last executing test programs: 3m36.181692324s ago: executing program 1 (id=584): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x29, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) r5 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0600000004000000008000005c"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sched_switch\x00', r7}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x709}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r5, 0x0, 0x200000}, 0x38) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 3m35.260466761s ago: executing program 1 (id=597): r0 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x6, 0x6, 0x81, 0x0, 0x7, 0x2, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x8, 0xa}, 0x4100, 0x9, 0x7ff, 0x5, 0x3, 0x4, 0x81, 0x0, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x80, 0xa2, 0x3, 0x7, 0x5, 0x0, 0x80, 0xe0c10, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x4000, 0x0, 0xfff, 0x1, 0x6, 0xffffffff, 0x6, 0x0, 0x1, 0x0, 0xb}, r0, 0x6, r1, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r0, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)='%ps \x00'}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.kill\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000280)={'netpci0\x00', @link_local}) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000540)={&(0x7f00000002c0)="db1c07cfd68c89db13f657ded1bccf0f50", &(0x7f0000000300)=""/243, &(0x7f0000000400)="0cb703ff69319b2149f5fdf069a2703d69e609dd98ced095c82739dcfd4af6ff34cc0c72c17d2d79615d45", &(0x7f0000000440)="dd36eb90ea4d2e23ed914aa9b4783d1bc2b12f6e393858046ca5c551755c7a80d47cf3fa91c95158a797e9ac4a066161bddb1a6db9f778d4a3766e8ec74f18e58b959490cca3403403ea5132d5738557458520e3104e2a5f4eee12ea09eb9d4acf9cc7fae31ab22e6584c7d2290c27a15451ccc140c9671cbf15bd80764782b6ef49873d33554d97260a7465a21ac57e16dcb8f085a59e91910220781597864fce4548d402e05cdbabbd5ff98e06961a241bbd9324db3a335ea53a0afe9194eee071b7149f", 0x6, r2}, 0x38) sendmsg$tipc(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000580)="11cc9acfd206dc16b0e4cfbdf4dafe1782fd06a73967f02d5fb89899", 0x1c}, {&(0x7f00000005c0)="3ed831cf89f5aa4911637faa9e679511ca60bde5ef4ecfeba060fae4a6b6ac9da6baed49cb6a642de835e2fd4ce26e5fa370bfd3689d800901c9dd88f8b2", 0x3e}, {&(0x7f0000000600)="675e90d656", 0x5}, {&(0x7f0000000640)="5ba9e14611091f2ec5dca1b849010f4f39b43e1c521c4d1905a0b84894fbeea20aeae200669d805228fca4f44afc6df257c4d92ff496970fd9bb63b585bab5731e5d9e52dfd343acd025ac61ee8d6965d7f746bcaebcb4e4b4027d94fd89f79ddd04573a9cbe1cb384ecb5ee4619fb106724b7f9c1dafd32eec58ab3073bd0109f9d03661a3a18ae64fe1791d3b84961ec37a1b736480eab", 0x98}, {&(0x7f0000000700)="e6aade6c9161b356b4adbf92eacfd05c3f278919e03eed7e96df6b4c933e763553b0c289d5679048cdd77db708548681be6545e144eecb6ec7b043b1199937496fca62c5437f32b7b3b607ef749a075e75d721672c52667d1e96d86b4f0c133010d18489e79a97ad1dc0da62a003b1548f0a23ad545ad9d75aa86f4eb9518abad7a4daec5c7e5da2d066fcd0c65720636978033527fa0f5688c5b812ddcca8d120e8448d3644af6b7019a0e09e713b783fcff274adecf30115c06e9a93c4b5b141f57e590da60cfa310de191286a0b4803b5e19a46c83d53464c86c70850cfbb51b541fd15c3968a3cc193040a599019dc7fc97c9977bb5d", 0xf8}, {&(0x7f0000000800)="b05f301bed611911eb9faf845eab2c9cea2871bb78d59f9b631130f24459d426d42a711e9fa187fb8bf93d19983cf5d9f9522a589b501043e7640f9befee08e17b489c4366f3767ae44f3d43d40063c66d99c508df0a1df4ee2b9bb2677e303123014135d6317bb4381810212472f994f0ee4c13ba6977c1b1e9a03231f0f8fe193bd2d33b493a533410d304783fefb939ae76377a08a78f7b4c", 0x9a}], 0x6, &(0x7f0000000940)="7c04a38ab3a1ebcdcea5ec6a0af75b39f6245b839c9f106ea1f1465713cca81e9adda648fc0111cfe0b18ad057cd39121fe09c6070666efb4204ce93c2e5284d4d5bfb96c92253dcffa483a430aa3dbae3cdd9ef05f5c4064d", 0x59, 0x20044080}, 0x4008000) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000d00)={&(0x7f0000000a00)="ee8377c397f6400c67e1809f2bef50765f96394116882de017f1da5916260de5ba830cf31ef4135a17f20be818b40ba28be0538701120109282090e047b4d43aabc0dcd187defa0b497271a9fbbdef89e8898550dff266153ec31cf3d19d74fdba949576068fb804dd45272e6582666a2b00961879e800086daf076dc15492a08f1b9823dc41cb2882a1d2d2e5c0a7456a6dd2fa7f0e17ba606c793d911216c3ef35d13ed08716f21262746796ccb0e2f32bd9e1eec1ea68f8fc7ea9f951911bf28d05e4a92e27e2826e9aeeeb2a3e12d52e614df064b58f491e2152", &(0x7f0000000b00)=""/140, &(0x7f0000000bc0)="cb7eb387330272f5aaa597d616ac4adb587804450ddf1fb3f814193dfb15910ae2288df72ccfab86fa0b36361e725b48901dd09127", &(0x7f0000000c00)="09ebab73f20557f9dc017e6ace7967def92a29d278c326b798cf89a931d5ed1bfc647932918a6b0879cb435e2b25a3d980c0fb3516ed4b975f8b55e68a27a7349be26474928e244c9bb542244b3b3b12ed8d12703efcf9458ed2909fcbadddd797528600d276ae1365a6b369d708eae9f8a4b02847081b746bd666b0422feeef3a97dbc5cbc43959986eade78d47eb846dba7268439277274ee260f5fa0f860251c17b513527a4a41479131fb1e2671138517d349bcb6f279ed8e9216d179bbc1d11256533e5a2517bb9b0f4bd3294eca9d5f3a3fa5a71cc9fd5760fc12a27cd784745a845b79e91326c44ac63a7bcc5fbf5162b0cdcc61bda", 0x8000, r2}, 0x38) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000d40)='memory.current\x00', 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000d80)={r4, r2}, 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000ec0)={@cgroup=r3, 0x15, 0x0, 0x1, &(0x7f0000000dc0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000e00)=[0x0], &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000e80)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001200)={r3, 0xe0, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000f40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, &(0x7f0000000f80)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000fc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb1, &(0x7f0000001000)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001040), &(0x7f0000001080), 0x8, 0x1c, 0x8, 0x8, &(0x7f00000010c0)}}, 0x10) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000001240)={0x5, 0x0}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000f00)={@ifindex=r6, r0, 0x1b, 0x2030, 0x0, @void, @void, @value=r7, @void, r5}, 0x20) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000001280)) write$cgroup_subtree(r4, &(0x7f00000012c0)={[{0x2d, 'pids'}, {0x2b, 'hugetlb'}]}, 0xf) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001440)={0x6, 0x11, &(0x7f0000001300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4e3}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@map_idx={0x18, 0xb, 0x5, 0x0, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000013c0)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41000, 0x22, '\x00', r6, 0x25, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=[r2, r3, r2, r4], 0x0, 0x10, 0xee}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001500)={r3, 0xffffffffffffffff}, 0x4) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001540)=@bloom_filter={0x1e, 0x8, 0x7, 0x499b, 0x4320, r9, 0x800, '\x00', r6, r0, 0x4, 0x1, 0x4, 0x7}, 0x50) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000015c0)={@fallback=r10, r0, 0x38, 0x0, 0x0, @void, @value=r4, @void, @void, r5}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001700)={r9, 0x58, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r10, 0x58, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r10, &(0x7f0000001900)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001600)}], 0x1, &(0x7f0000001800)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @broadcast, @dev={0xac, 0x14, 0x14, 0x2f}}}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end, @noop]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r12, @dev={0xac, 0x14, 0x14, 0x34}, @empty}}}, @ip_retopts={{0x70, 0x0, 0x7, {[@ra={0x94, 0x4}, @end, @timestamp_addr={0x44, 0x1c, 0xac, 0x1, 0x8, [{@broadcast, 0x4}, {@remote, 0x7a}, {@empty, 0x4}]}, @rr={0x7, 0x7, 0xb4, [@initdev={0xac, 0x1e, 0x1, 0x0}]}, @timestamp_prespec={0x44, 0x34, 0xb1, 0x3, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@multicast2, 0x5}, {@local, 0x81}, {@private=0xa010101, 0xffffb2fd}, {@local, 0x5}, {@remote, 0x2}]}, @end]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @loopback, @rand_addr=0x64010102}}}], 0xe8}, 0xc840) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001980)={&(0x7f0000001940)='kvm_unmap_hva_range\x00', r0, 0x0, 0x3}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000019c0)={@ifindex=r12, r8, 0x2f, 0x0, 0x0, @void, @value=r8, @void, @void, r5}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001a00)={r9}, 0x4) recvmsg$unix(r0, &(0x7f0000002ec0)={0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000001a40)=""/190, 0xbe}, {&(0x7f0000001b00)=""/153, 0x99}, {&(0x7f0000001bc0)=""/4096, 0x1000}, {&(0x7f0000002bc0)=""/38, 0x26}, {&(0x7f0000002c00)=""/229, 0xe5}], 0x5, &(0x7f0000002d80)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x110}, 0x10001) perf_event_open(&(0x7f0000002f40)={0x4, 0x80, 0x0, 0x6, 0x8, 0x1, 0x0, 0x6, 0x15, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000002f00)}, 0x80, 0xe, 0x1000, 0x9, 0x7, 0x0, 0x8, 0x0, 0x9, 0x0, 0xb464}, r13, 0xc, 0xffffffffffffffff, 0x1) ioctl$TUNATTACHFILTER(r14, 0x401054d5, &(0x7f0000003000)={0x4, &(0x7f0000002fc0)=[{0x5, 0xf8, 0x8, 0x43e}, {0x1, 0x7, 0x4, 0x8}, {0x7, 0xb5, 0x9, 0x1ff}, {0x6, 0xfa, 0x1b, 0x7}]}) 3m35.174350743s ago: executing program 1 (id=599): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="7b9e303f8a8a0ee35cf3e1688f743a7a110259da0da9246db4ba25e9c97ef226cf392e4540e64d77775194ddf25427f195e08722e7b9ab622ade27a53c11699130f91663ea321e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f7, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x58, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x15, 0x4, &(0x7f0000000340)=@raw=[@ringbuf_query], &(0x7f00000009c0)='syzkaller\x00', 0x6, 0x36, &(0x7f0000000400)=""/54, 0x41100, 0x0, '\x00', r2, @fallback=0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x4, 0x4, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000a00)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x4faf}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[@ANYRESOCT], 0x48) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000003f000000000000000000f195", @ANYRESHEX=r1], &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r3}, 0x8) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r5 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r4}, 0x8) close(r5) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'veth0_vlan\x00', @random="010000201000"}) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r7}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7030000000000008500000087000000b70000000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ITER_CREATE(0x21, &(0x7f0000000800)={r5}, 0x8) 3m34.980123027s ago: executing program 1 (id=604): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x18) (async, rerun: 64) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) (rerun: 64) r2 = openat$cgroup_pressure(r1, &(0x7f0000000080)='io.pressure\x00', 0x2, 0x0) (async, rerun: 64) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) (rerun: 64) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={r3, &(0x7f0000000140)="cd12807af6f89e69f80aa61287f84a0e", &(0x7f0000000180)=""/180}, 0x20) (async) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)={0xffffffffffffffff}, 0x4) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000003c0)={@ifindex, 0xe, 0x0, 0x6, &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0], 0x0}, 0x40) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r1, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000440)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x5f, &(0x7f0000000500)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x8b, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) (async, rerun: 32) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, r0, 0x0, 0x1, &(0x7f0000000740)='\x00', 0x0}, 0x30) (rerun: 32) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000400)={@ifindex=r6, r4, 0x23, 0x20, 0x0, @void, @void, @void, @value=r8, r5}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@ifindex=0x0, 0x1, 0x1, 0x0, &(0x7f00000007c0)=[0x0], 0x1, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) write$cgroup_subtree(r2, &(0x7f0000000900)={[{0x2b, 'net_prio'}]}, 0xa) (async, rerun: 32) openat$cgroup_type(r1, &(0x7f0000000940), 0x2, 0x0) (rerun: 32) r10 = openat$cgroup_int(r3, &(0x7f0000000980)='io.latency\x00', 0x2, 0x0) (async) r11 = openat$tun(0xffffffffffffff9c, &(0x7f00000009c0), 0x210080, 0x0) ioctl$TUNSETVNETLE(r11, 0x400454dc, &(0x7f0000000a00)) (async, rerun: 32) ioctl$TUNSETOFFLOAD(r11, 0x400454d0, 0x1) (rerun: 32) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x4, 0x280f, 0x7ff, 0x20250, r3, 0x1, '\x00', r9, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0xb}, 0x50) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b40)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000ac0), &(0x7f0000000b00)=r4}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r4}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000cc0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000c40), &(0x7f0000000c80)=r4}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001080)={0x6, 0x21, &(0x7f0000000d00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xf80}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6085}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r14}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r15}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000e40)='GPL\x00', 0x400, 0x7a, &(0x7f0000000e80)=""/122, 0x41100, 0x50, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000f00)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000f40)={0x0, 0x7, 0x0, 0x8}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000f80)=[0xffffffffffffffff], &(0x7f0000000fc0)=[{0x5, 0x4, 0xe, 0x3}, {0x1, 0x5, 0x8, 0xa}, {0x4, 0x3, 0x7, 0x7}, {0x4, 0x3, 0xb, 0x9}, {0x3, 0x3, 0x9, 0x8}, {0x0, 0x3, 0x0, 0x6}, {0x3, 0x3, 0x8, 0x3}, {0x1, 0x3, 0x2, 0xc}, {0x3, 0x1, 0x6, 0x3}, {0x1, 0x2, 0x6, 0xb}], 0x10, 0xfffffff7}, 0x94) (async) write$cgroup_subtree(r4, &(0x7f0000001140)={[{0x2d, 'cpuset'}, {0x2d, 'cpuacct'}, {0x2d, 'rlimit'}]}, 0x19) (async) r16 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001280)=r7, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x12, &(0x7f0000001180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x9}, [@alu={0x4, 0x0, 0x4cdd283abef4479e, 0xa, 0x2, 0x40, 0x10}, @generic={0x4, 0xc, 0x8, 0x33c3, 0xffffffff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_val={0x18, 0x2, 0x2, 0x0, r15, 0x0, 0x0, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0xb}]}, &(0x7f0000001240)='GPL\x00', 0x80000000, 0x0, 0x0, 0x40f00, 0x0, '\x00', r9, 0x0, r16, 0x8, &(0x7f00000012c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000001300)={0x3, 0x6, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001340)=[r14, r15, r10, r15], &(0x7f0000001380)=[{0x0, 0x5, 0x9, 0xa}, {0x3, 0x5, 0xb, 0x4}], 0x10, 0x3ff}, 0x94) (async) r17 = openat$tun(0xffffffffffffff9c, &(0x7f0000001480), 0x40040, 0x0) ioctl$TUNGETVNETLE(r17, 0x800454dd, &(0x7f00000014c0)) (async) write$cgroup_devices(r1, &(0x7f0000001500)={'c', ' *:* ', 'wm\x00'}, 0x9) (async) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001580), 0x2, 0x0) 3m34.891613678s ago: executing program 1 (id=610): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10002}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8b0f, &(0x7f0000000000)={'bridge_slave_1\x00', @random="b3957f6fcfc1"}) socketpair(0x21, 0x800, 0x6, &(0x7f0000000000)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r4}, 0xc) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/cgroup\x00') perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x1, 0x40000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x1, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000003040)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e00000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0x0, 0x10, 0x6, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000580), 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 3m30.365548186s ago: executing program 1 (id=621): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x204000, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x2) (async) r1 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}, 0x3028, 0x0, 0xffffffff, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x8000, 0x0, 0xfffffffffffffffe}, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x9, 