last executing test programs: 5.71869342s ago: executing program 4 (id=3904): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x7f, 0x0, 0x0, 0xff, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000009955cbd76d2fa9b85ab62b31b3f1ed831e8c3bf74cb8bbd1f978c32eac8aa0a614985eabc3921aeaa04a78d3f886f45f99d2c39cdf272286eb9930451bd6dd60e75b786a6404da2cbde3f9a7bfb500"/106], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffee2, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x37, 0x0, &(0x7f00000004c0)="b9180bb76003070c009e40f086dd1fff290000003b0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472c", 0x0, 0x31, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x8002, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r6, 0x0, 0x0}, 0x20) 5.573729942s ago: executing program 4 (id=3906): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000da7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000e00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) (async) bpf$OBJ_GET_PROG(0x7, 0x0, 0x406) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) (async) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_pressure(r3, &(0x7f0000000340)='cpu.pressure\x00', 0x2, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x16, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="660a000000000000611152000000000085000000010000009500000000000000"], &(0x7f00000002c0)='GPL\x00'}, 0x94) (async) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x1000}) (async) r5 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x5}, 0x100e64, 0xc78, 0x0, 0x9, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='i2c_read\x00', r0, 0x0, 0x3}, 0x18) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x4) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff024}, {0x6}]}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r6}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x65, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x104800}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x0, 0x0, 0x0}, 0x94) (async) close(r7) 5.550435192s ago: executing program 4 (id=3908): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000001c0), 0x4) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYRES16=0x0, @ANYRESDEC=r0, @ANYRES32=r1], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000400)={0x0, r3}, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x18, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={&(0x7f0000000780)="70d8d3a1b86d268fdddf63b0341347b41df96a0556e16db5f8db6303bcb196bef3f0cd6643d3edbd84d76725eb3bec8a7008e22fe7b95a444b131dfcd3bcfa05f85db56d3f96f656eee1aef2b742b9cd3c5853a29e232cafa43a8e00635e348c6b84e06ccbfbf6fe15de3ef003424f46f221a48044f37970aa1f9bd071868e9d70e31a2eb5619585b574cfefc00891b644a3fbed7ba20e4a8f01578d89cb3dda3affec3183da06d5499304ed0601b9460f93e98e7153ae0d616efecdf303f153eb7482aaa5ffd0ace1909a05970917185bcc6f366295e107fc251158c25ae22048026ff9134705a365f8fb456c36b22e3da4e47d322a3e267e7c6b8c7dffa51b8f4d6cc43e2a5737e3049462e45692da2aac66e9b4a0291b2d280fe911c50e600dd1a86f4795bad7a8a2e50c6db3da9ea25482b96f309d7e8b650c798fdb3bd0246045186f6b6d5d2d373737e71966e2c51d0269319e424fb527129b1f543f57685ec4840f1eeb53b43c2b6451fc542dee9266eaf35d215f2787955b480c5197c819a84f80c21db16cbc7227d2df9565a0407f355744dab20dcacaca824eb7f6f5fc9484580df95b7be59d2992be86f771a809ee35465407ba1d1e12ffe3ffbbf0f94e5169bb993fd7e0212312c24a71702192aeeb8739654d79186f9d8e9e0acc9fa51e6aca851967937fbed75a4380df8a4197229804e161a953fda6a121294e0afb2cf7a3d128a2fa2105725bf635704acfc4e410f7b338f2f62f4016be74c20181143e5b2325e0ebd79a20b380aaa07dc576d4ff2063d3bab11ac2c907bb3a6192d62716d6fef1f54c02bcd5be8064ce741d0b645bd436913c72e9e2b3d6ba98bebbd7572d1f2e19d747af66095c50d2641b667dd4e32f1840e716e7bb481ebcf9a9bee11aa6