last executing test programs: 5.267410047s ago: executing program 1 (id=6088): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r1}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r3}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x13, &(0x7f0000000440)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32=r4, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 5.07205824s ago: executing program 1 (id=6089): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000000)={'geneve1\x00', 0x400}) (async) close(r2) (async) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'geneve1\x00', 0x400}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r5 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) (async) r6 = getpid() write$cgroup_pid(r5, &(0x7f00000001c0)=r6, 0x12) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) unlink(0x0) (async) close(r0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r7, r4}, 0xc) 4.918196602s ago: executing program 1 (id=6095): perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB="9feb010018000000000000007c0000007c00000002000000000000000000000000000600000d00000000000000000000000000000000000000000000000000000000000000000000000000120000000000000000000000000000000000000000000c00002000000000000000000900000000000000000000000900000000000000000000000a020000000000"], 0x0, 0x96, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x28, &(0x7f0000000680)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x80}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @call={0x85, 0x0, 0x0, 0xbd}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @jmp={0x5, 0x1, 0x4, 0x1, 0x2, 0x50, 0xffffffffffffffff}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000540)='syzkaller\x00', 0x8, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x65, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x104800}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r3) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.434093949s ago: executing program 1 (id=6098): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRESOCT=r0, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000, 0x2}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x80, 0xce, 0x9, 0x8, 0x0, 0x3, 0x40000, 0xf, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, @perf_config_ext={0x7}, 0x80, 0x9, 0x80000000, 0x3, 0x8, 0x4b942b90, 0x1, 0x0, 0x9, 0x0, 0x72}, r3, 0x7, r2, 0x3) write$cgroup_netprio_ifpriomap(r2, 0x0, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @exit, @initr0, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r4, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 3.965644665s ago: executing program 1 (id=6104): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000080900000001000000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, 0x0, &(0x7f0000000180)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000080)={0x1, 0x41, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x4156, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffff8, 0x1}, 0x12640, 0x0, 0xfffffffe, 0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000300)=[0x0], &(0x7f0000000500)=[0x0], 0x0, 0x29, &(0x7f0000000580)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x59, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x6, 0x4, 0x8, 0xc, 0x19040, 0xffffffffffffffff, 0x0, '\x00', r5, r3, 0x0, 0x0, 0x0, 0x0, @value=r3, @void, @value=r3}, 0x50) close(0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) syz_clone(0x22000, &(0x7f0000000c00)="059e2f84846085a148934ffe6d59b328eb9da129c47bf118815afdeede9c3664fb639f24fb77726f149b3996b9413aec0382f513f4e38c586bad858a88670812aa1035b9e2c726d3539338b829b4aa18f12e319ade3919d3680bf3933791900fdaf4eb6fa1f9298ec2fa3022720e67777e1d3cb20b81ca071c43b5784f57d235c917cec30f3a64af0a1abc585a5188415f1b3e672db1d1ab7b02a852df2727dde6247733b6915da0a07a72a05f19e5c810176f416ee30ffff0b223200ee974d164eebe3a566682c48bfc0cfe855c69f3fe1774b5fceab64f", 0xd8, &(0x7f0000000680), &(0x7f0000000940), &(0x7f0000000a00)="c1dca3ce380caeb5916551ced29e30862831c3786ccc27bd4cba3ba41f8f787e0923ff287c09a502fd4c07c9d6e7445e625e1d7abc649ef3e93a5a213299d28eb787e643ada43727f76a0ebef59f8e53cae321ac9c3f1e4381a863302f272863a8f5cb626405f92cf53bfe74fd6bc86e0437df68a95978658773758c7493d573") bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r8, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r9, &(0x7f0000000380), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x53, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 3.578211951s ago: executing program 1 (id=6106): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) socketpair(0x1e, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x3917) openat$cgroup_ro(r1, &(0x7f00000001c0)='cpuset.memory_pressure\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000007f1600850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) sendmsg$inet(r3, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$cgroup_pid(r1, &(0x7f0000000980), 0x20000992) mkdirat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x1ff) 2.985775148s ago: executing program 4 (id=6109): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0x5) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000060000000800000001"], 0x48) close(r4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb0107680ae4000000000018000000180000000400000000000000010000840000a0e70000000004000000ad83000000615b00"], &(0x7f0000000380)=""/146, 0x34, 0x92, 0x1, 0x0, 0x0, @void, @value}, 0x28) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0c00000004000000040000000000010000000000", @ANYRES32, @ANYBLOB="0000000000000000001e00000000000000000000fd7a31f76535b0e6ac00f24fdfe83ef447332001c7ae1f4671373f198f54a60209fc4fcec79b4fd2b1fadd36b938e5ce32e236", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000040300"/28], 0x48) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2b, 'cpu'}, {0x2d, 'pids'}]}, 0xb) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) (async) write$cgroup_subtree(r1, 0x0, 0x5) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000060000000800000001"], 0x48) (async) close(r4) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb0107680ae4000000000018000000180000000400000000000000010000840000a0e70000000004000000ad83000000615b00"], &(0x7f0000000380)=""/146, 0x34, 0x92, 0x1, 0x0, 0x0, @void, @value}, 0x28) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0c00000004000000040000000000010000000000", @ANYRES32, @ANYBLOB="0000000000000000001e00000000000000000000fd7a31f76535b0e6ac00f24fdfe83ef447332001c7ae1f4671373f198f54a60209fc4fcec79b4fd2b1fadd36b938e5ce32e236", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000040300"/28], 0x48) (async) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2b, 'cpu'}, {0x2d, 'pids'}]}, 0xb) (async) 2.933096429s ago: executing program 4 (id=6112): perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}}, 0x0, 0x96, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc0189436, 0x2000141a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x11}, 0x10020) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, r6, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8946, &(0x7f0000000080)) 2.518055195s ago: executing program 4 (id=6115): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0x1, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)={0x1b, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x3, &(0x7f00000002c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x7}], &(0x7f0000000300)='syzkaller\x00', 0x2, 0xb9, &(0x7f0000000400)=""/185, 0x41000, 0x5a, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x2, 0xa, 0x1, 0x1000}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000640)=[r1], &(0x7f0000000680)=[{0x5, 0x1, 0xe, 0x4}], 0x10, 0x3000000, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x9, 0x6, 0x7fe2, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r3, &(0x7f0000000080), 0x0}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/1664], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffffe, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='neigh_create\x00', r2, 0x0, 0x2}, 0x18) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000001580)='\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x702, 0xf, 0x0, &(0x7f0000000100)="e4eb89cf14efb3f160334470b8d491", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe40, 0x60000004, &(0x7f0000000100)="b9ff03076044238cb89e14f008000de0ffff00182000632f77fbac141412e000002062079f4b4d2f87e5feca6aab845013f2325f1a3903050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f90931dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) 2.453997226s ago: executing program 3 (id=6117): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, 0x0, &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x3, 0x8, 0x3, 0xd68}]}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 2.381659287s ago: executing program 0 (id=6121): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x4c, 0x1, 0x0, 0x0, 0x0, 0x210e, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8003, 0xaea}, 0x110104, 0x32, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x9) r1 = perf_event_open(&(0x7f0000000480)={0x4, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x900000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8}, 0x0, 0xffffffffffffffff, r0, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="162a677ac09706baa3c5b303a46760d06603aaf8b1c52ceee76268a20a932454046c938a6871d48b54f19eebc652a6d5e1a4b2095334a68d1420fbdb2d77361345b91348265bef4ec30deb8b4d5755c3e201c2ad5359606efc031e", @ANYRES8=r0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES8=r1, @ANYRESOCT=0x0], 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1e0000000800e9db000000b2fdffffff2f82662f", @ANYRES32=r3, @ANYBLOB="0400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400000005000000040000000f00"/24, @ANYRES32, @ANYBLOB], 0x50) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x40047451, 0x2000000c) r7 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r4}, 0x8) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb0100180000000000000027000040270000000a000000000000000000000700000000050000000100000f0300000002000000fbff285ec8fc0000db52c10000300061380030613000"], &(0x7f0000000580)=""/163, 0x4a, 0xa3, 0x0, 0x1, 0x10000, @value=r7}, 0x28) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, r8, 0x0, 0x40000000, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r10, &(0x7f0000000140)='io.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x10, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r9}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="823b821f17584b1d570000ff93cb03000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r11 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r11}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 2.288052608s ago: executing program 0 (id=6122): mkdir(&(0x7f0000000580)='./file0\x00', 0xaa) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x24, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0xb) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="9feb010018000000000000007c0000007c00000002000000000000000000000e000000002f000000000000000600000d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000000000000000000009000000000000000000000009000000000000000000000009020000000000"], 0x0, 0x96, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9f0000000c000c0000000200000000000000000000040000deff00"/36], &(0x7f00000005c0)=""/258, 0x26, 0x102, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000180)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_val, @exit]}, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) setsockopt$sock_attach_bpf(r3, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8913, &(0x7f0000001a80)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf\xc8>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r2, @ANYRES32=0x1, @ANYRES64=r0, @ANYRES16=r6, @ANYRES32=r5], 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89b0, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf\xc8>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b000000050000000273f1833abbff00000000000005008000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b708000000feffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) sendmsg$tipc(r4, &(0x7f0000000080)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x3}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x140400c0}, 0x2000081) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r8], 0x18}, 0x0) sendmsg$unix(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r8], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) close(r9) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="1900000004000000fcff00000000000000000000baa20a026eeb6469cdce81a65d16e3000fda28637a7b9554361ca0247cdefbeabf0428afd3aee839073eb80fc5c53b4efe1965be98fea471f788a03307db176b626a7a5f60795a6e515ebfa1331eaa21c4bdd8c20e80a8c922f45236aa219884fb2f938878aa4d20450d9ae53d5b15a70a081fd954b0929aba65706b7837bab52c6f36c61fee07bc7bf82571a76c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x17, 0xc, &(0x7f0000000580)=ANY=[@ANYRES8=r10], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0xc54c0000, 0x66, 0x3, 0x600, 0xffffffffffffffff, 0x3, '\x00', 0x0, r1, 0x3, 0x1, 0x4, 0x1, @void, @value, @void, @value}, 0x50) 1.720570296s ago: executing program 2 (id=6128): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000005c0)}, 0x20) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r4) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r6], 0x18}, 0x0) (async) sendmsg$unix(r4, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r6], 0x18}, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) (async) close(r6) close(r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x2e, &(0x7f00000000c0), 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xb, &(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYRESHEX=0x0, @ANYRES64=r0, @ANYRESDEC=r1, @ANYRESOCT=r0, @ANYRES8=r0, @ANYRES64=r1, @ANYRESDEC=r0, @ANYRESOCT=0x0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.701881466s ago: executing program 2 (id=6129): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) syz_clone(0x40000000, &(0x7f0000000280)="2a30053e1c3176348270ca8b9180188fc835645c38b5c342fa86e88edfa65351a46a96741fb8b27eb7a0bbf51c48d5e453c0f1988ab9e8ce16", 0x39, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000fcffffff18110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000100850000008600000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd8d}], 0x1}, 0x0) 1.614415527s ago: executing program 0 (id=6130): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='mm_page_alloc\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='io.stat\x00', 0x0, 0x0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x144, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={r0, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x11, 0x4, 0x4, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b00)={{r6}, &(0x7f0000000a80), &(0x7f0000000ac0)=r7}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r1, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f0000000740)=[0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xce, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0xb5, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@base={0x1, 0x9, 0x9, 0x7563, 0x5, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x7ff}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_lsm={0x1d, 0x13, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@cb_func={0x18, 0x8, 0x4, 0x0, 0x2}, @map_val={0x18, 0x5, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x67e}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000004c0)='syzkaller\x00', 0x328, 0x34, &(0x7f0000000540)=""/52, 0x41100, 0x30, '\x00', r5, 0x1b, r7, 0x8, &(0x7f0000000680)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0x5, 0x7, 0x200}, 0x10, r8, 0x0, 0x9, &(0x7f0000000b80)=[r9, r10], &(0x7f0000000bc0)=[{0x5, 0x5, 0x6, 0xb}, {0x4, 0x1, 0xe, 0x5}, {0x1, 0x4, 0xc, 0xb}, {0x0, 0x4, 0xe, 0x8}, {0x1, 0x3, 0xd, 0x2}, {0x1, 0x9, 0x10}, {0x0, 0x5, 0x8, 0x1}, {0x4, 0x5, 0x4, 0x8}, {0x1, 0x2, 0x2, 0x1}], 0x10, 0xe94, @void, @value}, 0x94) recvmsg$unix(r3, &(0x7f0000001580)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000d40)=""/135, 0x87}, {&(0x7f0000000e00)=""/42, 0x2a}, {&(0x7f0000000e40)=""/208, 0xd0}, {&(0x7f0000000f40)=""/215, 0xd7}, {&(0x7f0000001040)=""/213, 0xd5}, {&(0x7f0000001140)=""/147, 0x93}, {&(0x7f0000001200)=""/251, 0xfb}, {&(0x7f0000001300)=""/173, 0xad}], 0x8, &(0x7f0000001440)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x110}, 0x40000040) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r11) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$cgroup_devices(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="5e0308003c5ca601d77045"], 0xffdd) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r13}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r14}, 0xc) 1.232493943s ago: executing program 0 (id=6131): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c1300000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000048aa005e850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x8, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r8) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) 1.231861173s ago: executing program 3 (id=6132): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000cda9d1000000000000000100000000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x76) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000005c0)='fdb_delete\x00', r3}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x1c10a1, 0x0, 0x4a}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xf7, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) close(r0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f0000000300)={0x0, r0}, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xfffffffffffffd44, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r7}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kfree\x00', r9}, 0x10) close(0x4) 1.230737883s ago: executing program 2 (id=6133): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791095000000000062000009000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x4e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x800454e0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000040000000000000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) 616.063341ms ago: executing program 4 (id=6134): perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x40, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x80000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x1, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) (async) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) (async) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e408"], 