0x0, 0x0, 0x4, 0x82f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x9, 0x6, 0x8, 0x4, 0x2}, 0x50) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async, rerun: 64) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x18) sendmsg$unix(r3, &(0x7f0000000000)={&(0x7f00000057c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r2}, &(0x7f0000000000), &(0x7f0000000880)}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000480)={r2, &(0x7f0000000380), 0x0}, 0x20) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r6}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a53b1500eb", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000ac0)='freezer.self_freezing\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000b80)={r8, &(0x7f0000000b00)="d3f188ea11d49243ad5f40cb668b659d67e98ca6c6a9024861876da95c4c4cd09d15ef1d3b8e1a602de14c7aa63cddd2af03b803fd627014be2a517cdea22788b0c9cbe1db16975db22e88eb02d2b645c5b10b87575e8e7f3af2c161ce011658ec6d9d9b738f3f9b856d629eb58545", &(0x7f0000002a00)=""/4096, 0x4}, 0x20) (async, rerun: 32) recvmsg$unix(r7, &(0x7f0000000400)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000500)=""/122, 0x7a}, {&(0x7f0000000180)=""/24, 0x18}, {&(0x7f0000000600)=""/68, 0x44}, {&(0x7f0000000680)=""/160, 0xa0}], 0x4}, 0x40002140) (async, rerun: 32) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000780)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000007c0)={r2, &(0x7f0000000940)="6194434ff19dbb346c76df5adc6fdbdef32b649f51923461e6d59e8df59071aa4c0956b41892f191bda35b89be04ab2fe702e2b1325751ab50f973827498cacb2760e10dc463314ddfb895d84ebe27c0c1d97a912e79da1d0bf2205dcc5158dd43ff123fbcf679c283152071aec607c1b39ff8c77dd956e64397c082c97ea792f94c2517ce71a3967db23502abcb4fc5a9a218804b25066da5299dcfe956e7a802716f41f6dadca39d2ea689ef60ade7fe30b9571f8eabf71a2cb06fdb9e4ac7211f5e19956c14bf4cd9fae717d7fca185a1b92446c4d960bbdf04b7", &(0x7f0000000a40)=""/106}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x40, 0xc8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x30000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xfffffffffffffffe}, 0xc000, 0x0, 0x40000000, 0x3, 0x3, 0xfffffffc, 0x4, 0x0, 0xfffffffe, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 3m15.288850437s ago: executing program 32 (id=621): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x204000, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x2) (async) r1 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}, 0x3028, 0x0, 0xffffffff, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x8000, 0x0, 0xfffffffffffffffe}, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x9, 0x0, 0x0, 0x4, 0x82f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x9, 0x6, 0x8, 0x4, 0x2}, 0x50) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async, rerun: 64) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x18) sendmsg$unix(r3, &(0x7f0000000000)={&(0x7f00000057c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r2}, &(0x7f0000000000), &(0x7f0000000880)}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000480)={r2, &(0x7f0000000380), 0x0}, 0x20) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r6}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a53b1500eb", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000ac0)='freezer.self_freezing\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000b80)={r8, &(0x7f0000000b00)="d3f188ea11d49243ad5f40cb668b659d67e98ca6c6a9024861876da95c4c4cd09d15ef1d3b8e1a602de14c7aa63cddd2af03b803fd627014be2a517cdea22788b0c9cbe1db16975db22e88eb02d2b645c5b10b87575e8e7f3af2c161ce011658ec6d9d9b738f3f9b856d629eb58545", &(0x7f0000002a00)=""/4096, 0x4}, 0x20) (async, rerun: 32) recvmsg$unix(r7, &(0x7f0000000400)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000500)=""/122, 0x7a}, {&(0x7f0000000180)=""/24, 0x18}, {&(0x7f0000000600)=""/68, 0x44}, {&(0x7f0000000680)=""/160, 0xa0}], 0x4}, 0x40002140) (async, rerun: 32) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000780)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000007c0)={r2, &(0x7f0000000940)="6194434ff19dbb346c76df5adc6fdbdef32b649f51923461e6d59e8df59071aa4c0956b41892f191bda35b89be04ab2fe702e2b1325751ab50f973827498cacb2760e10dc463314ddfb895d84ebe27c0c1d97a912e79da1d0bf2205dcc5158dd43ff123fbcf679c283152071aec607c1b39ff8c77dd956e64397c082c97ea792f94c2517ce71a3967db23502abcb4fc5a9a218804b25066da5299dcfe956e7a802716f41f6dadca39d2ea689ef60ade7fe30b9571f8eabf71a2cb06fdb9e4ac7211f5e19956c14bf4cd9fae717d7fca185a1b92446c4d960bbdf04b7", &(0x7f0000000a40)=""/106}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x40, 0xc8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x30000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xfffffffffffffffe}, 0xc000, 0x0, 0x40000000, 0x3, 0x3, 0xfffffffc, 0x4, 0x0, 0xfffffffe, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 1.747498396s ago: executing program 3 (id=2817): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x3}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a40)={0xffffffffffffffff, 0xe0, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0], 0x0, 0x3e, &(0x7f00000007c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001880), &(0x7f00000018c0), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000001900)}}, 0x10) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="10eb0000040000000400496c9f00000200000000000000", @ANYRES16=r3, @ANYBLOB="000000bed22cce7e198edd000000000000000000", @ANYRES8=r2, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r5}, &(0x7f0000000a00), &(0x7f0000000a40)=r4}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xc16a, '\x00', r3, r4, 0x5, 0x5, 0x5}, 0x50) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000040)="1467f89421e50ddc8660446984616b2d543e9f586ea52e13da48468f664a53fff5a9cfcccbd4233bf3ea344e4664933e6fe7fff4a0cd95aa3718550374ce893866635bff454d380c32c4211fdf93caca24ba1466dc1abdd8cf0c763119cc5c4f78b85114e5cf8c286b6bc53b981db95026d345c35ce693e92f1df1345c1ae08c8df22139262987a25da4647e3bb5b954b0e206cda7cc46134f11c1d6a6bb", 0x9e}, {&(0x7f0000000880)="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", 0x1000}, {&(0x7f00000001c0)="3b45f50ae696af102fc1b27972db960633999fe573dbbf2179bf944b3a4fa73bf37995dd965c0770f6d1f711dccb4f8066de05e564a878260a21ff8f12fec4ddd88be947b4e002b757eab40e80ab529dd1da6c5b3139e9b4966573d34199830f2933ceca271ecb0fc3ad2c7cca963e266b3834c7def3cac6612b5cd7b380bd83367a71db9ed06264e660c53756f93eb67e8c728006202c4734a3d2967fa4ee108068d33be2ab2968dc654043e7749246f6fc726966973e7e8476a61570a847f061eb1b3d1995d96eff8de4ef1b787bbfdbd0c0e1da200f9b8e", 0xd9}, {&(0x7f00000002c0)="1146e1ab8a56c92260bdb5f25adf02e2df90560d4f662025fddfc358203c1559003d0fb81482ac940590d69929d9f0ba67df6476d40e4b2dcc4cc75b23d917ede01b1ff2eedb2c4f37d1992a7eff36e001e093e82a67e03bfa403567923090963770019b03433dee95d59aade132af568d915ee79bb127ec099ccea15eee184f72c6a6d9f1ab9de1062fce7aecbae330238a99c7138334fdffa5b44600c08424218a3cc1bcbb63bfcf6b2c277ef891a5229ebb3139121321a657387080", 0xbd}, {&(0x7f0000000380)="52685138b4a2ce12fbaa115d282f549f3ae635bb62484442add380c49555ff8c9ca7bc4230f16b6611abf695c5478165bd0d4b248339aa7132bf7943783f77a2fab164261cbe", 0x46}, {&(0x7f0000000100)="329e9944b240c4e6f44e1372e651530664ee295241dc55949c621d4966f81ece44673935ae0d0c3470c5ec", 0x2b}, {&(0x7f0000000580)="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", 0xfb}, {&(0x7f0000000440)="bcd05fb60cc3ecafdbc47db57b6126d7927b15e1da1c241079", 0x19}], 0x8, &(0x7f0000001a80)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_retopts={{0x68, 0x0, 0x7, {[@lsrr={0x83, 0xf, 0x7f, [@remote, @broadcast, @rand_addr=0x64010101]}, @end, @ssrr={0x89, 0xb, 0xc3, [@broadcast, @multicast2]}, @lsrr={0x83, 0x27, 0x57, [@private=0xa010100, @rand_addr=0x64010102, @local, @loopback, @local, @dev={0xac, 0x14, 0x14, 0x2a}, @loopback, @broadcast, @multicast2]}, @cipso={0x86, 0xe, 0x3, [{0x2, 0x8, "06fe12b3f0f4"}]}, @ra={0x94, 0x4}, @ra={0x94, 0x4}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @rand_addr=0x64010100, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @rand_addr=0x64010102, @loopback}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x61}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0xe}}}}], 0x140}, 0x4000000) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xf, &(0x7f0000000140)=ANY=[@ANYBLOB="180000007f0000feffffff000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000400)={r6, 0x0, 0x0}, 0x10) 1.713058677s ago: executing program 3 (id=2819): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x13, 0xb, &(0x7f0000000a80)=ANY=[@ANYRES64], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000006c0)='ns/uts\x00') bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000840000e4fe000000b2fa0000000000000000", @ANYRESDEC, @ANYRES8=r0, @ANYRES16=r2, @ANYRESHEX=r2], 0x50) r3 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x2, 0x4, 0xfd, 0x0, 0x75, 0x4, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x86}, 0x105004, 0xc8, 0x0, 0x3, 0xc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x4, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r2, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x25, &(0x7f0000000540), 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000840)=ANY=[], &(0x7f0000000740)=""/215, 0x74, 0xd7, 0x1, 0x2c, 0x10000, @value=r2}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffff4a) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="1bf400101820000000000000", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x20) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200), 0x801, 0x0) socketpair(0xf, 0x80007, 0x80, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) r6 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.cpu_exclusive\x00', 0x2, 0x0) write$cgroup_int(r6, &(0x7f00000003c0)=0x1ff, 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="850000002e00d7a01af32d8a3c13c8490800"/32], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0xffffffffffffffff, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x11}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r3, 0x0, 0x1, &(0x7f0000000480)='.'}, 0x30) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x29, 0x1, 0x8, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r7, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e408"], 0xfdef) 1.596706139s ago: executing program 5 (id=2823): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) 1.508544681s ago: executing program 5 (id=2824): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000070000000010"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="12000000060000000400000002", @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 1.199887467s ago: executing program 5 (id=2826): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r4}, 0x10) r5 = perf_event_open(&(0x7f0000000380)={0x4, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x2, 0xf9, 0x0, 0x7, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x1fffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x288}, 0x94) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x7, 0x2, 0x1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0x1a}, 0x11014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, r5, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r7}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) (async) close(r9) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r3, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r13, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r14, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) (async) write$cgroup_subtree(r14, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000800000000000000", @ANYRES32=r2, @ANYBLOB="0600000000000549175fdf10fb8b000000000000", @ANYRES32=r12, @ANYRES32=r14, @ANYBLOB="04000000030000000400"/28], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r11}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 1.199278517s ago: executing program 2 (id=2827): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_reset\x00', r1, 0x0, 0xfffffffffffffffe}, 0x18) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 1.185709467s ago: executing program 4 (id=2829): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x58}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e02000000000000000000000000000005"], 0x0, 0x37}, 0x28) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="54000000000000000000000400000000000000600000000100010001000000010000000700000007442cc05000000000000000010000ee06000000080000000100000e4a0000002000650003000000050000000800000000300000000000000001000000"], 0x88}, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x2d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc0189436, 0xf0ff1f00000000) 1.142034618s ago: executing program 3 (id=2830): r0 = perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0x7f, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0xc000d, 0x18, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4ac, 0x2, @perf_config_ext={0x7fff, 0x8}, 0x1b885, 0x9, 0x2, 0x0, 0x1, 0x1, 0xff, 0x0, 0x7, 0x0, 0xf81}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xa) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x3}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x3, r2, 0x4}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xf, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x61}, @call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r5, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(r6, &(0x7f0000000200)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000400)={r3, 0x0, 0x0}, 0x10) 1.140670958s ago: executing program 0 (id=2831): bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000c40)={@cgroup, 0x34, 0x0, 0x4, &(0x7f0000000b00)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000b80)=[0x0], &(0x7f0000000c00)=[0x0]}, 0x40) (async) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) (async, rerun: 32) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000240)='cpuset.memory_migrate\x00', 0x2, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000800)={0x2, 0xa6, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000340)="a836", 0x2}], 0x1}, 0x4040001) (async) recvmsg$unix(r4, &(0x7f00000038c0)={0x0, 0x0, 0x0}, 0x1) recvmsg$unix(r4, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)=""/122, 0x6d}], 0x1}, 0x0) (async) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0x2000000, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x50) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r1, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000000500)=[0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xed, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x6a, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r9}, 0x18) (async, rerun: 64) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB="0300000022000000000000000000000000000040273001e2d90ff1c4c0af0fc4a038ec9c839bbd1e2fa94ed7be6d721b0ee2c6c3f870318a2d33633b75e0e179ff6dbd4203c9a9e57f4d86910d77ad32071e7fde014ee33252e149f167bacfef3759e74b426679b9b15725559bad6e5d61b0a02ced9ca4c787016db02bc46b68f8df51098bb8c8fe420416404eb564dd4a23432d9320c7dccfac358dfb55fe4510d1332ee065504d0f4da8ceccc6c88e8080db9e3e0000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000050000000100"/28], 0x50) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1e, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x3}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000380)='syzkaller\x00', 0xb, 0x0, 0x0, 0x41000, 0x21, '\x00', r8, @sk_lookup, r7, 0x8, &(0x7f0000000880)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x0, 0x5, 0x0, 0x1000}, 0x10, 0xffffffffffffffff, r9, 0x6, &(0x7f0000000980)=[r6, r6, r7, r10, r6], &(0x7f00000009c0)=[{0x3, 0x2, 0xa, 0x9}, {0x2, 0x3, 0xd, 0x9}, {0x2, 0x5, 0x2, 0x4}, {0x1, 0x1, 0x1, 0x2}, {0x1, 0x2, 0xd, 0xb}, {0x5, 0x4, 0x10}]}, 0x94) openat$cgroup_procs(r7, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) 1.140487988s ago: executing program 0 (id=2832): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r2}, 0x10) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r3}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) 1.116865869s ago: executing program 0 (id=2833): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00"/11], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020100008500000043000000"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r3}, 0x10) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) 