last executing test programs: 4.008564962s ago: executing program 3 (id=1198): r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x282, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="190000de695e6414f31aab0008"], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000740)={0x0, r0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x5, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0b00000005000000000400000d00000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000c501f7ecb75a12f7d8539cfcc4980000000000000000eb0000000000000000"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f00000008c0)='ext4_fc_stats\x00', r3, 0x0, 0x5}, 0x18) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x9, 0xe, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xc, 0x20000000}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='9p_client_req\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r5, r6, 0x0, 0x0, 0x0}, 0xfffffffffffffed7) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="160a0000000000006110ac000000000095000f0000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYRES64=0x0], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000700)=r5, 0x12) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x10, 0x2, 0x6, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0x1, 0x58, &(0x7f0000000480)}, 0x10) sendmsg$inet(r7, &(0x7f0000000680)={&(0x7f0000000180)={0x2, 0x4e22, @private=0xa010102}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000200)="37e777e7d384068cb5c6a8fc0e51266470d230b1d77b5a4ff32d911f5c31ffee023ff0709785c0c0166419d7d558", 0x2e}, {&(0x7f0000000240)="702af9c03473b8e85120d208fac75e8fb0189b406fb47694f01e38d053", 0x1d}, {&(0x7f00000003c0)="0512f875ceaa50e605f693b4688d71eabe8228c867328d9a8d27e770cd12843e151c530292e29b6fdc98b97f2f993da76cfde7239bc6f0fcd5d4c5b2ecf49e7e3fdb691b0e42bc68d7bcb19acbf9f346fb52908355e7267f35b6c36dd36a1a1a1618d7665c3de71c5d3b141e3b8bb397d43428f777fb75076b69476ad138c6053f0eb59c528f6de2", 0x88}], 0x3, &(0x7f00000005c0)=ANY=[], 0xa0}, 0x4046096) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x8}, 0x2000, 0x0, 0x0, 0x0, 0x46fa, 0x820000, 0x7fff, 0x0, 0x0, 0x0, 0x10a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000170000000000000908000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x800000}, [@call={0x85, 0x0, 0x0, 0x50}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r9}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="090000000400000008f9ff000c23000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) write$cgroup_type(0xffffffffffffffff, &(0x7f00000006c0), 0x9) 3.705533092s ago: executing program 3 (id=1206): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9426}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000018360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x6400, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000540)='cpu&00\t||') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x207) 3.537406751s ago: executing program 3 (id=1207): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r0, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r0, 0xe0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000800)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0], 0x0, 0xe8, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x1b, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x3, 0x11, &(0x7f0000000680)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xf697}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ldst={0x3, 0x0, 0x0, 0x7, 0x4, 0x8, 0x4}, @ldst={0x3, 0x0, 0x4, 0x0, 0xb, 0x10}]}, &(0x7f0000001d00)='syzkaller\x00', 0x15, 0x1000, &(0x7f0000000a40)=""/4096, 0x41000, 0x20, '\x00', r1, @fallback=0x30, r2, 0x8, &(0x7f0000000740)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000780)={0x3, 0xd, 0x4, 0x1}, 0x10, r3, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000001b40)=[{0x3, 0x1, 0xf, 0x3}, {0x2, 0x4, 0xb, 0x7}, {0x4, 0x5, 0xa, 0x7}, {0x3, 0x5, 0xf, 0x9}], 0x10, 0xb, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x11, 0x3, 0x0, &(0x7f00000001c0)) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbb, 0xbb, 0xa, [@float={0x7f, 0x0, 0x0, 0x10, 0x2}, @ptr={0x7, 0x0, 0x0, 0x2, 0x3}, @fwd={0xe}, @float={0x8, 0x0, 0x0, 0x10, 0x2}, @restrict={0xa, 0x0, 0x0, 0xb, 0x1}, @volatile={0x9, 0x0, 0x0, 0x9, 0x2}, @datasec={0xa, 0x7, 0x0, 0xf, 0x3, [{0x3, 0x1, 0x1}, {0x5, 0x195e, 0x80}, {0x3, 0x1, 0x80000000}, {0x3, 0x81, 0x5}, {0x1, 0x1, 0xe}, {0x3, 0xc68, 0x4}, {0x1, 0x0, 0x1}], "7aec21"}, @int={0xa, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x57, 0x5}]}, {0x0, [0x0, 0x5f, 0x0, 0x7f, 0x2e, 0x30, 0x61, 0x2e]}}, &(0x7f0000000180)=""/170, 0xde, 0xaa, 0x0, 0x1, 0x0, @void, @value}, 0x28) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r5, @ANYRES8=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0x3, 0x2, 0x12, 0xffffffffffffffff, 0xa, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x0, 0x2, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r6, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000013a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000001d40)='mm_page_alloc\x00', r10}, 0x18) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000500)={r7, 0x0, 0x20000000}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r11}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x4803}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r12) 3.31841733s ago: executing program 3 (id=1208): perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x7, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xb}, 0x0, 0xc8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x80) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000000000001800", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 3.18284966s ago: executing program 3 (id=1212): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, 0x0, 0x2000fdef) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@fallback=r0, r0, 0x26, 0x2005, 0xffffffffffffffff, @value=r1}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) gettid() bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x10000a, 0xffffffffffffffff, 0x9) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r5, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r5}, 0xc) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40001) write$cgroup_int(r6, &(0x7f0000000000)=0x1, 0x12) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="620ac4ff0000000071100800000000009500008e725cd200"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 2.948731039s ago: executing program 1 (id=1213): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='ext4_mballoc_alloc\x00', r0, 0x0, 0x5}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_destroy\x00', r2}, 0x18) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) close(r3) 2.754030639s ago: executing program 0 (id=1215): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000200000000000010000000018110000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000046682d562c31630100000000000000b52f0d6086e274aa97a91fa46cdcefe7534fda04ca542b4c4904446290f93bce3177127ebc0c24e7e718c0b1da96d9c9fa8e95238403007cb9806b9641253a7b99504c950fcba378fae7ec90b6da825996012194da80cc7621803fe840ccedca203b30524e6258edbfe64d0900cdf79924bfb82ad5cfe25853d4f3a2841f7d7e692bfb1387c1211d00d4cace5a0ae3fad859bc7cb33f20922abe3780b6d07d9dde639e27dc79daef403b188d618ab4928773db8fba724f8d8f46ff88fdf1e61dceef4ac7bb085eb915eb2f14927a5caef0f5224ef0e7219c3fe37b272f27e9aab8a31e258d6c14be1f1a31a8e68d00"/306], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"/306], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1600000004000000630000000000000000050000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1600000004000000630000000000000000050000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x5c901, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00"/18, @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000fa8500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000084000000b7000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f1, &(0x7f0000000900)={'ip6tnl0\x00', @random="0600002000"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x2000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)) (async) syz_clone(0x2000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[], 0x32600) write$cgroup_subtree(r5, &(0x7f0000000680)=ANY=[@ANYBLOB="2b696f2006626c6b696fc2e8097894cb111a94dbff8c87d878202b7069646f4f05004010f233eb5253bbd01afdd4ffa3b2d63ff883f2b13c3fb224af403088e08bab095423693dd673db55bdc7f1c267e4ee4d04df41eb1df1b358397adffc8c54801494a6185037338541adfb6a003a79df3e68096119028ca01cbf736c16ff525ec788dcdbeb14bfaef7f860d1c180ba4e6c0d5527f946baa6c2b9d1c751422da02127f597466a780c592a13d1b234aa44e412df3ad4736701a1cc669a7614bddff5d1d1b052eb"], 0x1e) bpf$MAP_CREATE(0x2000000000000000, &(0x7f00000000c0)=ANY=[@ANYBLOB="06000000040000000080", @ANYRES32, @ANYRESOCT, @ANYBLOB="000000ddfdffffffe1ff1c839059440e034e9f606c65a7b8e5e09900dbb4b7083709a79ce534019a1f2439636a"], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0, 0xffff0000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000a6388d41b5e303e7ccddf116fbb900000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRESOCT, @ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRESOCT, @ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2.153478916s ago: executing program 3 (id=1218): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x31) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x2, 0x574b940b860987d2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f00000568e4fea4b2d300", @ANYRES32, @ANYBLOB="0000000000000000000000000001000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r7}, 0x18) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x9, 0x84, 0xf8, 0x60, 0x0, 0xc, 0x8000, 0xd, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_config_ext={0x4, 0xe5c}, 0x1200, 0x23933f, 0x1, 0x6, 0x80000001, 0x44d, 0x6, 0x0, 0x207, 0x0, 0x6}, 0x0, 0x1, r8, 0x1) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000980), 0x20000992) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.116385856s ago: executing program 1 (id=1219): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB='1-2:5/', @ANYRESDEC], 0x31) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r4, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r8, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80), 0x100}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 1.746504925s ago: executing program 1 (id=1222): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc11"], 0xfdef) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000a40)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="10005b22b97f8623cad930c6105b607b00000400", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r1, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={r1, &(0x7f00000007c0)="6a89d5ddfad8ece6197df50c18d9fe81100113b8b339361c07ff3d0de50356229ad41df6a6323d1a3ebcb3faae6273ac0461089cf585ac20af704ef1c8d61466a17eb4c3193957a8df6e7eac2a5d47f792e6897c234191dfabb07491789bf4ba8a20a465434c82fab816ca767d4ceb8a2111b3677dd5761b81ac1a2a8974c93eacbb8dbd6d36e41b2ccf71875a97f4f200000000000000000000f1f58ce3e871313438c5d2e3ee24ae089e9d8292275b", 0x0, 0x4}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001280)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0], 0x0, 0x23, &(0x7f0000000280)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000240), &(0x7f0000000640), 0x8, 0x73, 0x8, 0x14, &(0x7f0000000680)}}, 0x10) write$cgroup_pid(r1, &(0x7f0000000200)=0xffffffffffffffff, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="e72f2f62dee10cfa0e056dd20da058dda861b18c2aa7922d5dfada1c1fb47da1dbcf63893f8c3913f603867892149011e1f8efb8e1502fe84c032c0ff4c9872d6024268447a735e98ff9cdf02bbaa809395f19b49e745db0e2199d57da228da93f46473b43705c7bb767ba5c7c6b3143eb145ece6f890a42802dd5044f1d4e171dafcc0d9dcb9930268a7a67b137877aeb6df562984d47fce423487e344dd212030d5af74f45baa55f4886f469473cf01c10f8d77fe55036f1af393b"], &(0x7f0000000080)='GPL\x00', 0x5, 0xab, &(0x7f0000000900)=""/171, 0x41100, 0x20, '\x00', r3, @fallback=0x1e, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x0, 0x3, 0x0, 0x1}, 0x10, r4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000017010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYRESHEX=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0a00000004000000080000000800000000100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r3, @ANYRES32, @ANYBLOB="01000000000000000100000000000800"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r8}, 0x0, &(0x7f0000000180)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'pimreg1\x00', 0x100}) close(r11) write$cgroup_subtree(r6, 0x0, 0xfdef) 1.340119354s ago: executing program 0 (id=1225): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$SIOCSIFHWADDR(r0, 0x8946, &(0x7f0000000900)={'ip6gre0\x00', @random='\x00\x00\x00 \x00'}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) r2 = getpid() syz_open_procfs$namespace(r2, &(0x7f0000000140)='ns/cgroup\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='block_split\x00', r3, 