0xfdef) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r6}, 0x18) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000001600000000000000000000007112190000000000950000000000000049bff45e93b11fa51b2615b5624b40c7ea63478c8b8a2cd8419139a97a9c859c6d075d8e7c9a8400d78dc6d9e9a8bbae7d33d7cf3c9674eac5a5ad0c174acf16db3c0fc4692ef713eae955c461edc4c69caf1b0b2f46798681aeb7113362f245b75583f4274d8566e4bd8184210edfd12d23673999db188efe1b14559f7e726dad04"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_clone(0x50001000, &(0x7f0000000380)="d1c4ff7500fcf354a0aebe04b87fd0af2726178aaf", 0x15, &(0x7f00000003c0), &(0x7f0000000500), &(0x7f00000006c0)="4fa4880a282aef4ec8b0981acb2b47df468cc2ebeb7c9943603213c93f40d65100153628be454a2f100ffa4e8fabb7506ffe8c70fc2fc8de8dcaac09b7a5a4f06b721d81473c1776a56ae326afa965002b5b583fe44b4a48b5a4b48d16ec1462d13cfbc5d050e8c3366b17ff1e6afb6731210dc8c6130a7f62341b091e082731a4125e9de6e4af379a8e987ace5e9e") syz_open_procfs$namespace(r7, &(0x7f0000000540)='ns/ipc\x00') (async) perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x7fffffffffffffff}, r7, 0x0, 0xffffffffffffffff, 0x0) 614.791611ms ago: executing program 0 (id=6135): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, 0x0, &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x3, 0x8, 0x3, 0xd68}]}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 275.486256ms ago: executing program 2 (id=6136): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) close(r0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/17], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0xfff5) 111.894768ms ago: executing program 3 (id=6137): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) (async) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async, rerun: 64) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (rerun: 64) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001000)='./cgroup/syz1\x00', 0x1ff) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x8200, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0xffff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=ANY=[@ANYBLOB="1b1e004144be16a41e67f9b268cc7349c36727653da635ffe698927260bbba59fa3f875c22c1c79d2d6cc6312e917688d47cc2de0211c5dda5b685c3793e65780c29b6ac317e84e8b74e3c98e34c1f5df88d5789a763014b2117f7be7b14599e12aae01d0d17343562e69781dfab94fabfc7a0a282143eed550bfc4d2c08117dd79809"], 0x48) (rerun: 64) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001400)={&(0x7f0000001040)='fsi_master_acf_poll_response_busy\x00', r2}, 0x18) (async, rerun: 32) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async, rerun: 32) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000012c0)={r1, 0xe0, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000001040), &(0x7f0000001080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xb6, &(0x7f00000010c0)=[{}, {}], 0x10, 0x10, &(0x7f0000001100), &(0x7f0000001140), 0x8, 0x5b, 0x8, 0x8, &(0x7f0000001180)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001300)={r4}, 0x4) (async, rerun: 32) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 40.172449ms ago: executing program 3 (id=6138): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0x60}, 0xc) 36.242069ms ago: executing program 0 (id=6139): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB="0000000000ffffffffffffffff18c000"/28, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYRESHEX=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r4 = perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x3, 0x0, 0x40, 0x0, 0x0, 0x1f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x7f}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x1) mkdir(0x0, 0x100) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000000001a000000000000006c00000000009500000000000000c49b23458dae42e10ba0bd3b39b5eb663ae903d46c6d00a463181efcec9c867cccf26a8581c85a071928df9742e76a62108e8fe07bf4f72806175fb697926f56852d135314a1d2e5b69a8fb925574ae6c85a906f2b09b728b808710e25f16110adb92d6b7ad7f2e6f6310a4d3502564a3a8903e909821664efea005342c4dda549dd14f9756fd5045422"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x3}, 0x8) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={0x0}, 0x18) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b000000416f5222910a00000000fe00bc000000800000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1801000000001f00000000000000ea1f850000007b00000095"], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x18, 0x14, &(0x7f0000001700)=ANY=[@ANYRES8=r4, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000001812000045f2826f446af4f82f0db29808e70c74d12f98c3e1a5e686f51eba55610d69cbdad34a8b86b751c25aba0af11d51eb2e3f5c8be4af38edc17d8111099219501381b3d59e9def0ab06c236f8813fb45b189f5860ea4bc943fc31b372cc4266cf8337576874f47", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000009500000000000000"], &(0x7f0000000800)='GPL\x00', 0x6000000, 0x22, &(0x7f0000000b40)=""/34, 0x41000, 0x52, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000b80)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000c40)=[0xffffffffffffffff, r7], &(0x7f0000000c80)=[{0x0, 0x4, 0xf, 0x2}, {0x4, 0x4, 0xb, 0x3}, {0x2, 0x2, 0x10, 0xc}, {0x5, 0x2, 0xa, 0x8}, {0x0, 0x2, 0x10}, {0x1, 0x3, 0x2, 0xb}, {0x2, 0x4, 0x0, 0x2}, {0x2, 0x3, 0x1, 0x7}, {0x1, 0x4, 0x4, 0x8}], 0x10, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r8}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r10) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r5, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r12}, 0x10) write$cgroup_subtree(r11, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r13, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="34cbf9c55466da0eadc249236ab3cbf316717306be4c08c8c7da1f1ee04ab4b4eac14995ebdf620ff778a4e3452587e42a3c6aa1bd35dfd99f23b525893bc3b5f9f3bed1986bf8d0dddd7c5cdada611f9bf641e421ed71a842d84fa289a542f941d6e06b2b14e2a706ce30acf7d82f224f3e30cadd9d15f3dddbb29dbeb9f68fb68bedb91e0b1ef48832778fe36699c7ebf101659a8f476c4a065eac71d6d1e7fafc6f25ec2c9a8f431fe347a2d30e912c5b2397613ce784637ec71e37566eb0548b461f71028459c6f137c18737d58b56949d022bf1eaf486692bb76836a233c7879d740ad0beaf5159d3380442824f536a41bb22d08fe53952b9c6fed2605d53311c71b455655f96ea6a87e41e9211e90170b0a2b1a2098175ebcd33d517085d224122264cddadd82a3d11bc4a33ce66108b22b1abc6243d306d8f6b8a2ddb5373c190d8f859a3174a200936b079f85edcac7fc03fb993ec0ff8b83f1fd3f1b888d192d99c7ede5d381784d25410cccf1b0bf26a54f065e1e3ec59cc5704fb658fc980a0ac4287ef884ee82007554be3f1e163c81468d0c26c95e3e12393776e32800bb4f086f19080c4fca3d72e8569a5627ce98f2ae0bdb3ec42c23847d47e10b1c58da7e9cea990da842d96e3a51ed7d892f7b28a10486424a69a9109ebd4d7d5a3768400ac000a6d7556ca192e5cd45efb82001ac7b53e03036b6019a07ffb545cd3853e077f08a015f6232488c1139a9409c95ed005261e36b307406ba5714ef395129345866109341feb6c7c458ce08c147a983b46375ddb3621cee0312ba1a434bcd6081e1a8ae8b6d518988b9965faf9aff86df8173b93342cceaec357a100e59b4d66553633626b0b12e9622b8f8fdfe26545b87c57f8ce8609fb8e19b0f6d1cd64e8de85c7327f543b2f38cf3086b57f85e1aaa4add723e4bc4e3ea2c27acec1e545ae3fc870bd42422f6eaf17a1f82699c9cadf224ea1e5d1705b49118d91cc3731aeed60e41bf15a9613aeda8e63a29bc7a95b2d993d23269a310b91f69d16a71243c0f4080d3359f5ddd63c7032bef14ab25eb7df4b28b2132bcbf94a281c8f5de79885a6d679f145fca292b599bb09a1864726d86b65d4781408320b968e2224c23ce7a56d8892970043737ae47f071aaeb219716bc21e3304e301eb5cd32aea951a70621eb870214a72e6c474c3a20f5bd8e089ba16326cc9a80a1a4f5f0e8f58629e20b1c73eb8af330744b187a5cfdb410466378313700ca44eb6dcbc8f3d70f58e134202546f0b1a3b61a298f2a1184b1533bdad308fa2f960087e0f239d2ccbaee3889ddc1a2bea2183b98854d255a6f708909134fab83f42f13e7604f602e264f4a3b2b2a08c673c7ce2813218159b472d3b20ecbf26dd2f7b3ba5298a4ff7444ea0936e098c126f590b05e7697ed8a3d52ba1abc7285de2f160b9b081cb775a5ab77aad1bb98d47e3da53fc4c11d4db47de1e4e6f56ad671f5d8389b33260cc546e4f0bf34fec9b2abd209e6b89e6e381367774676ed6e6eaffe42b07241c276f3c84f17a0762de83eb769bdf28991ddbc23758f01c9ecfba4ab2ca2118fcedd7adde9ff47f643c13e3ad2f13b576985128f233e329fe269d5745cd2b30e5762452a4ff58fdec30623175f8d575ced1c43411e2869aadbe6f1e79a010bca334cb08d545bc2808f359b7777d1bb5675ee210574b9f72cdeb071e07eeaa0988086213a37a972647cf21d3a3bcbd7359da327bacad41b93c5e0e494669109dddcec781774f248f5663e4fac187d42ffccf68335de2adac4f8d3e1bf04b95a9464960186ed019773ffeda18f9827a61edc5fc4088eb0965cb1bd8af1185aa3972b8f73839b4611e303bcbc1f84a330f60fa0a7795ea3cffe0e338406533e12c7deef0b5906c513eab4619a8f02fdd65dcfb7297ef971c4601ad079f7ad38278ae3ff455b37d5492af546975535450693fd4593c8157b3fdb16fd3a106d2f1509d1c06dabb8933269d790a1c5e5f7bdd4a57e1e670d7043cfed88c365b5f8eefe530ef7da5322df981723332c088fce89c2ceee23b420f64332243b9c606d67d538810a94e0ffbd37a119d8fc4d6caec0def40e62613873c74feabde63e12cb2016c1d35cf1bb95bf59e01a63be8825cb3118b74b106f21eef5ee2f41e5fb39fdde058050f780d98ced247c66fc3a03ba04edaf14d698859ba303d511cf0845dc5e269aef2287770a247fd5ae1299b45819ff41725f9da3e4dab7770eb83992b53ae9a9de69e764f6e3aee3e27cfb1bacf531a91605894ae209da6d25872fb54bf36b2ed450b51aa8ee4875b9bc7e55753f61e12a323d301faceb2ecff0686b1359343a94774a6a098dc2df440725cd8331f527d4e22f8090d8879ef4765849705b99465d7ebdf661b81c303d13b87270dc1f227d5954fcbc93bbce6fde2a1f8d573d9cd8130c173a14706f1e9dabc4d16a5b003dd3239faf91769e25cf007b0623141e4e57f11746cd62f20d73956fa84c6a12e1756b6671a64bd7a474ba425907e1a61ba6d2ffa1149165a713a141bfec0f1af51afebdb84d5f14eb51acc284403627d6ce48fd028dc04e00ed963de37f85d155c33e2b4ceb09044c4f1c7791348216b674a8831a232a638f8bfb396fabbe1f880944bc5dcac55df8abc78f804306c88617acfd4adfbb5a055d3d3e91abb763ad84e701cc5679498e04600570f4b2e57c70542043dc590ab363215e6ab3f0bd89383748783d01c9227229edac723d4e2eaa061a44f2630691f25ca6093775183fdf432e01322203dd654b336670116a6a52a27ff", 0x7d1}, {0x0}, {0x0}, {0x0}, {&(0x7f00000020c0)}], 0x5}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xf, 0x7, &(0x7f0000000680)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000522000085000000500000002f000000000000009500000000000000a800000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000840)=ANY=[@ANYRESDEC=r1, @ANYRESOCT=0x0, @ANYRESHEX=r10, @ANYRESHEX=r3], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r14}, 0x18) 26.317789ms ago: executing program 3 (id=6140): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000100000000000000", @ANYRES32, @ANYBLOB="0800000000000000000000000092814550da4b00cfb9a14bfb8eb9e65f0956806e06a2c0443a4173620f7a800e877f2b3970ef8e3a5866098c0664e9c2d253c49cfc7ddc5b89ac8775b2a6b102dbfa13aa375df88fee63afb47feccc87008d77d408df05c34bba4856acb3bae2845f505bb79e55af118c179171fd2cd6e27cc792e674fb93c420b9f8bc69f2d41e50f5b1e239f0d94bf47b65b12ad652f0687482b6577ead37d5f98c9dbd7c29ef17125912b66f962411cf", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000040000000200"/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000f00)={@cgroup, 0x10, 0x1, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f00000003c0)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000340)=""/115, 0x73}, {&(0x7f0000000540)=""/90, 0x5a}], 0x2}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x1, 0x5, 0x2, 0xffff, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x40001, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r6}, 0xc) 0s ago: executing program 2 (id=6141): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) bpf$MAP_CREATE(0x300000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000004000000410000000000000001000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000000000000000000000b478141e8f43197f5282ddf5a7cbe3d7d3aad5a84436861775efdf8563cf07c7dfaa8cc6d717911384a910eccd738f427d0a", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="034000000100"/28], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190000001400577b080000000000000020000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xff, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) kernel console output (not intermixed with test programs): netlink_xfrm_socket permissive=1 [ 258.731877][ T6760] syz.4.2146[6760] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.731935][ T6760] syz.4.2146[6760] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.813917][ T6766] device pim6reg1 entered promiscuous mode [ 259.142603][ T6778] device syzkaller0 entered promiscuous mode [ 259.416082][ T6791] device syzkaller0 entered promiscuous mode [ 261.053582][ T6825] device syzkaller0 entered promiscuous mode [ 261.084698][ T24] audit: type=1400 audit(1746818863.080:181): avc: denied { create } for pid=6822 comm="syz.4.2169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 261.205258][ T6831] geneve1: tun_chr_ioctl cmd 1074025672 [ 261.253651][ T6831] geneve1: ignored: set checksum enabled [ 263.830396][ T24] audit: type=1400 audit(1746818865.830:182): avc: denied { create } for pid=6856 comm="syz.2.2180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 264.241872][ T6871] device veth0_vlan left promiscuous mode [ 264.300364][ T6871] device veth0_vlan entered promiscuous mode [ 264.423812][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 264.447673][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 264.527982][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 264.886940][ T6879] device syzkaller0 entered promiscuous mode [ 265.358874][ T6942] device pim6reg1 entered promiscuous mode [ 266.518030][ T6955] device syzkaller0 entered promiscuous mode [ 266.945773][ T6965] device syzkaller0 entered promiscuous mode [ 269.408314][ T7008] device syzkaller0 entered promiscuous mode [ 276.567732][ T7076] device syzkaller0 entered promiscuous mode [ 277.176376][ T7088] device sit0 entered promiscuous mode [ 277.327464][ T7092] device veth0_vlan left promiscuous mode [ 277.341380][ T7092] device veth0_vlan entered promiscuous mode [ 277.430014][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 277.438479][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 277.446135][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 278.084186][ T7125] device syzkaller0 entered promiscuous mode [ 279.335486][ T7170] tap0: tun_chr_ioctl cmd 1074025677 [ 279.344648][ T7170] tap0: linktype set to 512 [ 282.004176][ T7204] device pim6reg1 entered promiscuous mode [ 282.296154][ T7214] device syzkaller0 entered promiscuous mode [ 282.561772][ T7227] device syzkaller0 entered promiscuous mode [ 283.142352][ T7250] device sit0 left promiscuous mode [ 283.174632][ T7251] device sit0 entered promiscuous mode [ 283.298919][ T24] audit: type=1400 audit(1746818885.300:183): avc: denied { create } for pid=7249 comm="syz.3.2311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 285.123876][ T24] audit: type=1400 audit(1746818887.120:184): avc: denied { create } for pid=7325 comm="syz.0.2331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 285.850095][ T24] audit: type=1400 audit(1746818887.850:185): avc: denied { write } for pid=7361 comm="syz.2.2340" name="net" dev="proc" ino=41542 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 285.915605][ T24] audit: type=1400 audit(1746818887.850:186): avc: denied { add_name } for pid=7361 comm="syz.2.2340" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 286.009364][ T24] audit: type=1400 audit(1746818887.850:187): avc: denied { create } for pid=7361 comm="syz.2.2340" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 286.103885][ T7362] device syzkaller0 entered promiscuous mode [ 286.112246][ T24] audit: type=1400 audit(1746818887.850:188): avc: denied { associate } for pid=7361 comm="syz.2.2340" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 286.585300][ T7397] device wg2 entered promiscuous mode [ 286.929822][ T7412] device wg2 entered promiscuous mode [ 287.721087][ T7453] device wg2 left promiscuous mode [ 290.067113][ T7507] device wg2 left promiscuous mode [ 290.234318][ T7507] device wg2 entered promiscuous mode [ 290.428275][ T24] audit: type=1400 audit(1746818892.430:189): avc: denied { create } for pid=7535 comm="syz.2.2401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 290.867966][ T7568] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.883474][ T7568] device bridge_slave_1 left promiscuous mode [ 290.890160][ T7568] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.898438][ T7568] device bridge_slave_0 left promiscuous mode [ 290.904698][ T7568] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.073106][ T7579] device veth0_vlan left promiscuous mode [ 291.081525][ T7579] device veth0_vlan entered promiscuous mode [ 291.108958][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 291.117586][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 291.125468][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 291.305849][ T7592] device syzkaller0 entered promiscuous mode [ 291.388308][ T7594] device syzkaller0 entered promiscuous mode [ 292.404049][ T7666] device syzkaller0 entered promiscuous mode [ 293.443019][ T7684] FAULT_INJECTION: forcing a failure. [ 293.443019][ T7684] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 293.457175][ T7684] CPU: 1 PID: 7684 Comm: syz.3.2451 Tainted: G W 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 293.468491][ T7684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 293.478745][ T7684] Call Trace: [ 293.482150][ T7684] __dump_stack+0x21/0x24 [ 293.486486][ T7684] dump_stack_lvl+0x169/0x1d8 [ 293.491460][ T7684] ? show_regs_print_info+0x18/0x18 [ 293.496835][ T7684] dump_stack+0x15/0x1c [ 293.500992][ T7684] should_fail+0x3c1/0x510 [ 293.505405][ T7684] should_fail_usercopy+0x1a/0x20 [ 293.510447][ T7684] _copy_from_user+0x20/0xd0 [ 293.515048][ T7684] sock_do_ioctl+0x1b2/0x330 [ 293.519688][ T7684] ? __kasan_slab_free+0x11/0x20 [ 293.524629][ T7684] ? sock_show_fdinfo+0xa0/0xa0 [ 293.530133][ T7684] ? selinux_file_ioctl+0x377/0x480 [ 293.535645][ T7684] ? mutex_trylock+0xa0/0xa0 [ 293.540572][ T7684] ? __fget_files+0x2c4/0x320 [ 293.545697][ T7684] sock_ioctl+0x504/0x710 [ 293.550289][ T7684] ? sock_poll+0x360/0x360 [ 293.554858][ T7684] ? __fget_files+0x2c4/0x320 [ 293.560185][ T7684] ? security_file_ioctl+0x84/0xa0 [ 293.565305][ T7684] ? sock_poll+0x360/0x360 [ 293.569994][ T7684] __se_sys_ioctl+0x121/0x1a0 [ 293.574722][ T7684] __x64_sys_ioctl+0x7b/0x90 [ 293.579317][ T7684] do_syscall_64+0x31/0x40 [ 293.583845][ T7684] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 293.590306][ T7684] RIP: 0033:0x7f7b412f9969 [ 293.595358][ T7684] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 293.617955][ T7684] RSP: 002b:00007f7b3f962038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 293.626888][ T7684] RAX: ffffffffffffffda RBX: 00007f7b41520fa0 RCX: 00007f7b412f9969 [ 