1.093913629s ago: executing program 4 (id=2834): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) 1.092994059s ago: executing program 2 (id=2835): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r2}, 0x10) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r3}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) (fail_nth: 1) 1.092347659s ago: executing program 4 (id=2836): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000001600)=ANY=[@ANYBLOB="7a0a00ff0000000071106a0000000000950000000000000091dbe2142a6e5c8e4d0863ca21c717ef681753f9c42ff332419265edfffcb91a101e421852b47a11c74a9d79b9b5fdd4dba906f4fce4ca43d1fc53d4859110386e746ab3de1692cf1daa3374eefb3841a0f12e86c65406738f95f5b6b3dd4e56f1130db733f1eb5553223feffd951f04492ff6318a"], &(0x7f0000000480)='syzkaller\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d40)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000fc0)={r0, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000440)=[0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x0, 0x6e, &(0x7f0000000540)=[{}, {}], 0x10, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x9f, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="460a00000000000063113400000000006037090003fe2c38e000000000000000"], &(0x7f00000003c0)='syzkaller\x00', 0x100000, 0x0, 0x0, 0x0, 0x3, '\x00', r1, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x0, 0x0, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r3, 0x0, 0x5) write$cgroup_subtree(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="2d63707520cff4f40300167eeb70331599c5223e7529f8e0bae5a26ad4300194808a04a1be5e4614"], 0x5) r4 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000001000)={[{0x2b, 'net_prio'}, {0x2d, 'io'}, {0x2b, 'blkio'}, {0x2d, 'devices'}, {0x2d, 'perf_event'}, {0x2b, 'cpuacct'}, {0x2b, 'io'}]}, 0x37) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x14, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xef, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f086dd47e0ffff00123a03631177fbac141416e000030a44079f03fe80000000000000000000000000002e01050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6e", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x6}, 0x50) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xffffffffffffff80}, 0x100888, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f00000002c0)={'sit0\x00', @random="0c66b597fc07"}) 1.081767699s ago: executing program 0 (id=2837): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='fscache_acquire\x00', r2}, 0x18) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40010) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10005, 0x800}, 0x48) close(r4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f0000000c00)=ANY=[@ANYBLOB="180000000000000000000000feffffffb7080000000000007baaf8ff00000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a70000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000009500"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r5}, 0xc) 927.687912ms ago: executing program 0 (id=2838): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) syz_clone(0x2c000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4], 0x18}, 0x4044006) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x6, 0x14, &(0x7f0000001480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}}, @printk={@x}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r8, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x50) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70200001400a685b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) close(r5) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r12}, 0x10) write$cgroup_int(r11, &(0x7f00000001c0)=0x7fff, 0x12) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r13}, 0x10) 689.193797ms ago: executing program 4 (id=2839): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb7020000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r2}, 0x10) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) 688.310956ms ago: executing program 3 (id=2840): r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x80, 0x18, 0x2, 0x10, 0x0, 0x10001, 0x40004, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x412, 0x100000001, 0xfffffffd, 0x0, 0x5, 0x1000, 0xff, 0x0, 0x4, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x8000000000000001) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x10001, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000140)={'gretap0\x00', @local}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{0x1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)='%pi6 \x00'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="e16b2cadd4d25c122602f4f8673db88fcb80243d05f68d45c7b7f6586a6195caad7e848fc88dd9ab95", &(0x7f0000000280)=""/192}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000380)='%pi6 \x00') r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000400)='memory.events\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000440)=0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@map=r2, 0x2b, 0x1, 0x2, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) ioctl$TUNSETNOCSUM(r4, 0x400454c8, 0x1) unlink(&(0x7f00000005c0)='./file0\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000640)={0x6, 0x80, 0x7a, 0xb, 0x0, 0x1, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xd54f, 0x1, @perf_bp={&(0x7f0000000600), 0x8}, 0x4410, 0xffffffff, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x0, 0x10, 0x0, 0x9}) r6 = syz_clone(0x40080, &(0x7f0000000780)="3b3077d2a321dac7d81bdf98a171de765bb4569cf8785bb71655e7c16995647692051c34549c27db4ead42287a70d820929515e847b1886e8c30d05051a613de20f681b29116a0cafa8c8893c219a42c69c8a1845a455343cf14bf073151604f9897ce4709c45d620d5b0ce0c4babdd124fbc3d84d4c3fa4fc708d01d8c1d89dd628c34351989e38831e0d3fe23e9a0c752a8411f2e6bd6f52b27f98303e840c42", 0xa1, &(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)="857b823d04312a1717e7e8317487a13b906ff914b9e6cea8d279f2") r7 = perf_event_open(&(0x7f0000000940)={0x4, 0x80, 0xf, 0x5, 0x42, 0x67, 0x0, 0x7f, 0x8088, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xe, 0x4, @perf_bp={&(0x7f0000000900), 0xd}, 0x112, 0x8, 0x4, 0x8, 0x2, 0x4, 0x4, 0x0, 0x0, 0x0, 0x569}, 0x0, 0x5, r4, 0x18) r8 = perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0xfb, 0x0, 0x40, 0x3, 0x0, 0x7, 0x1100, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000006c0)}, 0x10010, 0x3d9, 0x1000, 0x4, 0xa, 0x0, 0x8000, 0x0, 0x1}, r6, 0x1, r7, 0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000009c0)={@fallback=r3, r4, 0x1c, 0x0, 0x0, @void, @value=r4}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a00)={0x1b, 0x0, 0x0, 0x0, 0x0, r5, 0x80000000, '\x00', 0x0, r4, 0x1, 0x1, 0x2}, 0x50) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r4}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c80)={0xffffffffffffffff, 0x58, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x18, 0x1c, &(0x7f0000000ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_idx={0x18, 0x8, 0x5, 0x0, 0xe}, @map_fd={0x18, 0x6, 0x1, 0x0, r9}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @generic={0x4, 0x6, 0x0, 0x8, 0x4}, @jmp={0x5, 0x0, 0x9, 0xa, 0x3, 0x10, 0x4}, @map_val={0x18, 0x8, 0x2, 0x0, r10, 0x0, 0x0, 0x0, 0x8}, @exit], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000bc0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x40, '\x00', r11, 0x0, r5, 0x8, &(0x7f0000000cc0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0xa, 0x80000001, 0x186e}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000d40)=[r2], &(0x7f0000000d80)=[{0x1, 0x2, 0xe, 0xb}, {0x2, 0x3, 0x0, 0xb}], 0x10, 0x1}, 0x94) close(r1) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000e80)={'bridge0\x00', 0x1}) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x11, 0x34, &(0x7f0000000f00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@map_fd={0x18, 0x3, 0x1, 0x0, r10}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0xf}, @jmp={0x5, 0x1, 0x1, 0x5, 0x6, 0x18, 0xfffffffffffffffc}, @generic={0x38, 0x0, 0xf, 0x1d1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xd}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3873}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000010c0)='GPL\x00', 0x8, 0x8, &(0x7f0000001100)=""/8, 0x41000, 0x40, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000001140)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000001180)={0xc, 0x1, 0x7, 0x3d5}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000011c0)=[r10, r10, r5, r4, r9, r9], 0x0, 0x10, 0xfffffffb}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000012c0)={&(0x7f0000000ec0)='btrfs_set_extent_bit\x00', r12, 0x0, 0x100000001}, 0x18) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002500)={&(0x7f0000001300)="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", &(0x7f0000002300)=""/109, &(0x7f0000002380)="7015163c146f73404a277a13e6547c176ffbba190aaab6d5e25f59c2246fea9cdd2b9b57c7b1f55358a46a567861e19fcf25faabcbe07df8467d28e2f46dca6230e9d9da31d9ac65f402587b69542d578d5d6a7efc1c84476d78918e7caada52865964a16d0b99112344d8ba53892f8fb4027b67b724ba6071f1816fe1b9a8d90cbb714d6ebbdd7c9c120e5521fa92338252c46baf27703a217816ef483697a8e152c1faad2cb6e92a48a6549ba240a7bee97c125b174187e546834959ec25933f5b5699ca80ec24ff58e7a00d4c38b65d8260c80524c3383ae9f121722e6b1a5cf688d0a02b8ae114a3c9c6b936c351387b38d7f7d4", &(0x7f0000002480)="94aadb840e99af2d6523b03a9430b0f3ad61d00213c8c5736a902f65b8ebceb4e1b16f73ecf4b35d2d0e2a1f5062b6fce3f98817cadc55917080a804db304ce3c8f53b6985b008e54a7e2534499b6933d4590d00", 0x3, r10, 0x4}, 0x38) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000002540)={0xe}, 0x8) r13 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000026c0)={&(0x7f0000002580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x76, 0x76, 0x4, [@datasec={0x2, 0x2, 0x0, 0xf, 0x2, [{0x2, 0x7, 0x5}, {0x4, 0x1, 0x2}], "5d8b"}, @enum64={0x6, 0x3, 0x0, 0x13, 0x0, 0x4, [{0x3, 0x5, 0x8}, {0x5, 0x4, 0xa}, {0x7, 0x3, 0x7}]}, @decl_tag={0x3, 0x0, 0x0, 0x11, 0x3, 0x8}, @decl_tag={0x4, 0x0, 0x0, 0x11, 0x2, 0x6}]}, {0x0, [0x7f, 0x30]}}, &(0x7f0000002640)=""/68, 0x94, 0x44, 0x1, 0x7, 0x10000, @value=r10}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000002700)=@base={0x1a, 0x10, 0x6, 0xfffffff8, 0x48000, r2, 0x1e7, '\x00', r11, r13, 0x0, 0x2, 0x0, 0x0, @value=r10}, 0x50) 650.870097ms ago: executing program 4 (id=2841): perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x20, 0x0, 0x0, 0x9, 0x0, 0x2, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x1c7, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x600000000000000, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000007}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) syz_clone(0x44044000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) close(0x3) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000800000000000000000001801000020bd342100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2b}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNGETVNETLE(r4, 0x40047451, &(0x7f0000000180)) 607.848748ms ago: executing program 3 (id=2842): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x3}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xf, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000400)={r1, 0x0, 0x0}, 0x10) (fail_nth: 3) 374.991213ms ago: executing program 2 (id=2843): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0a000000a8ef9fe7e40eba930ba48ff858b3536091f5f6f5c033435157a2c75816dff063158ccc937cb9a0bf932eb8ec9659f0bcd02b190f1b31f6693ed47888669670816447083e8f4d31b378869942f4e577d9c0810dbf85ae9a14b51bfe75798a23a3e02cf703db20bff326e598735c060501f0870b35564aa11d95f817de3f386e18204864607a4aa200e0dc96e894e15e2c6fa48e5a37c91df3365ab963abd1d573be90d679a128602e3993bec25e4c45568c9e648a49bc34e00cd5ec8319f8d71a6c9582bee3cd5f"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000030000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000efffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000180)=r5, 0x4) (async) sendmsg$unix(r3, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) (async) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) (async, rerun: 32) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x2) (async, rerun: 64) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000004c0)={0xfffffe33, 0x0}, 0x8) (rerun: 64) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r9}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) (rerun: 64) r13 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r12, @ANYRES32=r13, @ANYBLOB="0500"], 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r12}, &(0x7f00000006c0), &(0x7f0000000700)=r11}, 0x20) sendmsg$inet(r10, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b40)={r2, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0], 0x0, 0xbe, &(0x7f0000000500)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000940), &(0x7f00000009c0), 0x8, 0x7e, 0x8, 0x8, &(0x7f0000000a00)}}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000b80)={0x0, r8}, 0x8) (async) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x9, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', r14, @cgroup_sock, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000280)='f2fs_filemap_fault\x00', r15, 0x0, 0xa}, 0x18) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r15}, 0x10) (async, rerun: 64) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 362.321453ms ago: executing program 3 (id=2844): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff4a, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000001c0)='sock_rcvqueue_full\x00', r1, 0x0, 0x3}, 0x18) (async) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000060000000000000000000000850000009e00000095"], 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1000}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, &(0x7f0000000040)}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa0677"], 0xfdef) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x10404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200009, 0x4}, 0x0, 0xc8, 0x2c, 0x0, 0x2, 0x6, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001", @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r6}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) (async) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xfdef) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x4, 0x4, 0x4, 0x10000, 0x808, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3000000, 0xffffffff}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 352.168123ms ago: executing program 5 (id=2845): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r2}, 0x10) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r3}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) 311.705074ms ago: executing program 0 (id=2846): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x4}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00'}, 0x2d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000000340)=0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x5421, 0x110e22fff7) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) ioctl$TUNGETVNETLE(r2, 0x800454dd, &(0x7f0000000380)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000003c0)={'netdevsim0\x00', @multicast}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='module_request\x00', r5}, 0x18) socketpair(0x0, 0x0, 0x0, &(0x7f0000000280)) 310.194304ms ago: executing program 2 (id=2847): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) 302.149414ms ago: executing program 2 (id=2848): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00"/11], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020100008500000043000000"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r3}, 0x10) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) 290.259534ms ago: executing program 2 (id=2849): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r3, 0x0, &(0x7f0000001780)=""/4096}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) 206.629896ms ago: executing program 4 (id=2850): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000002100000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x5, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000001f8ffff00000001ab459e2331110fdd971b7a750006000000184f0000f9ffffff00000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x84, &(0x7f0000000540)=""/132, 0x41000, 0x51, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0x5, 0x6, 