entered promiscuous mode [ 751.000556][ T2632] syzkaller0: tun_net_xmit 48 [ 751.009477][T28188] syzkaller0: create flow: hash 3332040875 index 0 [ 751.043629][T28194] syz.2.8837[28194] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 751.043690][T28194] syz.2.8837[28194] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 751.100041][T28187] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 751.455508][T28207] device pim6reg1 entered promiscuous mode [ 751.473536][T28205] device syzkaller0 entered promiscuous mode [ 751.771403][ T110] device bridge_slave_1 left promiscuous mode [ 751.777616][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 751.790587][ T110] device bridge_slave_0 left promiscuous mode [ 751.796639][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 752.210071][T28225] device syzkaller0 entered promiscuous mode [ 752.256279][ T563] syzkaller0: tun_net_xmit 48 [ 752.313617][T28225] syzkaller0: create flow: hash 3332040875 index 0 [ 752.511959][T28224] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 752.988980][T28274] device sit0 left promiscuous mode [ 753.069268][T28271] device sit0 entered promiscuous mode [ 753.279740][T28284] device syzkaller0 entered promiscuous mode [ 753.303479][ T2984] syzkaller0: tun_net_xmit 48 [ 754.838834][T28325] device syzkaller0 entered promiscuous mode [ 755.143216][T28332] device syzkaller0 entered promiscuous mode [ 755.156791][T28332] syzkaller0: create flow: hash 3332040875 index 0 [ 755.165573][ T2617] syzkaller0: tun_net_xmit 48 [ 755.238635][T28331] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 755.547822][T28366] device syzkaller0 entered promiscuous mode [ 756.222854][T28379] syz.3.8900[28379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 756.222913][T28379] syz.3.8900[28379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 756.344527][T28381] device syzkaller0 entered promiscuous mode [ 756.364126][T28381] syzkaller0: create flow: hash 3332040875 index 0 [ 756.385883][T10172] syzkaller0: tun_net_xmit 48 [ 756.429023][T28380] syzkaller0 (unregistered): delete flow: hash 3332040875 index 0 [ 756.529062][T28385] device veth0_vlan left promiscuous mode [ 756.553575][T28385] device veth0_vlan entered promiscuous mode [ 756.595048][T10172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 756.603287][T10172] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 756.610833][T10172] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 758.170648][T28424] syz.2.8913[28424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 758.170707][T28424] syz.2.8913[28424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 759.359830][T28478] syz.4.8929[28478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 759.375738][T28464] device syzkaller0 entered promiscuous mode [ 759.393129][T28478] syz.4.8929[28478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 759.430837][ T2984] syzkaller0: tun_net_xmit 48 [ 760.182729][T28528] syz.1.8946[28528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 760.182790][T28528] syz.1.8946[28528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 761.452306][T28549] device veth0_to_team entered promiscuous mode [ 761.592998][T28565] syz.1.8959[28565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 761.593060][T28565] syz.1.8959[28565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 762.844932][T28636] device syzkaller0 entered promiscuous mode [ 763.082914][T28651] device veth1_macvtap left promiscuous mode [ 763.178515][T28651] device veth1_macvtap entered promiscuous mode [ 763.187352][T28651] device macsec0 entered promiscuous mode [ 763.453798][T28676] device veth0_vlan left promiscuous mode [ 763.469118][T28676] device veth0_vlan entered promiscuous mode [ 763.516043][T28679] syz_tun: tun_chr_ioctl cmd 2147767506 [ 763.764393][T28703] device veth1_macvtap left promiscuous mode [ 763.865169][T28709] device veth1_macvtap entered promiscuous mode [ 763.879071][T28709] device macsec0 entered promiscuous mode [ 765.025124][T28783] syz.4.9028[28783] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 765.025184][T28783] syz.4.9028[28783] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 765.143925][T28801] device