293.636160][ T7684] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 0000000000000007 [ 293.645668][ T7684] RBP: 00007f7b3f962090 R08: 0000000000000000 R09: 0000000000000000 [ 293.656249][ T7684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 293.666168][ T7684] R13: 0000000000000000 R14: 00007f7b41520fa0 R15: 00007ffceead5928 [ 293.700831][ T7685] device syzkaller0 entered promiscuous mode [ 293.824262][ T7696] syz.0.2455 uses obsolete (PF_INET,SOCK_PACKET) [ 294.074898][ T7696] device syzkaller0 entered promiscuous mode [ 294.222228][ T7709] Â: renamed from pim6reg1 [ 294.250490][ T7711] ÿÿÿÿÿÿ: renamed from vlan1 [ 294.577990][ T24] audit: type=1400 audit(1746818896.580:190): avc: denied { read } for pid=7725 comm="syz.0.2464" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 294.620418][ T24] audit: type=1400 audit(1746818896.600:191): avc: denied { open } for pid=7725 comm="syz.0.2464" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 294.676653][ T7730] device wg2 entered promiscuous mode [ 294.978821][ T7756] device sit0 left promiscuous mode [ 295.125678][ T7764] device sit0 entered promiscuous mode [ 295.306604][ T7784] device vxcan1 entered promiscuous mode [ 295.598868][ T7812] device syzkaller0 entered promiscuous mode [ 295.672246][ T7822] device pim6reg1 entered promiscuous mode [ 295.976532][ T7843] device syzkaller0 entered promiscuous mode [ 295.984455][ T7843] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 296.123320][ T7856] device wg2 entered promiscuous mode [ 296.299913][ T7867] device syzkaller0 entered promiscuous mode [ 299.679790][ T7913] device wg2 left promiscuous mode [ 302.878766][ T7952] device syzkaller0 entered promiscuous mode [ 303.199201][ T7968] device syzkaller0 entered promiscuous mode [ 303.231896][ T7978] device syzkaller0 entered promiscuous mode [ 304.153201][ T8005] device pim6reg1 entered promiscuous mode [ 304.210065][ T8003] device syzkaller0 entered promiscuous mode [ 304.919510][ T8041] GPL: port 1(erspan0) entered blocking state [ 304.946818][ T8041] GPL: port 1(erspan0) entered disabled state [ 304.963336][ T8041] device erspan0 entered promiscuous mode [ 304.998729][ T8037] GPL: port 1(erspan0) entered blocking state [ 305.005032][ T8037] GPL: port 1(erspan0) entered forwarding state [ 305.175422][ T8045] device syzkaller0 entered promiscuous mode [ 309.906939][ T8143] device sit0 left promiscuous mode [ 309.930044][ T8143] device sit0 entered promiscuous mode [ 310.194646][ T8150] device syzkaller0 entered promiscuous mode [ 314.770718][ T8214] syz.1.2616[8214] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.770796][ T8214] syz.1.2616[8214] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.910384][ T8218] device pim6reg1 entered promiscuous mode [ 315.422701][ T8225] device syzkaller0 entered promiscuous mode [ 315.778001][ T8233] device syzkaller0 entered promiscuous mode [ 316.315555][ T24] audit: type=1400 audit(1746818918.310:192): avc: denied { ioctl } for pid=8236 comm="syz.2.2624" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 321.697451][ T8355] device syzkaller0 entered promiscuous mode [ 325.965349][ T8400] device syzkaller0 entered promiscuous mode [ 327.990757][ T8436] device syzkaller0 entered promiscuous mode [ 328.590352][ T8450] device syzkaller0 entered promiscuous mode [ 329.795950][ T95] udevd[95]: worker [8379] terminated by signal 33 (Unknown signal 33) [ 329.812935][ T95] udevd[95]: worker [8379] failed while handling '/devices/virtual/block/loop3' [ 330.920125][ T8490] device syzkaller0 entered promiscuous mode [ 331.020156][ T8492] device wg2 entered promiscuous mode [ 331.076309][ T8488] device wg2 left promiscuous mode [ 333.314764][ T8523] device syzkaller0 entered promiscuous mode [ 334.961815][ T8563] device macsec0 left promiscuous mode [ 335.253237][ T8579] device syzkaller0 entered promiscuous mode [ 336.426061][ T8633] device syzkaller0 entered promiscuous mode [ 338.636319][ T8749] device sit0 left promiscuous mode [ 338.672035][ T8754] device wg2 left promiscuous mode [ 338.841502][ T8763] device wg2 entered promiscuous mode [ 338.866925][ T8763] device sit0 entered promiscuous mode [ 346.818187][ T9002] device pim6reg1 entered promiscuous mode [ 350.723608][ T9067] device syzkaller0 entered promiscuous mode [ 352.481617][ T9141] device pim6reg1 entered promiscuous mode [ 353.536993][ T9178] device sit0 left promiscuous mode [ 354.964106][ T9240] device syzkaller0 entered promiscuous mode [ 355.104679][ T9242] device syzkaller0 entered promiscuous mode [ 355.145571][ T9250] syz.4.2946[9250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.145637][ T9250] syz.4.2946[9250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.260948][ T9296] syz.3.2960[9296] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.073880][ T9302] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.133760][ T9302] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.146984][ T9302] device bridge_slave_0 entered promiscuous mode [ 357.189388][ T9302] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.196474][ T9302] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.267527][ T9302] device bridge_slave_1 entered promiscuous mode [ 357.445729][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 357.453851][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 357.500198][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 357.508768][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 357.517381][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.524572][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.532309][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 357.541083][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 357.549482][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.556918][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.564339][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 357.618881][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 357.627038][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 357.685901][ T9337] device syzkaller0 entered promiscuous mode [ 357.741798][ T9302] device veth0_vlan entered promiscuous mode [ 357.776559][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 357.785621][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 357.796360][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 357.804432][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 357.818558][ T9302] device veth1_macvtap entered promiscuous mode [ 357.852953][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 357.876091][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 357.920561][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 358.683255][ T9377] device syzkaller0 entered promiscuous mode [ 358.794021][ T9360] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.811664][ T9360] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.875810][ T9360] device bridge_slave_0 entered promiscuous mode [ 358.939968][ T9360] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.948652][ T9360] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.956009][ T9360] device bridge_slave_1 entered promiscuous mode [ 359.008233][ T9360] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.015297][ T9360] bridge0: port 2(bridge_slave_1) entered forwarding state [ 359.022688][ T9360] bridge0: port 1(bridge_slave_0) entered blocking state [ 359.029767][ T9360] bridge0: port 1(bridge_slave_0) entered forwarding state [ 359.075768][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 359.084334][ T9365] bridge0: port 1(bridge_slave_0) entered disabled state [ 359.095504][ T9365] bridge0: port 2(bridge_slave_1) entered disabled state [ 359.126617][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 359.142409][ T9365] bridge0: port 1(bridge_slave_0) entered blocking state [ 359.149526][ T9365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 359.159794][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 359.168361][ T9365] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.175511][ T9365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 359.183281][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 359.230082][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 359.257600][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 359.266524][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 359.277863][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 359.285505][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 359.296870][ T9360] device veth0_vlan entered promiscuous mode [ 359.322699][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 359.338362][ T9360] device veth1_macvtap entered promiscuous mode [ 359.364981][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 359.383137][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 359.483884][ T9428] device syzkaller0 entered promiscuous mode [ 359.510341][ T290] GPL: port 1(erspan0) entered disabled state [ 359.557532][ T290] device erspan0 left promiscuous mode [ 359.582112][ T290] GPL: port 1(erspan0) entered disabled state [ 359.879341][ T9443] device syzkaller0 entered promiscuous mode [ 360.060755][ T290] device veth0_vlan left promiscuous mode [ 360.782789][ T9476] device syzkaller0 entered promiscuous mode [ 361.208558][ T9496] device sit0 left promiscuous mode [ 362.283992][ T9528] device pim6reg1 entered promiscuous mode [ 362.426786][ T9535] device syzkaller0 entered promiscuous mode [ 363.821964][ T9555] ªªªªªª: renamed from vlan0 [ 363.909377][ T9557] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.918993][ T9557] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.140222][ T9574] device veth1_macvtap left promiscuous mode [ 364.146777][ T9574] device macsec0 entered promiscuous mode [ 364.155399][ T9557] device bridge_slave_1 left promiscuous mode [ 364.168611][ T9557] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.191221][ T9557] device bridge_slave_0 left promiscuous mode [ 364.201254][ T9557] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.692182][ T9595] device syzkaller0 entered promiscuous mode [ 365.421570][ T9614] device veth1_macvtap entered promiscuous mode [ 365.430598][ T9614] device macsec0 entered promiscuous mode [ 365.548012][ T9622] device veth0_vlan left promiscuous mode [ 365.573707][ T9622] device veth0_vlan entered promiscuous mode [ 365.625526][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 365.650498][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 365.676441][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 365.701343][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 365.840119][ T9646] device wg2 left promiscuous mode [ 366.550242][ T9659] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.614591][ T9659] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.651700][ T9659] device bridge_slave_0 entered promiscuous mode [ 366.660338][ T9659] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.667703][ T9659] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.675359][ T9659] device bridge_slave_1 entered promiscuous mode [ 366.851203][ T9683] device syzkaller0 entered promiscuous mode [ 366.862554][ T9659] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.869842][ T9659] bridge0: port 2(bridge_slave_1) entered forwarding state [ 366.877339][ T9659] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.884666][ T9659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.113028][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.121419][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.595175][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 367.607646][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 367.678644][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 367.697464][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 367.721237][ T9365] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.728354][ T9365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.781205][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 367.850584][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 367.908964][ T9365] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.916096][ T9365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.010651][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 368.046108][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 368.054373][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 368.062602][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 368.077275][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 368.086236][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 368.131576][ T9659] device veth0_vlan entered promiscuous mode [ 368.171156][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 368.199803][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 368.308649][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 368.377042][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 368.459428][ T9659] device veth1_macvtap entered promiscuous mode [ 368.525972][ T9717] device syzkaller0 entered promiscuous mode [ 368.534349][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 368.543284][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 368.553374][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 368.776337][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 368.785875][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 368.894732][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 368.903827][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 369.550834][ T9751] device veth0_vlan left promiscuous mode [ 369.564359][ T9751] device veth0_vlan entered promiscuous mode [ 369.673818][ T9760] device syzkaller0 entered promiscuous mode [ 370.645249][ T9809] device syzkaller0 entered promiscuous mode [ 370.832842][ T9793] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.879765][ T9793] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.897559][ T9793] device bridge_slave_0 entered promiscuous mode [ 370.945733][ T9793] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.952998][ T9793] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.961360][ T9793] device bridge_slave_1 entered promiscuous mode [ 370.999820][ T9833] device pim6reg1 entered promiscuous mode [ 371.194836][ T9793] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.201951][ T9793] bridge0: port 2(bridge_slave_1) entered forwarding state [ 371.209253][ T9793] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.216314][ T9793] bridge0: port 1(bridge_slave_0) entered forwarding state [ 371.335902][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.359188][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.495979][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 371.505923][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 371.527016][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 371.536188][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 371.545095][ T344] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.552201][ T344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 371.574873][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 371.583816][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 371.648901][ T344] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.656031][ T344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 371.678385][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 371.692768][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 371.707094][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 371.722341][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 371.820848][ T9860] device syzkaller0 entered promiscuous mode [ 371.887430][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 371.900197][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 371.923435][ T9793] device veth0_vlan entered promiscuous mode [ 371.963988][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 371.974639][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 372.002119][ T9793] device veth1_macvtap entered promiscuous mode [ 372.018828][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 372.031384][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 372.048351][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 372.065842][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 372.083921][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 372.159356][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 372.193940][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 372.260568][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 372.326926][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 372.466932][ T9884] device syzkaller0 entered promiscuous mode [ 372.716062][ T290] device veth1_macvtap left promiscuous mode [ 372.726096][ T290] device veth0_vlan left promiscuous mode [ 373.341357][ T9922] device pim6reg1 entered promiscuous mode [ 373.620000][ T9930] device sit0 entered promiscuous mode [ 374.799206][ T9981] device syzkaller0 entered promiscuous mode [ 376.070858][T10032] device pim6reg1 entered promiscuous mode [ 376.147283][T10032] device veth0_vlan left promiscuous mode [ 376.161116][T10032] device veth0_vlan entered promiscuous mode [ 376.176444][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 376.188499][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 376.211504][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 376.458257][T10043] device syzkaller0 entered promiscuous mode [ 380.176850][T10138] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 380.540369][T10146] 7B’ç÷ï: renamed from syzkaller0 [ 380.976117][T10177] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.167597][T10183] device syzkaller0 entered promiscuous mode [ 382.275373][T10212] device veth0_vlan left promiscuous mode [ 382.290793][T10212] device veth0_vlan entered promiscuous mode [ 382.820101][T10235] device syzkaller0 entered promiscuous mode [ 383.464702][T10276] device pim6reg1 entered promiscuous mode [ 384.039114][T10295] device pim6reg1 entered promiscuous mode [ 384.386922][T10305] device syzkaller0 entered promiscuous mode [ 384.472304][T10309] device syzkaller0 entered promiscuous mode [ 384.832752][ T1100] syzkaller0: tun_net_xmit 48 [ 384.863941][T10320] device syzkaller0 entered promiscuous mode [ 385.819538][T10362] device syzkaller0 entered promiscuous mode [ 386.942815][T10430] device pim6reg1 entered promiscuous mode [ 388.349597][T10477] device syzkaller0 entered promiscuous mode [ 388.994662][T10487] device syzkaller0 entered promiscuous mode [ 389.082354][T10498] device