0x8}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000800), &(0x7f0000000900)=[{0x3, 0x5, 0x7, 0xb}, {0x1, 0x5, 0x1, 0xc}, {0x2, 0x1, 0x9, 0x2}, {0x2, 0x5, 0x7, 0x1}, {0x0, 0x2, 0xa, 0xa}, {0x5, 0x4, 0xb, 0xb}], 0x10, 0x5}, 0x94) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="2d6e65745f7072696f202b6e6574202d696f20c56e65745f7072696f202b63707561636374202b726c696d6974202b637075736574202d637075202d64657669636573202b6e657420ef8cf64a46b7ac46540aa8967be8b47948ad1277a8a6837622b4e1cc06951180b97ade1754cf5bc81c254e5b291792dfb009330d113ed2e5bee5948ad0570320191425da41662adc1ad9871d6cdca2891d5f1bdfb3423ab2b43625f7c7d3ba0701cba38359ebb23edeb0676e8e666560f9555e50c31363eb1b0ee06d7d87977a611976a68d"], 0x49) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)=r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x2, 0x80, 0xc2, 0xc}}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x2, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0x1, 0x0, r3}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r4}, &(0x7f0000000840), &(0x7f0000000880)=r3}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000980), 0x12) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0xbe9c06, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYRES8], &(0x7f0000000080)='GPL\x00', 0x10000, 0x0, 0x0, 0x0, 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r6, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup_int(r2, &(0x7f00000002c0)='cpu.max.burst\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x80, 0xc8, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x770}, 0x0, 0x80000000000, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xb, 0xc, &(0x7f0000000000)=ANY=[@ANYRES16=0x0, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 204.682426ms ago: executing program 5 (id=2851): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb7020000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r2}, 0x10) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) 0s ago: executing program 5 (id=2852): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\v\x00\x00\x00\b\x00\x00\x00\f'], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x7, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1190e95fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9b24be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fca4e0b6eab1aa7d55545a34effa077faa56d59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e59a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d0faab186d94af98af1da2b5952eb15855933a202304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0480f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad9433269af3be5fa6a9a5c24e392955f4e979ea13201bafe4f0f6ea508000000a0c548552b571bed5647223c78a992810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ede62fc28839b5301160ecec37e83efceefd7ca2533659edc8be05cc85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d35a142a9ec9a7a3755e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a2946501559335781092cf8ce3c7c56cd31121624d76517fd3666276c3c0e812b28e2f30d035cee5d0e77a3c70008ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856cf24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31651e0ecea5ece8fb11a4ee288eb149f1fa33669cc8d901fa8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463baf28345bde0c195bc9f021da8f3025ee9c8e3168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262fa3f1dabeb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a4601adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a8640724a5f4e12ad99012a2e01ce79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cc50feeb7bfad9b7be3283b6450d014e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5671820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff2418a18217747ae442e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427a7f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d17eb0000000000000000000000fa08ad0731c4b839688b22c4da2a6b00008a1949a6ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282bffff2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae05334d5a44a020000001c0d882a564d74a7c72bf9a2152b261e58fea6d2f93589cfe261dc0410b5ccc92a5a0eab327a33431d62d2b7c75ce654d556c9e1817c1abca762ab53d40da51560351b673363652e1ecb56cfe4a746a45ab13c6014e9f361ab687d1cd1795ce9e05c817b83d76046bdb3709de5df7499a02d2f636a454b85b987580ada025d83bd7b8df28a540d5ec5537942e79f2f1ab25ea5f563bc77e4f9468bd309469880c7e34150ca886d1f13dff7e82dbe296c877d925c38c54cc8137b29028854b6bd57ca893927c331300e16aba792289e135589d93302fc37c73c303e383cdf8ef3f6d6265fe5ee01759d24027475c8901039a898582022bc95992b86dce0710887c8a625d9cbb897bdbfaf49a3f642a169827a9bae4fcfa5212461db000000000000e6ed75ca8fcda7ef3ee336189fef3b3ffb9f38fefc5ff39c4e69e3fa1f8b10ee97123e99b61eba065b1ad67530e7c4f11f9da7ae000002000000610101ad7f79cb9bbf64a0fc109f49fe50151f5ddfe51833ec65ece70e07ce8ab5d97db47da8f80000664dc0b86ae2b3ff9d4e220752a6b2f3ea9f793612386496dca5af7b8952aafa332482e6137e994d3f5259b7f51544cdc6d8cb4becc20dd3a57545b0c2621e4c5f94a23f73ee02c22ee7e27c2cc491a85947baac523c347c9b9ede5d6265997f2ad6e9719aafdb323988e62b7ec84545cd63b7a7"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) bpf$PROG_BIND_MAP(0x1c, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x29}, 0x3d) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008bd6000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r3, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x8a, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001600)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x5, [@struct={0x4, 0x2, 0x0, 0x4, 0x1, 0x5, [{0xc, 0x2, 0x4}, {0x5, 0x0, 0x8}]}, @restrict={0x10, 0x0, 0x0, 0xb, 0x4}, @fwd={0x6}, @float={0x4, 0x0, 0x0, 0x10, 0xc}, @float={0x4, 0x0, 0x0, 0x10, 0x8}, @func={0xf, 0x0, 0x0, 0xc, 0x4}, @const={0x9, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x61, 0x30]}}, &(0x7f0000000880)=""/195, 0x89, 0xc3, 0x1, 0xc, 0x10000}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="1b0000000a000000000000000200000000000000", @ANYRES32=r0, @ANYBLOB="0300"/20, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="00000000020000000100"/28], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r7}, 0x18) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1b, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00', 0x80}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x0, 0xc, &(0x7f0000001680)=ANY=[@ANYRESHEX=r8, @ANYRES32=r9, @ANYRESDEC=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000001500)='io_uring_file_get\x00', r10, 0x0, 0x4}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{}, &(0x7f0000000a00), &(0x7f0000000a40)}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB="6ac100"/20, @ANYRES32, @ANYRES32, @ANYBLOB="050000000500f4ff0400080000000000000000000000000004000000"], 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r11}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001240)={r0}, 0x4) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000012c0)=@generic={&(0x7f0000001280)='\x00'}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001380)={{r0, 0xffffffffffffffff}, &(0x7f0000001300), &(0x7f0000001340)='%-5lx \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001440)={0x10, 0x2, &(0x7f0000001080)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x7}], &(0x7f00000010c0)='syzkaller\x00', 0x2b, 0xac, &(0x7f0000001100)=""/172, 0x41100, 0x20, '\x00', r4, @sk_msg=0x7, 0xffffffffffffffff, 0x8, &(0x7f00000011c0)={0x4, 0x7}, 0x8, 0x10, &(0x7f0000001200)={0x4, 0xd, 0x5, 0x5}, 0x10, 0xffffffffffffffff, r11, 0x1, &(0x7f00000013c0)=[r0, 0xffffffffffffffff, r12, r0, 0xffffffffffffffff, r13], &(0x7f0000001400)=[{0x4, 0x4, 0x4, 0x7}], 0x10, 0x6}, 0x94) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRES64=r10, @ANYRES32, @ANYBLOB="02ee000000000000800000000019d961c2307642b9c4ef4aa6e4d6e4a908b875021fbf35fd6b1125a6aedd24959de0d4b49ca15e5b849037d850cec4ae98063c6608", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.4' (ED25519) to the list of known hosts. [ 19.664943][ T30] audit: type=1400 audit(1757694010.533:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.666054][ T273] cgroup: Unknown subsys name 'net' [ 19.668642][ T30] audit: type=1400 audit(1757694010.533:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.673266][ T30] audit: type=1400 audit(1757694010.533:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.673386][ T273] cgroup: Unknown subsys name 'devices' [ 19.823851][ T273] cgroup: Unknown subsys name 'hugetlb' [ 19.829470][ T273] cgroup: Unknown subsys name 'rlimit' [ 19.966804][ T30] audit: type=1400 audit(1757694010.833:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.990136][ T30] audit: type=1400 audit(1757694010.833:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.995846][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.015030][ T30] audit: type=1400 audit(1757694010.833:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 20.046766][ T30] audit: type=1400 audit(1757694010.893:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.072460][ T30] audit: type=1400 audit(1757694010.893:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.102772][ T30] audit: type=1400 audit(1757694010.973:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.128533][ T30] audit: type=1400 audit(1757694010.973:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.128630][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.660375][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.667506][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.675076][ T281] device bridge_slave_0 entered promiscuous mode [ 20.682389][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.689442][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.697121][ T281] device bridge_slave_1 entered promiscuous mode [ 20.754985][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.762082][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.769494][ T282] device bridge_slave_0 entered promiscuous mode [ 20.796581][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.803642][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.811052][ T282] device bridge_slave_1 entered promiscuous mode [ 20.863040][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.870340][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.878187][ T285] device bridge_slave_0 entered promiscuous mode [ 20.892022][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.899154][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.906658][ T285] device bridge_slave_1 entered promiscuous mode [ 20.945912][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.953053][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.960451][ T283] device bridge_slave_0 entered promiscuous mode [ 20.968030][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.975088][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.982547][ T283] device bridge_slave_1 entered promiscuous mode [ 20.997474][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.004628][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.012246][ T284] device bridge_slave_0 entered promiscuous mode [ 21.031148][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.038296][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.045707][ T284] device bridge_slave_1 entered promiscuous mode [ 21.057852][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.064939][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.201493][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.210997][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.218679][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.253490][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.261785][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.270107][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.277235][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.285078][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.293700][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.300711][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.325677][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.333782][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.355425][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.363445][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.371549][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.379995][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.387134][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.394725][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.403139][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.410379][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.417807][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.426144][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.433193][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.440520][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.448809][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.455850][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.463240][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.471240][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.478919][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.492631][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.500052][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.508420][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.515470][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.523018][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.531145][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.538197][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.562227][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.570516][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.579052][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.587354][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.594432][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.602223][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.610546][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.617746][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.625184][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.633373][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.641357][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.649460][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.657686][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.666669][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.674956][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.689246][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.697842][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.706298][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.714714][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.729503][ T281] device veth0_vlan entered promiscuous mode [ 21.739922][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.748593][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.757375][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.765386][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.773660][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.781158][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.797081][ T282] device veth0_vlan entered promiscuous mode [ 21.807825][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.816518][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.826164][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.835178][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.843655][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.851652][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.859771][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.868195][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.876512][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.884120][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.894759][ T281] device veth1_macvtap entered promiscuous mode [ 21.901380][ T283] device veth0_vlan entered promiscuous mode [ 21.912719][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.920512][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.928571][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.936884][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.945455][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.953973][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.962612][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.971285][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.978975][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.992398][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.000809][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.009521][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.017502][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.029617][ T284] device veth0_vlan entered promiscuous mode [ 22.038437][ T282] device veth1_macvtap entered promiscuous mode [ 22.045426][ T285] device veth0_vlan entered promiscuous mode [ 22.052781][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.060378][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.068071][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.076475][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.084746][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.093211][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.101459][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.109676][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.117987][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.125857][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.133551][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.143512][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.152341][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.167185][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.175668][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.185896][ T283] device veth1_macvtap entered promiscuous mode [ 22.197265][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.205206][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.213609][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.228135][ T285] device veth1_macvtap entered promiscuous mode [ 22.237214][ T281] request_module fs-gadgetfs succeeded, but still no fs? [ 22.246858][ T284] device veth1_macvtap entered promiscuous mode [ 22.255367][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.263819][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.271928][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.279836][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.288152][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.296606][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.304861][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.313231][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.337248][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.351555][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.361234][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.370763][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.379534][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.388088][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.396837][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.406036][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.435588][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.447424][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.568767][ T350] device veth0_vlan left promiscuous mode [ 22.581196][ T350] device veth0_vlan entered promiscuous mode [ 22.634370][ T351] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 22.741965][ C1] hrtimer: interrupt took 27290 ns [ 22.788113][ T355] device sit0 entered promiscuous mode [ 22.895003][ T361] device syzkaller0 entered promiscuous mode [ 24.774207][ T385] device veth1_macvtap left promiscuous mode [ 24.878701][ T385] device wg2 entered promiscuous mode [ 25.806998][ T30] kauditd_printk_skb: 38 callbacks suppressed [ 25.807012][ T30] audit: type=1400 audit(1757694016.673:112): avc: denied { read } for pid=386 comm="syz.3.16" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 26.172684][ T30] audit: type=1400 audit(1757694016.773:113): avc: denied { open } for pid=386 comm="syz.3.16" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 26.534977][ T395] ref_ctr_offset mismatch. inode: 0x1d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 27.405374][ T30] audit: type=1400 audit(1757694018.273:114): avc: denied { ioctl } for pid=409 comm="syz.3.23" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.451017][ T417] device veth0_vlan left promiscuous mode [ 27.467719][ T417] device veth0_vlan entered promiscuous mode [ 27.484209][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.492891][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.508200][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.062579][ T426] device syzkaller0 entered promiscuous mode [ 28.190888][ T428] device sit0 entered promiscuous mode [ 28.682773][ T30] audit: type=1400 audit(1757694019.553:115): avc: denied { write } for pid=445 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 29.219634][ T460] device veth0_vlan left promiscuous mode [ 29.229638][ T460] device veth0_vlan entered promiscuous mode [ 31.273333][ T489] device sit0 entered promiscuous mode [ 31.958460][ T499] device syzkaller0 entered promiscuous mode [ 32.056715][ T30] audit: type=1400 audit(1757694022.923:116): avc: denied { read } for pid=503 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 32.205600][ T506] device sit0 left promiscuous mode [ 32.431249][ T508] device wg2 entered promiscuous mode [ 35.141264][ T544] device syzkaller0 entered promiscuous mode [ 36.131856][ T30] audit: type=1400 audit(1757694026.993:117): avc: denied { tracepoint } for pid=579 comm="syz.2.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 37.484208][ T30] audit: type=1400 audit(1757694028.353:118): avc: denied { create } for pid=620 comm="syz.3.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 37.584491][ T623] device wg2 entered promiscuous mode [ 39.482554][ T30] audit: type=1400 audit(1757694030.353:119): avc: denied { relabelfrom } for pid=656 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 39.502563][ T30] audit: type=1400 audit(1757694030.353:120): avc: denied { relabelto } for pid=656 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 40.413076][ T695] ip6_vti0: mtu greater than device maximum [ 41.030203][ T30] audit: type=1400 audit(1757694031.883:121): avc: denied { create } for pid=707 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 41.261525][ T30] audit: type=1400 audit(1757694032.123:122): avc: denied { create } for pid=713 comm="syz.0.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 41.326245][ T723] bond_slave_1: mtu less than device minimum [ 41.461580][ T724] syz.2.109[724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.461662][ T724] syz.2.109[724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.557711][ T30] audit: type=1400 audit(1757694032.423:123): avc: denied { cpu } for pid=731 comm="syz.3.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 41.975717][ T756] nr0: tun_chr_ioctl cmd 1074025673 [ 42.113842][ T782] tap0: tun_chr_ioctl cmd 1074025675 [ 42.119175][ T782] tap0: persist enabled [ 42.149360][ T764] device veth0_vlan left promiscuous mode [ 42.325185][ T764] device veth0_vlan entered promiscuous mode [ 43.178219][ T806] device veth0_vlan left promiscuous mode [ 43.212643][ T806] device veth0_vlan entered promiscuous mode [ 43.396417][ T827] GPL: port 1(erspan0) entered blocking state [ 43.412681][ T827] GPL: port 1(erspan0) entered disabled state [ 43.439876][ T827] device erspan0 entered promiscuous mode [ 43.483291][ T834] GPL: port 1(erspan0) entered blocking state [ 43.489500][ T834] GPL: port 1(erspan0) entered forwarding state [ 44.041079][ T872] device sit0 entered promiscuous mode [ 45.045214][ T898] device syzkaller0 entered promiscuous mode [ 45.277275][ T911] device wg2 left promiscuous mode [ 45.922884][ T943] syz.4.161[943] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.922974][ T943] syz.4.161[943] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.104882][ T30] audit: type=1400 audit(1757694036.953:124): avc: denied { write } for pid=951 comm="syz.2.165" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 46.226262][ T30] audit: type=1400 audit(1757694037.093:125): avc: denied { ioctl } for pid=960 comm="syz.0.166" path="socket:[18629]" dev="sockfs" ino=18629 ioctlcmd=0x8907 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 47.542878][ T1021] device sit0 entered promiscuous mode [ 47.777016][ T1026] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.784289][ T1026] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.907630][ T1026] device bridge_slave_1 left promiscuous mode [ 47.915977][ T1026] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.932960][ T1026] device bridge_slave_0 left promiscuous mode [ 47.941052][ T1026] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.354400][ T30] audit: type=1400 audit(1757694039.223:126): avc: denied { create } for pid=1037 comm="syz.4.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 48.700596][ T1053] device wg2 left promiscuous mode [ 51.059401][ T1048] syz.2.189 (1048) used greatest stack depth: 22016 bytes left [ 51.542671][ T1142] device wg2 entered promiscuous mode [ 51.717050][ T1151] tun0: tun_chr_ioctl cmd 1074025681 [ 52.521030][ T30] audit: type=1400 audit(1757694043.383:127): avc: denied { create } for pid=1189 comm="syz.2.224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 53.188050][ T1211] bond_slave_1: mtu less than device minimum [ 53.783799][ T1239] device veth0_vlan left promiscuous mode [ 53.818695][ T1239] device veth0_vlan entered promiscuous mode [ 53.877834][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 53.902702][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 53.963345][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 55.862009][ C0] sched: RT throttling activated [ 57.075968][ T30] audit: type=1400 audit(1757694047.943:128): avc: denied { create } for pid=1278 comm="syz.2.246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 57.877763][ T30] audit: type=1400 audit(1757694048.723:129): avc: denied { create } for pid=1298 comm="syz.3.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 58.349721][ T1315] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 59.292191][ T1324] device veth0_vlan left promiscuous mode [ 59.333266][ T1324] device veth0_vlan entered promiscuous mode [ 59.803701][ T30] audit: type=1400 audit(1757694050.673:130): avc: denied { ioctl } for pid=1338 comm="syz.1.261" path="cgroup:[4026532288]" dev="nsfs" ino=4026532288 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 61.539634][ T1361] device sit0 left promiscuous mode [ 62.025471][ T1356] device wg2 left promiscuous mode [ 62.064941][ T1366] device sit0 entered promiscuous mode [ 65.750372][ T30] audit: type=1400 audit(1757694056.613:131): avc: denied { create } for pid=1429 comm="syz.3.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 67.235089][ T1460] device sit0 left promiscuous mode [ 67.527314][ T1464] device sit0 entered promiscuous mode [ 67.965120][ T30] audit: type=1400 audit(1757694058.833:132): avc: denied { create } for pid=1480 comm="syz.1.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 68.070267][ T30] audit: type=1400 audit(1757694058.913:133): avc: denied { create } for pid=1480 comm="syz.1.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 68.288452][ T1495] GPL: port 1(erspan0) entered blocking state [ 68.310631][ T1495] GPL: port 1(erspan0) entered disabled state [ 68.322638][ T1495] device erspan0 entered promiscuous mode [ 68.359043][ T1487] GPL: port 1(erspan0) entered blocking state [ 68.365583][ T1487] GPL: port 1(erspan0) entered forwarding state [ 69.497551][ T1506] device sit0 left promiscuous mode [ 71.328080][ T1566] device pim6reg1 entered promiscuous mode [ 72.938439][ T1600] device pim6reg1 entered promiscuous mode [ 73.964478][ T30] audit: type=1400 audit(1757694064.833:134): avc: denied { create } for pid=1617 comm="syz.0.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 74.573201][ T1631] ±ÿ: renamed from team_slave_1 [ 76.086242][ T30] audit: type=1400 audit(1757694066.943:135): avc: denied { create } for pid=1658 comm="syz.2.346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 78.901334][ T1717] device sit0 left promiscuous mode [ 79.260179][ T1722] device sit0 entered promiscuous mode [ 81.643686][ T30] audit: type=1400 audit(1757694072.513:136): avc: denied { create } for pid=1771 comm="syz.2.377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 82.031193][ T1816] device syzkaller0 entered promiscuous mode [ 82.185748][ T1812] tap0: tun_chr_ioctl cmd 2147767520 [ 82.192613][ T1812] tap0: tun_chr_ioctl cmd 1074025677 [ 82.214835][ T1812] tap0: linktype set to 1 [ 82.644433][ T1838] device syzkaller0 entered promiscuous mode [ 82.832590][ T1850] device wg2 entered promiscuous mode [ 83.930376][ T1874] device sit0 left promiscuous mode [ 84.026665][ T30] audit: type=1400 audit(1757694074.893:137): avc: denied { create } for pid=1881 comm="syz.2.406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 85.108059][ T1916] device pim6reg1 entered promiscuous mode [ 85.182797][ T1918] syz.1.415[1918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.182866][ T1918] syz.1.415[1918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.876746][ T30] audit: type=1400 audit(1757694076.743:138): avc: denied { create } for pid=1942 comm="syz.3.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 86.327426][ T1976] device syzkaller0 entered promiscuous mode [ 88.055476][ T2013] device wg2 left promiscuous mode [ 93.407940][ T2143] device sit0 left promiscuous mode [ 93.551464][ T2145] device sit0 entered promiscuous mode [ 93.590705][ T2142] device veth0_vlan left promiscuous mode [ 93.607336][ T2142] device veth0_vlan entered promiscuous mode [ 93.647518][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 93.671783][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 93.756455][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 94.039223][ T2155] device sit0 left promiscuous mode [ 94.246420][ T2158] device sit0 entered promiscuous mode [ 94.920460][ T2188] device pim6reg1 entered promiscuous mode [ 95.036718][ T2194] device pim6reg1 entered promiscuous mode [ 96.266498][ T30] audit: type=1400 audit(1757694087.123:139): avc: denied { create } for pid=2222 comm="syz.2.504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 96.333401][ T2223] device sit0 entered promiscuous mode [ 97.184439][ T2273] device syzkaller0 entered promiscuous mode [ 98.802754][ T2329] bond_slave_1: mtu less than device minimum [ 98.841522][ T2329] bridge0: port 3(veth1) entered blocking state [ 98.858254][ T2329] bridge0: port 3(veth1) entered disabled state [ 98.882611][ T2329] device veth1 entered promiscuous mode [ 99.448730][ T2349] device syzkaller0 entered promiscuous mode [ 100.087253][ T2367] device syzkaller0 entered promiscuous mode [ 100.293769][ T2383] bond_slave_1: mtu less than device minimum [ 100.556968][ T2384] tap1: tun_chr_ioctl cmd 1074025692 [ 100.740342][ T2405] device syzkaller0 entered promiscuous mode [ 101.356479][ T30] audit: type=1400 audit(1757694092.213:140): avc: denied { create } for pid=2421 comm="syz.4.561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 101.405126][ T2432] device sit0 entered promiscuous mode [ 101.906180][ T30] audit: type=1400 audit(1757694092.773:141): avc: denied { append } for pid=2448 comm="syz.1.569" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 102.442930][ T2465] ªªªªªª: renamed from vlan0 [ 102.760123][ T2471] device sit0 left promiscuous mode [ 102.859888][ T2488] device sit0 entered promiscuous mode [ 103.196929][ T30] audit: type=1400 audit(1757694094.063:142): avc: denied { create } for pid=2494 comm="syz.1.580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 103.735244][ T2534] device pim6reg1 entered promiscuous mode [ 104.675014][ T2561] device veth1_macvtap entered promiscuous mode [ 104.681926][ T2561] device macsec0 entered promiscuous mode [ 109.236833][ T30] audit: type=1400 audit(1757694100.023:143): avc: denied { create } for pid=2630 comm="syz.2.617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 109.354405][ T2636] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.380066][ T2636] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.840531][ T30] audit: type=1400 audit(1757694100.703:144): avc: denied { create } for pid=2649 comm="syz.3.