0x0, 0x9}, 0x18) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r5, 0x8982, 0x20000000) 1.279193604s ago: executing program 2 (id=1226): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000001540)=""/155}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="550a0000000000006111580000000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) close(r2) 1.207775484s ago: executing program 4 (id=1228): openat$tun(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000c1dc3ab200"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3b}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000880), 0x3}, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000100000891468000000000000", @ANYRES32=0x0, @ANYRES32, @ANYRES64=r2], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000000000800000a1750000", @ANYRES32, @ANYBLOB="0300000000d200"/20, @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000002d971c9400000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x14, &(0x7f0000000180)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000940)='tlb_flush\x00', r7}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000340)=ANY=[@ANYRESHEX, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYRESHEX=0x0], 0x0, 0xd961, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdfffff, @void, @value=0x2000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r8}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r5}, &(0x7f0000000080), &(0x7f0000000300)=r8}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r9, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) 1.165115324s ago: executing program 2 (id=1229): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9426}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000018360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0xf8ff, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000540)='cpu&00\t||') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x207) 1.040715893s ago: executing program 2 (id=1230): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r2, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, &(0x7f0000000280)=[0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5f, &(0x7f0000000380)=[{}], 0x8, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0xb6, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000a78d879fcb4eac4f1ae6c00001829ee", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00'}, 0x10) gettid() close(0xffffffffffffffff) close(r4) 983.890733ms ago: executing program 4 (id=1231): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], 0x0, 0xd295, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001080)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', r5, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001280)=ANY=[@ANYBLOB="1b0000000000000000000000b5aa000000000000", @ANYRES32=r3, @ANYBLOB="e3995cb2262079ad0595ff8bb145d958010000000000000000000000000000000000000073957bcbcf624a209a0741012d1c10b3cc218c3e44964ef6af5524", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000020000000300"/28], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r7, 0x0, 0x1}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001300)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYRES32=r8, @ANYRESDEC=r3, @ANYRES32, @ANYBLOB="03000000050000000200"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0x20, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="95000000000000081800000002000000000000000a000000b0ffffff7f000000006400000e000000000000000a000000d47300010400000082a4c0ff04000000"], &(0x7f0000000040)='GPL\x00', 0xe, 0xa2, &(0x7f00000004c0)=""/162, 0x41100, 0x8, '\x00', r5, @netfilter, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0xa, 0x2, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000000580)=[r3, r6, r3, r3, r9, r3, r3], &(0x7f0000001180)=[{0x1, 0x5, 0xd, 0x2}, {0x1, 0x2, 0x8, 0x1}, {0x3, 0x5, 0x3, 0x4}, {0x3, 0x1, 0x9, 0x9}], 0x10, 0x7b, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000002480)={0x18, 0xc, &(0x7f0000001380)=ANY=[@ANYRES32=r4, @ANYRES64=r6, @ANYRES32, @ANYRES16=r2, @ANYBLOB="31c86653c3cce7a83721863a77698f3c53016f3c89033536484fd756220358255048fb00ace294e7baa7028ce2f1f0cb440584ca5849365b40aa15b3f62cb22f44f73f824ddbb5284de3fbb1f896d392e53d3272c0451b41f2dfd0ccc3081a8448ffb8a31281118e0f2e11b50bfdc649ab45bcfd4fdf6dbd43b03cd9e138d098a9a26d3b5f17c2787d464f176a0c576eb7b6e33118605cf0aa2fdcdf51359aa80386566429600c4eade2fa4bbd922a0f281c2d747577c74fe9ddd57b7aa333345996ab2c1b88f962ceda10", @ANYRES64=r0, @ANYBLOB="a4f4467443f4ce140514749c21ccf48fc88138968e928854d4ae6a49d1c562aaf24f3607a14808c29585dae640c1a962e0ec1fe30788fafcf09ca4d78d09fef697d0d93bcc13bb316dee6840f9ef9755f2ad5b6a81cc4da035f99f31196d26b25ad2975e259df31c7e477bc1fc7681ae516c1938a4aa2bef94bc58c8cc4bbb2654865228b973830c8c23a3b7c54816e908d7ec2e1ffb0553cf08e982fc1d0da89678cad8ad1f27febef560c45e08121e0bcfa446e8dac5ed3f184d39b301b532ef19556830cb1cd82c58f9961723bc3354e8dff9325f79c74fadccc5a31a3dbaef1d4e72f6d4e34edb00578108890eb0592fe6327026fe7834966c599bfbd60aa30912e6267a3e6228506e4c2949acde0a73ecac1e340089e6102e9d646990709416d569047aeea2acee362142549fd56b0cd256ea3ead2d616d53f7fe867992fa4650b1fcf1ae582eac2b2ddcd1a24cb88c3d981399862f33c322046e234453d9b2963350546c4e1cad066acfedf040e48db7b845ce2f4cd501d3b1ef656f458c80071a0ba1226dda89ebd07c977c848ca7491e1062aaa493c79a0c46019b17584461f0635543552b252bedda216e55a49624ad6c94dacf014bd751b4294c17a2d527ed7c431b7002f30f79ece246ad727266311e591900d3dd508f69aa09fa65c7a92414745258971c70d4df27623c729330d08484e31260910c55475134536d577ec59f2d69afb50e77a42a34a47878df692aa99ff784b240ba7aa4970163c23c8b4d080fde3065c56164380c6d16c7f83f35765228d09cf8acc94b517dbb03df82491e3a278b02dde8f62a33df0f3d2662d8ab5fc088699a266f5d801f4740fe00808de2ad8b44a76043d062b30dd4124824c6d9a840fc86f7d7303198e28f1b9459004d91c5d1b0e7147399c74f32ac630ea2059e120a7e6179d97a8d145465e31532cb931793fb0794fcde568ec4b3afe3bcb1f6794eca56445b01d3c9273cf54a4b60b159177c0dd4c835d79e83bc0dcc97a733b02c5abbdbc4a7089a33c59b1fa4a166a523779415d87f9311d252f5c81f1ac82161819e6cf2ecd0f8b43d6cddf0ac83a207c1556a5e596f4023119d67a0651aa9c702472aa5df669391cd4799f6c57823ddabd7d29d60cb554ca135beac82d62edd328a057e75c75d34156b350959a103d1f479b4525902d6ebea12f36f1cb25c216f3784f1003d8219500d8953e9c2e8d8d7e74fb90a5f2aba2daa1fb58e6c949c7345c4ad61d34723aa7c4d9eb47b552f33a8392cd00603ef62727f97ae7bf33225a7e69aec2bc196835e6000515eccbf35ab3d4a7cc646a091fef6afb8fbc6dbb5ff75b8413130405be7003729ff1226543526324c41b856def43a187aac875aea2efc39377b641f8bd6196dba150d39182b3873402c95417de3ab824e46f96dbe84da167497ec563442591e636ff3478c6f798d6141758fd9ebd971ca7c84eddf120a94ab7112154bfe19abbcd51d9cd67b330dec8cd906f8ff66f30fc64b012d3b407ca75b301df5c64a33feda6d4a4d076a2de1b23af064e5f0baed6b0294de4ac10587ad6f2d69b0b221d9cb676a981461b89579b662827ab6284b6e752993528be7ba6e2166467ab32e93bfd159fdd77dd11a779a3f62e0f3a0c685184ddbfcf38ba98c0ae372ab90b9bf397ed01a1cd21a79fb69e7f85c09bfc0d9c767e6a509be6ac30744a1128bd95d44406e3bf9d0d86b4e06428980add9e06afb991e2b6657cb2ed1d4eb37f488aa3f7e3742fea1950087ad11829a791e0ccd1f8c9a9104b2005580fa259315771566d9f5745380b96d025c9f0517fe0a14dcbdbe9ed1ca7a612a69b18423363922239300fab3da3f6c4af5ce231796c1de6c017758b240db1686c09ea118a30859b5e9c2954314c010b82d8213bee665fc203cefe8bafa57fdda66775d41d59c3e8f73c3e948a81a75c7d180cbd151173c83936ab2c3ba401f290b84a91c707ca16f4b210165efecb310bac39b04273504c29c04e30356f39877acb0ab98ea4d42ca560dc7904f4d8e8077f4f5651bac6b1c5aed079e0ed357fc14b9f581aff381a9b19f4f355e141d947d34efc0c71a45f1e0b4b3ffa631abb372b1bfd71f615535992f415857365ecf1e33466acfa3039d71a3df29988dc1c11d306fe39aca7dd98c5538d7db817947f512f91c42ce72db418ef4ea0bc2ea9e43b787054f270a270312f4c40416bc198147a6be3cb0e6a97e7e2ff7ec12bad06980a53c8551d7eca61aa290258107abc83d824c9af24e5322a847705a8857fc0e61c56ddc49d4f067c95f62475b9973693f6236b3a019c27d52d6f3dd548c87dc1d7fe47c0dec59206ae6e6d0a6cdf8300383100f8042ec70785c41e29748e32eaf8ae5382510720dea0b4e3037a5d26810969b53d7b8445e34578895d6fbfdade1a4a787f578d387f3016857a44c0d5e9734acaafb61f7d344f1da1d19823ffac3afa2ee5bd9174add8b31d1c1a946f2d491b277e5e76e83752b35e301c368b290dfd6238fdc816e8cc0b14312892aa9168c79a25aa3454072fa42954644818b972585f59f12b34a7d88c5c37710f1e0cc3834de2f9106c0213e5a1bcf458ded6c7f9b47e6f064e1c07dd08cec9a68e1ec1a1e5b911ef67940aba74326d688a5edd098c3af58284897fcc729c88ab39c1379c478f12592ae059a29dca8860225ed639970d6c3acc37705b133499e8156003416a65a7aeed1781c26c2e72c8d96d11b271868352caf06bc7002f24f7666416e704a34464c62f6a406a52e110c4ac5526c3891672c08487d00a30b9ecc7e78b2f5bfc3780b3e3ab6bba976cd579208b3a4284b6aac18d4aae1c7d02a3c0296c8d6d7f31e761b2ee0e124693855f79e6d7bffbaaf3d7b4a057b8271813a5ca8f6fa838fab376f752bce859a0e9ee39f983c6c240455e48fa85956b3dac2b67a57ec9f3a90f267fd7c2ef76e2a83a39fa4579634652b3501799691799f64c134d64f3e4b836208c0e9165e4daeb89951cfb5e9d86bab4cb1178629bd6dcc9a9e091366368b9ab63d8108891466cd6b2419c8eb821828a5a2c99f4098c2074acbac9f495680422bf26ef1c4ee190702fb3cba677d472008740942a7c992f4ca191eb51967bb57d5f67716f85aef5dd72cae4ab91f24ad15c158ec613ea17b4cadfb060c5154e47ede3c5a542f937beafe5d2e03ab1c987524208761766efd5a1518c2256b38db2575168c780fb458ec8c7c00fce7652b61277c1119ca3ca1658d39c153b8fe0e72d3d29b527d6f2f1b01507eeffb63322a71de8272d1a86c35184b4337ce1bd79ad56ac672d8f2d585651d46487951dbd0f32f4eefa0b51d5834521b3d7da2e8a160375d9754e151f5a00afade1acdf1eec8722c28e77857ce26ca72108d1eab1e46f3adcd6d3ef963c024feb279ead5173e02457f9a06469aa358f7f87d88d94ae3fde56f8626b073ca66f38539bb6202a8c3fbde5e57fbf31d1a974c8674c060b31c4d687d5238e19bb1e264728f04efd1bea1df830d8b7151f0263cdfb2d3b3b0eb3495e840c669af466cddd0fe175b83906fa3f3b0e97b1e1404897d9aed11914ae36e8e0405cf763c302b5a97e8e2e2e5187fc7851b995afcc7354334c722062d213f2bd68766b8f97252bae40756f0d375a6f04aeea8cdf70f416806a16ce12c88f840283a74e8bd738fa27b34ab45b632979c15f56b4d3cf43966ef6d09b1d553b828f5adbbc5b051d6edbb1d33a6dbb9cf188e3efaec9a8e8989513c671996f7c736855cf66663379614e2023bc6a04a60a72ff474baacc339436b51d3946df9b3aa1da9e63efaef2c5ea9bddbc47a8f5e0eeae7e44a19a43f099bc423ecbe21498c16f04cc2d2036fb731c071783a450ad649edd7ebae1719f00d464171d948b6455079af8a1adca8540858767d4f2bcd58ef8a91154e90c25e12290aca75545ebdfab3e5b7d97c82d09ea3621ad4f2ad0182ce1eed2b5697e6b26ddf5af9de726e255d4847a5b6e659f049887af28f60e1a6223562bf06c4a69e62e6924a28a4396c34ec05fcfaba5d007bc58d698eff673e83508dabe2dfc77ea1a9c1d12f414cf40182e74e39dc9e92509485c2ee1df4c95b3af5860309d5fb2df005422d373f47aa3f4a6a8a89ecbc7cad469c09c970a3ba7441a99b05b2eb7dd8a58d1322537db55a9101f53c8a1e3b4402e25d9a69c876de385a386cce464a1e122211e3405fdf87ef45f8bf0cfb8a8c9519e609c1e4e4171634e3918e634f07652607b249d0adadfbea609103c5258444b659e3bd8bea1c0882125a302d523b7462beb2f4086355f809d3ca7dc015d2cec553b3b5b8eed0004f2502f690ff577e673d6fff39646ad0cf90c927eba13e9efbd86280fa97af386ee195992da4f973af8877a1a70fd17cce9cd6c2befae67601ee1b5523e753010a8578554b120d1070d71d036d0df98cbed63c76b060838fda50f6c7688e5b7faf837c1066b456c2a7011af47c30143468d9beeddc511dc47be91e822ef0773759abf28f8e285ddace9549f2ab18a331b5383e80e697c28fd724af3848e90396863a5c2cf827ed19569a858f16843b8e89302527eb79f1facbf12a727e59cc227dce81114862a4238de01d8f1dda4b7b4dcbf773909e16a7af87afe23e44675abe23a3fc5498b9f23e6a040166722817f7ae7003ee0816b603c0cc9cdbecae6e9c48dc6642e30190ef0ee0c9a604b0a303bfdd33b7027892c37213b9ec105018e8e880d66d2c1318e7b21db2f9aa21c91416369df1a321489f7de0662c39251f0c91fae8ecc9c45ccb5fab1609089f2d7e8c5517f9ae2ce1021dd9a0d28cfb25e355bdefe390ba7c6e4dbe1c25b0d6013595dd6d5aee2f495208e3c116b192d33a2c805c50c2e468ed1f228ab71af573311409f30b54b5c669cdfc8775fba54e139400bc21905894be1971a439cad151cf63d8ee7d8dadaf08748f4feb5179c29293052055dc7f33280331721cbea436ac06bb3d8df6a9402c5651c149921cf516537ee3f16844a3bad2da2c9798d6684ffbaec138999a9c4fd8d3cc7745ab824f647cb74e0c1b39c7e6012c7c63dcf3665c54d8f0ce791a77f9d0c4aebd1be587944d4083be689e9a76bbe3669a0b3a7979ec45fbf271c972ca6fa99d16b2a4dc6e4764f02d1784075171e9ca81322ff3d70fbbfebf978aaf7e156304da08ee528082e616502c941e721c12043c5dcab5ac7da891222eb654d0cdb9b3d4e844e2cb2f0a115362ded2c9a98bd1e82e617011ef3e573739e656097546720a1c00f9aa6955051964259e86d16a946f886424500bb11da41f33e4b5e1d933954980d54b743ea3d44f55b122680c7fff86e29b5180e17273a1fa1c46855f6294f5fde19f964a66ebd177d57648fddaedc3d22e54d3657ab4f71cc86a0a22169a2f5ca3ab28a7e925b3f037d568ea50b3d435b2748c68313f06e62af2597f86488559c2e86d9d3b94f206fb9588ed9ffa3969b17e08dddf996618254958fa28cef4ca5e1c7540deb5e4af3376cbd61cc62eaa524d71366d07e31a45d3ee4dd678efcf78d03d519fff5087999048bb68b57d0cad30b43ae98ee2f007322c0922545445b33582ead4a43b15687282c763d59dfc5b196820ae339c025cb330d5c5f6083af26afadc071b930446011f7f4e12389a8c4fc1620332fa67437726a3f78f946cbae240ef41d7218d80a3d1068909967e15b2b8ce2dd31ea15d94e37fbe12d2c10e1baed1a456db8f1a3fd13d7a5808", @ANYRESOCT=r0, @ANYRES32=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200), 0xfffffffffffffffc, 0x761, r11}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r10}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r13, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x3, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0), 0xce, r14}, 