syzkaller0 entered promiscuous mode [ 389.411478][T10511] syz.2.3321[10511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 389.411562][T10511] syz.2.3321[10511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 389.462799][T10509] device syzkaller0 entered promiscuous mode [ 390.094756][T10539] device pim6reg1 entered promiscuous mode [ 390.472100][T10545] device veth1_macvtap left promiscuous mode [ 390.580128][T10551] device veth1_macvtap entered promiscuous mode [ 390.625607][T10551] device macsec0 entered promiscuous mode [ 391.457207][T10576] syz.0.3341[10576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.457267][T10576] syz.0.3341[10576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.392219][T10666] device sit0 left promiscuous mode [ 397.802681][T10688] device syzkaller0 entered promiscuous mode [ 399.382771][T10749] device sit0 entered promiscuous mode [ 400.771827][T10790] device wg2 entered promiscuous mode [ 401.232086][T10801] device sit0 left promiscuous mode [ 402.499392][T10845] device syzkaller0 entered promiscuous mode [ 402.610718][T10862] device pim6reg1 entered promiscuous mode [ 402.643420][T10864] device pim6reg1 entered promiscuous mode [ 402.706999][T10862] device macsec0 left promiscuous mode [ 403.051892][T10905] device veth0_vlan left promiscuous mode [ 403.109508][T10905] device veth0_vlan entered promiscuous mode [ 403.207988][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 403.246506][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 403.302871][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 403.492731][T10923] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.500150][T10923] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.889860][T10938] device sit0 entered promiscuous mode [ 405.809121][T11056] GPL: port 1(erspan0) entered blocking state [ 405.816457][T11056] GPL: port 1(erspan0) entered disabled state [ 405.824433][T11056] device erspan0 entered promiscuous mode [ 405.831940][T11056] GPL: port 1(erspan0) entered blocking state [ 405.838143][T11056] GPL: port 1(erspan0) entered forwarding state [ 405.960664][T11072] FAULT_INJECTION: forcing a failure. [ 405.960664][T11072] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 405.973889][T11072] CPU: 0 PID: 11072 Comm: syz.3.3493 Tainted: G W 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 405.985432][T11072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 405.995570][T11072] Call Trace: [ 405.998889][T11072] __dump_stack+0x21/0x24 [ 406.003212][T11072] dump_stack_lvl+0x169/0x1d8 [ 406.007876][T11072] ? thaw_kernel_threads+0x220/0x220 [ 406.013271][T11072] ? vsnprintf+0x1871/0x1960 [ 406.018118][T11072] ? show_regs_print_info+0x18/0x18 [ 406.023316][T11072] dump_stack+0x15/0x1c [ 406.027506][T11072] should_fail+0x3c1/0x510 [ 406.031911][T11072] should_fail_usercopy+0x1a/0x20 [ 406.036923][T11072] _copy_to_user+0x20/0x90 [ 406.041328][T11072] simple_read_from_buffer+0xe9/0x160 [ 406.047023][T11072] proc_fail_nth_read+0x19a/0x210 [ 406.052045][T11072] ? proc_fault_inject_write+0x2f0/0x2f0 [ 406.057695][T11072] ? rw_verify_area+0x1c0/0x360 [ 406.062652][T11072] ? proc_fault_inject_write+0x2f0/0x2f0 [ 406.068290][T11072] vfs_read+0x1fe/0xa10 [ 406.072440][T11072] ? kernel_read+0x70/0x70 [ 406.076865][T11072] ? __kasan_check_write+0x14/0x20 [ 406.081981][T11072] ? mutex_lock+0x8c/0xe0 [ 406.086868][T11072] ? mutex_trylock+0xa0/0xa0 [ 406.091451][T11072] ? __fget_files+0x2c4/0x320 [ 406.096125][T11072] ? __fdget_pos+0x2d2/0x380 [ 406.100993][T11072] ? ksys_read+0x71/0x240 [ 406.105315][T11072] ksys_read+0x140/0x240 [ 406.109572][T11072] ? vfs_write+0xd60/0xd60 [ 406.113990][T11072] ? ____fput+0x15/0x20 [ 406.118149][T11072] __x64_sys_read+0x7b/0x90 [ 406.122643][T11072] do_syscall_64+0x31/0x40 [ 406.127056][T11072] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 406.132957][T11072] RIP: 0033:0x7f9b9d9f137c [ 406.137364][T11072] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 406.157043][T11072] RSP: 002b:00007f9b9c05b030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 406.165461][T11072] RAX: ffffffffffffffda RBX: 00007f9b9dc19fa0 RCX: 00007f9b9d9f137c [ 406.173436][T11072] RDX: 000000000000000f RSI: 00007f9b9c05b0a0 RDI: 0000000000000009 [ 406.181410][T11072] RBP: 00007f9b9c05b090 R08: 0000000000000000 R09: 0000000000000000 [ 406.189373][T11072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 406.197454][T11072] R13: 0000000000000000 R14: 00007f9b9dc19fa0 R15: 00007ffc9ee59818 [ 406.443169][T11084] device pim6reg1 entered promiscuous mode [ 406.470284][T11086] device wg2 entered promiscuous mode [ 408.360906][T11175] device veth1_macvtap left promiscuous mode [ 408.643736][T11194] device syzkaller0 entered promiscuous mode [ 408.889719][T11205] device veth0_vlan left promiscuous mode [ 408.962880][T11205] device veth0_vlan entered promiscuous mode [ 409.227688][ T24] audit: type=1400 audit(1746819011.230:193): avc: denied { create } for pid=11209 comm="syz.3.3538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 409.936781][T11245] device pim6reg1 entered promiscuous mode [ 410.403499][T11266] device syzkaller0 entered promiscuous mode [ 411.089538][T11321] device syzkaller0 entered promiscuous mode [ 412.644065][T11389] device wg2 left promiscuous mode [ 412.859614][T11421] syz.1.3602[11421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.859735][T11421] syz.1.3602[11421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.965633][T11415] device syzkaller0 entered promiscuous mode [ 413.036773][T11421] syz.1.3602[11421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.038791][T11421] syz.1.3602[11421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.572726][T11436] device veth0_vlan left promiscuous mode [ 413.607943][T11436] device veth0_vlan entered promiscuous mode [ 413.813977][T11438] device veth1_macvtap left promiscuous mode [ 413.957226][T11444] device pim6reg1 entered promiscuous mode [ 415.118424][T11488] device syzkaller0 entered promiscuous mode [ 415.251588][T11489] device syzkaller0 entered promiscuous mode [ 415.354740][T11496] device syzkaller0 entered promiscuous mode [ 416.045808][T11507] device syzkaller0 entered promiscuous mode [ 416.753741][T11524] device pim6reg1 entered promiscuous mode [ 416.954589][T11524] device veth0_vlan left promiscuous mode [ 416.970696][T11524] device veth0_vlan entered promiscuous mode [ 417.006140][T11531] device syzkaller0 entered promiscuous mode [ 417.028723][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 417.038316][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 417.045973][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 419.143120][T11591] device syzkaller0 entered promiscuous mode [ 420.013436][T11641] device syzkaller0 entered promiscuous mode [ 420.229160][T11649] device veth0_vlan left promiscuous mode [ 420.265595][T11649] device veth0_vlan entered promiscuous mode [ 422.930553][T11718] device syzkaller0 entered promiscuous mode [ 423.649331][T11730] device syzkaller0 entered promiscuous mode [ 423.887194][T11742] device syzkaller0 entered promiscuous mode [ 424.021805][T11759] device syzkaller0 entered promiscuous mode [ 424.150598][T11761] device syzkaller0 entered promiscuous mode [ 424.207350][T11770] : port 1(ip6gretap0) entered blocking state [ 424.213705][T11770] : port 1(ip6gretap0) entered disabled state [ 424.221507][T11770] device ip6gretap0 entered promiscuous mode [ 425.202190][T11821] device veth0_vlan left promiscuous mode [ 425.208169][T11821] device veth0_vlan entered promiscuous mode [ 425.625583][T11842] device pim6reg1 entered promiscuous mode [ 425.765247][ T24] audit: type=1400 audit(1746819027.760:194): avc: denied { read } for pid=11855 comm="syz.4.3742" name="cgroup.subtree_control" dev="cgroup2" ino=233 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 426.651403][T11875] device syzkaller0 entered promiscuous mode [ 430.914808][T11911] device syzkaller0 entered promiscuous mode [ 431.078851][T11923] device syzkaller0 entered promiscuous mode [ 431.120186][T11924] device pim6reg1 entered promiscuous mode [ 432.577896][T11964] ÿÿÿÿÿÿ: renamed from vlan1 [ 432.835737][T11990] device syzkaller0 entered promiscuous mode [ 434.427615][T12079] device pim6reg1 entered promiscuous mode [ 435.287150][T12105] device sit0 entered promiscuous mode [ 438.297488][T12196] device syzkaller0 entered promiscuous mode [ 439.263202][T12234] device pim6reg1 entered promiscuous mode [ 439.636630][T12250] device veth0_to_team entered promiscuous mode [ 440.030394][T12256] device sit0 entered promiscuous mode [ 440.390109][T12299] ip6erspan0: tun_chr_ioctl cmd 1074025677 [ 440.408559][T12299] ip6erspan0: linktype set to 805 [ 440.882475][T12324] device syzkaller0 entered promiscuous mode [ 440.927083][T12330] FAULT_INJECTION: forcing a failure. [ 440.927083][T12330] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 440.946361][T12330] CPU: 0 PID: 12330 Comm: syz.1.3887 Tainted: G W 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 440.957769][T12330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 440.968180][T12330] Call Trace: [ 440.971495][T12330] __dump_stack+0x21/0x24 [ 440.975828][T12330] dump_stack_lvl+0x169/0x1d8 [ 440.980509][T12330] ? show_regs_print_info+0x18/0x18 [ 440.985698][T12330] ? stack_trace_save+0x98/0xe0 [ 440.990681][T12330] dump_stack+0x15/0x1c [ 440.994835][T12330] should_fail+0x3c1/0x510 [ 440.999248][T12330] should_fail_usercopy+0x1a/0x20 [ 441.004281][T12330] _copy_from_user+0x20/0xd0 [ 441.008990][T12330] __copy_msghdr_from_user+0xaf/0x5e0 [ 441.014399][T12330] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 441.019829][T12330] ? __fsnotify_parent+0x5f5/0x6c0 [ 441.024964][T12330] ___sys_sendmsg+0x156/0x260 [ 441.029657][T12330] ? __sys_sendmsg+0x250/0x250 [ 441.034437][T12330] ? rw_verify_area+0x1c0/0x360 [ 441.039335][T12330] ? __fdget+0x1a1/0x230 [ 441.043610][T12330] __x64_sys_sendmsg+0x1e2/0x2a0 [ 441.048547][T12330] ? fput+0x1a/0x20 [ 441.052378][T12330] ? ___sys_sendmsg+0x260/0x260 [ 441.057244][T12330] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 441.063313][T12330] do_syscall_64+0x31/0x40 [ 441.067735][T12330] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 441.073630][T12330] RIP: 0033:0x7f423cbcd969 [ 441.078048][T12330] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 441.097659][T12330] RSP: 002b:00007f423b236038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 441.106294][T12330] RAX: ffffffffffffffda RBX: 00007f423cdf4fa0 RCX: 00007f423cbcd969 [ 441.114567][T12330] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000004 [ 441.122546][T12330] RBP: 00007f423b236090 R08: 0000000000000000 R09: 0000000000000000 [ 441.130521][T12330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 441.138493][T12330] R13: 0000000000000000 R14: 00007f423cdf4fa0 R15: 00007ffe90b94788 [ 441.456034][ T24] audit: type=1400 audit(1746819043.450:195): avc: denied { create } for pid=12353 comm="syz.0.3895" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 441.619240][T12364] device syzkaller0 entered promiscuous mode [ 441.689410][T12369] FAULT_INJECTION: forcing a failure. [ 441.689410][T12369] name failslab, interval 1, probability 0, space 0, times 0 [ 441.707344][T12369] CPU: 0 PID: 12369 Comm: syz.3.3900 Tainted: G W 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 441.718884][T12369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 441.729121][T12369] Call Trace: [ 441.732422][T12369] __dump_stack+0x21/0x24 [ 441.736752][T12369] dump_stack_lvl+0x169/0x1d8 [ 441.741429][T12369] ? thaw_kernel_threads+0x220/0x220 [ 441.746716][T12369] ? slab_post_alloc_hook+0x5d/0x2f0 [ 441.751999][T12369] ? show_regs_print_info+0x18/0x18 [ 441.757193][T12369] ? new_inode_pseudo+0x91/0x210 [ 441.762129][T12369] ? proc_pid_make_inode+0x27/0x1d0 [ 441.767330][T12369] ? proc_pident_instantiate+0x69/0x2b0 [ 441.772877][T12369] ? proc_pident_lookup+0x1c0/0x270 [ 441.778082][T12369] ? path_openat+0x1127/0x3160 [ 441.782845][T12369] ? do_filp_open+0x1b3/0x3e0 [ 441.787521][T12369] ? do_sys_openat2+0x14c/0x6d0 [ 441.792393][T12369] dump_stack+0x15/0x1c [ 441.796570][T12369] should_fail+0x3c1/0x510 [ 441.801095][T12369] ? __alloc_skb+0x9e/0x520 [ 441.805611][T12369] __should_failslab+0xa4/0xe0 [ 441.810377][T12369] should_failslab+0x9/0x20 [ 441.814887][T12369] kmem_cache_alloc+0x3d/0x2e0 [ 441.819660][T12369] __alloc_skb+0x9e/0x520 [ 441.823994][T12369] ? avc_has_perm+0x234/0x360 [ 441.828679][T12369] tipc_msg_build+0xd0/0xc90 [ 441.833273][T12369] ? avc_has_perm_noaudit+0x240/0x240 [ 441.838653][T12369] __tipc_sendstream+0x93f/0x1740 [ 441.843709][T12369] ? tsk_advance_rx_queue+0x700/0x700 [ 441.849179][T12369] ? wait_woken+0x180/0x180 [ 441.853709][T12369] tipc_sendstream+0x55/0x70 [ 441.858310][T12369] ? tipc_getsockopt+0x4c0/0x4c0 [ 441.863289][T12369] ____sys_sendmsg+0x5a2/0x8c0 [ 441.868073][T12369] ? __sys_sendmsg_sock+0x40/0x40 [ 441.873101][T12369] ? import_iovec+0x7c/0xb0 [ 441.877636][T12369] ___sys_sendmsg+0x1f0/0x260 [ 441.882336][T12369] ? __sys_sendmsg+0x250/0x250 [ 441.887139][T12369] ? rw_verify_area+0x1c0/0x360 [ 441.892016][T12369] ? __fdget+0x1a1/0x230 [ 441.896270][T12369] __x64_sys_sendmsg+0x1e2/0x2a0 [ 441.901207][T12369] ? fput+0x1a/0x20 [ 441.905019][T12369] ? ___sys_sendmsg+0x260/0x260 [ 441.909929][T12369] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 441.916014][T12369] do_syscall_64+0x31/0x40 [ 441.920437][T12369] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 441.926326][T12369] RIP: 0033:0x7f9b9d9f2969 [ 441.930756][T12369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 441.950563][T12369] RSP: 002b:00007f9b9c05b038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 441.958986][T12369] RAX: ffffffffffffffda RBX: 00007f9b9dc19fa0 RCX: 00007f9b9d9f2969 [ 441.966961][T12369] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000004 [ 441.974935][T12369] RBP: 00007f9b9c05b090 R08: 0000000000000000 R09: 0000000000000000 [ 441.982992][T12369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 441.991049][T12369] R13: 0000000000000000 R14: 00007f9b9dc19fa0 R15: 00007ffc9ee59818 [ 442.462581][T12381] device sit0 left promiscuous mode [ 442.553745][T12382] device sit0 entered promiscuous mode [ 443.080581][T12392] device veth0_vlan left promiscuous mode [ 443.091487][T12392] device veth0_vlan entered promiscuous mode [ 443.616468][T12411] FAULT_INJECTION: forcing a failure. [ 443.616468][T12411] name failslab, interval 1, probability 0, space 0, times 0 [ 443.666091][T12411] CPU: 1 PID: 12411 Comm: syz.4.3913 Tainted: G W 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 443.677499][T12411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 443.687560][T12411] Call Trace: [ 443.690865][T12411] __dump_stack+0x21/0x24 [ 443.695210][T12411] dump_stack_lvl+0x169/0x1d8 [ 443.699900][T12411] ? show_regs_print_info+0x18/0x18 [ 443.705113][T12411] dump_stack+0x15/0x1c [ 443.709273][T12411] should_fail+0x3c1/0x510 [ 443.713693][T12411] ? tipc_msg_build+0xd0/0xc90 [ 443.718563][T12411] __should_failslab+0xa4/0xe0 [ 443.723334][T12411] should_failslab+0x9/0x20 [ 443.727846][T12411] __kmalloc_track_caller+0x5f/0x320 [ 443.733137][T12411] ? kmem_cache_alloc+0x165/0x2e0 [ 443.738162][T12411] ? __alloc_skb+0x9e/0x520 [ 443.742672][T12411] ? tipc_msg_build+0xd0/0xc90 [ 443.747440][T12411] __alloc_skb+0xdc/0x520 [ 443.751772][T12411] ? avc_has_perm+0x234/0x360 [ 443.756455][T12411] tipc_msg_build+0xd0/0xc90 [ 443.761047][T12411] ? avc_has_perm_noaudit+0x240/0x240 [ 443.766428][T12411] __tipc_sendstream+0x93f/0x1740 [ 443.771536][T12411] ? tsk_advance_rx_queue+0x700/0x700 [ 443.776913][T12411] ? wait_woken+0x180/0x180 [ 443.781426][T12411] ? kasan_set_track+0x5b/0x70 [ 443.786195][T12411] ? kasan_set_track+0x4a/0x70 [ 443.790974][T12411] tipc_sendstream+0x55/0x70 [ 443.795573][T12411] ? tipc_getsockopt+0x4c0/0x4c0 [ 443.800515][T12411] ____sys_sendmsg+0x5a2/0x8c0 [ 443.805281][T12411] ? __sys_sendmsg_sock+0x40/0x40 [ 443.810307][T12411] ? import_iovec+0x7c/0xb0 [ 443.814822][T12411] ___sys_sendmsg+0x1f0/0x260 [ 443.819500][T12411] ? __sys_sendmsg+0x250/0x250 [ 443.824258][T12411] ? rw_verify_area+0x1c0/0x360 [ 443.829115][T12411] ? __fdget+0x1a1/0x230 [ 443.833354][T12411] __x64_sys_sendmsg+0x1e2/0x2a0 [ 443.838284][T12411] ? fput+0x1a/0x20 [ 443.842093][T12411] ? ___sys_sendmsg+0x260/0x260 [ 443.846945][T12411] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 443.853011][T12411] do_syscall_64+0x31/0x40 [ 443.857429][T12411] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 443.863317][T12411] RIP: 0033:0x7f26929c8969 [ 443.867739][T12411] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 443.887349][T12411] RSP: 002b:00007f2691031038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 443.895773][T12411] RAX: ffffffffffffffda RBX: 00007f2692beffa0 RCX: 00007f26929c8969 [ 443.903744][T12411] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000004 [ 443.911710][T12411] RBP: 00007f2691031090 R08: 0000000000000000 R09: 0000000000000000 [ 443.919690][T12411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 443.927662][T12411] R13: 0000000000000000 R14: 00007f2692beffa0 R15: 00007fffc01fd9c8 [ 443.956090][T12410] device syzkaller0 entered promiscuous mode [ 444.129144][T12432] device xfrm0 entered promiscuous mode [ 444.558271][T12466] FAULT_INJECTION: forcing a failure. [ 444.558271][T12466] name failslab, interval 1, probability 0, space 0, times 0 [ 444.571106][T12466] CPU: 1 PID: 12466 Comm: syz.0.3929 Tainted: G W 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 444.582463][T12466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 444.592530][T12466] Call Trace: [ 444.595999][T12466] __dump_stack+0x21/0x24 [ 444.600318][T12466] dump_stack_lvl+0x169/0x1d8 [ 444.605015][T12466] ? show_regs_print_info+0x18/0x18 [ 444.610215][T12466] dump_stack+0x15/0x1c [ 444.614368][T12466] should_fail+0x3c1/0x510 [ 444.618884][T12466] ? __alloc_skb+0x9e/0x520 [ 444.623375][T12466] __should_failslab+0xa4/0xe0 [ 444.628127][T12466] should_failslab+0x9/0x20 [ 444.632617][T12466] kmem_cache_alloc+0x3d/0x2e0 [ 444.637365][T12466] __alloc_skb+0x9e/0x520 [ 444.641681][T12466] tipc_msg_reverse+0x228/0x900 [ 444.646526][T12466] tipc_sk_filter_rcv+0xca0/0x3850 [ 444.651637][T12466] ? tipc_sk_dump+0xfc0/0xfc0 [ 444.656392][T12466] ? __kasan_check_write+0x14/0x20 [ 444.661489][T12466] ? _raw_spin_lock_bh+0x8e/0xe0 [ 444.666674][T12466] ? __kasan_slab_alloc+0x69/0xf0 [ 444.671686][T12466] tipc_sk_rcv+0x7cc/0x1ef0 [ 444.676181][T12466] ? __skb_queue_purge+0x170/0x170 [ 444.681283][T12466] ? iov_iter_advance+0x2a6/0x750 [ 