veth1_macvtap left promiscuous mode [ 765.245249][T28801] device syzkaller0 entered promiscuous mode [ 765.712482][T28852] syz.4.9048[28852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 765.712543][T28852] syz.4.9048[28852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 766.285863][T28897] syz.2.9062[28897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 766.357516][T28897] syz.2.9062[28897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 767.036562][T28940] syz.4.9079[28940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 767.199030][T28940] syz.4.9079[28940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 768.177036][T28980] syz.3.9092[28980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 768.298986][T28980] syz.3.9092[28980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 769.470423][T29040] device pim6reg1 entered promiscuous mode [ 769.498190][T29046] syz.2.9112[29046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 769.498249][T29046] syz.2.9112[29046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 769.660652][T29061] device veth0_vlan left promiscuous mode [ 769.696108][T29061] device veth0_vlan entered promiscuous mode [ 769.858673][T29078] syz.4.9121[29078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 769.858725][T29078] syz.4.9121[29078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 769.860437][T29070] device vxcan1 entered promiscuous mode [ 770.879464][T29101] syz.2.9128[29101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 770.879526][T29101] syz.2.9128[29101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 771.546566][T29128] device syzkaller0 entered promiscuous mode [ 771.580042][T29128] syzkaller0: create flow: hash 2167636728 index 0 [ 771.629902][ T2979] syzkaller0: tun_net_xmit 48 [ 771.694196][T29127] syzkaller0 (unregistered): delete flow: hash 2167636728 index 0 [ 772.759018][T29148] device wg2 left promiscuous mode [ 774.230655][T29196] device veth0_vlan left promiscuous mode [ 774.329892][T29196] device veth0_vlan entered promiscuous mode [ 774.422810][T29205] syz.1.9162[29205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 774.422865][T29205] syz.1.9162[29205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 776.883814][T29257] device syzkaller0 entered promiscuous mode [ 777.182808][T29276] syz.0.9187[29276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 777.182872][T29276] syz.0.9187[29276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 777.245925][T29276] syz.0.9187[29276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 777.261737][T29276] syz.0.9187[29276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 780.843183][T29358] device syzkaller0 entered promiscuous mode [ 781.010398][T29372] syz.3.9215[29372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 781.010458][T29372] syz.3.9215[29372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 782.134038][T29408] device sit0 left promiscuous mode [ 782.268327][T29422] syz.1.9231[29422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 782.268387][T29422] syz.1.9231[29422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 782.414948][T29411] device sit0 entered promiscuous mode [ 782.856198][T29449] device syzkaller0 entered promiscuous mode [ 783.282609][T29461] device veth0_to_batadv left promiscuous mode [ 783.345725][T29461] bridge0: port 3(veth0_to_batadv) entered disabled state [ 783.497290][T29476] syz.1.9248[29476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 783.497351][T29476] syz.1.9248[29476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 784.045730][T29495] device syzkaller0 entered promiscuous mode [ 784.469156][T29504] device pim6reg1 entered promiscuous mode [ 785.042132][T29539] device syzkaller0 entered promiscuous mode [ 785.396623][T29544] device syzkaller0 entered promiscuous mode [ 785.497275][T29550] device sit0 left promiscuous mode [ 785.800603][T29570] device syzkaller0 entered promiscuous mode [ 786.167560][T29605] device pim6reg1 entered promiscuous mode [ 786.898321][T29626] device pim6reg1 entered promiscuous mode [ 787.032593][T29634] device syzkaller0 entered promiscuous mode [ 787.636895][T29666] device syzkaller0 entered promiscuous