0x38) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r14, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r15}, 0x10) close(r13) close(r12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r16, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 879.503803ms ago: executing program 0 (id=1232): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000009000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000001c696914343b2ba18bcbb23a4ee4a0fb3a23615e5f5eae267363226f4e92143c591e898a09dc8bd20e2dfdc73505f90d12f17d3cf3885c2f45df9b041568749c14e6ff5edf32699ebe7e85d5dfe0a17722dbd449f3511edfc35e085e528319ff20ac3e8d6132e02ff66feadf22222cd2db3ab579258ccb378d34cd6b8958cd6dde6c6897fe46e2f9871fe13372cfe1abf5d5840ca8a60af92a1a2eeedd5a375f63767873ff87906c0a98af1888a660d94268b9b6c78c623857180d216e31084d846ff7597d67e39670756cc639", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r5, &(0x7f0000000600), 0x12) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x80, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) close(r2) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x430, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0bad040005001aad87b9b585e7a9769c00001e0001000885c777b8000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0xf5010000, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x6d) 819.975903ms ago: executing program 4 (id=1233): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB='1-2:5/', @ANYRESDEC], 0x31) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r4, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r8, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80), 0x100}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 819.514653ms ago: executing program 1 (id=1234): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x31) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000000001811", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f00000568e4fea4b2d300", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x5, &(0x7f0000002d00)=ANY=[@ANYRESHEX=r1], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xc300, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f00800", 0x0, 0x4000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001400a685b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@generic={&(0x7f0000000640)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74c30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x4001, 0xc8, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000008000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r6, 0x58, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1e000000f8ffffff000147001ace613f6e097f65", @ANYRES32=r0, @ANYBLOB="010400"/20, @ANYRES32=r10, @ANYRES32=r3, @ANYBLOB="0500000000000000030000000900"/24, @ANYRES32=r3, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r11, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_subtree(r9, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x20008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x80}, 0x103100, 0x6, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x4}) 639.004172ms ago: executing program 1 (id=1235): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB='1-2:5/', @ANYRESDEC], 0x31) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r4, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r8, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80), 0x100}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 593.445112ms ago: executing program 4 (id=1236): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000008441000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/18, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e00000004000000bf0100000100000000000200", @ANYRES32=r0, @ANYBLOB="0500000000000000000000000000000000000000c90fcc1fd9970c8b3f163d7794e09f16df95d6280bc6de2aa5bc675492aee56cb63ecb1ce55f294bc057ce899ab390e3ba490e11c80c5a39410add661400e389a931dde60cc264c2292cf720168c1a3be69160f4f5fa365a89d4d557f3f7e98fcdc57e82504071396c3478d6c0aa8d5358c4a6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200000000000000050000000a00"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x16) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x1, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x864, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xfbba, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB="0000008000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000fe0166f165ed1c8429146c63730000070000000000000000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[], 0xfdef) syz_clone(0x10000000, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000280), 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89a0, &(0x7f0000000080)) 575.016642ms ago: executing program 4 (id=1237): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000180)=""/82, 0x52}], 0x1}, 0x2100) sendmsg$inet(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000840)='J', 0x1}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x1d, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@cb_func, @call={0x85, 0x0, 0x0, 0x75}, @tail_call, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @alu={0x7, 0x1, 0x1, 0x5, 0xb, 0x58, 0xfffffffffffffffc}, @func, @exit]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8946, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r6}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='fib6_table_lookup\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x5fe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000008040000cd00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x10) 501.443591ms ago: executing program 2 (id=1238): bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x502, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r0}, &(0x7f0000000880), &(0x7f00000008c0)}, 0x20) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r2}, 0x10) 451.522362ms ago: executing program 2 (id=1239): perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x7, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xb}, 0x0, 0xc8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x80) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x1b) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 330.657431ms ago: executing program 2 (id=1240): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x2, &(0x7f0000000200)=@raw=[@map_idx_val={0x18, 0x6, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40}], &(0x7f0000000280)='GPL\x00', 0x6, 0x6a, &(0x7f0000000340)=""/106, 0x41000, 0x8, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000680)={0x1, 0xf, 0x1, 0x7}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000006c0), &(0x7f0000000700)=[{0x5, 0x4, 0x5, 0x5}, {0x3, 0x4, 0x4, 0x4}, {0x3, 0x5, 0x3, 0x7}, {0x5, 0x1, 0x3, 0x2}], 0x10, 0x4f7, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x14, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80003}, 0x0, 0x0, 0x0, 0x7}, r2, 0x0, r3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r9}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESDEC=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r10}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB="00000000000000008000"/19, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) 271.554561ms ago: executing program 4 (id=1241): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x250080, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x339) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000038c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001440)={'\x00', 0x2}) ioctl$TUNSETOFFLOAD(r1, 0x400454c9, 0x17) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1, 0x7, 0x10001, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000080), 0x12) ioctl$TUNSETLINK(r1, 0x400454cd, 0x305) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791000000000000062080000000000009500050000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x50) 270.92663ms ago: executing program 1 (id=1242): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000c1dc3ab200"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3b}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000100000891468000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000cc0)=""/254, 0x26, 0xfe, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000000000800000a1750000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r2, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000180)={'tunl0\x00', @remote}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r7}, &(0x7f0000000080), &(0x7f00000006c0)='%-010d \x00'}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) 57.48206ms ago: executing program 0 (id=1243): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x2, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x10) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x80, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000040000000000000000000007f"], 0xfdef) 23.60468ms ago: executing program 0 (id=1244): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000007c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r2, @ANYBLOB="000000000000000066000000000000001800000000000000000000000000000095000000000000008401000000000000950062000000000057adb0f9b000cbe2abe9f9407806e80182ae5d08977e8e4538ab6d06cf7caacfcc38662948063ac600813ea3b8f5dc1140a1287d0147b4063ebf061f76bc2d4fb47d336b5b3db043"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x21) 0s ago: executing program 0 (id=1245): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b000000000000000000000000800000000000", @ANYBLOB="00000000d3ec66ecc053c543da2e5f"], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000eef000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, 0x0, &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6493790710000000000080000b2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249f21c6eee84309e7a23c19a394830f2539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bfb1c0e6b1244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbb888b0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f94479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b844139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323478a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526894aa7fe5e68949a3b304723177d356c4604bca492ecec37e83efceefd78a2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bd43b5b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebcef5af469abe753314fae31a09c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa7000008000000000000117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d34264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5a71e0d7696caba172745c7dd919ffb631820420b75b6522c0e21c882c66f4f25ffb6d95e07e068000000000000eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6f0100000000000000f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e09d24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868db06fd892d68a547477f8ef686ff0dba7b8c18c94d5a89b0567a851750a35d9cc2217db890d89385fcaa00f0f2e524672e6f4c8bedfd5da5b157709b8265cf511dc5846ab1d85916c4a6b2d1b408575982e11230cbac0a9c6eaa03c945645581f678403c2a936c53ae72940aa92bcf22b82c6bc028e0acdddf9fef595f0f7a9f80c0e4c659ced769ec463d26a81e468846761a8e1efd6a031ab7adc8665e267be0065cc315aa23012423ec8b8492d9b50fa4d8c5891959b761eec6dc988532782fda13239c948e27853606e26225c796b79cc04f3d1a5a13000000001e301d82a27010d3ac6119d2b12caf282413672d20c852c50084d7b2d50754775ed63bc18023c31351af76e24788d96103455693b34e09a163a9f613a7e5530222cebd7fa0fbff32dc98088f9fab33648cc38e87dd2dd6ee157f5f018702696915661715c979b7796d4f101a257688af7c148e8615c938c4ca8a69f6fc585ec1dd1857a501f90b161eff23181a11a2b0da4c58d459cbf9db"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000002c0)='\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$TOKEN_CREATE(0x24, &(0x7f00000006c0)={0x0, r1}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x6, [@volatile={0xa, 0x0, 0x0, 0x9, 0x4}, @enum={0x9, 0x8, 0x0, 0x6, 0x4, [{0x9, 0x10000}, {0x0, 0x1}, {0x4, 0x4}, {0x1, 0x5}, {0xc, 0x200}, {0x10, 0x6a77}, {0xc, 0x7f}, {0x3, 0x5}]}]}, {0x0, [0x5f, 0x2e, 0x0, 0x5f]}}, &(0x7f00000003c0)=""/38, 0x76, 0x26, 0x0, 0x4, 0x10000, @value=r5}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000800)={&(0x7f0000000040)='fib6_table_lookup\x00', r6}, 0x18) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='xen_cpu_load_idt\x00', r4, 0x0, 0xf}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0xc, &(0x7f0000000600)=ANY=[@ANYRES8=r4, @ANYRES8=r2, @ANYRESOCT=r0, @ANYRES64], 0x0, 0x1316b694, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xf, &(0x7f0000000200)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='timer_start\x00', r10}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{r0}, &(0x7f0000000400), &(0x7f0000000540)='%-5lx \x00'}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=0xffffffffffffffff, 0x4) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.28' (ED25519) to the list of known hosts. [ 20.054356][ T24] audit: type=1400 audit(1737989505.109:66): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.055360][ T273] cgroup: Unknown subsys name 'net' [ 