444.686296][T12466] ? tipc_msg_build+0xd0/0xc90 [ 444.691081][T12466] ? __kmalloc_track_caller+0x181/0x320 [ 444.696615][T12466] tipc_node_xmit+0x256/0xcd0 [ 444.701279][T12466] ? __alloc_skb+0x38b/0x520 [ 444.705875][T12466] ? __check_object_size+0x8e/0x3c0 [ 444.711060][T12466] ? tipc_node_get_linkname+0x1a0/0x1a0 [ 444.716950][T12466] ? avc_has_perm_noaudit+0x240/0x240 [ 444.722345][T12466] __tipc_sendstream+0xafa/0x1740 [ 444.727371][T12466] ? tsk_advance_rx_queue+0x700/0x700 [ 444.732746][T12466] ? wait_woken+0x180/0x180 [ 444.737237][T12466] tipc_sendstream+0x55/0x70 [ 444.741918][T12466] ? tipc_getsockopt+0x4c0/0x4c0 [ 444.746840][T12466] ____sys_sendmsg+0x5a2/0x8c0 [ 444.751599][T12466] ? __sys_sendmsg_sock+0x40/0x40 [ 444.756702][T12466] ? import_iovec+0x7c/0xb0 [ 444.761278][T12466] ___sys_sendmsg+0x1f0/0x260 [ 444.765944][T12466] ? __sys_sendmsg+0x250/0x250 [ 444.770693][T12466] ? rw_verify_area+0x1c0/0x360 [ 444.775536][T12466] ? __fdget+0x1a1/0x230 [ 444.779775][T12466] __x64_sys_sendmsg+0x1e2/0x2a0 [ 444.784697][T12466] ? fput+0x1a/0x20 [ 444.788498][T12466] ? ___sys_sendmsg+0x260/0x260 [ 444.793352][T12466] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 444.799403][T12466] do_syscall_64+0x31/0x40 [ 444.803832][T12466] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 444.809710][T12466] RIP: 0033:0x7fe397788969 [ 444.814113][T12466] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 444.833985][T12466] RSP: 002b:00007fe395df1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 444.842384][T12466] RAX: ffffffffffffffda RBX: 00007fe3979affa0 RCX: 00007fe397788969 [ 444.850342][T12466] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000004 [ 444.858386][T12466] RBP: 00007fe395df1090 R08: 0000000000000000 R09: 0000000000000000 [ 444.866362][T12466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 444.874317][T12466] R13: 0000000000000000 R14: 00007fe3979affa0 R15: 00007ffe815e3e98 [ 444.887211][ T24] audit: type=1400 audit(1746819046.890:196): avc: denied { unlink } for pid=77 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 445.098294][T12470] device syzkaller0 entered promiscuous mode [ 445.355753][T12483] device sit0 left promiscuous mode [ 445.418509][T12483] device sit0 entered promiscuous mode [ 445.807098][T12499] FAULT_INJECTION: forcing a failure. [ 445.807098][T12499] name failslab, interval 1, probability 0, space 0, times 0 [ 445.819778][T12499] CPU: 1 PID: 12499 Comm: syz.1.3942 Tainted: G W 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 445.831228][T12499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 445.841292][T12499] Call Trace: [ 445.844605][T12499] __dump_stack+0x21/0x24 [ 445.848946][T12499] dump_stack_lvl+0x169/0x1d8 [ 445.853626][T12499] ? thaw_kernel_threads+0x220/0x220 [ 445.858927][T12499] ? show_regs_print_info+0x18/0x18 [ 445.864137][T12499] dump_stack+0x15/0x1c [ 445.868301][T12499] should_fail+0x3c1/0x510 [ 445.872723][T12499] ? tipc_msg_reverse+0x228/0x900 [ 445.877757][T12499] __should_failslab+0xa4/0xe0 [ 445.882535][T12499] should_failslab+0x9/0x20 [ 445.887044][T12499] __kmalloc_track_caller+0x5f/0x320 [ 445.892340][T12499] ? kmem_cache_alloc+0x165/0x2e0 [ 445.897368][T12499] ? __alloc_skb+0x9e/0x520 [ 445.901879][T12499] ? tipc_msg_reverse+0x228/0x900 [ 445.906910][T12499] __alloc_skb+0xdc/0x520 [ 445.911251][T12499] tipc_msg_reverse+0x228/0x900 [ 445.916573][T12499] tipc_sk_filter_rcv+0xca0/0x3850 [ 445.921722][T12499] ? tipc_sk_dump+0xfc0/0xfc0 [ 445.926405][T12499] ? __kasan_check_write+0x14/0x20 [ 445.931533][T12499] ? _raw_spin_lock_bh+0x8e/0xe0 [ 445.936493][T12499] ? __kasan_slab_alloc+0x69/0xf0 [ 445.941562][T12499] tipc_sk_rcv+0x7cc/0x1ef0 [ 445.946094][T12499] ? __skb_queue_purge+0x170/0x170 [ 445.951223][T12499] ? iov_iter_advance+0x2a6/0x750 [ 445.956260][T12499] ? tipc_msg_build+0xd0/0xc90 [ 445.961047][T12499] ? __kmalloc_track_caller+0x181/0x320 [ 445.966617][T12499] tipc_node_xmit+0x256/0xcd0 [ 445.971308][T12499] ? __alloc_skb+0x38b/0x520 [ 445.975916][T12499] ? __check_object_size+0x8e/0x3c0 [ 445.976847][T12496] device syzkaller0 entered promiscuous mode [ 445.981165][T12499] ? tipc_node_get_linkname+0x1a0/0x1a0 [ 445.981178][T12499] ? avc_has_perm_noaudit+0x240/0x240 [ 445.981196][T12499] __tipc_sendstream+0xafa/0x1740 [ 445.981222][T12499] ? tsk_advance_rx_queue+0x700/0x700 [ 445.981236][T12499] ? wait_woken+0x180/0x180 [ 445.981251][T12499] ? kasan_set_track+0x5b/0x70 [ 445.981270][T12499] ? kasan_set_track+0x4a/0x70 [ 446.022624][T12499] tipc_sendstream+0x55/0x70 [ 446.027229][T12499] ? tipc_getsockopt+0x4c0/0x4c0 [ 446.032180][T12499] ____sys_sendmsg+0x5a2/0x8c0 [ 446.036960][T12499] ? __sys_sendmsg_sock+0x40/0x40 [ 446.042003][T12499] ? import_iovec+0x7c/0xb0 [ 446.046524][T12499] ___sys_sendmsg+0x1f0/0x260 [ 446.051227][T12499] ? __sys_sendmsg+0x250/0x250 [ 446.056004][T12499] ? rw_verify_area+0x1c0/0x360 [ 446.060883][T12499] ? __fdget+0x1a1/0x230 [ 446.065146][T12499] __x64_sys_sendmsg+0x1e2/0x2a0 [ 446.070105][T12499] ? fput+0x1a/0x20 [ 446.073926][T12499] ? ___sys_sendmsg+0x260/0x260 [ 446.078801][T12499] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 446.084917][T12499] do_syscall_64+0x31/0x40 [ 446.089352][T12499] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 446.095275][T12499] RIP: 0033:0x7f423cbcd969 [ 446.099832][T12499] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 446.119453][T12499] RSP: 002b:00007f423b236038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 446.127924][T12499] RAX: ffffffffffffffda RBX: 00007f423cdf4fa0 RCX: 00007f423cbcd969 [ 446.135911][T12499] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000004 [ 446.143893][T12499] RBP: 00007f423b236090 R08: 0000000000000000 R09: 0000000000000000 [ 446.151884][T12499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 446.159869][T12499] R13: 0000000000000000 R14: 00007f423cdf4fa0 R15: 00007ffe90b94788 [ 446.288912][T12503] device veth1_macvtap entered promiscuous mode [ 446.295329][T12503] device macsec0 entered promiscuous mode [ 446.301975][ T9365] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 446.418348][T12516] device syzkaller0 entered promiscuous mode [ 446.792448][T12523] device syzkaller0 entered promiscuous mode [ 447.210863][T12549] FAULT_INJECTION: forcing a failure. [ 447.210863][T12549] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 447.248726][T12549] CPU: 1 PID: 12549 Comm: syz.0.3954 Tainted: G W 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 447.260318][T12549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 447.270423][T12549] Call Trace: [ 447.273739][T12549] __dump_stack+0x21/0x24 [ 447.278082][T12549] dump_stack_lvl+0x169/0x1d8 [ 447.282771][T12549] ? thaw_kernel_threads+0x220/0x220 [ 447.288060][T12549] ? vsnprintf+0x1871/0x1960 [ 447.292661][T12549] ? show_regs_print_info+0x18/0x18 [ 447.297869][T12549] dump_stack+0x15/0x1c [ 447.302031][T12549] should_fail+0x3c1/0x510 [ 447.306452][T12549] should_fail_usercopy+0x1a/0x20 [ 447.311480][T12549] _copy_to_user+0x20/0x90 [ 447.315908][T12549] simple_read_from_buffer+0xe9/0x160 [ 447.321301][T12549] proc_fail_nth_read+0x19a/0x210 [ 447.326344][T12549] ? proc_fault_inject_write+0x2f0/0x2f0 [ 447.331989][T12549] ? rw_verify_area+0x1c0/0x360 [ 447.336963][T12549] ? proc_fault_inject_write+0x2f0/0x2f0 [ 447.342606][T12549] vfs_read+0x1fe/0xa10 [ 447.346773][T12549] ? kernel_read+0x70/0x70 [ 447.351203][T12549] ? __kasan_check_write+0x14/0x20 [ 447.356413][T12549] ? mutex_lock+0x8c/0xe0 [ 447.360749][T12549] ? mutex_trylock+0xa0/0xa0 [ 447.365345][T12549] ? __fget_files+0x2c4/0x320 [ 447.370115][T12549] ? __fdget_pos+0x2d2/0x380 [ 447.374710][T12549] ? ksys_read+0x71/0x240 [ 447.379040][T12549] ksys_read+0x140/0x240 [ 447.383288][T12549] ? vfs_write+0xd60/0xd60 [ 447.387719][T12549] __x64_sys_read+0x7b/0x90 [ 447.392229][T12549] do_syscall_64+0x31/0x40 [ 447.396648][T12549] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 447.402550][T12549] RIP: 0033:0x7fe39778737c [ 447.406973][T12549] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 447.426697][T12549] RSP: 002b:00007fe395df1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 447.435126][T12549] RAX: ffffffffffffffda RBX: 00007fe3979affa0 RCX: 00007fe39778737c [ 447.443106][T12549] RDX: 000000000000000f RSI: 00007fe395df10a0 RDI: 0000000000000008 [ 447.451091][T12549] RBP: 00007fe395df1090 R08: 0000000000000000 R09: 0000000000000000 [ 447.459079][T12549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 447.467075][T12549] R13: 0000000000000000 R14: 00007fe3979affa0 R15: 00007ffe815e3e98 [ 447.681074][T12562] device syzkaller0 entered promiscuous mode [ 447.800115][T12560] device syzkaller0 entered promiscuous mode [ 447.981316][T12592] device pim6reg1 entered promiscuous mode [ 448.418236][T12628] device syzkaller0 entered promiscuous mode [ 448.450950][T12626] device syzkaller0 entered promiscuous mode [ 449.432152][T12666] device pim6reg1 entered promiscuous mode [ 451.290376][T12716] device pim6reg1 entered promiscuous mode [ 451.666568][T12733] device syzkaller0 entered promiscuous mode [ 452.478173][T12752] device pim6reg1 entered promiscuous mode [ 453.246238][T12782] device sit0 left promiscuous mode [ 453.403552][T12785] device sit0 entered promiscuous mode [ 453.674691][T12811] device syzkaller0 entered promiscuous mode [ 454.239452][T12863] device syzkaller0 entered promiscuous mode [ 455.130397][ T24] audit: type=1400 audit(1746819057.130:197): avc: denied { create } for pid=12896 comm="syz.2.4064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 455.411631][T12912] device veth0_vlan left promiscuous mode [ 455.423097][T12912] device veth0_vlan entered promiscuous mode [ 455.506767][T12917] device wg2 entered promiscuous mode [ 455.585650][T12925] syz.3.4074[12925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.585703][T12925] syz.3.4074[12925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.770934][T12942] device pim6reg1 entered promiscuous mode [ 455.932470][T12946] device sit0 left promiscuous mode [ 455.952865][T12948] device syzkaller0 entered promiscuous mode [ 455.994201][T12946] device sit0 entered promiscuous mode [ 456.142634][T12954] FAULT_INJECTION: forcing a failure. [ 456.142634][T12954] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 456.155859][T12954] CPU: 1 PID: 12954 Comm: syz.2.4082 Tainted: G W 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 456.167220][T12954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 456.177267][T12954] Call Trace: [ 456.180550][T12954] __dump_stack+0x21/0x24 [ 456.184867][T12954] dump_stack_lvl+0x169/0x1d8 [ 456.189537][T12954] ? show_regs_print_info+0x18/0x18 [ 456.194719][T12954] ? kstrtouint_from_user+0x1a0/0x200 [ 456.200079][T12954] dump_stack+0x15/0x1c [ 456.204217][T12954] should_fail+0x3c1/0x510 [ 456.208618][T12954] should_fail_usercopy+0x1a/0x20 [ 456.213627][T12954] _copy_from_user+0x20/0xd0 [ 456.218290][T12954] ___sys_recvmsg+0x129/0x4f0 [ 456.222987][T12954] ? __sys_recvmsg+0x250/0x250 [ 456.227754][T12954] ? __fdget+0x1a1/0x230 [ 456.231993][T12954] __x64_sys_recvmsg+0x1dd/0x2a0 [ 456.236917][T12954] ? ___sys_recvmsg+0x4f0/0x4f0 [ 456.241779][T12954] ? syscall_trace_enter+0x108/0x170 [ 456.247053][T12954] do_syscall_64+0x31/0x40 [ 456.251477][T12954] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 456.257351][T12954] RIP: 0033:0x7fd2956d5969 [ 456.261753][T12954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 456.281364][T12954] RSP: 002b:00007fd293d3e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 456.289768][T12954] RAX: ffffffffffffffda RBX: 00007fd2958fcfa0 RCX: 00007fd2956d5969 [ 456.297726][T12954] RDX: 0000000000000000 RSI: 0000200000000900 RDI: 0000000000000004 [ 456.305681][T12954] RBP: 00007fd293d3e090 R08: 0000000000000000 R09: 0000000000000000 [ 456.313638][T12954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 456.321596][T12954] R13: 0000000000000000 R14: 00007fd2958fcfa0 R15: 00007ffda04342d8 [ 456.485758][T12958] device veth1_macvtap left promiscuous mode [ 456.829240][T12989] FAULT_INJECTION: forcing a failure. [ 456.829240][T12989] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 456.843027][T12989] CPU: 1 PID: 12989 Comm: syz.1.4095 Tainted: G W 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 456.854413][T12989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 456.864477][T12989] Call Trace: [ 456.867793][T12989] __dump_stack+0x21/0x24 [ 456.872113][T12989] dump_stack_lvl+0x169/0x1d8 [ 456.876777][T12989] ? show_regs_print_info+0x18/0x18 [ 456.881963][T12989] dump_stack+0x15/0x1c [ 456.886106][T12989] should_fail+0x3c1/0x510 [ 456.890509][T12989] should_fail_usercopy+0x1a/0x20 [ 456.895541][T12989] _copy_from_user+0x20/0xd0 [ 456.900121][T12989] iovec_from_user+0x1bc/0x2f0 [ 456.904873][T12989] ? kstrtouint_from_user+0x1a0/0x200 [ 456.910234][T12989] __import_iovec+0x71/0x390 [ 456.914838][T12989] ? memset+0x35/0x40 [ 456.918816][T12989] import_iovec+0x7c/0xb0 [ 456.923140][T12989] ___sys_recvmsg+0x420/0x4f0 [ 456.927803][T12989] ? __sys_recvmsg+0x250/0x250 [ 456.932558][T12989] ? __fdget+0x1a1/0x230 [ 456.936809][T12989] __x64_sys_recvmsg+0x1dd/0x2a0 [ 456.941754][T12989] ? fput+0x1a/0x20 [ 456.945561][T12989] ? ___sys_recvmsg+0x4f0/0x4f0 [ 456.950408][T12989] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 456.956461][T12989] do_syscall_64+0x31/0x40 [ 456.960865][T12989] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 456.966758][T12989] RIP: 0033:0x7f423cbcd969 [ 456.971175][T12989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 456.990774][T12989] RSP: 002b:00007f423b236038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 456.999175][T12989] RAX: ffffffffffffffda RBX: 00007f423cdf4fa0 RCX: 00007f423cbcd969 [ 457.007133][T12989] RDX: 0000000000000000 RSI: 0000200000000900 RDI: 0000000000000004 [ 457.015089][T12989] RBP: 00007f423b236090 R08: 0000000000000000 R09: 0000000000000000 [ 457.023042][T12989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 457.030997][T12989] R13: 0000000000000000 R14: 00007f423cdf4fa0 R15: 00007ffe90b94788 [ 458.003547][T13009] device wg2 entered promiscuous mode [ 458.058302][T13008] device syzkaller0 entered promiscuous mode [ 458.805213][T13053] device syzkaller0 entered promiscuous mode [ 458.907732][T13069] device veth0_vlan left promiscuous mode [ 458.997699][T13069] device veth0_vlan entered promiscuous mode [ 459.092704][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 459.117402][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 459.147559][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 459.580953][T13132] device syzkaller0 entered promiscuous mode [ 459.906792][T13153] device syzkaller0 entered promiscuous mode [ 459.984160][T13163] device pim6reg1 entered promiscuous mode [ 460.528718][T13182] device syzkaller0 entered promiscuous mode [ 462.117979][T13222] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 462.127108][T13222] device syzkaller0 entered promiscuous mode [ 462.482159][T13238] device syzkaller0 entered promiscuous mode [ 462.771829][T13240] device syzkaller0 entered promiscuous mode [ 463.648311][T13278] syz.4.4179[13278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 463.648451][T13278] syz.4.4179[13278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 463.780513][T13278] syz.4.4179[13278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 463.795879][T13278] syz.4.4179[13278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.515623][T13360] device sit0 entered promiscuous mode [ 465.590118][T13362] device pim6reg1 entered promiscuous mode [ 465.701837][T13373] device syzkaller0 entered promiscuous mode [ 466.484648][T13433] syz.4.4222[13433] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.484761][T13433] syz.4.4222[13433] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.272547][T13441] device syzkaller0 entered promiscuous mode [ 467.685152][T13476] device veth0_vlan left promiscuous mode [ 467.697488][T13476] device veth0_vlan entered promiscuous mode [ 468.232071][T13535] device wg2 left promiscuous mode [ 469.021348][T13577] device syzkaller0 entered promiscuous mode [ 469.437052][T13605] device syzkaller0 entered promiscuous mode [ 470.278644][T13659] device syzkaller0 entered promiscuous mode [ 470.446321][T13667] device pim6reg1 entered promiscuous mode [ 470.561691][T13672] device pim6reg1 entered promiscuous mode [ 471.170909][T13706] device syzkaller0 entered promiscuous mode [ 471.455540][T13716] device syzkaller0 entered promiscuous mode [ 471.595498][T13728] device syzkaller0 entered promiscuous mode [ 471.895773][T13752] device syzkaller0 entered promiscuous mode [ 472.265716][T13770] device bridge_slave_1 left promiscuous mode [ 472.279644][T13770] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.290979][T13770] device bridge_slave_0 left promiscuous mode [ 472.297246][T13770] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.689728][T13782] device pim6reg1 entered promiscuous mode [ 472.812842][T13795] device syzkaller0 entered promiscuous mode [ 473.185667][T13824] device syzkaller0 entered promiscuous mode [ 473.289386][T13828] device pim6reg1 entered promiscuous mode [ 473.356302][T13840] device syzkaller0 entered promiscuous mode [ 474.080889][T13874] device syzkaller0 entered promiscuous mode [ 474.214648][T13877] device pim6reg1 entered promiscuous mode [ 474.327061][T13883] syz.2.4369[13883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.327168][T13883] syz.2.4369[13883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.285271][T13907] device syzkaller0 entered promiscuous mode [ 475.898774][T13934] device pim6reg1 entered promiscuous mode [ 475.992289][T13939] device pim6reg1 entered promiscuous mode [ 476.249400][T13946] device sit0 left promiscuous mode [ 476.523917][T13955] device syzkaller0 entered promiscuous mode [ 477.770064][T14005] device syzkaller0 entered promiscuous mode [ 479.552374][ T24] audit: type=1400 audit(1746819081.550:198): avc: denied { create } for pid=14021 comm="syz.0.4417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 479.673502][T14017] device pim6reg1 entered promiscuous mode [ 479.955035][T14047] device syzkaller0 entered promiscuous mode [ 480.214138][T14052] device syzkaller0 entered promiscuous mode [ 482.532921][T14078] device pim6reg1 entered promiscuous mode [ 482.650917][T14084] device veth0_vlan left promiscuous mode [ 482.670826][T14084] device veth0_vlan entered promiscuous mode [ 488.212569][T14203] device syzkaller0 entered promiscuous mode [ 492.852653][T14324] device syzkaller0 entered promiscuous mode [ 493.004797][T14328] device