mode [ 788.156119][T29685] device syzkaller0 entered promiscuous mode [ 788.355991][T29695] device syzkaller0 entered promiscuous mode [ 788.370270][ T1710] syzkaller0: tun_net_xmit 48 [ 789.249301][T29742] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 789.835302][T29781] device syzkaller0 entered promiscuous mode [ 790.935596][T29810] device pim6reg1 entered promiscuous mode [ 791.210594][T29827] device syzkaller0 entered promiscuous mode [ 792.114115][T29845] syz.1.9372[29845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 792.114175][T29845] syz.1.9372[29845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 792.448258][T29854] syz.3.9376[29854] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 792.533721][T29854] syz.3.9376[29854] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 792.597461][T29858] device pim6reg1 entered promiscuous mode [ 792.633019][T29854] device sit0 left promiscuous mode [ 792.653522][T29854] syz.3.9376[29854] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 792.653580][T29854] syz.3.9376[29854] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 792.674115][T29854] device sit0 entered promiscuous mode [ 793.694055][T29895] syz.0.9388[29895] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 793.694126][T29895] syz.0.9388[29895] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 794.311788][T29937] syz.1.9400[29937] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 794.344460][T29937] syz.1.9400[29937] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 795.486300][T29994] device sit0 left promiscuous mode [ 796.631013][T30036] device sit0 left promiscuous mode [ 796.726121][T30036] device sit0 entered promiscuous mode [ 797.051540][T30037] device syzkaller0 entered promiscuous mode [ 798.386396][T30140] k: renamed from pim6reg1 [ 800.020439][T30231] device syzkaller0 entered promiscuous mode [ 800.186540][T30239] device syzkaller0 entered promiscuous mode [ 800.802628][T30269] bpf_get_probe_write_proto: 6 callbacks suppressed [ 800.802640][T30269] syz.1.9504[30269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 800.811156][T30269] syz.1.9504[30269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 801.483806][T30308] device pim6reg1 entered promiscuous mode [ 802.211992][T30336] syz.0.9521[30336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 802.212050][T30336] syz.0.9521[30336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 802.371592][T30344] FAULT_INJECTION: forcing a failure. [ 802.371592][T30344] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 802.551116][T30344] CPU: 1 PID: 30344 Comm: syz.4.9525 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 802.562304][T30344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 802.572192][T30344] Call Trace: [ 802.575344][T30344] dump_stack_lvl+0x1e2/0x24b [ 802.579836][T30344] ? bfq_pos_tree_add_move+0x43b/0x43b [ 802.585131][T30344] dump_stack+0x15/0x17 [ 802.589208][T30344] should_fail+0x3c6/0x510 [ 802.593465][T30344] should_fail_usercopy+0x1a/0x20 [ 802.598324][T30344] _copy_from_user+0x20/0xd0 [ 802.602752][T30344] generic_map_delete_batch+0x2d0/0x630 [ 802.608134][T30344] ? bpf_map_inc_not_zero+0x120/0x120 [ 802.613342][T30344] ? bpf_map_inc_not_zero+0x120/0x120 [ 802.618548][T30344] bpf_map_do_batch+0x4c3/0x620 [ 802.623235][T30344] __se_sys_bpf+0xc3c/0x11cb0 [ 802.627755][T30344] ? stack_trace_save+0x113/0x1c0 [ 802.632613][T30344] ? terminate_walk+0x407/0x4f0 [ 802.637300][T30344] ? stack_trace_snprint+0xf0/0xf0 [ 802.642243][T30344] ? kmem_cache_free+0xa9/0x1e0 [ 802.646930][T30344] ? kmem_cache_free+0xa9/0x1e0 [ 802.651614][T30344] ? kasan_set_track+0x5d/0x70 [ 802.656214][T30344] ? __x64_sys_bpf+0x90/0x90 [ 802.660641][T30344] ? __kasan_slab_free+0x11/0x20 [ 802.665412][T30344] ? slab_free_freelist_hook+0xc0/0x190 [ 802.670797][T30344] ? kmem_cache_free+0xa9/0x1e0 [ 802.675483][T30344] ? putname+0xe7/0x140 [ 802.679471][T30344] ? do_sys_openat2+0x1fc/0x710 [ 802.684157][T30344] ? __x64_sys_openat+0x243/0x290 [ 802.689021][T30344] ? do_syscall_64+0x34/0x70 [ 802.693450][T30344] ? _kstrtoull+0x3a0/0x4a0 [ 802.697797][T30344] ? kstrtouint_from_user+0x20a/0x2a0 [ 802.702996][T30344] ? kstrtol_from_user+0x310/0x310 [ 802.707943][T30344] ? memset+0x35/0x40 [ 802.711763][T30344] ? __fsnotify_parent+0x4b9/0x6c0 [ 802.716718][T30344] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 802.723307][T30344] ? proc_fail_nth_write+0x20b/0x290 [ 802.728425][T30344] ? proc_fail_nth_read+0x210/0x210 [ 802.733462][T30344] ? security_file_permission+0x86/0xb0 [ 802.738845][T30344] ? rw_verify_area+0x1c3/0x360 [ 802.743542][T30344] ? preempt_count_add+0x92/0x1a0 [ 802.748388][T30344] ? vfs_write+0x852/0xe70 [ 802.752644][T30344] ? kmem_cache_free+0xa9/0x1e0 [ 802.757333][T30344] ? kernel_write+0x3d0/0x3d0 [ 802.761842][T30344] ? __kasan_check_write+0x14/0x20 [ 802.766787][T30344] ? mutex_lock+0xa5/0x110 [ 802.771052][T30344] ? mutex_trylock+0xa0/0xa0 [ 802.775470][T30344] ? __kasan_check_write+0x14/0x20 [ 802.780415][T30344] ? fput_many+0x160/0x1b0 [ 802.784677][T30344] ? debug_smp_processor_id+0x17/0x20 [ 802.789877][T30344] __x64_sys_bpf+0x7b/0x90 [ 802.794131][T30344] do_syscall_64+0x34/0x70 [ 802.798381][T30344] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 802.804107][T30344] RIP: 0033:0x7f6cb3ea19f9 [ 802.808370][T30344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 802.827978][T30344] RSP: 002b:00007f6cb2b21048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 802.836308][T30344] RAX: ffffffffffffffda RBX: 00007f6cb402ff80 RCX: 00007f6cb3ea19f9 [ 802.844208][T30344] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 000000000000001b [ 802.852016][T30344] RBP: 00007f6cb2b210a0 R08: 0000000000000000 R09: 0000000000000000 [ 802.859829][T30344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 802.867640][T30344] R13: 000000000000000b R14: 00007f6cb402ff80 R15: 00007ffd4981b7d8 [ 803.466210][T30385] syz.1.9540[30385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 803.466268][T30385] syz.1.9540[30385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 803.599568][T30397] device syzkaller0 entered promiscuous mode [ 803.678350][T30398] device syzkaller0 entered promiscuous mode [ 804.728555][T30475] device syzkaller0 entered promiscuous mode [ 805.016025][T30482] device syzkaller0 entered promiscuous mode [ 805.155147][T30494] device sit0 left promiscuous mode [ 805.261472][T30494] device sit0 entered promiscuous mode [ 805.366898][T30510] FAULT_INJECTION: forcing a failure. [ 805.366898][T30510] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 805.548756][T30510] CPU: 1 PID: 30510 Comm: syz.3.9581 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 805.559954][T30510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 805.569955][T30510] Call Trace: [ 805.573094][T30510] dump_stack_lvl+0x1e2/0x24b [ 805.577605][T30510] ? bfq_pos_tree_add_move+0x43b/0x43b [ 805.582903][T30510] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 805.589490][T30510] ? proc_fail_nth_write+0x20b/0x290 [ 805.594702][T30510] dump_stack+0x15/0x17 [ 805.598690][T30510] should_fail+0x3c6/0x510 [ 805.602952][T30510] should_fail_usercopy+0x1a/0x20 [ 805.607808][T30510] _copy_from_user+0x20/0xd0 [ 805.612234][T30510] sock_do_ioctl+0x20e/0x3a0 [ 805.616658][T30510] ? sock_show_fdinfo+0xa0/0xa0 [ 805.621347][T30510] ? kernel_write+0x3d0/0x3d0 [ 805.625860][T30510] ? selinux_file_ioctl+0x3cc/0x540 [ 805.630894][T30510] sock_ioctl+0x4a6/0x760 [ 805.635058][T30510] ? sock_poll+0x340/0x340 [ 805.639315][T30510] ? security_file_ioctl+0x84/0xb0 [ 805.644258][T30510] ? sock_poll+0x340/0x340 [ 805.648513][T30510] __se_sys_ioctl+0x114/0x190 [ 805.653024][T30510] __x64_sys_ioctl+0x7b/0x90 [ 805.657451][T30510] do_syscall_64+0x34/0x70 [ 805.661707][T30510] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 805.667429][T30510] RIP: 0033:0x7f2aba4ea9f9 [ 805.671683][T30510] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 805.691136][T30510] RSP: 002b:00007f2ab916a048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 805.699368][T30510] RAX: ffffffffffffffda RBX: 00007f2aba678f80 RCX: 00007f2aba4ea9f9 [ 805.707179][T30510] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000007 [ 805.714990][T30510] RBP: 00007f2ab916a0a0 R08: 0000000000000000 R09: 0000000000000000 [ 805.722802][T30510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 805.730615][T30510] R13: 