20.076814][ T24] audit: type=1400 audit(1737989505.109:67): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.103707][ T24] audit: type=1400 audit(1737989505.139:68): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.103849][ T273] cgroup: Unknown subsys name 'devices' [ 20.247785][ T273] cgroup: Unknown subsys name 'hugetlb' [ 20.253197][ T273] cgroup: Unknown subsys name 'rlimit' [ 20.390803][ T24] audit: type=1400 audit(1737989505.449:69): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.413892][ T24] audit: type=1400 audit(1737989505.449:70): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 20.424840][ T276] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.438352][ T24] audit: type=1400 audit(1737989505.449:71): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.469654][ T24] audit: type=1400 audit(1737989505.509:72): avc: denied { relabelto } for pid=276 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.469676][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.494821][ T24] audit: type=1400 audit(1737989505.509:73): avc: denied { write } for pid=276 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.528701][ T24] audit: type=1400 audit(1737989505.529:74): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.553989][ T24] audit: type=1400 audit(1737989505.529:75): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.988589][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.995434][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.002799][ T283] device bridge_slave_0 entered promiscuous mode [ 21.011537][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.018481][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.025437][ T283] device bridge_slave_1 entered promiscuous mode [ 21.069463][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.076805][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.083882][ T284] device bridge_slave_0 entered promiscuous mode [ 21.091661][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.098534][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.105712][ T284] device bridge_slave_1 entered promiscuous mode [ 21.115138][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.122113][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.129267][ T286] device bridge_slave_0 entered promiscuous mode [ 21.137880][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.144703][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.151942][ T286] device bridge_slave_1 entered promiscuous mode [ 21.214827][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.221748][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.228961][ T285] device bridge_slave_0 entered promiscuous mode [ 21.250032][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.256890][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.264053][ T285] device bridge_slave_1 entered promiscuous mode [ 21.296973][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.303811][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.311054][ T287] device bridge_slave_0 entered promiscuous mode [ 21.317697][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.324519][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.331827][ T287] device bridge_slave_1 entered promiscuous mode [ 21.371857][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.378724][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.385785][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.392604][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.403351][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.410206][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.417289][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.424088][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.476022][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.483498][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.490417][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.497960][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.504970][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.527403][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.535305][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.542079][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.549379][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.557519][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.564332][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.577584][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.584848][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.592580][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.600668][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.607514][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.639982][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.648104][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.655544][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.663595][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.670435][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.678349][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.686072][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.694049][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.701927][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.720614][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.728815][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.736840][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.743977][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.751805][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.759051][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.766986][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.773800][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.781145][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.789397][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.796203][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.803526][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.811311][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.819019][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.826375][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.837705][ T286] device veth0_vlan entered promiscuous mode [ 21.848082][ T283] device veth0_vlan entered promiscuous mode [ 21.854751][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.862747][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.870753][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.878937][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.885762][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.893284][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.909850][ T286] device veth1_macvtap entered promiscuous mode [ 21.918650][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.927152][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.935059][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.941820][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.949704][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.957873][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.964686][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.971971][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.979928][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.986773][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.994101][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.006484][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.014352][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.022343][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.030593][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.038781][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.046769][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.054416][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.062435][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.088047][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.096088][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.104679][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.113050][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.121629][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.129478][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.137173][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.144901][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.152576][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.160659][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.168763][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.176956][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.184953][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.192629][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.200392][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.207647][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.218706][ T287] device veth0_vlan entered promiscuous mode [ 22.226813][ T284] device veth0_vlan entered promiscuous mode [ 22.235623][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.244023][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.252144][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.259363][ T286] request_module fs-gadgetfs succeeded, but still no fs? [ 22.259571][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.278921][ T286] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 22.281678][ T285] device veth0_vlan entered promiscuous mode [ 22.295357][ T283] device veth1_macvtap entered promiscuous mode [ 22.310253][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.318243][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.330051][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.338895][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.346662][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.354413][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.362536][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.370701][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.378135][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.390902][ T285] device veth1_macvtap entered promiscuous mode [ 22.399973][ T284] device veth1_macvtap entered promiscuous mode [ 22.411567][ T287] device veth1_macvtap entered promiscuous mode [ 22.418035][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.425661][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.426307][ C1] hrtimer: interrupt took 36677 ns [ 22.434782][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.446904][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.454350][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.462850][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.471159][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.505521][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.514573][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.523140][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.533223][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.541776][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.550480][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.558948][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.567384][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.575545][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.583971][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.592464][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.600930][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.609403][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.618055][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.626219][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.634744][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.836948][ T323] device sit0 entered promiscuous mode [ 23.737613][ T347] tap0: tun_chr_ioctl cmd 1074025692 [ 25.009897][ T382] device wg2 entered promiscuous mode [ 25.121296][ T394] device pim6reg1 entered promiscuous mode [ 25.154432][ T396] cgroup: syz.3.24 (396) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 25.170473][ T396] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 25.510364][ T24] kauditd_printk_skb: 45 callbacks suppressed [ 25.510374][ T24] audit: type=1400 audit(1737989510.569:121): avc: denied { create } for pid=405 comm="syz.3.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 25.753258][ T413] device sit0 left promiscuous mode [ 25.835166][ T415] device sit0 entered promiscuous mode [ 26.585686][ T428] device sit0 entered promiscuous mode [ 26.909682][ T24] audit: type=1400 audit(1737989511.969:122): avc: denied { create } for pid=453 comm="syz.0.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 26.929737][ T454] device veth1_macvtap left promiscuous mode [ 26.967698][ T24] audit: type=1400 audit(1737989512.019:123): avc: denied { create } for pid=456 comm="syz.2.