pim6reg1 entered promiscuous mode [ 493.575211][T14350] device syzkaller0 entered promiscuous mode [ 494.071310][T14371] device syzkaller0 entered promiscuous mode [ 494.372639][T14376] device pim6reg1 entered promiscuous mode [ 494.632503][T14380] device syzkaller0 entered promiscuous mode [ 495.418522][T14394] device pim6reg1 entered promiscuous mode [ 496.600700][T14418] device syzkaller0 entered promiscuous mode [ 496.817286][T14427] device pim6reg1 entered promiscuous mode [ 497.617868][T14461] device sit0 left promiscuous mode [ 497.641473][T14465] device syzkaller0 entered promiscuous mode [ 497.654939][T14460] device sit0 entered promiscuous mode [ 497.675384][T14457] bridge0: port 1(bridge_slave_0) entered blocking state [ 497.683090][T14457] bridge0: port 1(bridge_slave_0) entered disabled state [ 497.690852][T14457] device bridge_slave_0 entered promiscuous mode [ 497.702165][T14462] device pim6reg1 entered promiscuous mode [ 497.710227][T14457] bridge0: port 2(bridge_slave_1) entered blocking state [ 497.719659][T14457] bridge0: port 2(bridge_slave_1) entered disabled state [ 497.728878][T14457] device bridge_slave_1 entered promiscuous mode [ 497.799073][T14470] device pim6reg1 entered promiscuous mode [ 497.834346][T14457] bridge0: port 2(bridge_slave_1) entered blocking state [ 497.841471][T14457] bridge0: port 2(bridge_slave_1) entered forwarding state [ 497.848809][T14457] bridge0: port 1(bridge_slave_0) entered blocking state [ 497.855833][T14457] bridge0: port 1(bridge_slave_0) entered forwarding state [ 497.878536][T14472] device syzkaller0 entered promiscuous mode [ 497.953763][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 497.962644][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 497.971401][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 497.984383][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 497.994603][ T344] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.001689][ T344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 498.009818][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 498.018605][ T344] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.025730][ T344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 498.122560][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 498.130846][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 498.198623][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 498.222998][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 498.234514][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 498.242688][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 498.259308][T14457] device veth0_vlan entered promiscuous mode [ 498.271792][T14507] ªªªªªª: renamed from vlan0 [ 498.296423][T14512] device syzkaller0 entered promiscuous mode [ 498.321222][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 498.366538][T14457] device veth1_macvtap entered promiscuous mode [ 498.416067][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 498.460652][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 498.538549][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 498.547230][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 499.170414][T14559] bridge0: port 2(bridge_slave_1) entered disabled state [ 499.180393][T14559] bridge0: port 1(bridge_slave_0) entered disabled state [ 499.224508][T14575] device bridge_slave_1 left promiscuous mode [ 499.232420][T14575] bridge0: port 2(bridge_slave_1) entered disabled state [ 499.240541][T14575] device bridge_slave_0 left promiscuous mode [ 499.246939][T14575] bridge0: port 1(bridge_slave_0) entered disabled state [ 499.309855][T14576] device pim6reg1 entered promiscuous mode [ 500.492615][T14618] device sit0 left promiscuous mode [ 500.527229][T14618] device sit0 entered promiscuous mode [ 501.006736][T14644] FAULT_INJECTION: forcing a failure. [ 501.006736][T14644] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 501.366672][T14644] CPU: 1 PID: 14644 Comm: syz.3.4604 Tainted: G W 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 501.378080][T14644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 501.388219][T14644] Call Trace: [ 501.391511][T14644] __dump_stack+0x21/0x24 [ 501.395851][T14644] dump_stack_lvl+0x169/0x1d8 [ 501.400528][T14644] ? show_regs_print_info+0x18/0x18 [ 501.405739][T14644] ? slab_free_freelist_hook+0xc5/0x190 [ 501.411369][T14644] dump_stack+0x15/0x1c [ 501.415522][T14644] should_fail+0x3c1/0x510 [ 501.419949][T14644] should_fail_usercopy+0x1a/0x20 [ 501.424974][T14644] copy_fpstate_to_sigframe+0x86b/0xb40 [ 501.430528][T14644] ? fpregs_set+0x540/0x540 [ 501.435128][T14644] ? _raw_spin_unlock_irq+0x4e/0x70 [ 501.440696][T14644] ? get_signal+0x1238/0x12e0 [ 501.445380][T14644] ? rw_verify_area+0x1c0/0x360 [ 501.450322][T14644] ? fpu__alloc_mathframe+0x88/0x150 [ 501.455607][T14644] arch_do_signal_or_restart+0x5c7/0x10f0 [ 501.461325][T14644] ? mutex_lock+0x8c/0xe0 [ 501.465648][T14644] ? mutex_trylock+0xa0/0xa0 [ 501.470230][T14644] ? __fget_files+0x2c4/0x320 [ 501.474920][T14644] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 501.480638][T14644] ? fput_many+0x15a/0x1a0 [ 501.485065][T14644] ? __bpf_trace_sys_enter+0x62/0x70 [ 501.490337][T14644] exit_to_user_mode_loop+0xa2/0xe0 [ 501.495524][T14644] syscall_exit_to_user_mode+0x68/0x90 [ 501.500976][T14644] do_syscall_64+0x3d/0x40 [ 501.505465][T14644] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 501.511425][T14644] RIP: 0033:0x7f9b9d9f141f [ 501.515828][T14644] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 501.535420][T14644] RSP: 002b:00007f9b9c03a030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 501.543837][T14644] RAX: 0000000000000001 RBX: 0000000000000005 RCX: 00007f9b9d9f141f [ 501.551794][T14644] RDX: 0000000000000001 RSI: 00007f9b9c03a090 RDI: 0000000000000005 [ 501.559836][T14644] RBP: 00007f9b9c03a090 R08: 0000000000000000 R09: 00007f9b9c039df7 [ 501.567811][T14644] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 501.575801][T14644] R13: 0000000000000000 R14: 00007f9b9dc1a080 R15: 00007ffc9ee59818 [ 502.999698][T14682] device syzkaller0 entered promiscuous mode [ 503.449169][T14701] device syzkaller0 entered promiscuous mode [ 503.512624][T14703] device syzkaller0 entered promiscuous mode [ 503.555308][T14708] device syzkaller0 entered promiscuous mode [ 503.591780][T14708] FAULT_INJECTION: forcing a failure. [ 503.591780][T14708] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 503.721519][T14710] device syzkaller0 entered promiscuous mode [ 503.754668][T14708] CPU: 0 PID: 14708 Comm: syz.3.4630 Tainted: G W 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 503.766076][T14708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 503.776142][T14708] Call Trace: [ 503.779468][T14708] __dump_stack+0x21/0x24 [ 503.783796][T14708] dump_stack_lvl+0x169/0x1d8 [ 503.788485][T14708] ? show_regs_print_info+0x18/0x18 [ 503.793733][T14708] ? vfs_write+0xac8/0xd60 [ 503.798209][T14708] dump_stack+0x15/0x1c [ 503.802371][T14708] should_fail+0x3c1/0x510 [ 503.806801][T14708] should_fail_usercopy+0x1a/0x20 [ 503.811830][T14708] _copy_from_user+0x20/0xd0 [ 503.816422][T14708] __se_sys_bpf+0x181/0x680 [ 503.820934][T14708] ? __x64_sys_bpf+0x90/0x90 [ 503.825542][T14708] __x64_sys_bpf+0x7b/0x90 [ 503.829974][T14708] do_syscall_64+0x31/0x40 [ 503.834515][T14708] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 503.840425][T14708] RIP: 0033:0x7f9b9d9f2969 [ 503.844850][T14708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 503.864466][T14708] RSP: 002b:00007f9b9c05b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 503.872906][T14708] RAX: ffffffffffffffda RBX: 00007f9b9dc19fa0 RCX: 00007f9b9d9f2969 [ 503.880890][T14708] RDX: 0000000000000038 RSI: 00002000000003c0 RDI: 0000000000000018 [ 503.888882][T14708] RBP: 00007f9b9c05b090 R08: 0000000000000000 R09: 0000000000000000 [ 503.896893][T14708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 503.904861][T14708] R13: 0000000000000000 R14: 00007f9b9dc19fa0 R15: 00007ffc9ee59818 [ 504.089668][T14732] device pim6reg1 entered promiscuous mode [ 504.346926][T14746] device sit0 left promiscuous mode [ 504.365432][T14746] device sit0 entered promiscuous mode [ 504.462794][T14755] device syzkaller0 entered promiscuous mode [ 504.490422][T14755] FAULT_INJECTION: forcing a failure. [ 504.490422][T14755] name failslab, interval 1, probability 0, space 0, times 0 [ 504.512928][T14755] CPU: 0 PID: 14755 Comm: syz.2.4646 Tainted: G W 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 504.521897][T14753] device syzkaller0 entered promiscuous mode [ 504.524334][T14755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 504.540351][T14755] Call Trace: [ 504.543651][T14755] __dump_stack+0x21/0x24 [ 504.547989][T14755] dump_stack_lvl+0x169/0x1d8 [ 504.552756][T14755] ? show_regs_print_info+0x18/0x18 [ 504.557950][T14755] ? printk+0xff/0x110 [ 504.562029][T14755] dump_stack+0x15/0x1c [ 504.566185][T14755] should_fail+0x3c1/0x510 [ 504.570635][T14755] ? generic_map_lookup_batch+0x41f/0xa60 [ 504.576346][T14755] __should_failslab+0xa4/0xe0 [ 504.581097][T14755] should_failslab+0x9/0x20 [ 504.585587][T14755] __kmalloc+0x60/0x330 [ 504.589829][T14755] generic_map_lookup_batch+0x41f/0xa60 [ 504.595366][T14755] ? rw_verify_area+0x1c0/0x360 [ 504.600228][T14755] ? bpf_map_update_value+0x410/0x410 [ 504.605584][T14755] ? __fdget+0x1a1/0x230 [ 504.609817][T14755] ? bpf_map_update_value+0x410/0x410 [ 504.615173][T14755] bpf_map_do_batch+0x2d4/0x5f0 [ 504.620011][T14755] ? security_bpf+0x82/0xa0 [ 504.624500][T14755] __se_sys_bpf+0x386/0x680 [ 504.628987][T14755] ? __x64_sys_bpf+0x90/0x90 [ 504.633566][T14755] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 504.639709][T14755] __x64_sys_bpf+0x7b/0x90 [ 504.644110][T14755] do_syscall_64+0x31/0x40 [ 504.648516][T14755] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 504.654391][T14755] RIP: 0033:0x7ff389c96969 [ 504.658795][T14755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 504.678388][T14755] RSP: 002b:00007ff3882ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 504.686792][T14755] RAX: ffffffffffffffda RBX: 00007ff389ebdfa0 RCX: 00007ff389c96969 [ 504.694751][T14755] RDX: 0000000000000038 RSI: 00002000000003c0 RDI: 0000000000000018 [ 504.702711][T14755] RBP: 00007ff3882ff090 R08: 0000000000000000 R09: 0000000000000000 [ 504.710747][T14755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 504.718707][T14755] R13: 0000000000000000 R14: 00007ff389ebdfa0 R15: 00007ffc4d8b26e8 [ 504.773732][T14764] €Â0ÿÿ: renamed from pim6reg1 [ 504.975863][T14775] device pim6reg1 entered promiscuous mode [ 505.003728][T14771] bridge0: port 3(veth0) entered blocking state [ 505.010415][T14771] bridge0: port 3(veth0) entered disabled state [ 505.018335][T14771] device veth0 entered promiscuous mode [ 505.024214][T14771] bridge0: port 3(veth0) entered blocking state [ 505.030538][T14771] bridge0: port 3(veth0) entered forwarding state [ 505.266885][T14797] FAULT_INJECTION: forcing a failure. [ 505.266885][T14797] name failslab, interval 1, probability 0, space 0, times 0 [ 505.329111][T14794] device syzkaller0 entered promiscuous mode [ 505.365996][T14797] CPU: 1 PID: 14797 Comm: syz.2.4659 Tainted: G W 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 505.377401][T14797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 505.387460][T14797] Call Trace: [ 505.390811][T14797] __dump_stack+0x21/0x24 [ 505.395151][T14797] dump_stack_lvl+0x169/0x1d8 [ 505.399836][T14797] ? thaw_kernel_threads+0x220/0x220 [ 505.405124][T14797] ? show_regs_print_info+0x18/0x18 [ 505.410332][T14797] dump_stack+0x15/0x1c [ 505.414492][T14797] should_fail+0x3c1/0x510 [ 505.418920][T14797] ? generic_map_lookup_batch+0x44d/0xa60 [ 505.424653][T14797] __should_failslab+0xa4/0xe0 [ 505.429424][T14797] should_failslab+0x9/0x20 [ 505.433930][T14797] __kmalloc+0x60/0x330 [ 505.438085][T14797] ? sched_clock_cpu+0x1b/0x3d0 [ 505.442943][T14797] ? generic_map_lookup_batch+0x41f/0xa60 [ 505.448674][T14797] generic_map_lookup_batch+0x44d/0xa60 [ 505.454232][T14797] ? bpf_map_update_value+0x410/0x410 [ 505.459614][T14797] ? __fdget+0x1a1/0x230 [ 505.463866][T14797] ? bpf_map_update_value+0x410/0x410 [ 505.469242][T14797] bpf_map_do_batch+0x2d4/0x5f0 [ 505.474099][T14797] ? security_bpf+0x82/0xa0 [ 505.478606][T14797] __se_sys_bpf+0x386/0x680 [ 505.483465][T14797] ? __x64_sys_bpf+0x90/0x90 [ 505.488077][T14797] ? fpu__clear_all+0x20/0x20 [ 505.492758][T14797] __x64_sys_bpf+0x7b/0x90 [ 505.497188][T14797] do_syscall_64+0x31/0x40 [ 505.501609][T14797] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 505.507680][T14797] RIP: 0033:0x7ff389c96969 [ 505.512099][T14797] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 505.531883][T14797] RSP: 002b:00007ff3882de038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 505.540309][T14797] RAX: ffffffffffffffda RBX: 00007ff389ebe080 RCX: 00007ff389c96969 [ 505.548288][T14797] RDX: 0000000000000038 RSI: 00002000000003c0 RDI: 0000000000000018 [ 505.556272][T14797] RBP: 00007ff3882de090 R08: 0000000000000000 R09: 0000000000000000 [ 505.564260][T14797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 505.572241][T14797] R13: 0000000000000000 R14: 00007ff389ebe080 R15: 00007ffc4d8b26e8 [ 505.980177][T14812] device syzkaller0 entered promiscuous mode [ 506.435137][T14833] device syzkaller0 entered promiscuous mode [ 507.248966][T14847] FAULT_INJECTION: forcing a failure. [ 507.248966][T14847] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 507.289305][T14847] CPU: 0 PID: 14847 Comm: syz.1.4673 Tainted: G W 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 507.300711][T14847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 507.310771][T14847] Call Trace: [ 507.314079][T14847] __dump_stack+0x21/0x24 [ 507.318421][T14847] dump_stack_lvl+0x169/0x1d8 [ 507.323109][T14847] ? show_regs_print_info+0x18/0x18 [ 507.328316][T14847] ? __irq_exit_rcu+0x40/0x150 [ 507.333088][T14847] ? irq_exit_rcu+0x9/0x10 [ 507.337514][T14847] dump_stack+0x15/0x1c [ 507.341673][T14847] should_fail+0x3c1/0x510 [ 507.346101][T14847] should_fail_usercopy+0x1a/0x20 [ 507.351128][T14847] _copy_to_user+0x20/0x90 [ 507.355555][T14847] generic_map_lookup_batch+0x69f/0xa60 [ 507.361110][T14847] ? bpf_map_update_value+0x410/0x410 [ 507.366493][T14847] ? __fdget+0x1a1/0x230 [ 507.370740][T14847] ? bpf_map_update_value+0x410/0x410 [ 507.376115][T14847] bpf_map_do_batch+0x2d4/0x5f0 [ 507.380971][T14847] __se_sys_bpf+0x386/0x680 [ 507.385476][T14847] ? __x64_sys_bpf+0x90/0x90 [ 507.390080][T14847] __x64_sys_bpf+0x7b/0x90 [ 507.394502][T14847] do_syscall_64+0x31/0x40 [ 507.398923][T14847] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 507.404817][T14847] RIP: 0033:0x7f423cbcd969 [ 507.409240][T14847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 507.428864][T14847] RSP: 002b:00007f423b236038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 507.437291][T14847] RAX: ffffffffffffffda RBX: 00007f423cdf4fa0 RCX: 00007f423cbcd969 [ 507.445276][T14847] RDX: 0000000000000038 RSI: 00002000000003c0 RDI: 0000000000000018 [ 507.453257][T14847] RBP: 00007f423b236090 R08: 0000000000000000 R09: 0000000000000000 [ 507.461236][T14847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 507.469210][T14847] R13: 0000000000000000 R14: 00007f423cdf4fa0 R15: 00007ffe90b94788 [ 507.505573][T14848] device syzkaller0 entered promiscuous mode [ 508.843738][T14881] device veth1_macvtap left promiscuous mode [ 508.850689][T14881] device macsec0 left promiscuous mode [ 509.039926][T14885] device syzkaller0 entered promiscuous mode [ 510.004275][T14902] device sit0 left promiscuous mode [ 510.433344][T14902] device sit0 entered promiscuous mode [ 510.525960][T14909] device veth0_vlan left promiscuous mode [ 510.535312][T14909] device veth0_vlan entered promiscuous mode [ 510.561722][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 510.597377][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 510.606949][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 510.685430][ T344] bridge0: port 3(veth0) entered disabled state [ 510.728618][T14924] cgroup: fork rejected by pids controller in /syz4 [ 510.839752][T14912] device pim6reg1 entered promiscuous mode [ 511.031973][T14934] device pim6reg1 entered promiscuous mode [ 511.381751][T14939] bridge0: port 1(bridge_slave_0) entered blocking state [ 511.398365][T14939] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.406575][T14939] device bridge_slave_0 entered promiscuous mode [ 511.414484][T14939] bridge0: port 2(bridge_slave_1) entered blocking state [ 511.421790][T14939] bridge0: port 2(bridge_slave_1) entered disabled state [ 511.429603][T14939] device bridge_slave_1 entered promiscuous mode [ 511.591715][T14959] device syzkaller0 entered promiscuous mode [ 511.630689][T14961] device syzkaller0 entered promiscuous mode [ 511.819923][T14965] device wg2 left promiscuous mode [ 511.974259][T14969] device wg2 entered promiscuous mode [ 512.021164][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 512.042859][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 512.150819][T14984] device syzkaller0 entered promiscuous mode [ 512.158795][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 512.167663][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 512.177513][ T344] bridge0: port 1(bridge_slave_0) entered blocking state [ 512.184553][ T344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 512.202448][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 512.212835][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 512.221814][ T344] bridge0: port 2(bridge_slave_1) entered blocking state [ 512.228918][ T344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 512.245615][T14990] FAULT_INJECTION: forcing a failure. [ 512.245615][T14990] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 512.259402][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 512.267643][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 512.275563][T14990] CPU: 0 PID: 14990 Comm: syz.0.4716 Tainted: G W 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 512.286934][T14990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 512.297002][T14990] Call Trace: [ 512.300311][T14990] __dump_stack+0x21/0x24 [ 512.304650][T14990] dump_stack_lvl+0x169/0x1d8 [ 512.309336][T14990] ? show_regs_print_info+0x18/0x18 [ 512.314547][T14990] dump_stack+0x15/0x1c [ 512.318712][T14990] should_fail+0x3c1/0x510 [ 512.319534][T14986] ÿÿÿÿÿÿ: renamed from vlan1 [ 512.323138][T14990] should_fail_usercopy+0x1a/0x20 [ 512.332761][T14990] _copy_to_user+0x20/0x90 [ 