000000000000000b R14: 00007f2aba678f80 R15: 00007fffaed72848 [ 809.436913][T30733] device syzkaller0 entered promiscuous mode [ 809.788893][T30756] syz.0.9658[30756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 809.788949][T30756] syz.0.9658[30756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 810.106227][T30769] device syzkaller0 entered promiscuous mode [ 811.332776][T30834] syz.1.9686[30834] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 811.332837][T30834] syz.1.9686[30834] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 811.427391][T30836] bridge0: port 1(bridge_slave_0) entered blocking state [ 811.447161][T30836] bridge0: port 1(bridge_slave_0) entered disabled state [ 811.454975][T30836] device bridge_slave_0 entered promiscuous mode [ 811.467406][T30836] bridge0: port 2(bridge_slave_1) entered blocking state [ 811.474702][T30836] bridge0: port 2(bridge_slave_1) entered disabled state [ 811.482765][T30836] device bridge_slave_1 entered promiscuous mode [ 811.608110][T30836] bridge0: port 2(bridge_slave_1) entered blocking state [ 811.614998][T30836] bridge0: port 2(bridge_slave_1) entered forwarding state [ 811.622103][T30836] bridge0: port 1(bridge_slave_0) entered blocking state [ 811.628871][T30836] bridge0: port 1(bridge_slave_0) entered forwarding state [ 811.665745][T30856] device syzkaller0 entered promiscuous mode [ 811.687654][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 811.695443][ T2979] bridge0: port 1(bridge_slave_0) entered disabled state [ 811.705166][ T2979] bridge0: port 2(bridge_slave_1) entered disabled state [ 811.732863][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 811.741736][ T1710] bridge0: port 1(bridge_slave_0) entered blocking state [ 811.748604][ T1710] bridge0: port 1(bridge_slave_0) entered forwarding state [ 811.758934][ T1710] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 811.766979][ T1710] bridge0: port 2(bridge_slave_1) entered blocking state [ 811.773859][ T1710] bridge0: port 2(bridge_slave_1) entered forwarding state [ 811.845129][T30836] device veth0_vlan entered promiscuous mode [ 811.857723][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 811.866287][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 811.878438][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 811.886104][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 811.910494][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 811.918325][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 811.948093][T30836] device veth1_macvtap entered promiscuous mode [ 811.961787][ T2615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 811.988226][ T1240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 812.001838][ T1240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 812.139545][T30882] device pim6reg1 entered promiscuous mode [ 812.760038][ T110] device veth0_to_batadv left promiscuous mode [ 812.766144][ T110] bridge0: port 3(veth0_to_batadv) entered disabled state [ 812.778189][ T110] device bridge_slave_1 left promiscuous mode [ 812.785456][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 812.793165][ T110] device bridge_slave_0 left promiscuous mode [ 812.799652][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 812.816411][ T110] device veth1_macvtap left promiscuous mode [ 812.822900][ T110] device veth0_vlan left promiscuous mode [ 813.700108][T31020] device sit0 left promiscuous mode [ 814.174454][T31032] device syzkaller0 entered promiscuous mode [ 815.808362][T31131] device vxcan1 entered promiscuous mode [ 817.010692][T31204] device wg2 entered promiscuous mode [ 818.280249][T31244] bridge0: port 3(veth0_to_batadv) entered disabled state [ 818.287441][T31244] bridge0: port 2(bridge_slave_1) entered disabled state [ 818.294370][T31244] bridge0: port 1(bridge_slave_0) entered disabled state [ 818.422947][T31250] device syzkaller0 entered promiscuous mode [ 818.430148][T31247] Y4`Ҙ: renamed from lo [ 818.437971][T31243] bridge0: port 3(veth0_to_batadv) entered blocking state [ 818.445091][T31243] bridge0: port 3(veth0_to_batadv) entered listening state [ 818.454108][T31243] bridge0: port 2(bridge_slave_1) entered blocking state [ 818.461250][T31243] bridge0: port 2(bridge_slave_1) entered listening state [ 818.469519][T31243] bridge0: port 1(bridge_slave_0) entered blocking state [ 818.476990][T31243] bridge0: port 1(bridge_slave_0) entered listening state [ 818.500045][T31243] device bridge0 entered promiscuous mode [ 818.703525][T31281] bridge0: port 1(bridge_slave_0) entered disabled state [ 819.144196][T31328] device macsec0 entered promiscuous mode [ 819.378792][T31343] device veth0_vlan left promiscuous mode [ 819.475406][T31343] device veth0_vlan entered promiscuous mode [ 819.703731][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 819.727112][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 819.749909][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 820.458563][ C1] bridge0: port 3(veth0_to_batadv) entered learning state [ 820.538522][ C1] bridge0: port 1(bridge_slave_0) entered learning state [ 820.545443][ C1] bridge0: port 2(bridge_slave_1) entered learning state [ 821.605015][T31466] device syzkaller0 entered promiscuous mode [ 822.538500][ C1] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 822.545701][ C1] bridge0: topology change detected, propagating [ 822.608316][ T2611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 822.628502][ C1] bridge0: port 2(bridge_slave_1) entered forwarding state [ 822.635639][ C1] bridge0: topology change detected, propagating [ 822.641870][ C1] bridge0: port 1(bridge_slave_0) entered forwarding state [ 822.648830][ C1] bridge0: topology change detected, propagating [ 822.894233][T31508] device syzkaller0 entered promiscuous mode [ 823.321475][T31532] device sit0 entered promiscuous mode [ 823.350209][T31531] device pim6reg1 entered promiscuous mode [ 823.363403][T31539] device sit0 entered promiscuous mode [ 823.911119][T31575] device syzkaller0 entered promiscuous mode [ 823.945553][ T2615] syzkaller0: tun_net_xmit 48 [ 824.310607][T31600] syz.1.9927[31600] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 824.310670][T31600] syz.1.9927[31600] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 825.354900][T31639] device syzkaller0 entered promiscuous mode [ 825.419948][ T2615] syzkaller0: tun_net_xmit 48 [ 826.075687][T31690] device syzkaller0 entered promiscuous mode [ 826.084048][T13074] syzkaller0: tun_net_xmit 48 [ 826.973060][T31716] device sit0 entered promiscuous mode [ 829.909990][T31814] device sit0 left promiscuous mode [ 830.999923][T31859] bridge0: port 3(veth0_to_batadv) entered blocking state [ 831.025313][T31859] bridge0: port 3(veth0_to_batadv) entered disabled state [ 831.039295][T31859] device veth0_to_batadv entered promiscuous mode [ 831.045674][T31859] bridge0: port 3(veth0_to_batadv) entered blocking state [ 831.052630][T31859] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 831.370504][ T24] audit: type=1400 audit(1722857644.400:184): avc: denied { create } for pid=31879 comm="syz.4.10012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 831.640944][T31903] device sit0 left promiscuous mode [ 837.189657][ T312] device veth0_to_batadv left promiscuous mode [ 837.195758][ T312] bridge0: port 3(veth0_to_batadv) entered disabled state [ 837.203417][ T312] device bridge_slave_1 left promiscuous mode [ 837.209805][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 837.217468][ T312] device bridge_slave_0 left promiscuous mode [ 837.223823][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 837.232055][ T312] device veth0_vlan left promiscuous mode SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=1 req=10098 state=3 status=67 (errno 32: Broken pipe) [ 844.769232][ T312] device bridge_slave_1 left promiscuous mode [ 844.775224][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 844.782569][ T312] device bridge_slave_0 left promiscuous mode [ 844.788699][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 844.796340][ T312] device bridge_slave_1 left promiscuous mode [ 844.802486][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 844.809723][ T312] device bridge_slave_0 left promiscuous mode [ 844.815624][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 844.823433][ T312] device veth1_macvtap left promiscuous mode [ 844.829402][ T312] device veth1_macvtap left promiscuous mode