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.015491][ T24] audit: type=1400 audit(1737989512.069:124): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 27.086760][ T24] audit: type=1400 audit(1737989512.129:125): avc: denied { create } for pid=453 comm="syz.0.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 27.146541][ T24] audit: type=1400 audit(1737989512.179:126): avc: denied { read } for pid=456 comm="syz.2.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.165533][ T460] device sit0 left promiscuous mode [ 27.245587][ T464] device sit0 entered promiscuous mode [ 27.300149][ T24] audit: type=1400 audit(1737989512.249:127): avc: denied { write } for pid=456 comm="syz.2.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.333117][ T486] device sit0 left promiscuous mode [ 28.345383][ T489] device sit0 entered promiscuous mode [ 29.149350][ T493] device sit0 entered promiscuous mode [ 29.249298][ T504] device sit0 left promiscuous mode [ 29.596563][ T507] device sit0 entered promiscuous mode [ 30.868859][ T529] device sit0 entered promiscuous mode [ 32.598104][ T560] device sit0 left promiscuous mode [ 32.611794][ T559] device sit0 entered promiscuous mode [ 32.659243][ T560] device sit0 entered promiscuous mode [ 33.558336][ T587] device sit0 left promiscuous mode [ 33.573067][ T587] device sit0 entered promiscuous mode [ 33.968935][ T605] device sit0 left promiscuous mode [ 34.128192][ T607] device sit0 entered promiscuous mode [ 34.835753][ T614] device sit0 left promiscuous mode [ 35.803855][ T643] device sit0 left promiscuous mode [ 35.939071][ T644] device sit0 entered promiscuous mode [ 36.988983][ T675] device sit0 left promiscuous mode [ 37.004917][ T675] device sit0 entered promiscuous mode [ 37.166667][ T682] device sit0 left promiscuous mode [ 37.181193][ T682] device sit0 entered promiscuous mode [ 37.290182][ T684] syz.4.110[684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.290389][ T684] syz.4.110[684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.539715][ T694] device sit0 entered promiscuous mode [ 37.645595][ T702] device sit0 left promiscuous mode [ 37.662925][ T702] device sit0 entered promiscuous mode [ 37.921362][ T714] device sit0 left promiscuous mode [ 37.954588][ T714] device sit0 entered promiscuous mode [ 38.716249][ T737] device sit0 left promiscuous mode [ 38.752750][ T737] device sit0 entered promiscuous mode [ 39.071046][ T755] device sit0 left promiscuous mode [ 39.102990][ T755] device sit0 entered promiscuous mode [ 39.217431][ T764] device sit0 left promiscuous mode [ 39.233048][ T764] device sit0 entered promiscuous mode [ 39.584990][ T777] syz.2.140[777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.585096][ T777] syz.2.140[777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.708974][ T24] audit: type=1400 audit(1737989524.769:128): avc: denied { setopt } for pid=794 comm="syz.4.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 39.824082][ T808] device sit0 left promiscuous mode [ 39.852279][ T808] device sit0 entered promiscuous mode [ 40.281174][ T821] device pim6reg1 entered promiscuous mode [ 40.350221][ T24] audit: type=1400 audit(1737989525.409:129): avc: denied { create } for pid=818 comm="syz.2.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 40.744303][ T24] audit: type=1400 audit(1737989525.799:130): avc: denied { create } for pid=838 comm="syz.2.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 41.616700][ T893] device sit0 left promiscuous mode [ 41.680411][ T893] device sit0 entered promiscuous mode [ 43.488032][ T960] device sit0 left promiscuous mode [ 43.513775][ T960] device sit0 entered promiscuous mode [ 44.010076][ T984] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 44.277440][ T994] FAULT_INJECTION: forcing a failure. [ 44.277440][ T994] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 44.445258][ T995] device syzkaller0 entered promiscuous mode [ 44.453365][ T994] CPU: 1 PID: 994 Comm: syz.3.205 Not tainted 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 44.462893][ T994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 44.472796][ T994] Call Trace: [ 44.475923][ T994] dump_stack_lvl+0x1e2/0x24b [ 44.480425][ T994] ? bfq_pos_tree_add_move+0x43b/0x43b [ 44.485720][ T994] dump_stack+0x15/0x17 [ 44.489709][ T994] should_fail+0x3c6/0x510 [ 44.493966][ T994] should_fail_alloc_page+0x52/0x60 [ 44.498995][ T994] __alloc_pages_nodemask+0x1b3/0xaf0 [ 44.504207][ T994] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 44.509591][ T994] kmalloc_order+0x4c/0x170 [ 44.513928][ T994] kmalloc_order_trace+0x18/0x90 [ 44.518704][ T994] ? alloc_skb_with_frags+0xa1/0x570 [ 44.523819][ T994] __kmalloc_track_caller+0x1dd/0x320 [ 44.529028][ T994] ? __alloc_skb+0x80/0x510 [ 44.533367][ T994] ? alloc_skb_with_frags+0xa1/0x570 [ 44.538487][ T994] __alloc_skb+0xbc/0x510 [ 44.542655][ T994] alloc_skb_with_frags+0xa1/0x570 [ 44.547620][ T994] ? is_bpf_text_address+0x172/0x190 [ 44.552723][ T994] sock_alloc_send_pskb+0x915/0xa50 [ 44.557759][ T994] ? sock_kzfree_s+0x60/0x60 [ 44.562184][ T994] ? stack_trace_save+0x113/0x1c0 [ 44.567044][ T994] ? terminate_walk+0x407/0x4f0 [ 44.571731][ T994] ? stack_trace_snprint+0xf0/0xf0 [ 44.576677][ T994] tun_get_user+0xe90/0x38f0 [ 44.581104][ T994] ? kmem_cache_free+0xa9/0x1e0 [ 44.585788][ T994] ? do_sys_openat2+0x1fc/0x710 [ 44.590478][ T994] ? _kstrtoull+0x3a0/0x4a0 [ 44.594822][ T994] ? tun_do_read+0x1f60/0x1f60 [ 44.599414][ T994] ? kstrtouint_from_user+0x20a/0x2a0 [ 44.604628][ T994] ? kstrtol_from_user+0x310/0x310 [ 44.609575][ T994] ? avc_policy_seqno+0x1b/0x70 [ 44.614258][ T994] ? selinux_file_permission+0x2bb/0x560 [ 44.619724][ T994] ? fsnotify_perm+0x67/0x4e0 [ 44.624244][ T994] tun_chr_write_iter+0x1a8/0x250 [ 44.629102][ T994] vfs_write+0xb4c/0xe70 [ 44.633182][ T994] ? kernel_write+0x3d0/0x3d0 [ 44.637695][ T994] ? __fdget_pos+0x209/0x3a0 [ 44.642121][ T994] ? ksys_write+0x77/0x2c0 [ 44.646373][ T994] ksys_write+0x199/0x2c0 [ 44.650536][ T994] ? __ia32_sys_read+0x90/0x90 [ 44.655138][ T994] ? debug_smp_processor_id+0x17/0x20 [ 44.660345][ T994] __x64_sys_write+0x7b/0x90 [ 44.664770][ T994] do_syscall_64+0x34/0x70 [ 44.669022][ T994] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 44.674753][ T994] RIP: 0033:0x7f48820d4d29 [ 44.679008][ T994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 44.698449][ T994] RSP: 002b:00007f488073f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 44.706691][ T994] RAX: ffffffffffffffda RBX: 00007f48822edfa0 RCX: 00007f48820d4d29 [ 44.714501][ T994] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 44.722311][ T994] RBP: 00007f488073f090 R08: 0000000000000000 R09: 0000000000000000 [ 44.730124][ T994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 44.737935][ T994] R13: 0000000000000000 R14: 00007f48822edfa0 R15: 00007ffd1d268368 [ 44.793721][ T999] device sit0 left promiscuous mode [ 44.805405][ T1000] device sit0 entered promiscuous mode [ 45.071174][ T1024] device pim6reg1 entered promiscuous mode [ 45.081093][ T24] audit: type=1400 audit(1737989530.139:131): avc: denied { cpu } for pid=1025 comm="syz.3.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 45.323466][ T1055] FAULT_INJECTION: forcing a failure. [ 45.323466][ T1055] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 45.336730][ T1055] CPU: 1 PID: 1055 Comm: syz.0.225 Not tainted 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 45.346331][ T1055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 45.356221][ T1055] Call Trace: [ 45.359355][ T1055] dump_stack_lvl+0x1e2/0x24b [ 45.363862][ T1055] ? bfq_pos_tree_add_move+0x43b/0x43b [ 45.369168][ T1055] ? __alloc_skb+0x37c/0x510 [ 45.373583][ T1055] dump_stack+0x15/0x17 [ 45.377575][ T1055] should_fail+0x3c6/0x510 [ 45.381835][ T1055] should_fail_usercopy+0x1a/0x20 [ 45.386691][ T1055] _copy_from_iter+0x22c/0xd10 [ 45.391291][ T1055] ? sock_alloc_send_pskb+0x936/0xa50 [ 45.396511][ T1055] ? copyout_mc+0x90/0x90 [ 45.400714][ T1055] ? __check_object_size+0x2e6/0x3c0 [ 45.405789][ T1055] skb_copy_datagram_from_iter+0x100/0x6d0 [ 45.411439][ T1055] tun_get_user+0x1904/0x38f0 [ 45.415951][ T1055] ? kmem_cache_free+0xa9/0x1e0 [ 45.420624][ T1055] ? do_sys_openat2+0x1fc/0x710 [ 45.425315][ T1055] ? _kstrtoull+0x3a0/0x4a0 [ 45.429655][ T1055] ? tun_do_read+0x1f60/0x1f60 [ 45.434251][ T1055] ? kstrtouint_from_user+0x20a/0x2a0 [ 45.439458][ T1055] ? kstrtol_from_user+0x310/0x310 [ 45.444411][ T1055] ? avc_policy_seqno+0x1b/0x70 [ 45.449095][ T1055] ? selinux_file_permission+0x2bb/0x560 [ 45.454560][ T1055] ? fsnotify_perm+0x67/0x4e0 [ 45.459078][ T1055] tun_chr_write_iter+0x1a8/0x250 [ 45.463937][ T1055] vfs_write+0xb4c/0xe70 [ 45.468018][ T1055] ? kernel_write+0x3d0/0x3d0 [ 45.472531][ T1055] ? __fdget_pos+0x209/0x3a0 [ 45.476951][ T1055] ? ksys_write+0x77/0x2c0 [ 45.481207][ T1055] ksys_write+0x199/0x2c0 [ 45.485373][ T1055] ? __ia32_sys_read+0x90/0x90 [ 45.489978][ T1055] ? debug_smp_processor_id+0x17/0x20 [ 45.495178][ T1055] __x64_sys_write+0x7b/0x90 [ 45.499610][ T1055] do_syscall_64+0x34/0x70 [ 45.503871][ T1055] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 45.509674][ T1055] RIP: 0033:0x7f90bd22ed29 [ 45.513928][ T1055] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.533369][ T1055] RSP: 002b:00007f90bb899038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 45.541616][ T1055] RAX: ffffffffffffffda RBX: 00007f90bd447fa0 RCX: 00007f90bd22ed29 [ 45.549425][ T1055] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 45.557234][ T1055] RBP: 00007f90bb899090 R08: 0000000000000000 R09: 0000000000000000 [ 45.565046][ T1055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 45.572872][ T1055] R13: 0000000000000000 R14: 00007f90bd447fa0 R15: 00007ffd425e86d8 [ 45.611032][ T1059] device sit0 left promiscuous mode [ 45.632916][ T1059] device sit0 entered promiscuous mode [ 45.711655][ T1073] device macsec0 entered promiscuous mode [ 47.306678][ T1124] device sit0 left promiscuous mode [ 47.476310][ T1135] device sit0 entered promiscuous mode [ 48.396911][ T1144] device veth1_macvtap left promiscuous mode [ 48.411074][ T1144] device macsec0 entered promiscuous mode [ 48.692218][ T24] audit: type=1400 audit(1737989533.739:132): avc: denied { create } for pid=1143 comm="syz.3.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 48.754668][ T1149] device veth1_macvtap entered promiscuous mode [ 48.787478][ T1144] device veth1_macvtap left promiscuous mode [ 49.208328][ T1161] device sit0 left promiscuous mode [ 49.404773][ T1161] device sit0 entered promiscuous mode [ 50.189208][ T1181] device macsec0 left promiscuous mode [ 50.356990][ T1199] tap0: tun_chr_ioctl cmd 1074025692 [ 50.643159][ T1205] device sit0 left promiscuous mode [ 50.873065][ T1206] device sit0 entered promiscuous mode [ 50.902964][ T1218] FAULT_INJECTION: forcing a failure. [ 50.902964][ T1218] name failslab, interval 1, probability 0, space 0, times 1 [ 50.915403][ T1218] CPU: 0 PID: 1218 Comm: syz.2.268 Not tainted 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 50.925000][ T1218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 50.934894][ T1218] Call Trace: [ 50.938026][ T1218] dump_stack_lvl+0x1e2/0x24b [ 50.942530][ T1218] ? panic+0x812/0x812 [ 50.946443][ T1218] ? bfq_pos_tree_add_move+0x43b/0x43b [ 50.951736][ T1218] dump_stack+0x15/0x17 [ 50.955731][ T1218] should_fail+0x3c6/0x510 [ 50.959980][ T1218] ? __alloc_skb+0x80/0x510 [ 50.964324][ T1218] __should_failslab+0xa4/0xe0 [ 50.968927][ T1218] should_failslab+0x9/0x20 [ 50.973261][ T1218] kmem_cache_alloc+0x3d/0x2e0 [ 50.977859][ T1218] ? ipv6_parse_hopopts+0x29e/0x590 [ 50.982891][ T1218] ? ip6_rcv_core+0xd31/0x1370 [ 50.987490][ T1218] __alloc_skb+0x80/0x510 [ 50.991656][ T1218] ? do_syscall_64+0x34/0x70 [ 50.996085][ T1218] alloc_skb_with_frags+0xa1/0x570 [ 51.001030][ T1218] ? ip6_pol_route_output+0x50/0x80 [ 51.006063][ T1218] sock_alloc_send_pskb+0x915/0xa50 [ 51.011096][ T1218] ? sock_kzfree_s+0x60/0x60 [ 51.015522][ T1218] ? ip6_route_output_flags_noref+0x252/0x2f0 [ 51.021426][ T1218] ? __kasan_check_write+0x14/0x20 [ 51.026369][ T1218] ? dst_release+0x4f/0x180 [ 51.030707][ T1218] sock_alloc_send_skb+0x32/0x40 [ 51.035487][ T1218] __ip6_append_data+0x2841/0x3e40 [ 51.040437][ T1218] ? ip6_dst_lookup+0x53/0x60 [ 51.044951][ T1218] ? ip6_setup_cork+0x1220/0x1220 [ 51.049813][ T1218] ? __kasan_check_read+0x11/0x20 [ 51.054665][ T1218] ? ip6_setup_cork+0xce4/0x1220 [ 51.059440][ T1218] ip6_append_data+0x1ad/0x2d0 [ 51.064037][ T1218] ? icmpv6_route_lookup+0x5a0/0x5a0 [ 51.069157][ T1218] ? icmpv6_route_lookup+0x5a0/0x5a0 [ 51.074283][ T1218] icmp6_send+0x1464/0x1e00 [ 51.078626][ T1218] ? icmpv6_push_pending_frames+0x450/0x450 [ 51.084346][ T1218] ? get_page_from_freelist+0x2d60/0x2f30 [ 51.089911][ T1218] icmpv6_param_prob+0x31/0x40 [ 51.094503][ T1218] ip6_parse_tlv+0x730/0x800 [ 51.098930][ T1218] ipv6_parse_hopopts+0x29e/0x590 [ 51.103793][ T1218] ip6_rcv_core+0xd31/0x1370 [ 51.108220][ T1218] ipv6_rcv+0xca/0x270 [ 51.112125][ T1218] ? ip6_rcv_finish+0x350/0x350 [ 51.116810][ T1218] ? down_read_trylock+0x179/0x1d0 [ 51.121758][ T1218] ? kasan_poison+0x5d/0x70 [ 51.126093][ T1218] ? __kasan_kmalloc_large+0xad/0xc0 [ 51.131215][ T1218] ? __init_rwsem+0x1c0/0x1c0 [ 51.135729][ T1218] ? ip6_rcv_finish+0x350/0x350 [ 51.140417][ T1218] __netif_receive_skb+0x1c6/0x530 [ 51.145362][ T1218] ? __kasan_check_write+0x14/0x20 [ 51.150312][ T1218] ? exc_page_fault+0x33d/0x5b0 [ 51.154999][ T1218] ? deliver_ptype_list_skb+0x3c0/0x3c0 [ 51.160380][ T1218] ? asm_exc_page_fault+0x1e/0x30 [ 51.165241][ T1218] ? _copy_from_iter+0x1b1/0xd10 [ 51.170014][ T1218] netif_receive_skb+0xb0/0x480 [ 51.174699][ T1218] ? _copy_from_iter+0x3e6/0xd10 [ 51.179475][ T1218] ? netif_receive_skb_core+0x210/0x210 [ 51.184859][ T1218] ? sock_alloc_send_pskb+0x936/0xa50 [ 51.190068][ T1218] tun_rx_batched+0x6d9/0x870 [ 51.194583][ T1218] ? eth_type_trans+0x2e4/0x620 [ 51.199270][ T1218] ? local_bh_enable+0x30/0x30 [ 51.203863][ T1218] tun_get_user+0x2bf3/0x38f0 [ 51.208380][ T1218] ? kmem_cache_free+0xa9/0x1e0 [ 51.213061][ T1218] ? do_sys_openat2+0x1fc/0x710 [ 51.217751][ T1218] ? _kstrtoull+0x3a0/0x4a0 [ 51.222091][ T1218] ? tun_do_read+0x1f60/0x1f60 [ 51.226685][ T1218] ? kstrtouint_from_user+0x20a/0x2a0 [ 51.231894][ T1218] ? kstrtol_from_user+0x310/0x310 [ 51.236848][ T1218] ? avc_policy_seqno+0x1b/0x70 [ 51.241526][ T1218] ? selinux_file_permission+0x2bb/0x560 [ 51.246998][ T1218] ? fsnotify_perm+0x67/0x4e0 [ 51.251515][ T1218] tun_chr_write_iter+0x1a8/0x250 [ 51.256374][ T1218] vfs_write+0xb4c/0xe70 [ 51.260451][ T1218] ? kernel_write+0x3d0/0x3d0 [ 51.264966][ T1218] ? __fdget_pos+0x209/0x3a0 [ 51.269388][ T1218] ? ksys_write+0x77/0x2c0 [ 51.273641][ T1218] ksys_write+0x199/0x2c0 [ 51.277810][ T1218] ? __ia32_sys_read+0x90/0x90 [ 51.282425][ T1218] ? debug_smp_processor_id+0x17/0x20 [ 51.287625][ T1218] __x64_sys_write+0x7b/0x90 [ 51.292048][ T1218] do_syscall_64+0x34/0x70 [ 51.296300][ T1218] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 51.302024][ T1218] RIP: 0033:0x7f2914648d29 [ 51.306275][ T1218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.325723][ T1218] RSP: 002b:00007f2912cb3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 51.333960][ T1218] RAX: ffffffffffffffda RBX: 00007f2914861fa0 RCX: 00007f2914648d29 [ 51.341771][ T1218] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 51.349583][ T1218] RBP: 00007f2912cb3090 R08: 0000000000000000 R09: 0000000000000000 [ 51.357394][ T1218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 51.365205][ T1218] R13: 0000000000000000 R14: 00007f2914861fa0 R15: 00007fff1f0563e8 [ 51.952780][ T1226] device syzkaller0 entered promiscuous mode [ 51.973585][ T1243] tap0: tun_chr_ioctl cmd 1074025692 [ 52.002324][ T1240] device syzkaller0 entered promiscuous mode [ 54.523510][ T1082] syz.0.232 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 54.533150][ T1082] CPU: 0 PID: 1082 Comm: syz.0.232 Not tainted 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 54.543118][ T1082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 54.553011][ T1082] Call Trace: [ 54.556142][ T1082] dump_stack_lvl+0x1e2/0x24b [ 54.560642][ T1082] ? panic+0x812/0x812 [ 54.564550][ T1082] ? bfq_pos_tree_add_move+0x43b/0x43b [ 54.569843][ T1082] ? ___ratelimit+0x3f7/0x580 [ 54.574359][ T1082] ? _raw_spin_lock+0xa4/0x1b0 [ 54.578959][ T1082] dump_stack+0x15/0x17 [ 54.582960][ T1082] dump_header+0xd8/0x6d0 [ 54.587123][ T1082] oom_kill_process+0xef/0x2d0 [ 54.591715][ T1082] out_of_memory+0x9bd/0xe10 [ 54.596142][ T1082] ? unregister_oom_notifier+0x20/0x20 [ 54.601439][ T1082] ? mutex_lock_killable+0xa5/0x110 [ 54.606470][ T1082] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 54.612805][ T1082] ? sched_clock_cpu+0x1b/0x3b0 [ 54.617500][ T1082] mem_cgroup_out_of_memory+0x2a8/0x380 [ 54.622874][ T1082] ? mem_cgroup_oom_trylock+0x3a0/0x3a0 [ 54.628258][ T1082] ? _raw_spin_trylock_bh+0x190/0x190 [ 54.633461][ T1082] ? mem_cgroup_oom_trylock+0x22d/0x3a0 [ 54.638844][ T1082] try_charge+0xff2/0x15f0 [ 54.643187][ T1082] ? __memcg_kmem_charge+0x180/0x180 [ 54.648311][ T1082] ? __kasan_check_write+0x14/0x20 [ 54.653249][ T1082] ? get_mem_cgroup_from_mm+0x186/0x1a0 [ 54.658633][ T1082] __mem_cgroup_charge+0x147/0x6e0 [ 54.663580][ T1082] shmem_add_to_page_cache+0x6a9/0x10c0 [ 54.668965][ T1082] ? shmem_alloc_page+0x420/0x420 [ 54.673826][ T1082] ? _raw_spin_lock_irqsave+0x210/0x210 [ 54.679203][ T1082] ? find_lock_entry+0x1df/0x200 [ 54.683975][ T1082] shmem_getpage_gfp+0xa65/0x2480 [ 54.688839][ T1082] ? iov_iter_advance+0x827/0xb20 [ 54.693726][ T1082] ? shmem_getpage+0xa0/0xa0 [ 54.698124][ T1082] ? iov_iter_fault_in_readable+0x258/0x4f0 [ 54.703854][ T1082] ? __kasan_check_write+0x14/0x20 [ 54.708799][ T1082] ? _raw_spin_lock+0xa4/0x1b0 [ 54.713400][ T1082] ? _raw_spin_trylock_bh+0x190/0x190 [ 54.718607][ T1082] shmem_write_begin+0xca/0x1b0 [ 54.723295][ T1082] generic_perform_write+0x2cd/0x570 [ 54.728415][ T1082] ? file_remove_privs+0x2af/0x570 [ 54.733366][ T1082] ? grab_cache_page_write_begin+0xa0/0xa0 [ 54.739002][ T1082] ? file_remove_privs+0x570/0x570 [ 54.743949][ T1082] ? __kasan_check_write+0x14/0x20 [ 54.748900][ T1082] __generic_file_write_iter+0x23c/0x560 [ 54.754365][ T1082] ? generic_write_checks+0x3b9/0x470 [ 54.759574][ T1082] generic_file_write_iter+0xaf/0x1c0 [ 54.764779][ T1082] __kernel_write+0x5ab/0x9d0 [ 54.769292][ T1082] ? vfs_read+0xba0/0xba0 [ 54.773462][ T1082] ? __kasan_check_write+0x14/0x20 [ 54.778408][ T1082] dump_emit+0x261/0x3a0 [ 54.782484][ T1082] ? wait_for_dump_helpers+0x3b0/0x3b0 [ 54.787779][ T1082] ? dump_user_range+0xef/0x1a0 [ 54.792467][ T1082] dump_user_range+0x71/0x1a0 [ 54.796982][ T1082] elf_core_dump+0x33bd/0x3c10 [ 54.801585][ T1082] ? load_elf_binary+0x2750/0x2750 [ 54.806527][ T1082] ? __fsnotify_parent+0x5ed/0x6c0 [ 54.811474][ T1082] ? __kasan_check_write+0x14/0x20 [ 54.816427][ T1082] ? _raw_spin_lock+0xa4/0x1b0 [ 54.821023][ T1082] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 54.827450][ T1082] ? shmem_setattr+0x17e/0x8b0 [ 54.832050][ T1082] ? __kasan_check_read+0x11/0x20 [ 54.836905][ T1082] ? unshare_files+0x1c5/0x2c0 [ 54.841505][ T1082] ? __ia32_sys_unshare+0x40/0x40 [ 54.846366][ T1082] do_coredump+0x1eb8/0x2d60 [ 54.850790][ T1082] ? asm_exc_page_fault+0x1e/0x30 [ 54.855659][ T1082] ? simple_acl_create+0x2c0/0x2c0 [ 54.860599][ T1082] ? kmem_cache_free+0xa9/0x1e0 [ 54.865285][ T1082] ? ____kasan_slab_free+0x12c/0x160 [ 54.870413][ T1082] ? kmem_cache_free+0xa9/0x1e0 [ 54.875096][ T1082] get_signal+0x102c/0x1410 [ 54.879438][ T1082] arch_do_signal_or_restart+0xbd/0x17c0 [ 54.884903][ T1082] ? __do_sys_rt_sigreturn+0x1e0/0x1e0 [ 54.890200][ T1082] ? __bad_area_nosemaphore+0x430/0x430 [ 54.895577][ T1082] ? __bad_area_nosemaphore+0x2c0/0x430 [ 54.900958][ T1082] ? __init_rwsem+0x1c0/0x1c0 [ 54.905474][ T1082] exit_to_user_mode_loop+0x9b/0xd0 [ 54.910505][ T1082] irqentry_exit_to_user_mode+0x4e/0x80 [ 54.915886][ T1082] irqentry_exit+0x12/0x60 [ 54.920139][ T1082] exc_page_fault+0x33d/0x5b0 [ 54.924652][ T1082] ? asm_exc_page_fault+0x8/0x30 [ 54.929428][ T1082] asm_exc_page_fault+0x1e/0x30 [ 54.934112][ T1082] RIP: 0033:0x8c [ 54.937501][ T1082] Code: Unable to access opcode bytes at RIP 0x62. [ 54.943829][ T1082] RSP: 002b:00000000200000a8 EFLAGS: 00010217 [ 54.949732][ T1082] RAX: 0000000000000000 RBX: 00007f90bd448080 RCX: 00007f90bd22ed29 [ 54.957544][ T1082] RDX: 00000000200000c0 RSI: 00000000200000a0 RDI: 0000000080100000 [ 54.965355][ T1082] RBP: 00007f90bd2b02a0 R08: 0000000020000140 R09: 0000000020000140 [ 54.973165][ T1082] R10: 0000000020000100 R11: 0000000000000206 R12: 0000000000000000 [ 54.980979][ T1082] R13: 0000000000000001 R14: 00007f90bd448080 R15: 00007ffd425e86d8 [ 54.993584][ T1082] memory: usage 307200kB, limit 307200kB, failcnt 11272 [ 55.005557][ T1082] memory+swap: usage 429460kB, limit 9007199254740988kB, failcnt 0 [ 55.013635][ T1082] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 55.020627][ T1082] Memory cgroup stats for /syz0: [ 55.020743][ T1082] anon 270336 [ 55.020743][ T1082] file 311427072 [ 55.020743][ T1082] kernel_stack 0 [ 55.020743][ T1082] percpu 0 [ 55.020743][ T1082] sock 0 [ 55.020743][ T1082] shmem 311291904 [ 55.020743][ T1082] file_mapped 135168 [ 55.020743][ T1082] file_dirty 0 [ 55.020743][ T1082] file_writeback 270336 [ 55.020743][ T1082] anon_thp 0 [ 55.020743][ T1082] inactive_anon 313708544 [ 55.020743][ T1082] active_anon 405504 [ 55.020743][ T1082] inactive_file 65536 [ 55.020743][ T1082] active_file 126976 [ 55.020743][ T1082] unevictable 0 [ 55.020743][ T1082] slab_reclaimable 0 [ 55.020743][ T1082] slab_unreclaimable 0 [ 55.020743][ T1082] slab 0 [ 55.020743][ T1082] workingset_refault_anon 0 [ 55.020743][ T1082] workingset_refault_file 528 [ 55.020743][ T1082] workingset_activate_anon 0 [ 55.020743][ T1082] workingset_activate_file 462 [ 55.020743][ T1082] workingset_restore_anon 0 [ 55.020743][ T1082] workingset_restore_file 66 [ 55.137560][ T1082] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz.0.232,pid=1085,uid=0 [ 55.234423][ T1284] device sit0 left promiscuous mode [ 55.243302][ T1082] Memory cgroup out of memory: Killed process 1085 (syz.0.232) total-vm:89928kB, anon-rss:944kB, file-rss:53312kB, shmem-rss:0kB, UID:0 pgtables:176kB oom_score_adj:1000 [ 55.264053][ T1281] device sit0 entered promiscuous mode [ 55.274152][ T27] oom_reaper: reaped process 1085 (syz.0.232), now anon-rss:0kB, file-rss:53248kB, shmem-rss:0kB [ 55.290966][ T1082] syz.0.232 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 55.302210][ T1082] CPU: 1 PID: 1082 Comm: syz.0.232 Not tainted 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 55.311822][ T1082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 55.321883][ T1082] Call Trace: [ 55.325026][ T1082] dump_stack_lvl+0x1e2/0x24b [ 55.329524][ T1082] ? panic+0x812/0x812 [ 55.333429][ T1082] ? bfq_pos_tree_add_move+0x43b/0x43b [ 55.338725][ T1082] ? ___ratelimit+0x3f7/0x580 [ 55.343241][ T1082] ? _raw_spin_lock+0xa4/0x1b0 [ 55.347839][ T1082] dump_stack+0x15/0x17 [ 55.351827][ T1082] dump_header+0xd8/0x6d0 [ 55.355997][ T1082] oom_kill_process+0xef/0x2d0 [ 55.360596][ T1082] out_of_memory+0x9bd/0xe10 [ 55.365026][ T1082] ? unregister_oom_notifier+0x20/0x20 [ 55.370317][ T1082] ? mutex_lock_killable+0xd8/0x110 [ 55.375359][ T1082] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 55.381689][ T1082] ? sched_clock_cpu+0x1b/0x3b0 [ 55.386375][ T1082] mem_cgroup_out_of_memory+0x2a8/0x380 [ 55.391755][ T1082] ? mem_cgroup_oom_trylock+0x3a0/0x3a0 [ 55.397138][ T1082] ? _raw_spin_trylock_bh+0x190/0x190 [ 55.402343][ T1082] ? mem_cgroup_oom_trylock+0x22d/0x3a0 [ 55.407734][ T1082] try_charge+0xff2/0x15f0 [ 55.411981][ T1082] ? __memcg_kmem_charge+0x180/0x180 [ 55.417104][ T1082] ? __kasan_check_write+0x14/0x20 [ 55.422046][ T1082] ? get_mem_cgroup_from_mm+0x186/0x1a0 [ 55.427430][ T1082] __mem_cgroup_charge+0x147/0x6e0 [ 55.432377][ T1082] shmem_add_to_page_cache+0x6a9/0x10c0 [ 55.437758][ T1082] ? shmem_alloc_page+0x420/0x420 [ 55.442616][ T1082] ? _raw_spin_lock_irqsave+0x210/0x210 [ 55.447996][ T1082] ? find_lock_entry+0x1df/0x200 [ 55.452770][ T1082] shmem_getpage_gfp+0xa65/0x2480 [ 55.457639][ T1082] ? iov_iter_advance+0x827/0xb20 [ 55.462491][ T1082] ? shmem_getpage+0xa0/0xa0 [ 55.466915][ T1082] ? iov_iter_fault_in_readable+0x258/0x4f0 [ 55.472648][ T1082] ? __kasan_check_write+0x14/0x20 [ 55.477615][ T1082] ? _raw_spin_lock+0xa4/0x1b0 [ 55.482198][ T1082] ? _raw_spin_trylock_bh+0x190/0x190 [ 55.487402][ T1082] shmem_write_begin+0xca/0x1b0 [ 55.492089][ T1082] generic_perform_write+0x2cd/0x570 [ 55.497208][ T1082] ? file_remove_privs+0x2af/0x570 [ 55.502157][ T1082] ? grab_cache_page_write_begin+0xa0/0xa0 [ 55.507797][ T1082] ? file_remove_privs+0x570/0x570 [ 55.512746][ T1082] ? __kasan_check_write+0x14/0x20 [ 55.517691][ T1082] __generic_file_write_iter+0x23c/0x560 [ 55.523159][ T1082] ? generic_write_checks+0x3b9/0x470 [ 55.528368][ T1082] generic_file_write_iter+0xaf/0x1c0 [ 55.533577][ T1082] __kernel_write+0x5ab/0x9d0 [ 55.538088][ T1082] ? vfs_read+0xba0/0xba0 [ 55.542258][ T1082] ? __kasan_check_write+0x14/0x20 [ 55.547200][ T1082] dump_emit+0x261/0x3a0 [ 55.551280][ T1082] ? wait_for_dump_helpers+0x3b0/0x3b0 [ 55.556575][ T1082] ? dump_user_range+0xef/0x1a0 [ 55.561263][ T1082] dump_user_range+0x71/0x1a0 [ 55.565774][ T1082] elf_core_dump+0x33bd/0x3c10 [ 55.570379][ T1082] ? load_elf_binary+0x2750/0x2750 [ 55.575322][ T1082] ? __fsnotify_parent+0x5ed/0x6c0 [ 55.580273][ T1082] ? __kasan_check_write+0x14/0x20 [ 55.585216][ T1082] ? _raw_spin_lock+0xa4/0x1b0 [ 55.589816][ T1082] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 55.596245][ T1082] ? shmem_setattr+0x17e/0x8b0 [ 55.600848][ T1082] ? __kasan_check_read+0x11/0x20 [ 55.605696][ T1082] ? unshare_files+0x1c5/0x2c0 [ 55.610300][ T1082] ? __ia32_sys_unshare+0x40/0x40 [ 55.615161][ T1082] do_coredump+0x1eb8/0x2d60 [ 55.619584][ T1082] ? asm_exc_page_fault+0x1e/0x30 [ 55.624450][ T1082] ? simple_acl_create+0x2c0/0x2c0 [ 55.629395][ T1082] ? kmem_cache_free+0xa9/0x1e0 [ 55.634081][ T1082] ? ____kasan_slab_free+0x12c/0x160 [ 55.639202][ T1082] ? kmem_cache_free+0xa9/0x1e0 [ 55.643890][ T1082] get_signal+0x102c/0x1410 [ 55.648229][ T1082] arch_do_signal_or_restart+0xbd/0x17c0 [ 55.653698][ T1082] ? __do_sys_rt_sigreturn+0x1e0/0x1e0 [ 55.658997][ T1082] ? __bad_area_nosemaphore+0x430/0x430 [ 55.664371][ T1082] ? __bad_area_nosemaphore+0x2c0/0x430 [ 55.669759][ T1082] ? __init_rwsem+0x1c0/0x1c0 [ 55.674268][ T1082] exit_to_user_mode_loop+0x9b/0xd0 [ 55.679300][ T1082] irqentry_exit_to_user_mode+0x4e/0x80 [ 55.684680][ T1082] irqentry_exit+0x12/0x60 [ 55.688931][ T1082] exc_page_fault+0x33d/0x5b0 [ 55.693446][ T1082] ? asm_exc_page_fault+0x8/0x30 [ 55.698219][ T1082] asm_exc_page_fault+0x1e/0x30 [ 55.702906][ T1082] RIP: 0033:0x8c [ 55.706296][ T1082] Code: Unable to access opcode bytes at RIP 0x62. [ 55.712626][ T1082] RSP: 002b:00000000200000a8 EFLAGS: 00010217 [ 55.718528][ T1082] RAX: 0000000000000000 RBX: 00007f90bd448080 RCX: 00007f90bd22ed29 [ 55.726338][ T1082] RDX: 00000000200000c0 RSI: 00000000200000a0 RDI: 0000000080100000 [ 55.734150][ T1082] RBP: 00007f90bd2b02a0 R08: 0000000020000140 R09: 0000000020000140 [ 55.741961][ T1082] R10: 0000000020000100 R11: 0000000000000206 R12: 0000000000000000 [ 55.749771][ T1082] R13: 0000000000000001 R14: 00007f90bd448080 R15: 00007ffd425e86d8 [ 55.757990][ T1082] memory: usage 307200kB, limit 307200kB, failcnt 11853 [ 55.764734][ T1082] memory+swap: usage 429688kB, limit 9007199254740988kB, failcnt 0 [ 55.772638][ T1082] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 55.797059][ T1082] Memory cgroup stats for /syz0: [ 55.797167][ T1082] anon 270336 [ 55.797167][ T1082] file 311697408 [ 55.797167][ T1082] kernel_stack 0 [ 55.797167][ T1082] percpu 0 [ 55.797167][ T1082] sock 0 [ 55.797167][ T1082] shmem 311697408 [ 55.797167][ T1082] file_mapped 135168 [ 55.797167][ T1082] file_dirty 0 [ 55.797167][ T1082] file_writeback 0 [ 55.797167][ T1082] anon_thp 0 [ 55.797167][ T1082] inactive_anon 313843712 [ 55.797167][ T1082] active_anon 405504 [ 55.797167][ T1082] inactive_file 65536 [ 55.797167][ T1082] active_file 126976 [ 55.797167][ T1082] unevictable 0 [ 55.797167][ T1082] slab_reclaimable 0 [ 55.797167][ T1082] slab_unreclaimable 0 [ 55.797167][ T1082] slab 0 [ 55.797167][ T1082] workingset_refault_anon 0 [ 55.797167][ T1082] workingset_refault_file 528 [ 55.797167][ T1082] workingset_activate_anon 0 [ 55.797167][ T1082] workingset_activate_file 462 [ 55.797167][ T1082] workingset_restore_anon 0 [ 55.797167][ T1082] workingset_restore_file 66 [ 55.966318][ T1082] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz.0.232,pid=1084,uid=0 [ 56.149804][ T1082] Memory cgroup out of memory: Killed process 1084 (syz.0.232) total-vm:89928kB, anon-rss:948kB, file-rss:53312kB, shmem-rss:0kB, UID:0 pgtables:176kB oom_score_adj:1000 [ 56.250972][ T1088] syz.0.232 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 56.262575][ T1088] CPU: 0 PID: 1088 Comm: syz.0.232 Not tainted 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 56.272184][ T1088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 56.282166][ T1088] Call Trace: [ 56.285299][ T1088] dump_stack_lvl+0x1e2/0x24b [ 56.289811][ T1088] ? panic+0x812/0x812 [ 56.293708][ T1088] ? bfq_pos_tree_add_move+0x43b/0x43b [ 56.299005][ T1088] ? ___ratelimit+0x3f7/0x580 [ 56.303516][ T1088] ? _raw_spin_lock+0xa4/0x1b0 [ 56.308116][ T1088] dump_stack+0x15/0x17 [ 56.312107][ T1088] dump_header+0xd8/0x6d0 [ 56.316271][ T1088] oom_kill_process+0xef/0x2d0 [ 56.320876][ T1088] out_of_memory+0x9bd/0xe10 [ 56.325305][ T1088] ? unregister_oom_notifier+0x20/0x20 [ 56.330602][ T1088] ? mutex_lock_killable+0xd8/0x110 [ 56.335630][ T1088] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 56.341967][ T1088] ? sched_clock_cpu+0x1b/0x3b0 [ 56.346655][ T1088] mem_cgroup_out_of_memory+0x2a8/0x380 [ 56.352031][ T1088] ? mem_cgroup_oom_trylock+0x3a0/0x3a0 [ 56.357419][ T1088] ? _raw_spin_trylock_bh+0x190/0x190 [ 56.362624][ T1088] ? mem_cgroup_oom_trylock+0x22d/0x3a0 [ 56.368009][ T1088] try_charge+0xff2/0x15f0 [ 56.372260][ T1088] ? __memcg_kmem_charge+0x180/0x180 [ 56.377383][ T1088] ? __kasan_check_write+0x14/0x20 [ 56.382341][ T1088] ? get_mem_cgroup_from_mm+0x186/0x1a0 [ 56.387710][ T1088] __mem_cgroup_charge+0x147/0x6e0 [ 56.392654][ T1088] shmem_add_to_page_cache+0x6a9/0x10c0 [ 56.398037][ T1088] ? shmem_alloc_page+0x420/0x420 [ 56.402894][ T1088] ? find_lock_entry+0x1df/0x200 [ 56.407794][ T1088] shmem_getpage_gfp+0xa65/0x2480 [ 56.412672][ T1088] ? shmem_getpage+0xa0/0xa0 [ 56.417071][ T1088] ? iov_iter_fault_in_readable+0x258/0x4f0 [ 56.422795][ T1088] ? __kasan_check_write+0x14/0x20 [ 56.427743][ T1088] ? _raw_spin_lock+0xa4/0x1b0 [ 56.432346][ T1088] ? _raw_spin_trylock_bh+0x190/0x190 [ 56.437557][ T1088] shmem_write_begin+0xca/0x1b0 [ 56.442241][ T1088] generic_perform_write+0x2cd/0x570 [ 56.447366][ T1088] ? grab_cache_page_write_begin+0xa0/0xa0 [ 56.453000][ T1088] ? file_remove_privs+0x570/0x570 [ 56.457951][ T1088] ? __kasan_check_write+0x14/0x20 [ 56.462895][ T1088] __generic_file_write_iter+0x23c/0x560 [ 56.468364][ T1088] ? generic_write_checks+0x3b9/0x470 [ 56.473574][ T1088] generic_file_write_iter+0xaf/0x1c0 [ 56.478782][ T1088] __kernel_write+0x5ab/0x9d0 [ 56.483297][ T1088] ? vfs_read+0xba0/0xba0 [ 56.487463][ T1088] ? __kasan_check_write+0x14/0x20 [ 56.492403][ T1088] dump_emit+0x261/0x3a0 [ 56.496483][ T1088] ? wait_for_dump_helpers+0x3b0/0x3b0 [ 56.501778][ T1088] ? get_dump_page+0x58a/0x7a0 [ 56.506377][ T1088] dump_user_range+0x71/0x1a0 [ 56.510893][ T1088] elf_core_dump+0x33bd/0x3c10 [ 56.515498][ T1088] ? load_elf_binary+0x2750/0x2750 [ 56.520871][ T1088] ? __fsnotify_parent+0x5ed/0x6c0 [ 56.525818][ T1088] ? __kasan_check_write+0x14/0x20 [ 56.530939][ T1088] ? _raw_spin_lock+0xa4/0x1b0 [ 56.535543][ T1088] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 56.541968][ T1088] ? shmem_setattr+0x17e/0x8b0 [ 56.546570][ T1088] ? __kasan_check_read+0x11/0x20 [ 56.551426][ T1088] ? unshare_files+0x1c5/0x2c0 [ 56.556026][ T1088] ? __ia32_sys_unshare+0x40/0x40 [ 56.560886][ T1088] do_coredump+0x1eb8/0x2d60 [ 56.565310][ T1088] ? asm_exc_page_fault+0x1e/0x30 [ 56.570181][ T1088] ? simple_acl_create+0x2c0/0x2c0 [ 56.575120][ T1088] ? kmem_cache_free+0xa9/0x1e0 [ 56.579827][ T1088] ? ____kasan_slab_free+0x12c/0x160 [ 56.584927][ T1088] ? kmem_cache_free+0xa9/0x1e0 [ 56.589612][ T1088] get_signal+0x102c/0x1410 [ 56.593954][ T1088] arch_do_signal_or_restart+0xbd/0x17c0 [ 56.599428][ T1088] ? __do_sys_rt_sigreturn+0x1e0/0x1e0 [ 56.604713][ T1088] ? __bad_area_nosemaphore+0x430/0x430 [ 56.610099][ T1088] ? __bad_area_nosemaphore+0x2c0/0x430 [ 56.615477][ T1088] ? __init_rwsem+0x1c0/0x1c0 [ 56.619992][ T1088] exit_to_user_mode_loop+0x9b/0xd0 [ 56.625026][ T1088] irqentry_exit_to_user_mode+0x4e/0x80 [ 56.630408][ T1088] irqentry_exit+0x12/0x60 [ 56.634656][ T1088] exc_page_fault+0x33d/0x5b0 [ 56.639176][ T1088] ? asm_exc_page_fault+0x8/0x30 [ 56.643944][ T1088] asm_exc_page_fault+0x1e/0x30 [ 56.648688][ T1088] RIP: 0033:0x8c [ 56.652018][ T1088] Code: Unable to access opcode bytes at RIP 0x62. [ 56.658349][ T1088] RSP: 002b:00000000200000a8 EFLAGS: 00010217 [ 56.664250][ T1088] RAX: 0000000000000000 RBX: 00007f90bd448080 RCX: 00007f90bd22ed29 [ 56.672063][ T1088] RDX: 00000000200000c0 RSI: 00000000200000a0 RDI: 0000000080100000 [ 56.679875][ T1088] RBP: 00007f90bd2b02a0 R08: 0000000020000140 R09: 0000000020000140 [ 56.687688][ T1088] R10: 0000000020000100 R11: 0000000000000206 R12: 0000000000000000 [ 56.695498][ T1088] R13: 0000000000000001 R14: 00007f90bd448080 R15: 00007ffd425e86d8 [ 56.708347][ T24] audit: type=1400 audit(1737989541.769:133): avc: denied { remove_name } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 56.732720][ T1088] memory: usage 307044kB, limit 307200kB, failcnt 11943 [ 56.747574][ T24] audit: type=1400 audit(1737989541.769:134): avc: denied { rename } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 56.845430][ T1088] memory+swap: usage 405888kB, limit 9007199254740988kB, failcnt 0 [ 56.947972][ T1088] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 56.954639][ T1088] Memory cgroup stats for /syz0: [ 56.954772][ T1088] anon 270336 [ 56.954772][ T1088] file 298045440 [ 56.954772][ T1088] kernel_stack 0 [ 56.954772][ T1088] percpu 0 [ 56.954772][ T1088] sock 0 [ 56.954772][ T1088] shmem 298045440 [ 56.954772][ T1088] file_mapped 135168 [ 56.954772][ T1088] file_dirty 0 [ 56.954772][ T1088] file_writeback 0 [ 56.954772][ T1088] anon_thp 0 [ 56.954772][ T1088] inactive_anon 299921408 [ 56.954772][ T1088] active_anon 405504 [ 56.954772][ T1088] inactive_file 65536 [ 56.954772][ T1088] active_file 126976 [ 56.954772][ T1088] unevictable 0 [ 56.954772][ T1088] slab_reclaimable 0 [ 56.954772][ T1088] slab_unreclaimable 0 [ 56.954772][ T1088] slab 0 [ 56.954772][ T1088] workingset_refault_anon 0 [ 56.954772][ T1088] workingset_refault_file 561 [ 56.954772][ T1088] workingset_activate_anon 0 [ 56.954772][ T1088] workingset_activate_file 462 [ 56.954772][ T1088] workingset_restore_anon 0 [ 56.954772][ T1088] workingset_restore_file 66 [ 57.252899][ T1088] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz.0.232,pid=1081,uid=0 [ 57.276349][ T1088] Memory cgroup out of memory: Killed process 1081 (syz.0.232) total-vm:89928kB, anon-rss:952kB, file-rss:53312kB, shmem-rss:0kB, UID:0 pgtables:176kB oom_score_adj:1000 [ 57.436915][ T1337] device wg2 entered promiscuous mode [ 57.663630][ T24] audit: type=1400 audit(1737989542.719:135): avc: denied { tracepoint } for pid=1333 comm="syz.1.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 58.006591][ T1356] device sit0 left promiscuous mode [ 58.278200][ T1356] device sit0 entered promiscuous mode [ 59.594930][ T1399] device wg2 left promiscuous mode [ 59.613857][ T1405] tap0: tun_chr_ioctl cmd 1074025692 [ 59.924808][ T1419] device sit0 left promiscuous mode [ 59.964870][ T1419] device sit0 entered promiscuous mode [ 60.820759][ T1421] device sit0 left promiscuous mode [ 60.957103][ T1425] device sit0 entered promiscuous mode [ 61.127729][ T1437] device sit0 left promiscuous mode [ 61.178796][ T1439] device sit0 left promiscuous mode [ 61.204124][ T1442] device sit0 entered promiscuous mode [ 61.936105][ T1439] device sit0 entered promiscuous mode [ 62.026802][ T1454] tap0: tun_chr_ioctl cmd 1074025692 [ 62.490878][ T1470] device sit0 left promiscuous mode [ 62.505471][ T1473] device sit0 entered promiscuous mode [ 63.277911][ T1490] device sit0 left promiscuous mode [ 63.315403][ T1493] device sit0 entered promiscuous mode [ 64.020087][ T1500] tap0: tun_chr_ioctl cmd 1074025692 [ 64.056342][ T24] audit: type=1400 audit(1737989549.099:136): avc: denied { create } for pid=1501 comm="syz.2.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 64.318468][ T1526] device sit0 left promiscuous mode [ 64.381449][ T1528] device sit0 entered promiscuous mode [ 65.226399][ T1549] tap0: tun_chr_ioctl cmd 1074025692 [ 65.257458][ T1551] syz.2.369[1551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.257533][ T1551] syz.2.369[1551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.314781][ T1560] device sit0 left promiscuous mode [ 65.381327][ T1560] device sit0 entered promiscuous mode [ 65.737061][ T1573] tap0: tun_chr_ioctl cmd 1074025692 [ 65.768859][ T1580] device sit0 left promiscuous mode [ 65.784748][ T1580] device sit0 entered promiscuous mode [ 66.890514][ T1611] tun0: tun_chr_ioctl cmd 1074025692 [ 66.922396][ T1619] device sit0 left promiscuous mode [ 66.960046][ T1616] device syzkaller0 entered promiscuous mode [ 66.970439][ T1619] device sit0 entered promiscuous mode [ 66.996810][ T1621] tap0: tun_chr_ioctl cmd 1074025692 [ 67.901920][ T1656] tun0: tun_chr_ioctl cmd 1074025692 [ 68.652653][ T1673] tap0: tun_chr_ioctl cmd 1074025692 [ 68.887233][ T1695] device sit0 left promiscuous mode [ 68.905909][ T1695] device sit0 entered promiscuous mode [ 69.026380][ T1699] device sit0 left promiscuous mode [ 69.052952][ T1699] device sit0 entered promiscuous mode [ 69.579247][ T1721] tap0: tun_chr_ioctl cmd 1074025692 [ 70.029481][ T1760] device sit0 left promiscuous mode [ 70.105782][ T1760] device sit0 entered promiscuous mode [ 70.339807][ T1769] tap0: tun_chr_ioctl cmd 1074025692 [ 70.705919][ T1797] syz.3.448 (1797) used obsolete PPPIOCDETACH ioctl [ 70.926712][ T1817] tap0: tun_chr_ioctl cmd 1074025692 [ 70.989269][ T1827] syz.4.459 uses obsolete (PF_INET,SOCK_PACKET) [ 71.003364][ T1829] device sit0 left promiscuous mode [ 71.216580][ T1829] device sit0 entered promiscuous mode [ 71.879250][ T1853] device veth0_vlan left promiscuous mode [ 71.887209][ T1853] device veth0_vlan entered promiscuous mode [ 71.896039][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.905472][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.016524][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 72.335914][ T1863] Â: renamed from pim6reg1 [ 72.906154][ T1921] device sit0 left promiscuous mode [ 72.931592][ T1921] device sit0 entered promiscuous mode [ 73.306158][ T1951] device sit0 left promiscuous mode [ 73.317414][ T1951] device sit0 entered promiscuous mode [ 73.368836][ T1953] device sit0 left promiscuous mode [ 73.403479][ T1953] device sit0 entered promiscuous mode [ 73.655444][ T1982] device sit0 left promiscuous mode [ 73.673918][ T1982] device sit0 entered promiscuous mode [ 74.306730][ T2029] device sit0 left promiscuous mode [ 74.331821][ T2029] device sit0 entered promiscuous mode [ 75.442722][ T2072] device sit0 left promiscuous mode [ 75.453418][ T2077] device sit0 entered promiscuous mode [ 77.088501][ T2130] device sit0 left promiscuous mode [ 77.181195][ T2131] device sit0 entered promiscuous mode [ 77.993638][ T2156] device sit0 left promiscuous mode [ 78.169772][ T2159] device sit0 entered promiscuous mode [ 79.341362][ T2184] device sit0 left promiscuous mode [ 79.465586][ T2184] device sit0 entered promiscuous mode [ 80.677012][ T2228] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.691540][ T2228] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.755369][ T2234] device syzkaller0 entered promiscuous mode [ 80.806021][ T2236] device sit0 left promiscuous mode [ 80.836248][ T2236] device sit0 entered promiscuous mode [ 85.196875][ T2329] device sit0 left promiscuous mode [ 85.352781][ T2329] device sit0 entered promiscuous mode [ 89.906645][ T2392] device sit0 left promiscuous mode [ 89.920892][ T2392] device sit0 entered promiscuous mode [ 90.258036][ T2409] device sit0 left promiscuous mode [ 90.278440][ T2409] device sit0 entered promiscuous mode [ 91.427854][ T2463] device sit0 left promiscuous mode [ 91.522003][ T2466] device sit0 entered promiscuous mode [ 92.569213][ T2480] device bridge_slave_1 left promiscuous mode [ 92.583196][ T2480] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.604695][ T24] audit: type=1400 audit(1737989577.659:137): avc: denied { create } for pid=2486 comm="syz.3.