512.337201][T14990] generic_map_lookup_batch+0x6fd/0xa60 [ 512.342767][T14990] ? bpf_map_update_value+0x410/0x410 [ 512.348150][T14990] ? __fdget+0x1a1/0x230 [ 512.352411][T14990] ? bpf_map_update_value+0x410/0x410 [ 512.357796][T14990] bpf_map_do_batch+0x2d4/0x5f0 [ 512.362660][T14990] ? security_bpf+0x82/0xa0 [ 512.367225][T14990] __se_sys_bpf+0x386/0x680 [ 512.371777][T14990] ? __x64_sys_bpf+0x90/0x90 [ 512.376385][T14990] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 512.382553][T14990] __x64_sys_bpf+0x7b/0x90 [ 512.386990][T14990] do_syscall_64+0x31/0x40 [ 512.391447][T14990] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 512.397346][T14990] RIP: 0033:0x7fe397788969 [ 512.401810][T14990] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 512.421464][T14990] RSP: 002b:00007fe395daf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 512.430004][T14990] RAX: ffffffffffffffda RBX: 00007fe3979b0160 RCX: 00007fe397788969 [ 512.437986][T14990] RDX: 0000000000000038 RSI: 00002000000003c0 RDI: 0000000000000018 [ 512.445965][T14990] RBP: 00007fe395daf090 R08: 0000000000000000 R09: 0000000000000000 [ 512.453941][T14990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 512.461896][T14990] R13: 0000000000000000 R14: 00007fe3979b0160 R15: 00007ffe815e3e98 [ 512.656273][T14939] device veth0_vlan entered promiscuous mode [ 512.674016][T14989] device syzkaller0 entered promiscuous mode [ 512.681536][ T290] GPL: port 1(erspan0) entered disabled state [ 512.689052][ T290] device erspan0 left promiscuous mode [ 512.694609][ T290] GPL: port 1(erspan0) entered disabled state [ 512.702171][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 512.710821][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 512.719070][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 512.726536][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 512.737752][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 512.774905][T14994] device syzkaller0 entered promiscuous mode [ 512.797312][T14939] device veth1_macvtap entered promiscuous mode [ 512.811823][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 512.821885][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 512.830776][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 512.854373][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 512.887044][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 512.895930][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 512.912237][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 512.933743][T15003] @ÿ: renamed from bond_slave_0 [ 513.002542][T15013] device pim6reg1 entered promiscuous mode [ 513.062206][ T290] device veth0_vlan left promiscuous mode [ 513.889891][T15051] device syzkaller0 entered promiscuous mode [ 514.010175][T15045] device syzkaller0 entered promiscuous mode [ 514.298780][T15067] device syzkaller0 entered promiscuous mode [ 514.883668][T15095] device pim6reg1 entered promiscuous mode [ 515.204964][T15106] device sit0 entered promiscuous mode [ 516.877375][T15151] device syzkaller0 entered promiscuous mode [ 517.260432][T15173] device wg2 entered promiscuous mode [ 518.040379][T15227] device wg2 entered promiscuous mode [ 518.317854][T15246] device syzkaller0 entered promiscuous mode [ 518.386553][T15249] device syzkaller0 entered promiscuous mode [ 518.962952][T15312] device syzkaller0 entered promiscuous mode [ 518.980346][T15318] device wg2 left promiscuous mode [ 519.004984][T15318] device wg2 entered promiscuous mode [ 519.343370][T15334] device syzkaller0 entered promiscuous mode [ 519.793226][T15355] device syzkaller0 entered promiscuous mode [ 519.893446][T15364] device pim6reg1 entered promiscuous mode [ 520.121110][T15379] device syzkaller0 entered promiscuous mode [ 520.623854][T15404] device syzkaller0 entered promiscuous mode [ 521.056853][T15428] device pim6reg1 entered promiscuous mode [ 523.558827][T15533] device pim6reg1 entered promiscuous mode [ 524.461341][T15579] device syzkaller0 entered promiscuous mode [ 524.828831][T15595] device syzkaller0 entered promiscuous mode [ 524.851162][T15602] device pim6reg1 entered promiscuous mode [ 524.968601][T15607] device pim6reg1 entered promiscuous mode [ 525.101054][T15618] device syzkaller0 entered promiscuous mode [ 526.786308][T15709] device syzkaller0 entered promiscuous mode [ 527.278131][T15726] tap0: tun_chr_ioctl cmd 1074025675 [ 527.284730][T15726] tap0: persist enabled [ 527.289997][T15725] tap0: tun_chr_ioctl cmd 1074025675 [ 527.295655][T15725] tap0: persist enabled [ 527.317174][T15726] tap0: tun_chr_ioctl cmd 1074025675 [ 527.322921][T15726] tap0: persist disabled [ 527.916338][T15760] device pim6reg1 entered promiscuous mode [ 528.032283][T15762] device syzkaller0 entered promiscuous mode [ 529.851227][T15830] device pim6reg1 entered promiscuous mode [ 530.168186][T15838] device sit0 left promiscuous mode [ 530.248196][T15838] device sit0 entered promiscuous mode [ 530.615029][T15848] device syzkaller0 entered promiscuous mode [ 531.400280][T15877] device pim6reg1 entered promiscuous mode [ 531.915460][T15885] device veth1_macvtap left promiscuous mode [ 532.107250][T15892] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 532.453935][T15908] device syzkaller0 entered promiscuous mode [ 532.551353][T15913] device pim6reg1 entered promiscuous mode [ 532.994387][T15934] device syzkaller0 entered promiscuous mode [ 534.165089][T15980] device syzkaller0 entered promiscuous mode [ 534.343475][T15985] device syzkaller0 entered promiscuous mode [ 534.395129][T15989] device wg2 left promiscuous mode [ 534.452213][T15990] device wg2 entered promiscuous mode [ 534.765000][T15998] device syzkaller0 entered promiscuous mode [ 534.885966][T16013] device syzkaller0 entered promiscuous mode [ 536.808809][T16064] tap0: tun_chr_ioctl cmd 1074025675 [ 536.826734][T16064] tap0: persist enabled [ 536.851355][T16056] device syzkaller0 entered promiscuous mode [ 536.867527][T16057] tap0: tun_chr_ioctl cmd 1074025675 [ 536.900035][T16057] tap0: persist disabled [ 537.151559][T16076] device syzkaller0 entered promiscuous mode [ 537.711497][T16085] bridge0: port 2(bridge_slave_1) entered disabled state [ 537.776849][T16090] device bridge_slave_1 left promiscuous mode [ 537.789447][T16090] bridge0: port 2(bridge_slave_1) entered disabled state [ 537.804743][T16090] device bridge_slave_0 left promiscuous mode [ 537.828146][T16090] bridge0: port 1(bridge_slave_0) entered disabled state [ 538.433414][T16103] device veth0_vlan left promiscuous mode [ 538.508397][T16103] device veth0_vlan entered promiscuous mode [ 538.550896][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 538.617359][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 538.683363][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 540.005368][T16142] device syzkaller0 entered promiscuous mode [ 540.960387][T16173] device syzkaller0 entered promiscuous mode [ 541.103689][T16181] device syzkaller0 entered promiscuous mode [ 541.696221][T16226] device wg2 entered promiscuous mode [ 543.671124][T16326] device sit0 entered promiscuous mode [ 543.900212][T16337] device syzkaller0 entered promiscuous mode [ 544.146173][T16369] device sit0 left promiscuous mode [ 547.417740][T16457] device syzkaller0 entered promiscuous mode [ 547.907123][T16484] device syzkaller0 entered promiscuous mode [ 548.581472][T16506] Â: renamed from pim6reg1 [ 549.564558][T16565] device pim6reg1 entered promiscuous mode [ 549.896736][T16570] device syzkaller0 entered promiscuous mode [ 550.942719][T16629] device syzkaller0 entered promiscuous mode [ 551.221649][T16627] device pim6reg1 entered promiscuous mode [ 551.239295][T16641] device pim6reg1 entered promiscuous mode [ 552.072278][T16658] device veth0_vlan left promiscuous mode [ 552.124414][T16658] device veth0_vlan entered promiscuous mode [ 552.576372][T16668] Â: renamed from pim6reg1 [ 555.820226][T16781] device veth0_vlan left promiscuous mode [ 555.835232][T16781] device veth0_vlan entered promiscuous mode [ 557.434783][T16830] device syzkaller0 entered promiscuous mode [ 557.598591][T16838] FAULT_INJECTION: forcing a failure. [ 557.598591][T16838] name failslab, interval 1, probability 0, space 0, times 0 [ 557.611281][T16838] CPU: 0 PID: 16838 Comm: syz.1.5270 Tainted: G W 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 557.622654][T16838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 557.632888][T16838] Call Trace: [ 557.636195][T16838] __dump_stack+0x21/0x24 [ 557.640534][T16838] dump_stack_lvl+0x169/0x1d8 [ 557.645223][T16838] ? show_regs_print_info+0x18/0x18 [ 557.650436][T16838] dump_stack+0x15/0x1c [ 557.654626][T16838] should_fail+0x3c1/0x510 [ 557.659053][T16838] ? __napi_alloc_skb+0x158/0x2e0 [ 557.664075][T16838] __should_failslab+0xa4/0xe0 [ 557.668837][T16838] should_failslab+0x9/0x20 [ 557.673335][T16838] __kmalloc_track_caller+0x5f/0x320 [ 557.678621][T16838] ? kmem_cache_alloc+0x165/0x2e0 [ 557.683760][T16838] ? __alloc_skb+0x9e/0x520 [ 557.688351][T16838] ? __napi_alloc_skb+0x158/0x2e0 [ 557.693464][T16838] __alloc_skb+0xdc/0x520 [ 557.697790][T16838] ? __kasan_check_write+0x14/0x20 [ 557.702887][T16838] __napi_alloc_skb+0x158/0x2e0 [ 557.707723][T16838] napi_get_frags+0x6b/0x170 [ 557.712298][T16838] tun_get_user+0xa2c/0x3090 [ 557.716872][T16838] ? ____kasan_slab_free+0x125/0x160 [ 557.722139][T16838] ? __kasan_slab_free+0x11/0x20 [ 557.727063][T16838] ? putname+0xfe/0x150 [ 557.731203][T16838] ? __x64_sys_openat+0x136/0x160 [ 557.736213][T16838] ? tun_do_read+0x1c00/0x1c00 [ 557.740986][T16838] ? kstrtouint_from_user+0x1a0/0x200 [ 557.746345][T16838] ? __fsnotify_parent+0x5f5/0x6c0 [ 557.751458][T16838] ? avc_policy_seqno+0x1b/0x70 [ 557.756305][T16838] ? selinux_file_permission+0x2a5/0x510 [ 557.762009][T16838] ? fsnotify_perm+0x66/0x4b0 [ 557.766711][T16838] tun_chr_write_iter+0x1bf/0x270 [ 557.771726][T16838] vfs_write+0x725/0xd60 [ 557.775957][T16838] ? kernel_write+0x3c0/0x3c0 [ 557.780620][T16838] ? __fget_files+0x2c4/0x320 [ 557.785283][T16838] ? __fdget_pos+0x1f7/0x380 [ 557.789890][T16838] ? ksys_write+0x71/0x240 [ 557.794423][T16838] ksys_write+0x140/0x240 [ 557.798778][T16838] ? __ia32_sys_read+0x90/0x90 [ 557.803553][T16838] ? fpu__clear_all+0x20/0x20 [ 557.808239][T16838] __x64_sys_write+0x7b/0x90 [ 557.812824][T16838] do_syscall_64+0x31/0x40 [ 557.817229][T16838] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 557.823113][T16838] RIP: 0033:0x7f423cbcd969 [ 557.827521][T16838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 557.847253][T16838] RSP: 002b:00007f423b236038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 557.855696][T16838] RAX: ffffffffffffffda RBX: 00007f423cdf4fa0 RCX: 00007f423cbcd969 [ 557.863658][T16838] RDX: 0000000000000240 RSI: 0000200000000000 RDI: 0000000000000003 [ 557.871621][T16838] RBP: 00007f423b236090 R08: 0000000000000000 R09: 0000000000000000 [ 557.879580][T16838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 557.887537][T16838] R13: 0000000000000000 R14: 00007f423cdf4fa0 R15: 00007ffe90b94788 [ 558.244958][T16867] device syzkaller0 entered promiscuous mode [ 558.492259][T16893] sock: sock_set_timeout: `syz.3.5288' (pid 16893) tries to set negative timeout [ 558.589324][T16889] device syzkaller0 entered promiscuous mode [ 558.597388][T16891] bridge0: port 2(bridge_slave_1) entered disabled state [ 558.606499][T16891] bridge0: port 1(bridge_slave_0) entered disabled state [ 558.774520][T16891] device bridge_slave_1 left promiscuous mode [ 558.797375][T16891] bridge0: port 2(bridge_slave_1) entered disabled state [ 558.819808][T16891] device bridge_slave_0 left promiscuous mode [ 558.831606][T16891] bridge0: port 1(bridge_slave_0) entered disabled state [ 558.963068][T16910] device syzkaller0 entered promiscuous mode [ 559.108129][T16919] syz.2.5295[16919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 559.108192][T16919] syz.2.5295[16919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 559.256203][T16927] device wg2 left promiscuous mode [ 559.378453][T16927] device wg2 entered promiscuous mode [ 559.890137][T16951] device syzkaller0 entered promiscuous mode [ 561.427115][T17029] device syzkaller0 entered promiscuous mode [ 561.519759][T17046] FAULT_INJECTION: forcing a failure. [ 561.519759][T17046] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 561.533196][T17046] CPU: 1 PID: 17046 Comm: syz.2.5332 Tainted: G W 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 561.544568][T17046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 561.554614][T17046] Call Trace: [ 561.557899][T17046] __dump_stack+0x21/0x24 [ 561.562217][T17046] dump_stack_lvl+0x169/0x1d8 [ 561.566884][T17046] ? thaw_kernel_threads+0x220/0x220 [ 561.572174][T17046] ? vsnprintf+0x1871/0x1960 [ 561.576783][T17046] ? show_regs_print_info+0x18/0x18 [ 561.582091][T17046] dump_stack+0x15/0x1c [ 561.586244][T17046] should_fail+0x3c1/0x510 [ 561.590777][T17046] should_fail_usercopy+0x1a/0x20 [ 561.595828][T17046] _copy_to_user+0x20/0x90 [ 561.600685][T17046] simple_read_from_buffer+0xe9/0x160 [ 561.606070][T17046] proc_fail_nth_read+0x19a/0x210 [ 561.611090][T17046] ? proc_fault_inject_write+0x2f0/0x2f0 [ 561.616717][T17046] ? rw_verify_area+0x1c0/0x360 [ 561.621553][T17046] ? proc_fault_inject_write+0x2f0/0x2f0 [ 561.627180][T17046] vfs_read+0x1fe/0xa10 [ 561.631323][T17046] ? kernel_read+0x70/0x70 [ 561.635727][T17046] ? __kasan_check_write+0x14/0x20 [ 561.640910][T17046] ? mutex_lock+0x8c/0xe0 [ 561.645228][T17046] ? mutex_trylock+0xa0/0xa0 [ 561.650000][T17046] ? __fget_files+0x2c4/0x320 [ 561.654871][T17046] ? __fdget_pos+0x2d2/0x380 [ 561.659530][T17046] ? ksys_read+0x71/0x240 [ 561.663880][T17046] ksys_read+0x140/0x240 [ 561.668109][T17046] ? vfs_write+0xd60/0xd60 [ 561.672509][T17046] ? fpu__clear_all+0x20/0x20 [ 561.677170][T17046] __x64_sys_read+0x7b/0x90 [ 561.681657][T17046] do_syscall_64+0x31/0x40 [ 561.686063][T17046] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 561.692092][T17046] RIP: 0033:0x7ff389c9537c [ 561.696502][T17046] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 561.716095][T17046] RSP: 002b:00007ff3882ff030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 561.724496][T17046] RAX: ffffffffffffffda RBX: 00007ff389ebdfa0 RCX: 00007ff389c9537c [ 561.732451][T17046] RDX: 000000000000000f RSI: 00007ff3882ff0a0 RDI: 0000000000000009 [ 561.740422][T17046] RBP: 00007ff3882ff090 R08: 0000000000000000 R09: 0000000000000000 [ 561.748380][T17046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 561.756367][T17046] R13: 0000000000000000 R14: 00007ff389ebdfa0 R15: 00007ffc4d8b26e8 [ 562.326642][T17073] GPL: port 1(erspan0) entered blocking state [ 562.332979][T17073] GPL: port 1(erspan0) entered disabled state [ 562.346486][T17073] device erspan0 entered promiscuous mode [ 562.409940][T17075] GPL: port 1(erspan0) entered blocking state [ 562.416075][T17075] GPL: port 1(erspan0) entered forwarding state [ 562.651532][T17087] ÿÿÿÿÿÿ: renamed from team_slave_1 [ 564.004140][T17132] device pim6reg1 entered promiscuous mode [ 565.037778][T17173] device veth0_vlan left promiscuous mode [ 565.087563][T17173] device veth0_vlan entered promiscuous mode [ 565.183740][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 565.204395][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 565.255078][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 565.464207][T17198] device sit0 left promiscuous mode [ 565.745763][T17205] device pim6reg1 entered promiscuous mode [ 566.243347][T17220] device wg2 left promiscuous mode [ 566.408150][ T24] audit: type=1400 audit(1746819168.410:199): avc: denied { create } for pid=17225 comm="syz.4.5392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 568.849571][T17310] device sit0 entered promiscuous mode [ 569.611817][T17324] device syzkaller0 entered promiscuous mode [ 571.451853][T17390] device pim6reg1 entered promiscuous mode [ 571.583115][T17393] syz.2.5440[17393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 571.583211][T17393] syz.2.5440[17393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 571.915433][T17401] device sit0 left promiscuous mode [ 573.034126][T17429] syz.0.5450[17429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 573.034191][T17429] syz.0.5450[17429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 573.793376][T17459] device sit0 left promiscuous mode [ 574.388624][T17482] device pim6reg1 entered promiscuous mode [ 576.503363][T17581] device wg2 left promiscuous mode [ 578.761114][T17627] device pim6reg1 entered promiscuous mode [ 579.085305][T17659] device sit0 left promiscuous mode [ 580.925787][T17752] device veth0_vlan left promiscuous mode [ 580.940380][T17752] device veth0_vlan entered promiscuous mode [ 580.971620][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 580.980019][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 580.988196][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 582.041187][T17771] device veth0_vlan left promiscuous mode [ 582.077034][T17771] device veth0_vlan entered promiscuous mode [ 582.107931][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 582.118709][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 582.132285][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 583.152837][T17833] device syzkaller0 entered promiscuous mode [ 583.578540][T17851] syz.4.5582[17851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 583.578634][T17851] syz.4.5582[17851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 583.621394][T17855] syz.2.5583[17855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 583.634099][T17855] syz.2.5583[17855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 584.291513][T17908] device syzkaller0 entered promiscuous mode [ 584.806751][T17935] pim6reg0: tun_chr_ioctl cmd 1074025680 [ 585.009312][T17956] device sit0 entered promiscuous mode [ 585.831815][T17992] device pim6reg1 entered promiscuous mode [ 585.971165][T18002] device syzkaller0 entered promiscuous mode [ 586.409165][T18018] device pim6reg1 entered promiscuous mode [ 586.839461][T18012] syz.4.5627[18012] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.119823][T18026] device syzkaller0 entered promiscuous mode [ 587.761904][ T24] audit: type=1400 audit(1746819189.760:200): avc: denied { create } for pid=18062 comm="syz.4.5644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 591.413205][T18217] device syzkaller0 entered promiscuous mode [ 591.822502][T18236] device pim6reg1 entered promiscuous mode [ 596.360774][T18319] device pim6reg1 entered promiscuous mode [ 598.491715][T18346] device syzkaller0 entered promiscuous mode [ 601.658900][T18363] device syzkaller0 