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 110.263753][ T2668] Â: renamed from pim6reg1 [ 110.574160][ T2678] device pim6reg1 entered promiscuous mode [ 110.853751][ T30] audit: type=1400 audit(1757694101.723:145): avc: denied { create } for pid=2687 comm="syz.0.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 111.834189][ T2704] device syzkaller0 entered promiscuous mode [ 112.414718][ T2723] device veth1_macvtap left promiscuous mode [ 112.676756][ T30] audit: type=1400 audit(1757694103.543:146): avc: denied { create } for pid=2726 comm="syz.2.645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 113.392629][ T2740] device syzkaller0 entered promiscuous mode [ 114.739073][ T2770] Â: renamed from pim6reg1 [ 115.105567][ T2777] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.157897][ T2779] device sit0 entered promiscuous mode [ 115.537410][ T2802] bond_slave_1: mtu less than device minimum [ 123.908391][ T30] audit: type=1400 audit(1757694114.773:147): avc: denied { create } for pid=2877 comm="syz.3.688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 124.915077][ T30] audit: type=1400 audit(1757694115.783:148): avc: denied { read } for pid=2904 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 125.090227][ T30] audit: type=1400 audit(1757694115.783:149): avc: denied { open } for pid=2904 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 125.364324][ T2904] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.427931][ T2904] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.454116][ T2904] device bridge_slave_0 entered promiscuous mode [ 125.497864][ T2904] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.541176][ T2904] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.601512][ T2904] device bridge_slave_1 entered promiscuous mode [ 126.082980][ T281] syz-executor (281) used greatest stack depth: 21920 bytes left [ 126.107072][ T30] audit: type=1400 audit(1757694116.973:150): avc: denied { create } for pid=2904 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 126.141622][ T2904] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.148748][ T2904] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.156078][ T2904] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.163135][ T2904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.180536][ T30] audit: type=1400 audit(1757694116.973:151): avc: denied { write } for pid=2904 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 126.201692][ T30] audit: type=1400 audit(1757694116.973:152): avc: denied { read } for pid=2904 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 126.241334][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.292163][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.333431][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 126.392236][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 126.421872][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 126.450394][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 126.461897][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.468966][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.510491][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 126.519244][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 126.527759][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.534807][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.543049][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 126.577757][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 126.587724][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 126.596582][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 126.695306][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 126.704084][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 126.751126][ T2904] device veth0_vlan entered promiscuous mode [ 126.769974][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 126.785920][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.797304][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 126.804872][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 127.011733][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 127.025177][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 127.054047][ T2904] device veth1_macvtap entered promiscuous mode [ 127.295350][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 127.303376][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 127.311859][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 127.320616][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 127.376401][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 127.404534][ T2976] device veth1_macvtap left promiscuous mode [ 127.410780][ T2976] device macsec0 left promiscuous mode [ 127.455809][ T2974] device veth1_macvtap entered promiscuous mode [ 127.473089][ T2974] device macsec0 entered promiscuous mode [ 127.620191][ T45] GPL: port 1(erspan0) entered disabled state [ 127.718307][ T45] device erspan0 left promiscuous mode [ 127.730849][ T45] GPL: port 1(erspan0) entered disabled state [ 127.952122][ T2994] device veth1_macvtap left promiscuous mode [ 127.983847][ T3000] device wg2 entered promiscuous mode [ 128.014390][ T2994] device veth1_macvtap entered promiscuous mode [ 128.112094][ T2994] device macsec0 entered promiscuous mode [ 128.316866][ T45] device veth1_macvtap left promiscuous mode [ 129.629413][ T3050] device pim6reg1 entered promiscuous mode [ 130.483515][ T3095] device veth1_macvtap left promiscuous mode [ 130.489534][ T3095] device macsec0 entered promiscuous mode [ 134.921132][ T3281] device pim6reg1 entered promiscuous mode [ 135.164672][ T3289] 7’ç÷ïL&ßûÂß7*: renamed from syzkaller0 [ 135.514887][ T3296] device wg2 entered promiscuous mode [ 135.761892][ T3304] device sit0 left promiscuous mode [ 138.059835][ T3408] device syzkaller0 entered promiscuous mode [ 139.533800][ T3455] device syzkaller0 entered promiscuous mode [ 139.706793][ T3463] ªªªªªª: renamed from vlan0 [ 139.972933][ T3470] device syzkaller0 left promiscuous mode [ 140.779300][ T3484] bond_slave_1: mtu greater than device maximum [ 141.467751][ T3526] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.481190][ T3526] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.675023][ T3541] device bridge_slave_1 left promiscuous mode [ 141.707139][ T3541] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.791196][ T3541] device bridge_slave_0 left promiscuous mode [ 141.803199][ T3541] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.782813][ T3627] GPL: port 1(erspan0) entered blocking state [ 144.789036][ T3627] GPL: port 1(erspan0) entered disabled state [ 144.881922][ T3627] device erspan0 entered promiscuous mode [ 144.891618][ T3627] GPL: port 1(erspan0) entered blocking state [ 144.897741][ T3627] GPL: port 1(erspan0) entered forwarding state [ 146.412988][ T30] audit: type=1400 audit(1757694137.283:153): avc: denied { create } for pid=3642 comm="syz.2.914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 147.233689][ T3664] device syzkaller0 entered promiscuous mode [ 148.644573][ T3715] ip6_tunnel: non-ECT from fe08:0000:0000:0200:875a:6596:9ff5:7b00 with DS=0x31 [ 149.234696][ T30] audit: type=1400 audit(1757694140.103:154): avc: denied { create } for pid=3718 comm="syz.5.934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 150.562365][ T3739] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 150.659878][ T3748] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 150.693021][ T3748] device syzkaller0 entered promiscuous mode [ 155.199288][ T3846] bond_slave_1: mtu less than device minimum [ 159.554491][ T3973] device sit0 left promiscuous mode [ 159.667727][ T3975] device sit0 entered promiscuous mode [ 159.834862][ T3990] device veth0_vlan left promiscuous mode [ 159.842286][ T3990] device veth0_vlan entered promiscuous mode [ 159.853707][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 159.865140][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 159.879284][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 159.931544][ T3996] device syzkaller0 entered promiscuous mode [ 160.318041][ T4000] device sit0 left promiscuous mode [ 161.037651][ T4008] device veth1_macvtap left promiscuous mode [ 161.053873][ T4008] device macsec0 entered promiscuous mode [ 161.435388][ T30] audit: type=1400 audit(1757694152.303:155): avc: denied { create } for pid=4034 comm="syz.5.1024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 161.640601][ T4043] ------------[ cut here ]------------ [ 161.797158][ T4043] trace type BPF program uses run-time allocation [ 161.992165][ T4043] WARNING: CPU: 0 PID: 4043 at kernel/bpf/verifier.c:11718 check_map_prog_compatibility+0x6cd/0x870 [ 162.004872][ T4043] Modules linked in: [ 162.009781][ T4043] CPU: 0 PID: 4043 Comm: syz.3.1025 Not tainted syzkaller #0 [ 162.073796][ T4043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 162.131443][ T4043] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 162.262226][ T4043] Code: ee ff 48 c7 c6 20 ea 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 c6 4c ee ff c6 05 a3 92 6b 05 01 48 c7 c7 80 e6 47 85 e8 83 2d 25 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 162.461702][ T4043] RSP: 0018:ffffc90000ab7428 EFLAGS: 00010246 [ 162.559875][ T4043] RAX: 9892bc458faa3200 RBX: 0000000000000001 RCX: 0000000000080000 [ 162.572379][ T4043] RDX: ffffc90002f72000 RSI: 0000000000003b52 RDI: 0000000000003b53 [ 162.581358][ T4043] RBP: ffffc90000ab7470 R08: dffffc0000000000 R09: ffffed103ee065e8 [ 162.737675][ T4043] R10: ffffed103ee065e8 R11: 1ffff1103ee065e7 R12: ffff888110ba8000 [ 162.772583][ T4043] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88811c3b5800 [ 162.781632][ T4043] FS: 00007f9413a0b6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 162.902251][ T4043] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 163.002623][ T4043] CR2: 00007f3c2e0c048a CR3: 000000013008c000 CR4: 00000000003506b0 [ 163.011192][ T4043] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000200000000340 [ 163.184105][ T4043] DR3: 0000200000000340 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 163.306869][ T4043] Call Trace: [ 163.336929][ T4043] [ 163.367743][ T4043] resolve_pseudo_ldimm64+0x685/0x11d0 [ 163.401007][ T4043] ? check_attach_btf_id+0xde0/0xde0 [ 163.440992][ T4043] bpf_check+0x2c25/0xf280 [ 163.462365][ T4043] ? 0xffffffffa0028d04 [ 163.533115][ T4043] ? is_bpf_text_address+0x177/0x190 [ 163.539039][ T4043] ? bpf_get_btf_vmlinux+0x60/0x60 [ 163.622130][ T4043] ? irqentry_exit+0x37/0x40 [ 163.627340][ T4043] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 163.652120][ T4043] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 163.659620][ T4043] ? __stack_depot_save+0x16e/0x480 [ 163.722409][ T4043] ? __stack_depot_save+0x34/0x480 [ 163.728499][ T4043] ? __kasan_slab_alloc+0x69/0xf0 [ 163.762327][ T4043] ? _find_next_bit+0x1fa/0x200 [ 163.767653][ T4043] ? __kasan_kmalloc+0xec/0x110 [ 163.852968][ T4043] ? __kasan_kmalloc+0xda/0x110 [ 163.858458][ T4043] ? kmem_cache_alloc_trace+0x119/0x270 [ 163.872057][ T4043] ? selinux_bpf_prog_alloc+0x51/0x140 [ 163.877967][ T4043] ? security_bpf_prog_alloc+0x62/0x90 [ 164.097865][ T4043] ? bpf_prog_load+0x97c/0x1550 [ 164.112043][ T4043] ? __sys_bpf+0x4c3/0x730 [ 164.116980][ T4043] ? __x64_sys_bpf+0x7c/0x90 [ 164.122400][ T4043] ? x64_sys_call+0x4b9/0x9a0 [ 164.127508][ T4043] ? do_syscall_64+0x4c/0xa0 [ 164.183270][ T4043] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 164.190310][ T4043] ? irqentry_exit+0x37/0x40 [ 164.222057][ T4043] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 164.302044][ T4043] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 164.308974][ T4043] ? ktime_get_with_offset+0x19/0x200 [ 164.392268][ T4043] ? memset+0x35/0x40 [ 164.396920][ T4043] ? bpf_obj_name_cpy+0x193/0x1e0 [ 164.432452][ T4043] bpf_prog_load+0x1042/0x1550 [ 164.592611][ T4043] ? map_freeze+0x360/0x360 [ 164.598436][ T4043] ? selinux_bpf+0xc7/0xf0 [ 164.853155][ T4043] ? security_bpf+0x82/0xa0 [ 164.859207][ T4043] __sys_bpf+0x4c3/0x730 [ 164.924853][ T4043] ? bpf_link_show_fdinfo+0x310/0x310 [ 164.931404][ T4043] ? __kasan_check_write+0x14/0x20 [ 165.008324][ T4043] ? switch_fpu_return+0x15d/0x2c0 [ 165.083715][ T4043] __x64_sys_bpf+0x7c/0x90 [ 165.162711][ T4043] x64_sys_call+0x4b9/0x9a0 [ 165.167725][ T4043] do_syscall_64+0x4c/0xa0 [ 165.192444][ T4043] ? clear_bhb_loop+0x50/0xa0 [ 165.197705][ T4043] ? clear_bhb_loop+0x50/0xa0 [ 165.285455][ T4043] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 165.291735][ T4043] RIP: 0033:0x7f9414fc3ba9 [ 165.383170][ T4043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 165.673444][ T4043] RSP: 002b:00007f9413a0b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 165.812118][ T4043] RAX: ffffffffffffffda RBX: 00007f941520b090 RCX: 00007f9414fc3ba9 [ 165.821101][ T4043] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 165.954268][ T4043] RBP: 00007f9415046e19 R08: 0000000000000000 R09: 0000000000000000 [ 166.022736][ T4043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 166.031515][ T4043] R13: 00007f941520b128 R14: 00007f941520b090 R15: 00007fff745721e8 [ 166.187728][ T4043] [ 166.191489][ T4043] ---[ end trace d0951b60d55ccd3b ]--- [ 167.063335][ T30] audit: type=1400 audit(1757694157.853:156): avc: denied { ioctl } for pid=4092 comm="syz.3.1038" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 168.061249][ T4128] syz.5.1049[4128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.062109][ T4128] syz.5.1049[4128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.330104][ T4203] device sit0 entered promiscuous mode [ 170.416058][ T4245] nr0: tun_chr_ioctl cmd 1074025694 [ 170.672567][ T4248] nr0: tun_chr_ioctl cmd 1074025694 [ 172.870275][ T4286] -: renamed from syzkaller0 [ 173.192725][ T4300] device wg2 left promiscuous mode [ 173.258967][ T4300] device wg2 entered promiscuous mode [ 173.557313][ T4306] device syzkaller0 entered promiscuous mode [ 173.729585][ T4319] device syzkaller0 entered promiscuous mode [ 174.664961][ T4361] device sit0 left promiscuous mode [ 174.716072][ T4370] device sit0 entered promiscuous mode [ 175.013546][ T4408] ÿÿÿÿÿÿþ€: renamed from vlan1 [ 175.234841][ T4412] device syzkaller0 entered promiscuous mode [ 177.591638][ T4520] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 177.813225][ T4516] syz.2.1167 uses obsolete (PF_INET,SOCK_PACKET) [ 178.554001][ T4578] device pim6reg1 entered promiscuous mode [ 180.070870][ T4659] device syzkaller0 entered promiscuous mode [ 180.127691][ T4641] device pim6reg1 entered promiscuous mode [ 180.584995][ T4673] device syzkaller0 entered promiscuous mode [ 181.643113][ T4724] device syzkaller0 entered promiscuous mode [ 183.207987][ T4811] device pim6reg1 entered promiscuous mode [ 184.594422][ T4917] device sit0 left promiscuous mode [ 184.723487][ T4923] device pim6reg1 entered promiscuous mode [ 185.601811][ T30] audit: type=1400 audit(1757694176.463:157): avc: denied { create } for pid=5000 comm="syz.2.1310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 186.081875][ T5029] device sit0 left promiscuous mode [ 186.118919][ T5029] device sit0 entered promiscuous mode [ 186.595960][ T5039] device sit0 left promiscuous mode [ 188.793316][ T5178] device sit0 entered promiscuous mode [ 189.005797][ T5184] device veth1_to_bond entered promiscuous mode [ 191.859982][ T5257] device sit0 left promiscuous mode [ 195.390891][ T5324] device syzkaller0 entered promiscuous mode [ 196.168733][ T5338] device wg2 left promiscuous mode [ 196.336088][ T5344] device wg2 entered promiscuous mode [ 196.930083][ T5365] device veth0_vlan left promiscuous mode [ 196.942443][ T5365] device veth0_vlan entered promiscuous mode [ 196.975295][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.047334][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 197.084013][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 197.554249][ T5406] device veth0_vlan left promiscuous mode [ 197.560893][ T5406] device veth0_vlan entered promiscuous mode [ 197.602974][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.611320][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 197.627479][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 198.679331][ T5443] GPL: port 1(erspan0) entered blocking state [ 198.779275][ T5443] GPL: port 1(erspan0) entered disabled state [ 198.793132][ T5443] device erspan0 entered promiscuous mode [ 198.990122][ T5443] GPL: port 1(erspan0) entered