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 92.690244][ T2480] device bridge_slave_0 left promiscuous mode [ 92.750555][ T2480] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.922963][ T2504] device sit0 left promiscuous mode [ 92.934297][ T2495] device veth0_vlan left promiscuous mode [ 92.943818][ T2495] device veth0_vlan entered promiscuous mode [ 92.983124][ T2504] device sit0 entered promiscuous mode [ 93.267739][ T2539] device veth0_vlan left promiscuous mode [ 93.275119][ T2539] device veth0_vlan entered promiscuous mode [ 93.293613][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 93.301825][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 93.314402][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 93.520976][ T24] audit: type=1400 audit(1737989578.579:138): avc: denied { create } for pid=2581 comm="syz.1.700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 93.590034][ T2584] device veth0_vlan left promiscuous mode [ 93.619446][ T2584] device veth0_vlan entered promiscuous mode [ 93.831436][ T2601] device pim6reg1 entered promiscuous mode [ 94.225067][ T24] audit: type=1400 audit(1737989579.279:139): avc: denied { read } for pid=2602 comm="syz.3.705" name="cgroup.subtree_control" dev="cgroup2" ino=129 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 94.324184][ T2614] device syzkaller0 entered promiscuous mode [ 94.495813][ T24] audit: type=1400 audit(1737989579.549:140): avc: denied { create } for pid=2642 comm="syz.2.717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 94.634128][ T24] audit: type=1400 audit(1737989579.609:141): avc: denied { create } for pid=2646 comm="syz.1.719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 94.787337][ T2660] device veth0_vlan left promiscuous mode [ 94.823144][ T2660] device veth0_vlan entered promiscuous mode [ 94.849408][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.902893][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.928356][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 95.586623][ T24] audit: type=1400 audit(1737989580.639:142): avc: denied { append } for pid=2698 comm="syz.4.738" name="ppp" dev="devtmpfs" ino=148 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 96.414680][ T2760] device macsec0 left promiscuous mode [ 96.538875][ T2773] device veth1_macvtap entered promiscuous mode [ 96.671224][ T2773] device macsec0 entered promiscuous mode [ 96.701882][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 96.736576][ T2778] device syzkaller0 entered promiscuous mode [ 96.758911][ T24] audit: type=1400 audit(1737989581.819:143): avc: denied { create } for pid=2795 comm="syz.4.771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 97.227185][ T2867] device sit0 left promiscuous mode [ 97.253672][ T2867] device sit0 entered promiscuous mode [ 98.151619][ T2943] device pim6reg1 entered promiscuous mode [ 98.482212][ T2976] device sit0 left promiscuous mode [ 98.626917][ T2976] device sit0 entered promiscuous mode [ 99.971805][ T3037] device syzkaller0 entered promiscuous mode [ 100.079409][ T3050] device sit0 left promiscuous mode [ 100.205274][ T3052] device sit0 entered promiscuous mode [ 101.150613][ T3064] device sit0 left promiscuous mode [ 101.248851][ T3064] device sit0 entered promiscuous mode [ 101.432051][ T3074] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 101.450441][ T3074] device syzkaller0 entered promiscuous mode [ 101.471110][ T3086] device sit0 left promiscuous mode [ 101.493174][ T3091] device sit0 entered promiscuous mode [ 102.321465][ T3118] bridge0: port 3(dummy0) entered blocking state [ 102.334172][ T3118] bridge0: port 3(dummy0) entered disabled state [ 102.341069][ T3118] device dummy0 entered promiscuous mode [ 102.347169][ T3118] bridge0: port 3(dummy0) entered blocking state [ 102.353342][ T3118] bridge0: port 3(dummy0) entered forwarding state [ 102.583317][ T24] audit: type=1400 audit(1737989587.639:144): avc: denied { create } for pid=3136 comm="syz.0.888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 102.992742][ T3147] device syzkaller0 entered promiscuous mode [ 105.074920][ T3210] device sit0 left promiscuous mode [ 105.113391][ T3215] device sit0 left promiscuous mode [ 105.204591][ T3210] device sit0 entered promiscuous mode [ 105.925882][ T3219] device sit0 entered promiscuous mode [ 106.425014][ T3257] device sit0 left promiscuous mode [ 106.550006][ T3257] device sit0 entered promiscuous mode [ 107.643120][ T3309] device sit0 left promiscuous mode [ 107.897002][ T3309] device sit0 entered promiscuous mode [ 109.355851][ T3364] device syzkaller0 entered promiscuous mode [ 109.984627][ T24] audit: type=1400 audit(1737989595.039:145): avc: denied { setattr } for pid=3392 comm="syz.4.968" path="/dev/net/tun" dev="devtmpfs" ino=147 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 110.236386][ T24] audit: type=1400 audit(1737989595.249:146): avc: denied { create } for pid=3403 comm="syz.3.973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 110.772379][ T24] audit: type=1400 audit(1737989595.829:147): avc: denied { create } for pid=3429 comm="syz.2.981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 111.018808][ T3439] device syzkaller0 entered promiscuous mode [ 111.404420][ T3477] device pim6reg1 entered promiscuous mode [ 111.897701][ T24] audit: type=1400 audit(1737989596.949:148): avc: denied { ioctl } for pid=3492 comm="syz.2.1000" path="socket:[25688]" dev="sockfs" ino=25688 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 112.254742][ T3508] device sit0 left promiscuous mode [ 112.288276][ T3508] device sit0 entered promiscuous mode [ 112.434001][ T3517] device sit0 left promiscuous mode [ 112.448887][ T3520] device sit0 entered promiscuous mode [ 112.823763][ T3517] device syzkaller0 entered promiscuous mode [ 112.868618][ T3532] device veth0_vlan left promiscuous mode [ 112.896980][ T3532] device veth0_vlan entered promiscuous mode [ 112.917106][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.935221][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.002542][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 113.100348][ T3544] ªªªªªª: renamed from vlan0 [ 113.491943][ T3586] device sit0 left promiscuous mode [ 113.635542][ T3589] device sit0 entered promiscuous mode [ 114.204235][ T3591] device veth1_macvtap left promiscuous mode [ 114.215167][ T3591] device macsec0 left promiscuous mode [ 115.740279][ T3674] device sit0 left promiscuous mode [ 116.697457][ T3688] device pim6reg1 entered promiscuous mode [ 117.531273][ T3708] device pim6reg1 entered promiscuous mode [ 117.648074][ T3726] device veth0_vlan left promiscuous mode [ 117.653979][ T3726] device veth0_vlan entered promiscuous mode [ 117.681825][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 117.718286][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 117.738533][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 117.747047][ T3738] device sit0 left promiscuous mode [ 117.786390][ T3741] device sit0 entered promiscuous mode [ 120.747165][ T3832] tap0: tun_chr_ioctl cmd 1074025677 [ 120.814121][ T3832] tap0: linktype set to 773 [ 120.839276][ T3834] device sit0 left promiscuous mode [ 120.999884][ T3834] device sit0 entered promiscuous mode [ 124.190377][ T3926] device sit0 left promiscuous mode [ 124.205820][ T3929] device sit0 entered promiscuous mode [ 124.967474][ T24] audit: type=1400 audit(1737989610.029:149): avc: denied { ioctl } for pid=3941 comm="syz.0.1142" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 125.031605][ T3943] : renamed from ipvlan1 [ 126.766362][ T3982] device sit0 left promiscuous mode [ 126.831392][ T3983] device sit0 entered promiscuous mode [ 127.273997][ T4006] FAULT_INJECTION: forcing a failure. [ 127.273997][ T4006] name failslab, interval 1, probability 0, space 0, times 0 [ 127.295423][ T4006] CPU: 0 PID: 4006 Comm: syz.0.1161 Not tainted 5.10.233-syzkaller-00881-gfbe98d68b6b3 #0 [ 127.305133][ T4006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 127.315039][ T4006] Call Trace: [ 127.318169][ T4006] dump_stack_lvl+0x1e2/0x24b [ 127.322662][ T4006] ? bfq_pos_tree_add_move+0x43b/0x43b [ 127.327968][ T4006] dump_stack+0x15/0x17 [ 127.331952][ T4006] should_fail+0x3c6/0x510 [ 127.336209][ T4006] ? sidtab_sid2str_get+0x12b/0x2a0 [ 127.341240][ T4006] __should_failslab+0xa4/0xe0 [ 127.345841][ T4006] should_failslab+0x9/0x20 [ 127.350187][ T4006] __kmalloc_track_caller+0x5f/0x320 [ 127.355306][ T4006] kmemdup+0x24/0x50 [ 127.359037][ T4006] sidtab_sid2str_get+0x12b/0x2a0 [ 127.363897][ T4006] security_sid_to_context_core+0x2b5/0x490 [ 127.369628][ T4006] security_sid_to_context_force+0x36/0x40 [ 127.375270][ T4006] selinux_inode_init_security+0x6df/0xad0 [ 127.380916][ T4006] ? selinux_inode_free_security+0x200/0x200 [ 127.386725][ T4006] ? __kasan_check_write+0x14/0x20 [ 127.391671][ T4006] security_inode_init_security+0x15b/0x390 [ 127.397399][ T4006] ? shmem_tmpfile+0x100/0x100 [ 127.401993][ T4006] ? security_dentry_create_files_as+0xc0/0xc0 [ 127.407976][ T4006] ? simple_acl_create+0x29e/0x2c0 [ 127.412924][ T4006] ? shmem_get_inode+0x720/0x9e0 [ 127.417701][ T4006] shmem_mknod+0xb8/0x1c0 [ 127.421864][ T4006] ? selinux_inode_mkdir+0x22/0x30 [ 127.426811][ T4006] shmem_mkdir+0x2b/0x60 [ 127.430892][ T4006] vfs_mkdir+0x4cf/0x6c0 [ 127.434971][ T4006] do_mkdirat+0x1a6/0x2c0 [ 127.439221][ T4006] ? do_mknodat+0x450/0x450 [ 127.443559][ T4006] ? __bpf_trace_sys_enter+0x62/0x70 [ 127.448683][ T4006] ? __traceiter_sys_enter+0x2e/0x50 [ 127.453804][ T4006] __x64_sys_mkdir+0x60/0x70 [ 127.458229][ T4006] do_syscall_64+0x34/0x70 [ 127.462483][ T4006] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 127.468210][ T4006] RIP: 0033:0x7f90bd22ed29 [ 127.472466][ T4006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 127.491902][ T4006] RSP: 002b:00007f90bb899038 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 127.500148][ T4006] RAX: ffffffffffffffda RBX: 00007f90bd447fa0 RCX: 00007f90bd22ed29 [ 127.507960][ T4006] RDX: 0000000000000000 RSI: 0000000000000045 RDI: 00000000200001c0 [ 127.515768][ T4006] RBP: 00007f90bb899090 R08: 0000000000000000 R09: 0000000000000000 [ 127.523585][ T4006] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 127.531394][ T4006] R13: 0000000000000000 R14: 00007f90bd447fa0 R15: 00007ffd425e86d8 [ 128.000860][ T4016] device pim6reg1 entered promiscuous mode [ 128.019659][ T4029] device sit0 left promiscuous mode [ 128.048847][ T4029] device sit0 entered promiscuous mode [ 128.561763][ T4046] device syzkaller0 entered promiscuous mode [ 128.721761][ T4059] ÿÿÿÿÿÿ: renamed from vlan1 [ 128.774878][ T4070] device sit0 left promiscuous mode [ 128.896817][ T4070] device sit0 entered promiscuous mode [ 129.435923][ T24] audit: type=1400 audit(1737989614.489:150): avc: denied { create } for pid=4106 comm="syz.3.1198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 131.004066][ T4160] device syzkaller0 entered promiscuous mode [ 131.139750][ T4185] device pim6reg1 entered promiscuous mode [ 132.145296][ T4217] device sit0 left promiscuous mode [ 132.182401][ T4220] device sit0 entered promiscuous mode [ 133.025341][ T4252] device sit0 entered promiscuous mode