entered promiscuous mode [ 603.391156][T18402] device veth0_vlan left promiscuous mode [ 603.441038][T18402] device veth0_vlan entered promiscuous mode [ 604.936150][T18423] device sit0 entered promiscuous mode [ 605.847680][T18438] device pim6reg1 entered promiscuous mode [ 606.453324][T18464] bridge0: port 2(bridge_slave_1) entered disabled state [ 606.462342][T18464] bridge0: port 1(bridge_slave_0) entered disabled state [ 606.742417][T18483] syz.3.5767[18483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 606.742479][T18483] syz.3.5767[18483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 607.148427][T18483] device veth0_vlan left promiscuous mode [ 607.170594][T18483] device veth0_vlan entered promiscuous mode [ 612.530854][T18708] device syzkaller0 entered promiscuous mode [ 612.896434][T18726] device syzkaller0 entered promiscuous mode [ 613.380828][T18748] device veth0_vlan left promiscuous mode [ 613.401646][T18748] device veth0_vlan entered promiscuous mode [ 613.438650][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 613.447355][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 613.467782][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 613.724525][T18776] device macsec0 left promiscuous mode [ 614.153204][T18788] device syzkaller0 entered promiscuous mode [ 614.541214][T18790] device syzkaller0 entered promiscuous mode [ 614.688941][T18798] device wg2 left promiscuous mode [ 614.706022][T18799] device wg2 entered promiscuous mode [ 615.420570][T18836] device macsec0 entered promiscuous mode [ 616.217687][T18887] device sit0 left promiscuous mode [ 616.367271][T18890] device sit0 entered promiscuous mode [ 616.883913][T18900] geneve1: tun_chr_ioctl cmd 2147767519 [ 617.323251][T18939] device sit0 left promiscuous mode [ 617.575719][T18941] device pim6reg1 entered promiscuous mode [ 618.408903][T19000] device veth0_vlan left promiscuous mode [ 618.465648][T19000] device veth0_vlan entered promiscuous mode [ 618.629511][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 618.638001][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 618.645571][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 620.067731][T19058] device syzkaller0 entered promiscuous mode [ 620.270217][T19072] device pim6reg1 entered promiscuous mode [ 620.815232][ T24] audit: type=1400 audit(1746819222.810:201): avc: denied { mounton } for pid=19082 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 621.203886][T19082] bridge0: port 1(bridge_slave_0) entered blocking state [ 621.240821][T19082] bridge0: port 1(bridge_slave_0) entered disabled state [ 621.249009][T19082] device bridge_slave_0 entered promiscuous mode [ 621.321247][T19082] bridge0: port 2(bridge_slave_1) entered blocking state [ 621.339340][T19082] bridge0: port 2(bridge_slave_1) entered disabled state [ 621.367107][T19082] device bridge_slave_1 entered promiscuous mode [ 621.532617][ T290] device ip6gretap0 left promiscuous mode [ 621.546154][ T290] : port 1(ip6gretap0) entered disabled state [ 621.579423][T19114] device pim6reg1 entered promiscuous mode [ 621.679365][T19125] device syzkaller0 entered promiscuous mode [ 621.995263][T19082] bridge0: port 2(bridge_slave_1) entered blocking state [ 622.002403][T19082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 622.009867][T19082] bridge0: port 1(bridge_slave_0) entered blocking state [ 622.016921][T19082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 622.096877][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 622.110972][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 622.286848][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 622.307094][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 622.316048][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 622.324472][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 622.357500][ T344] bridge0: port 1(bridge_slave_0) entered blocking state [ 622.364635][ T344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 622.412740][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 622.422127][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 622.430925][ T344] bridge0: port 2(bridge_slave_1) entered blocking state [ 622.438039][ T344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 622.453446][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 622.461783][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 622.552525][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 622.560860][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 622.696865][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 622.717381][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 622.773942][T19082] device veth0_vlan entered promiscuous mode [ 622.795219][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 622.810105][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 622.818808][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 622.826422][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 622.863996][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 622.872379][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 622.901815][T19082] device veth1_macvtap entered promiscuous mode [ 622.925390][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 622.934521][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 622.943599][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 622.981822][ T290] device veth0_vlan left promiscuous mode [ 623.244552][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 623.255771][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 623.306428][T19207] syz.0.5943[19207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 623.306520][T19207] syz.0.5943[19207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 623.345704][T19209] device pim6reg1 entered promiscuous mode [ 623.375081][T19207] syz.0.5943[19207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 623.375175][T19207] syz.0.5943[19207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 623.511309][T19223] syz.4.5984[19223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 623.530201][T19223] syz.4.5984[19223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 626.444022][T19340] device pim6reg1 entered promiscuous mode [ 626.710099][T19324] device syzkaller0 entered promiscuous mode [ 627.337137][T19384] device pim6reg1 entered promiscuous mode [ 627.981754][T19411] device pim6reg1 entered promiscuous mode [ 628.077737][T19423] device pim6reg1 entered promiscuous mode [ 628.944180][T19460] device pim6reg1 entered promiscuous mode [ 630.247122][T19498] device pim6reg1 entered promiscuous mode [ 630.653635][T19517] device veth0_vlan left promiscuous mode [ 630.660929][T19517] device veth0_vlan entered promiscuous mode [ 630.687451][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 630.703340][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 630.714098][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 632.960289][T19554] bridge0: port 1(bridge_slave_0) entered blocking state [ 632.968420][T19554] bridge0: port 1(bridge_slave_0) entered disabled state [ 632.976281][T19554] device bridge_slave_0 entered promiscuous mode [ 632.995954][T19554] bridge0: port 2(bridge_slave_1) entered blocking state [ 633.003377][T19554] bridge0: port 2(bridge_slave_1) entered disabled state [ 633.011040][T19554] device bridge_slave_1 entered promiscuous mode [ 633.072991][T19554] bridge0: port 2(bridge_slave_1) entered blocking state [ 633.080079][T19554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 633.087429][T19554] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.094477][T19554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 633.103429][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 633.111507][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 633.140315][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 633.148355][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 633.171249][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 633.216823][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 633.231705][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.238797][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 633.246230][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 633.254999][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 633.263347][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 633.270419][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 633.312267][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 633.320568][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 633.329192][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 633.337975][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 633.389609][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 633.398598][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 633.457318][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 633.465657][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 633.495687][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 633.537023][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 633.545946][T19554] device veth0_vlan entered promiscuous mode [ 633.642376][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 633.651980][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 633.661784][T19554] device veth1_macvtap entered promiscuous mode [ 633.818109][T19590] device syzkaller0 entered promiscuous mode [ 633.860847][ T290] GPL: port 1(erspan0) entered disabled state [ 633.874848][ T290] device erspan0 left promiscuous mode [ 633.896952][ T290] GPL: port 1(erspan0) entered disabled state [ 633.914847][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 633.935963][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 633.966858][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 634.097408][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 634.146387][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 634.709183][ T290] device veth0_vlan left promiscuous mode [ 634.949539][T19634] FAULT_INJECTION: forcing a failure. [ 634.949539][T19634] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 635.008851][T19634] CPU: 1 PID: 19634 Comm: syz.3.6110 Tainted: G W 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 635.020257][T19634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 635.030318][T19634] Call Trace: [ 635.033632][T19634] __dump_stack+0x21/0x24 [ 635.037969][T19634] dump_stack_lvl+0x169/0x1d8 [ 635.042657][T19634] ? show_regs_print_info+0x18/0x18 [ 635.047865][T19634] ? stack_map_pop_elem+0x251/0x380 [ 635.053222][T19634] ? queue_map_peek_elem+0x2c0/0x2c0 [ 635.058617][T19634] dump_stack+0x15/0x1c [ 635.062801][T19634] should_fail+0x3c1/0x510 [ 635.067494][T19634] should_fail_usercopy+0x1a/0x20 [ 635.072636][T19634] _copy_to_user+0x20/0x90 [ 635.077171][T19634] bpf_prog_test_run_raw_tp+0x4f2/0x660 [ 635.082958][T19634] ? bpf_prog_test_run_tracing+0x4f0/0x4f0 [ 635.088792][T19634] ? fput_many+0x15a/0x1a0 [ 635.093234][T19634] ? bpf_prog_test_run_tracing+0x4f0/0x4f0 [ 635.099153][T19634] bpf_prog_test_run+0x350/0x3c0 [ 635.104140][T19634] __se_sys_bpf+0x49f/0x680 [ 635.108659][T19634] ? __x64_sys_bpf+0x90/0x90 [ 635.113260][T19634] ? fpu__clear_all+0x20/0x20 [ 635.118065][T19634] __x64_sys_bpf+0x7b/0x90 [ 635.122535][T19634] do_syscall_64+0x31/0x40 [ 635.126980][T19634] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 635.133097][T19634] RIP: 0033:0x7fb2b41ac969 [ 635.137522][T19634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 635.157287][T19634] RSP: 002b:00007fb2b2815038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 635.165720][T19634] RAX: ffffffffffffffda RBX: 00007fb2b43d3fa0 RCX: 00007fb2b41ac969 [ 635.173712][T19634] RDX: 000000000000000c RSI: 0000200000000500 RDI: 000000000000000a [ 635.181698][T19634] RBP: 00007fb2b2815090 R08: 0000000000000000 R09: 0000000000000000 [ 635.189681][T19634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 635.197661][T19634] R13: 0000000000000000 R14: 00007fb2b43d3fa0 R15: 00007fff28566378 [ 635.779205][T19672] FAULT_INJECTION: forcing a failure. [ 635.779205][T19672] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 635.796842][T19672] CPU: 1 PID: 19672 Comm: syz.4.6124 Tainted: G W 5.10.237-syzkaller-00309-g7e2543346ff7 #0 [ 635.808272][T19672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 635.818334][T19672] Call Trace: [ 635.821643][T19672] __dump_stack+0x21/0x24 [ 635.825980][T19672] dump_stack_lvl+0x169/0x1d8 [ 635.830663][T19672] ? thaw_kernel_threads+0x220/0x220 [ 635.835955][T19672] ? vsnprintf+0x1871/0x1960 [ 635.840599][T19672] ? show_regs_print_info+0x18/0x18 [ 635.845808][T19672] dump_stack+0x15/0x1c [ 635.849969][T19672] should_fail+0x3c1/0x510 [ 635.854398][T19672] should_fail_usercopy+0x1a/0x20 [ 635.859432][T19672] _copy_to_user+0x20/0x90 [ 635.863859][T19672] simple_read_from_buffer+0xe9/0x160 [ 635.869237][T19672] proc_fail_nth_read+0x19a/0x210 [ 635.874314][T19672] ? proc_fault_inject_write+0x2f0/0x2f0 [ 635.879950][T19672] ? rw_verify_area+0x1c0/0x360 [ 635.884805][T19672] ? proc_fault_inject_write+0x2f0/0x2f0 [ 635.890439][T19672] vfs_read+0x1fe/0xa10 [ 635.894601][T19672] ? kernel_read+0x70/0x70 [ 635.899150][T19672] ? __kasan_check_write+0x14/0x20 [ 635.904273][T19672] ? mutex_lock+0x8c/0xe0 [ 635.908606][T19672] ? mutex_trylock+0xa0/0xa0 [ 635.913196][T19672] ? __fget_files+0x2c4/0x320 [ 635.917879][T19672] ? __fdget_pos+0x2d2/0x380 [ 635.922578][T19672] ? ksys_read+0x71/0x240 [ 635.926912][T19672] ksys_read+0x140/0x240 [ 635.931161][T19672] ? vfs_write+0xd60/0xd60 [ 635.935585][T19672] ? fpu__clear_all+0x20/0x20 [ 635.940269][T19672] __x64_sys_read+0x7b/0x90 [ 635.944789][T19672] do_syscall_64+0x31/0x40 [ 635.949359][T19672] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 635.955253][T19672] RIP: 0033:0x7f4814a6037c [ 635.959678][T19672] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 635.979285][T19672] RSP: 002b:00007f48130ca030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 635.987713][T19672] RAX: ffffffffffffffda RBX: 00007f4814c88fa0 RCX: 00007f4814a6037c [ 635.995690][T19672] RDX: 000000000000000f RSI: 00007f48130ca0a0 RDI: 0000000000000007 [ 636.003666][T19672] RBP: 00007f48130ca090 R08: 0000000000000000 R09: 0000000000000000 [ 636.011646][T19672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 636.019630][T19672] R13: 0000000000000000 R14: 00007f4814c88fa0 R15: 00007ffc69c34738 [ 636.133951][T19670] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.156397][T19670] bridge0: port 1(bridge_slave_0) entered disabled state [ 636.215778][T19670] device bridge_slave_0 entered promiscuous mode [ 636.270252][T19670] bridge0: port 2(bridge_slave_1) entered blocking state [ 636.338714][T19670] bridge0: port 2(bridge_slave_1) entered disabled state [ 636.379732][T19670] device bridge_slave_1 entered promiscuous mode [ 636.998767][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 637.023733][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 637.115790][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 637.207047][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 637.266903][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 637.273994][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 637.356481][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 637.403187][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 637.431803][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 637.438898][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 637.628004][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 637.647339][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 637.676991][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 637.722218][T19670] device veth0_vlan entered promiscuous mode [ 637.742442][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 637.751120][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 637.804025][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 637.827138][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 637.864320][T19670] device veth1_macvtap entered promiscuous mode [ 637.885858][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 637.897785][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 637.927509][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 637.986819][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 638.036822][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready SYZFAIL: failed to send rpc fd=3 want=648 sent=0 n=-1 (errno 32: Broken pipe) [ 683.028601][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 683.057162][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 683.108180][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 683.126891][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 684.307565][ T9] device veth0 left promiscuous mode [ 684.313087][ T9] bridge0: port 3(veth0) entered disabled state [ 684.320270][ T9] device bridge_slave_1 left promiscuous mode [ 684.326450][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 684.334135][ T9] device bridge_slave_0 left promiscuous mode [ 684.340341][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.348851][ T9] device veth1_macvtap left promiscuous mode [ 685.787814][ T9] device bridge_slave_1 left promiscuous mode [ 685.794112][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 685.801760][ T9] device bridge_slave_0 left promiscuous mode [ 685.807994][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 685.817475][ T9] device bridge_slave_1 left promiscuous mode [ 685.823587][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 685.831192][ T9] device bridge_slave_0 left promiscuous mode [ 685.837424][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 685.845205][ T9] device bridge_slave_1 left promiscuous mode [ 685.851435][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 685.858884][ T9] device bridge_slave_0 left promiscuous mode [ 685.864985][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 685.872991][ T9] device bridge_slave_1 left promiscuous mode [ 685.879245][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 685.886736][ T9] device bridge_slave_0 left promiscuous mode [ 685.892875][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 685.901280][ T9] device veth1_macvtap left promiscuous mode [ 685.907362][ T9] device veth0_vlan left promiscuous mode [ 685.913288][ T9] device veth1_macvtap left promiscuous mode [ 685.919580][ T9] device veth1_macvtap left promiscuous mode [ 685.925583][ T9] device veth0_vlan left promiscuous mode [ 685.931568][ T9] device veth1_macvtap left promiscuous mode