blocking state [ 198.996273][ T5443] GPL: port 1(erspan0) entered forwarding state [ 200.931718][ T5581] device veth1_macvtap left promiscuous mode [ 200.965332][ T5581] device macsec0 left promiscuous mode [ 201.369943][ T5603] device pim6reg1 entered promiscuous mode [ 201.445696][ T5607] device veth1_macvtap left promiscuous mode [ 202.063803][ T5605] ÿÿÿÿÿÿ_“–ÿ’¯: renamed from vlan1 [ 202.427850][ T5650] ref_ctr_offset mismatch. inode: 0x69d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 205.393549][ T5770] syz.2.1540[5770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.393619][ T5770] syz.2.1540[5770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.556101][ T5786] ªªªªªª: renamed from vlan0 [ 207.758904][ T5812] device veth0_vlan left promiscuous mode [ 207.837577][ T5812] device veth0_vlan entered promiscuous mode [ 207.937933][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 207.983537][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 208.034704][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 208.822483][ T5879] device syzkaller0 entered promiscuous mode [ 209.166660][ T5893] device veth0_vlan left promiscuous mode [ 209.242694][ T5893] device veth0_vlan entered promiscuous mode [ 209.325438][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 209.354951][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 209.382931][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿþ€: link becomes ready [ 210.030489][ T5923] device pim6reg1 left promiscuous mode [ 210.038556][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): pim6reg1: link becomes ready [ 210.331832][ T5958] device sit0 entered promiscuous mode [ 210.905493][ T5977] device pim6reg1 entered promiscuous mode [ 211.875656][ T6018] device sit0 left promiscuous mode [ 213.276920][ T6065] device macsec0 left promiscuous mode [ 218.603917][ T6231] device wg2 left promiscuous mode [ 222.638934][ T6335] syz.4.1706[6335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.639018][ T6335] syz.4.1706[6335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.668927][ T6336] syz.4.1706[6336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.701293][ T6336] syz.4.1706[6336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.042649][ T6350] ªªªªªª: renamed from vlan0 [ 225.261903][ T6430] syz.5.1737[6430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.270707][ T6430] syz.5.1737[6430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.337607][ T6433] device veth0_vlan left promiscuous mode [ 225.355714][ T6433] device veth0_vlan entered promiscuous mode [ 225.363867][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 225.377961][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 225.403300][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 225.960627][ T6466] device syzkaller0 entered promiscuous mode [ 226.138405][ T6430] syz.5.1737 (6430) used greatest stack depth: 21808 bytes left [ 226.248562][ T6477] cgroup: fork rejected by pids controller in /syz5 [ 227.810364][ T6616] device sit0 entered promiscuous mode [ 229.038751][ T6685] device veth0_vlan left promiscuous mode [ 229.057153][ T6685] device veth0_vlan entered promiscuous mode [ 233.505739][ T6777] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.538731][ T6777] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.973408][ T6796] device veth0_vlan left promiscuous mode [ 233.992558][ T6796] device veth0_vlan entered promiscuous mode [ 234.042470][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 234.052499][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 234.060200][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 234.235994][ T6823] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.479626][ T6835] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 234.537557][ T6835] syzkaller1: linktype set to 280 [ 235.197953][ T6894] bond_slave_1: mtu less than device minimum [ 236.146771][ T6919] device syzkaller0 entered promiscuous mode [ 236.186909][ T30] audit: type=1400 audit(1757694227.043:158): avc: denied { write } for pid=6923 comm="syz.2.1884" name="cgroup.subtree_control" dev="cgroup2" ino=230 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 236.222190][ T30] audit: type=1400 audit(1757694227.053:159): avc: denied { open } for pid=6923 comm="syz.2.1884" path="" dev="cgroup2" ino=230 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 236.307433][ T6917] device syzkaller0 entered promiscuous mode [ 236.964403][ T6951] device sit0 left promiscuous mode [ 236.997292][ T6953] device sit0 entered promiscuous mode [ 239.964045][ T6991] device sit0 entered promiscuous mode [ 240.312707][ T6992] device sit0 left promiscuous mode [ 240.815967][ T7008] device veth1_macvtap entered promiscuous mode [ 240.863418][ T7008] device macsec0 entered promiscuous mode [ 240.982056][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 242.144975][ T7028] device syzkaller0 entered promiscuous mode [ 242.470450][ T7057] device pim6reg1 entered promiscuous mode [ 244.289918][ T7154] tap1: tun_chr_ioctl cmd 1074812118 [ 244.981015][ T7194] device wg2 entered promiscuous mode [ 245.204430][ T7217] tap0: tun_chr_ioctl cmd 1074025677 [ 245.209869][ T7217] tap0: linktype set to 768 [ 245.215769][ T7218] tap0: tun_chr_ioctl cmd 1074025677 [ 245.232616][ T7218] tap0: linktype set to 768 [ 245.396102][ T7237] device veth1 left promiscuous mode [ 245.405146][ T7237] bridge0: port 3(veth1) entered disabled state [ 245.448832][ T7237] device bridge_slave_1 left promiscuous mode [ 245.455297][ T7237] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.502980][ T7237] device bridge_slave_0 left promiscuous mode [ 245.510817][ T7237] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.607553][ T7247] device sit0 left promiscuous mode [ 246.476181][ T7250] device sit0 entered promiscuous mode [ 247.881163][ T7334] device syzkaller0 entered promiscuous mode [ 249.947688][ T7423] device wg2 entered promiscuous mode [ 251.248520][ T7504] device lo entered promiscuous mode [ 251.261021][ T7504] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 252.879434][ T7560] device lo entered promiscuous mode [ 252.921243][ T7560] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 253.401967][ T7577] device sit0 entered promiscuous mode [ 255.735385][ T7668] device syzkaller0 entered promiscuous mode [ 256.282100][ T7684] device wg2 left promiscuous mode [ 256.841820][ T7708] device syzkaller0 entered promiscuous mode [ 259.260605][ T7784] device sit0 entered promiscuous mode [ 261.239399][ T7836] device veth0_vlan left promiscuous mode [ 261.299098][ T7836] device veth0_vlan entered promiscuous mode [ 261.348904][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 261.360948][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 261.438345][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 262.379553][ T7884] device pim6reg1 entered promiscuous mode [ 263.444415][ T7894] device syzkaller0 entered promiscuous mode [ 263.619391][ T7907] device syzkaller0 entered promiscuous mode [ 264.329817][ T7941] device sit0 left promiscuous mode [ 264.567192][ T7941] device sit0 entered promiscuous mode [ 265.693669][ T7974] device wg2 left promiscuous mode [ 265.747865][ T7972] device wg2 entered promiscuous mode [ 265.935391][ T7975] device sit0 left promiscuous mode [ 267.494320][ T8037] device wg2 left promiscuous mode [ 267.626272][ T8038] syz.2.2215[8038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.626346][ T8038] syz.2.2215[8038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.875467][ T8096] device veth0_vlan left promiscuous mode [ 268.893710][ T8096] device veth0_vlan entered promiscuous mode [ 268.908080][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.971787][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 268.991772][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 270.761202][ T8251] syz.3.2286[8251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.779026][ T8251] syz.3.2286[8251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.151351][ T8264] device sit0 entered promiscuous mode [ 273.014954][ T8316] device pim6reg1 entered promiscuous mode [ 273.026450][ T8317] device sit0 left promiscuous mode [ 273.035892][ T8319] device sit0 entered promiscuous mode [ 276.072449][ T8409] device sit0 left promiscuous mode [ 276.203782][ T8416] ip6_vti0: mtu greater than device maximum [ 276.213820][ T8416] device pim6reg1 entered promiscuous mode [ 276.274444][ T8420] @ÿ: renamed from bond_slave_0 [ 276.397282][ T8426] device sit0 entered promiscuous mode [ 278.542947][ T30] audit: type=1400 audit(1757694269.413:160): avc: denied { create } for pid=8488 comm="syz.2.2356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 280.502300][ T8526] GPL: port 1(erspan0) entered disabled state [ 280.875005][ T8534] @ÿ: renamed from bond_slave_0 [ 283.266930][ T8583] device syzkaller0 entered promiscuous mode [ 283.428124][ T8578] @ÿ: renamed from bond_slave_0 [ 283.802038][ T8611] device sit0 left promiscuous mode [ 284.292017][ T30] audit: type=1400 audit(1757694275.153:161): avc: denied { mounton } for pid=8623 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 284.442233][ T283] syz-executor (283) used greatest stack depth: 21760 bytes left [ 284.490273][ T8623] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.544209][ T8623] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.559420][ T8623] device bridge_slave_0 entered promiscuous mode [ 284.672323][ T8623] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.685443][ T8623] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.694296][ T8623] device bridge_slave_1 entered promiscuous mode [ 284.713707][ T8636] @ÿ: renamed from bond_slave_0 [ 285.180685][ T8644] GPL: port 1(erspan0) entered disabled state [ 285.445375][ T337] GPL: port 1(erspan0) entered disabled state [ 285.457380][ T337] device erspan0 left promiscuous mode [ 285.462930][ T337] GPL: port 1(erspan0) entered disabled state [ 285.495519][ T8665] device sit0 entered promiscuous mode [ 285.675148][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 285.684865][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 285.733502][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 285.760113][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.803147][ T857] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.810230][ T857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.817958][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 285.826553][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 285.838315][ T857] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.845391][ T857] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.858443][ T8694] device sit0 left promiscuous mode [ 285.890811][ T8696] device sit0 entered promiscuous mode [ 285.904428][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 285.912297][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.920980][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 286.007394][ T8623] device veth0_vlan entered promiscuous mode [ 286.025193][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 286.036073][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.049969][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 286.064309][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.393863][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 286.409986][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 286.458188][ T8623] device veth1_macvtap entered promiscuous mode [ 286.607815][ T8714] device syzkaller0 entered promiscuous mode [ 286.650831][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 286.660955][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 286.669652][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 286.678551][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 286.687203][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 286.720409][ T30] audit: type=1400 audit(1757694277.583:162): avc: denied { unmount } for pid=8623 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 286.889064][ T8731] device syzkaller0 entered promiscuous mode [ 287.022838][ T8738] veth0_macvtap: mtu less than device minimum [ 287.087164][ T8747] bond_slave_1: mtu less than device minimum [ 288.925248][ T8764] device sit0 entered promiscuous mode [ 291.037215][ T8854] device syzkaller0 entered promiscuous mode [ 294.076173][ T8934] device sit0 entered promiscuous mode [ 294.273800][ T8933] device sit0 left promiscuous mode [ 295.701518][ T8972] device syzkaller0 entered promiscuous mode [ 296.682072][ T9059] device sit0 left promiscuous mode [ 296.772386][ T9064] device sit0 entered promiscuous mode [ 298.497570][ T9147] device wg2 entered promiscuous mode [ 298.636551][ T9141] device macsec0 left promiscuous mode [ 298.667830][ T9150] device syzkaller0 entered promiscuous mode [ 298.685142][ T9151] device syzkaller0 entered promiscuous mode [ 301.159586][ T9185] device sit0 left promiscuous mode [ 303.294501][ T9190] device syzkaller0 entered promiscuous mode [ 303.729005][ T9192] device syzkaller0 entered promiscuous mode [ 306.285823][ T9279] 7’ç÷ï: renamed from syzkaller0 [ 307.252639][ T9337] device veth0_vlan left promiscuous mode [ 307.264075][ T9337] device veth0_vlan entered promiscuous mode [ 307.272773][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 307.293251][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 307.302272][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 307.421504][ T9358] bond_slave_1: mtu less than device minimum [ 307.638983][ T9376] syz.2.2617[9376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.639089][ T9376] syz.2.2617[9376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.166895][ T30] audit: type=1400 audit(1757694299.033:163): avc: denied { create } for pid=9381 comm="syz.3.2622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 308.722588][ T9415] device pim6reg1 entered promiscuous mode [ 309.000850][ T9457] device sit0 left promiscuous mode [ 309.235699][ T9464] device sit0 entered promiscuous mode [ 310.097722][ T9486] FAULT_INJECTION: forcing a failure. [ 310.097722][ T9486] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 310.187155][ T9486] CPU: 1 PID: 9486 Comm: syz.0.2648 Tainted: G W syzkaller #0 [ 310.195949][ T9486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 310.206006][ T9486] Call Trace: [ 310.209272][ T9486] [ 310.212200][ T9486] __dump_stack+0x21/0x30 [ 310.216614][ T9486] dump_stack_lvl+0xee/0x150 [ 310.221185][ T9486] ? show_regs_print_info+0x20/0x20 [ 310.226481][ T9486] ? vfs_write+0xc17/0xf70 [ 310.230886][ T9486] dump_stack+0x15/0x20 [ 310.235018][ T9486] should_fail+0x3c1/0x510 [ 310.239414][ T9486] should_fail_usercopy+0x1a/0x20 [ 310.244414][ T9486] _copy_from_user+0x20/0xd0 [ 310.249001][ T9486] __sys_bpf+0x233/0x730 [ 310.253393][ T9486] ? bpf_link_show_fdinfo+0x310/0x310 [ 310.258746][ T9486] ? debug_smp_processor_id+0x17/0x20 [ 310.264103][ T9486] __x64_sys_bpf+0x7c/0x90 [ 310.268495][ T9486] x64_sys_call+0x4b9/0x9a0 [ 310.272980][ T9486] do_syscall_64+0x4c/0xa0 [ 310.277473][ T9486] ? clear_bhb_loop+0x50/0xa0 [ 310.282137][ T9486] ? clear_bhb_loop+0x50/0xa0 [ 310.286812][ T9486] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 310.292859][ T9486] RIP: 0033:0x7fed7b634ba9 [ 310.297251][ T9486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 310.317011][ T9486] RSP: 002b:00007fed7a09d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 310.325413][ T9486] RAX: ffffffffffffffda RBX: 00007fed7b87bfa0 RCX: 00007fed7b634ba9 [ 310.333366][ T9486] RDX: 000000000000000c RSI: 0000200000000000 RDI: 000000000000000a [ 310.341316][ T9486] RBP: 00007fed7a09d090 R08: 0000000000000000 R09: 0000000000000000 [ 310.349262][ T9486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 310.357210][ T9486] R13: 00007fed7b87c038 R14: 00007fed7b87bfa0 R15: 00007ffc5a1e0598 [ 310.365167][ T9486] [ 310.556150][ T9500] syz.3.2653[9500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.556221][ T9500] syz.3.2653[9500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 311.403735][ T9549] FAULT_INJECTION: forcing a failure. [ 311.403735][ T9549] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 311.573454][ T9549] CPU: 1 PID: 9549 Comm: syz.5.2666 Tainted: G W syzkaller #0 [ 311.582238][ T9549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 311.592277][ T9549] Call Trace: [ 311.595541][ T9549] [ 311.598457][ T9549] __dump_stack+0x21/0x30 [ 311.602772][ T9549] dump_stack_lvl+0xee/0x150 [ 311.607356][ T9549] ? show_regs_print_info+0x20/0x20 [ 311.612535][ T9549] dump_stack+0x15/0x20 [ 311.616668][ T9549] should_fail+0x3c1/0x510 [ 311.621073][ T9549] should_fail_usercopy+0x1a/0x20 [ 311.626185][ T9549] _copy_to_user+0x20/0x90 [ 311.630587][ T9549] bpf_prog_test_run_syscall+0x367/0x4d0 [ 311.636206][ T9549] ? sock_gen_cookie+0x60/0x60 [ 311.640950][ T9549] ? fput_many+0x15a/0x1a0 [ 311.645431][ T9549] ? sock_gen_cookie+0x60/0x60 [ 311.650173][ T9549] bpf_prog_test_run+0x3d5/0x620 [ 311.655108][ T9549] ? bpf_prog_query+0x230/0x230 [ 311.659934][ T9549] ? selinux_bpf+0xce/0xf0 [ 311.664326][ T9549] ? security_bpf+0x82/0xa0 [ 311.668894][ T9549] __sys_bpf+0x52c/0x730 [ 311.673112][ T9549] ? bpf_link_show_fdinfo+0x310/0x310 [ 311.678463][ T9549] ? debug_smp_processor_id+0x17/0x20 [ 311.683814][ T9549] __x64_sys_bpf+0x7c/0x90 [ 311.688208][ T9549] x64_sys_call+0x4b9/0x9a0 [ 311.692695][ T9549] do_syscall_64+0x4c/0xa0 [ 311.697090][ T9549] ? clear_bhb_loop+0x50/0xa0 [ 311.701748][ T9549] ? clear_bhb_loop+0x50/0xa0 [ 311.706402][ T9549] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 311.712280][ T9549] RIP: 0033:0x7f3c2e03aba9 [ 311.716715][ T9549] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 311.736307][ T9549] RSP: 002b:00007f3c2caa3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 311.744988][ T9549] RAX: ffffffffffffffda RBX: 00007f3c2e281fa0 RCX: 00007f3c2e03aba9 [ 311.752953][ T9549] RDX: 000000000000000c RSI: 0000200000000000 RDI: 000000000000000a [ 311.760910][ T9549] RBP: 00007f3c2caa3090 R08: 0000000000000000 R09: 0000000000000000 [ 311.768860][ T9549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 311.776813][ T9549] R13: 00007f3c2e282038 R14: 00007f3c2e281fa0 R15: 00007ffc3f6cced8 [ 311.784777][ T9549] [ 312.182439][ T9580] device syzkaller0 entered promiscuous mode [ 313.152293][ T9610] device veth0_vlan left promiscuous mode [ 313.290034][ T9610] device veth0_vlan entered promiscuous mode [ 313.332027][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 313.351789][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 313.383357][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 313.529749][ T30] audit: type=1400 audit(1757694304.383:164): avc: denied { ioctl } for pid=9623 comm="syz.5.2690" path="" dev="cgroup2" ino=499 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 313.885942][ T9642] FAULT_INJECTION: forcing a failure. [ 313.885942][ T9642] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 313.905816][ T9642] CPU: 1 PID: 9642 Comm: syz.4.2695 Tainted: G W syzkaller #0 [ 313.914610][ T9642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 313.924667][ T9642] Call Trace: [ 313.927960][ T9642] [ 313.930905][ T9642] __dump_stack+0x21/0x30 [ 313.935247][ T9642] dump_stack_lvl+0xee/0x150 [ 313.939986][ T9642] ? show_regs_print_info+0x20/0x20 [ 313.945184][ T9642] dump_stack+0x15/0x20 [ 313.949381][ T9642] should_fail+0x3c1/0x510 [ 313.953782][ T9642] should_fail_usercopy+0x1a/0x20 [ 313.958795][ T9642] _copy_to_user+0x20/0x90 [ 313.963196][ T9642] simple_read_from_buffer+0xe9/0x160 [ 313.968555][ T9642] proc_fail_nth_read+0x19a/0x210 [ 313.973569][ T9642] ? proc_fault_inject_write+0x2f0/0x2f0 [ 313.979270][ T9642] ? security_file_permission+0x83/0xa0 [ 313.984811][ T9642] ? proc_fault_inject_write+0x2f0/0x2f0 [ 313.990425][ T9642] vfs_read+0x282/0xbe0 [ 313.994562][ T9642] ? __kasan_check_write+0x14/0x20 [ 313.999653][ T9642] ? kernel_read+0x1f0/0x1f0 [ 314.004223][ T9642] ? __kasan_check_write+0x14/0x20 [ 314.009853][ T9642] ? mutex_lock+0x95/0x1a0 [ 314.014432][ T9642] ? wait_for_completion_killable_timeout+0x10/0x10 [ 314.021186][ T9642] ? __fget_files+0x2c4/0x320 [ 314.025866][ T9642] ? __fdget_pos+0x2d2/0x380 [ 314.030543][ T9642] ? ksys_read+0x71/0x240 [ 314.034895][ T9642] ksys_read+0x140/0x240 [ 314.039135][ T9642] ? vfs_write+0xf70/0xf70 [ 314.043551][ T9642] ? debug_smp_processor_id+0x17/0x20 [ 314.048913][ T9642] __x64_sys_read+0x7b/0x90 [ 314.053415][ T9642] x64_sys_call+0x96d/0x9a0 [ 314.058076][ T9642] do_syscall_64+0x4c/0xa0 [ 314.062478][ T9642] ? clear_bhb_loop+0x50/0xa0 [ 314.067137][ T9642] ? clear_bhb_loop+0x50/0xa0 [ 314.071804][ T9642] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 314.077762][ T9642] RIP: 0033:0x7fb003b255bc [ 314.082157][ T9642] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 314.101741][ T9642] RSP: 002b:00007fb00258f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 314.110137][ T9642] RAX: ffffffffffffffda RBX: 00007fb003d6dfa0 RCX: 00007fb003b255bc [ 314.118095][ T9642] RDX: 000000000000000f RSI: 00007fb00258f0a0 RDI: 0000000000000006 [ 314.126131][ T9642] RBP: 00007fb00258f090 R08: 0000000000000000 R09: 0000000000000000 [ 314.134083][ T9642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 314.142035][ T9642] R13: 00007fb003d6e038 R14: 00007fb003d6dfa0 R15: 00007ffd8a80fa78 [ 314.150129][ T9642] [ 314.651857][ T9722] syz.2.2723 (9722) used obsolete PPPIOCDETACH ioctl [ 314.660185][ T9708] bond_slave_1: mtu less than device minimum [ 314.708874][ T9729] device pim6reg1 entered promiscuous mode [ 314.771901][ T9732] device pim6reg1 entered promiscuous mode [ 314.939595][ T9772] device pim6reg1 entered promiscuous mode [ 316.823556][ T9911] device pim6reg1 entered promiscuous mode [ 317.096271][ T9950] device sit0 left promiscuous mode [ 317.132819][ T9956] FAULT_INJECTION: forcing a failure. [ 317.132819][ T9956] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 317.162487][ T9956] CPU: 0 PID: 9956 Comm: syz.2.2799 Tainted: G W syzkaller #0 [ 317.171363][ T9956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 317.181589][ T9956] Call Trace: [ 317.184865][ T9956] [ 317.187889][ T9956] __dump_stack+0x21/0x30 [ 317.192222][ T9956] dump_stack_lvl+0xee/0x150 [ 317.196806][ T9956] ? show_regs_print_info+0x20/0x20 [ 317.202012][ T9956] ? vfs_write+0xc17/0xf70 [ 317.206427][ T9956] dump_stack+0x15/0x20 [ 317.210585][ T9956] should_fail+0x3c1/0x510 [ 317.215025][ T9956] should_fail_usercopy+0x1a/0x20 [ 317.220052][ T9956] _copy_from_user+0x20/0xd0 [ 317.224640][ T9956] __sys_bpf+0x233/0x730 [ 317.228889][ T9956] ? bpf_link_show_fdinfo+0x310/0x310 [ 317.234258][ T9956] ? debug_smp_processor_id+0x17/0x20 [ 317.239626][ T9956] __x64_sys_bpf+0x7c/0x90 [ 317.244037][ T9956] x64_sys_call+0x4b9/0x9a0 [ 317.248535][ T9956] do_syscall_64+0x4c/0xa0 [ 317.252947][ T9956] ? clear_bhb_loop+0x50/0xa0 [ 317.257623][ T9956] ? clear_bhb_loop+0x50/0xa0 [ 317.262294][ T9956] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 317.268187][ T9956] RIP: 0033:0x7fd3777d4ba9 [ 317.272684][ T9956] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 317.292284][ T9956] RSP: 002b:00007fd37623d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 317.300704][ T9956] RAX: ffffffffffffffda RBX: 00007fd377a1bfa0 RCX: 00007fd3777d4ba9 [ 317.308773][ T9956] RDX: 0000000000000010 RSI: 0000200000000400 RDI: 000000000000000a [ 317.316745][ T9956] RBP: 00007fd37623d090 R08: 0000000000000000 R09: 0000000000000000 [ 317.324756][ T9956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 317.332732][ T9956] R13: 00007fd377a1c038 R14: 00007fd377a1bfa0 R15: 00007ffcb3171808 [ 317.340711][ T9956] [ 317.441189][ T9951] device sit0 entered promiscuous mode [ 317.822175][ T9985] device veth1_macvtap left promiscuous mode [ 317.828205][ T9985] device macsec0 left promiscuous mode [ 318.074917][T10014] FAULT_INJECTION: forcing a failure. [ 318.074917][T10014] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 318.200307][ T30] audit: type=1400 audit(1757694309.063:165): avc: denied { create } for pid=10018 comm="syz.4.2822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 318.242696][T10014] CPU: 1 PID: 10014 Comm: syz.2.2818 Tainted: G W syzkaller #0 [ 318.251575][T10014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 318.261839][T10014] Call Trace: [ 318.265127][T10014] [ 318.268141][T10014] __dump_stack+0x21/0x30 [ 318.272469][T10014] dump_stack_lvl+0xee/0x150 [ 318.277181][T10014] ? show_regs_print_info+0x20/0x20 [ 318.282413][T10014] dump_stack+0x15/0x20 [ 318.286566][T10014] should_fail+0x3c1/0x510 [ 318.290979][T10014] should_fail_usercopy+0x1a/0x20 [ 318.295996][T10014] _copy_to_user+0x20/0x90 [ 318.300406][T10014] bpf_prog_test_run_syscall+0x367/0x4d0 [ 318.306061][T10014] ? sock_gen_cookie+0x60/0x60 [ 318.310820][T10014] ? fput_many+0x15a/0x1a0 [ 318.315249][T10014] ? sock_gen_cookie+0x60/0x60 [ 318.320016][T10014] bpf_prog_test_run+0x3d5/0x620 [ 318.324948][T10014] ? bpf_prog_query+0x230/0x230 [ 318.329790][T10014] ? selinux_bpf+0xce/0xf0 [ 318.334201][T10014] ? security_bpf+0x82/0xa0 [ 318.338703][T10014] __sys_bpf+0x52c/0x730 [ 318.342939][T10014] ? bpf_link_show_fdinfo+0x310/0x310 [ 318.348321][T10014] ? debug_smp_processor_id+0x17/0x20 [ 318.353688][T10014] __x64_sys_bpf+0x7c/0x90 [ 318.358099][T10014] x64_sys_call+0x4b9/0x9a0 [ 318.362594][T10014] do_syscall_64+0x4c/0xa0 [ 318.367013][T10014] ? clear_bhb_loop+0x50/0xa0 [ 318.371772][T10014] ? clear_bhb_loop+0x50/0xa0 [ 318.376443][T10014] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 318.382404][T10014] RIP: 0033:0x7fd3777d4ba9 [ 318.386802][T10014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 318.406395][T10014] RSP: 002b:00007fd37623d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 318.414884][T10014] RAX: ffffffffffffffda RBX: 00007fd377a1bfa0 RCX: 00007fd3777d4ba9 [ 318.422925][T10014] RDX: 0000000000000010 RSI: 0000200000000400 RDI: 000000000000000a [ 318.430873][T10014] RBP: 00007fd37623d090 R08: 0000000000000000 R09: 0000000000000000 [ 318.438823][T10014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 318.446791][T10014] R13: 00007fd377a1c038 R14: 00007fd377a1bfa0 R15: 00007ffcb3171808 [ 318.454744][T10014] [ 318.758883][T10065] FAULT_INJECTION: forcing a failure. [ 318.758883][T10065] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 318.772077][T10065] CPU: 0 PID: 10065 Comm: syz.2.2835 Tainted: G W syzkaller #0 [ 318.781020][T10065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 318.791062][T10065] Call Trace: [ 318.794325][T10065] [ 318.797236][T10065] __dump_stack+0x21/0x30 [ 318.801652][T10065] dump_stack_lvl+0xee/0x150 [ 318.806224][T10065] ? show_regs_print_info+0x20/0x20 [ 318.811408][T10065] ? __activate_page+0xd40/0xd40 [ 318.816323][T10065] dump_stack+0x15/0x20 [ 318.820459][T10065] should_fail+0x3c1/0x510 [ 318.824866][T10065] should_fail_usercopy+0x1a/0x20 [ 318.829885][T10065] copy_page_from_iter_atomic+0x3fb/0x1350 [ 318.835764][T10065] ? pipe_zero+0x370/0x370 [ 318.840171][T10065] generic_perform_write+0x307/0x670 [ 318.845464][T10065] ? grab_cache_page_write_begin+0xb0/0xb0 [ 318.851350][T10065] ? file_remove_privs+0x590/0x590 [ 318.856472][T10065] ? rwsem_write_trylock+0x130/0x300 [ 318.861757][T10065] ? clear_nonspinnable+0x60/0x60 [ 318.866772][T10065] ? avc_policy_seqno+0x1b/0x70 [ 318.871610][T10065] __generic_file_write_iter+0x268/0x480 [ 318.877227][T10065] generic_file_write_iter+0xa9/0x1d0 [ 318.882579][T10065] vfs_write+0x802/0xf70 [ 318.886817][T10065] ? file_end_write+0x1b0/0x1b0 [ 318.891668][T10065] ? wait_for_completion_killable_timeout+0x10/0x10 [ 318.898337][T10065] ? __fget_files+0x2c4/0x320 [ 318.903001][T10065] ? __fdget_pos+0x2d2/0x380 [ 318.907579][T10065] ? ksys_write+0x71/0x240 [ 318.911975][T10065] ksys_write+0x140/0x240 [ 318.916284][T10065] ? __ia32_sys_read+0x90/0x90 [ 318.921116][T10065] ? debug_smp_processor_id+0x17/0x20 [ 318.926594][T10065] __x64_sys_write+0x7b/0x90 [ 318.931183][T10065] x64_sys_call+0x8ef/0x9a0 [ 318.935676][T10065] do_syscall_64+0x4c/0xa0 [ 318.940088][T10065] ? clear_bhb_loop+0x50/0xa0 [ 318.944831][T10065] ? clear_bhb_loop+0x50/0xa0 [ 318.949498][T10065] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 318.955487][T10065] RIP: 0033:0x7fd3777d4ba9 [ 318.959887][T10065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 318.979557][T10065] RSP: 002b:00007fd37623d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 318.987950][T10065] RAX: ffffffffffffffda RBX: 00007fd377a1bfa0 RCX: 00007fd3777d4ba9 [ 318.995986][T10065] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000004 [ 319.003936][T10065] RBP: 00007fd37623d090 R08: 0000000000000000 R09: 0000000000000000 [ 319.011893][T10065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 319.019844][T10065] R13: 00007fd377a1c038 R14: 00007fd377a1bfa0 R15: 00007ffcb3171808 [ 319.027801][T10065] [ 319.087605][T10074] FAULT_INJECTION: forcing a failure. [ 319.087605][T10074] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 319.108298][T10074] CPU: 0 PID: 10074 Comm: syz.3.2842 Tainted: G W syzkaller #0 [ 319.117259][T10074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 319.127500][T10074] Call Trace: [ 319.130871][T10074] [ 319.133787][T10074] __dump_stack+0x21/0x30 [ 319.138099][T10074] dump_stack_lvl+0xee/0x150 [ 319.142667][T10074] ? show_regs_print_info+0x20/0x20 [ 319.147868][T10074] dump_stack+0x15/0x20 [ 319.152020][T10074] should_fail+0x3c1/0x510 [ 319.156435][T10074] should_fail_usercopy+0x1a/0x20 [ 319.161490][T10074] _copy_to_user+0x20/0x90 [ 319.165904][T10074] simple_read_from_buffer+0xe9/0x160 [ 319.171270][T10074] proc_fail_nth_read+0x19a/0x210 [ 319.176319][T10074] ? proc_fault_inject_write+0x2f0/0x2f0 [ 319.182026][T10074] ? security_file_permission+0x83/0xa0 [ 319.187556][T10074] ? proc_fault_inject_write+0x2f0/0x2f0 [ 319.193339][T10074] vfs_read+0x282/0xbe0 [ 319.197579][T10074] ? __kasan_check_write+0x14/0x20 [ 319.202681][T10074] ? kernel_read+0x1f0/0x1f0 [ 319.207256][T10074] ? __kasan_check_write+0x14/0x20 [ 319.212397][T10074] ? mutex_lock+0x95/0x1a0 [ 319.216811][T10074] ? wait_for_completion_killable_timeout+0x10/0x10 [ 319.223382][T10074] ? __fget_files+0x2c4/0x320 [ 319.228044][T10074] ? __fdget_pos+0x2d2/0x380 [ 319.232628][T10074] ? ksys_read+0x71/0x240 [ 319.236942][T10074] ksys_read+0x140/0x240 [ 319.241163][T10074] ? vfs_write+0xf70/0xf70 [ 319.245556][T10074] ? debug_smp_processor_id+0x17/0x20 [ 319.250908][T10074] __x64_sys_read+0x7b/0x90 [ 319.255390][T10074] x64_sys_call+0x96d/0x9a0 [ 319.259869][T10074] do_syscall_64+0x4c/0xa0 [ 319.264348][T10074] ? clear_bhb_loop+0x50/0xa0 [ 319.269005][T10074] ? clear_bhb_loop+0x50/0xa0 [ 319.273660][T10074] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 319.279529][T10074] RIP: 0033:0x7f9414fc25bc [ 319.283926][T10074] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 319.303536][T10074] RSP: 002b:00007f9413a2c030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 319.311928][T10074] RAX: ffffffffffffffda RBX: 00007f941520afa0 RCX: 00007f9414fc25bc [ 319.319880][T10074] RDX: 000000000000000f RSI: 00007f9413a2c0a0 RDI: 0000000000000005 [ 319.327828][T10074] RBP: 00007f9413a2c090 R08: 0000000000000000 R09: 0000000000000000 [ 319.335781][T10074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 319.343730][T10074] R13: 00007f941520b038 R14: 00007f941520afa0 R15: 00007fff745721e8 [ 319.351685][T10074] [ 319.551611][T10093] device sit0 entered promiscuous mode Connection to 10.128.0.4 closed by remote host. [ 320.975573][ T857] device erspan0 left promiscuous mode [ 320.981244][ T857] GPL: port 1(erspan0) entered disabled state [ 320.988741][ T857] device erspan0 left promiscuous mode [ 320.994329][ T857] GPL: port 1(erspan0) entered disabled state [ 321.294187][ T857] device bridge_slave_1 left promiscuous mode [ 321.300304][ T857] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.307818][ T857] device bridge_slave_0 left promiscuous mode [ 321.313954][ T857] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.322560][ T857] device bridge_slave_1 left promiscuous mode [ 321.328651][ T857] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.336004][ T857] device bridge_slave_0 left promiscuous mode [ 321.342149][ T857] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.350014][ T857] device veth0_vlan left promiscuous mode [ 323.892614][ T857] device bridge_slave_1 left promiscuous mode [ 323.898920][ T857] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.906487][ T857] device bridge_slave_0 left promiscuous mode [ 323.912667][ T857] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.920441][ T857] device veth1_macvtap left promiscuous mode [ 323.926711][ T857] device veth0_vlan left promiscuous mode