368fad80973496c2a0aa498f09da0769c58ab945e3cde58ec355adbecc4d9bc994bbbd810d3b1bf44e489e33a784bc9d9509e50087c74bf27b5214d5ea2b4469e6f90d21554e29f1dc95799245e32b435e72b092a9a160ba548a50480f800ceeda1c69d8782e45e2aec88d21c17915151abf21088a15347e80ccbbc571296d4e7465975aff5fe731bd38986c7fa5b13297a1c7150963afe2aaf3f475c3b5bdd943d3f78e39572f19403138e4aa2062204bf2449af502d4c9ad0f77d8bedaa2855bce001e5075f844601edec401653c557a5d82ca0161f04dced092b247629b3ed9caf421c97bbcdd822182735b01735b483e02e90dbec6162df942acb121557d851524ad9bf0855d9da07669d95c5fa60b43083d5cd304ba22e5c3b8fa763834a1fdc2a05f49afaaacc5bfde5c0e9d50f0a757dcd64d93845313cdae5192d871dac16d37fcdcf43a85e13d08320c8b6cf17b55552da7e6f10a85e4fa5463949800d19a83723f0600fad4bfa78cea331ab9a4e7eb2730243bdf424ce52ebad591fbb7e8b3c7110ca6268abaf10bc630286b9278963dfe1bd72a0b89022819e58913b8c4dad754d51f043ca1e0fcfd1b0a535b43951cd862fbb9e650a3ae2f39cab3cbb01cf43983b453eea69a71c2bb042eafcca6bf729e464f5c4ad567d28ddf4f9b63f425f89761989d9477c33f15d431d0fa343887ef7fdf0435c1ce7f2754461fd9229d8d696694f37017abd1852838372fe776a2acc0bf2f779d7fb05b519c5846c4121b5469889702ce1c554b6fc6de6fab8213206a436b8097368a2ecb69c8ef0643dfaae457b72f342b267607891aa8831fb72412f67f8bfbea4db2c1fb9ffced8ac469869c5314edd55ccd5923b9167d5157cdca56a8938cf527b3c8d57626f527422473847e75f369ea586a9ae0b7707a120388f83b60a41d502f172179b4cde466f0f86ca39dcfe5545d44fcc44a6d7b370f29aa5485b16109ecf527bc33bbc362bb10c34607111cc4445489d5d43b3229b704800fb417c3de10306ac509cb06a7a35b7ee8c9ca7b1905258017b16c58d5da41548c13582d801858a7295e348c68a130b017e8dfe131a073468bbace25715716760bcb2ef14d56e0f73855805c6fe70dde9df37903bc05d6ae1e2247260269223a1b4a4a30b7942439bb0039263ff1a38bc5dedc98a9e5760a6cb1fcc50af6d8dd9963e05680a3fc1daec74374a515c1b36de8645849f4bd0504dc58c08f7e8c6b5f0c0f630d906e56e55a76c70002798f1586f09a9278a46f2d53fd43bac77887522cc786415c322c0818b44d6f4c8969354493b0a8bd219376cfe275ca58fb7d509df2337aec5d159647bdad81370afe6afb129c9523a59a0fa85aebe89e9a520f2b36ccf1553f0b72889b4c3ecfdd8e3b00c0ddf4077cc2e25b46ca217ecd6608eaf2e360a218dd44f188c12df4df7ef66d0f55488b6bb3ebbe7b0cef635a1701ba960f1afb533ef7a7af07a825aa051ca63df1ac528590c3df15f2fab6366929735b4c919b557211124840bd6401c0cf930d89468cc6f434ef39c116bed0a7c186ad5cc0fd2c96e38f4e8a2e708acb4eb00fb2dba9dc334d953ee62065d4f02b0a6815b39a90164bc8ee7414f807236e2e2865ae7d564dc690dc89e86b45e510acbd7ac85de26c5e3496dced9e1f2fb68658edfc49e54dd48c386c71814308f4312ee1636ab9c08f6359a6de50f44f913e734e00d40f162c1498147a4c8db291f6f03a4f5df91cc105cf9d105c2218c8039421245cef20c3e203ae50c6c819efe01d100d0b28f577b040adbb1aeb7104d8d04640a59edc28b26cbfd0579f3303a7cf19423eb328e7a682ddc8ff27a11f13d75b546e84281232dad8beaca6b9b934691c02dcbc4b998fe5bc9656341f33f4ee7451b61b6c237e6b1d1bfeb88ed327c08ea29e33f053687ca162466fe88fa167defc3343b750b2b4c0e144e796977ca25d08bca11489cdf2aece2d4472e4a40d251a8949ae3893eef1dd3732236eb95fe0fad3b6114d00b71c7a8bf70ac3ed4567603f674e1e5bf9a0d3c67cb99396ddd991f86694151800dd823334b0f1598a77d5216fbd9ce824e8246bbc545ba0a281df6f2af570a2db9917f4dca339819182b2f4cd266fbe48896589e375458f8ad67d5788f839782f72fad930fd5d8291c5ce2f9e9fc559250a06b6973c0ff60b4b339eba3524e55feef6da55092f1544643de8d8c2d042926b7c625237cc55dfc8b0947af7b1ae7e18a89c3be2ba7a125e237e9f9fa7e05a073a63bc3d0a25d84f166a93605eab3f9912fa7caffbe37d091a0d521eaece756b05bd5d70a226b182d950713b5fffba5de68c4a033cd46e4eaf8e4c64f39ec0ed6404976ee63ff19ec070fc5bc181d3ac55def702b67b43a56cc0c8eb0186c1cdda4b33b891714905658cd54bdd6de627115e91ca6aa248b8826d2cb32a54fe204357245fbb596e3e126537bb868b5c39e12c8f2b82840551fe36bcf1854d2cc3045cd9ec50f7fc5ae094602c5b069b352884b899fc9d7d872062a55d8472e5a1f43ee1252f8b63f43087ef2e031fff045bfb05287a82450b1f43b4e749bdfad93a848ce6ff204f93c2360499c79fe0a3c79e7b1a3b61760425a0b53ed9b55ccfdf71b52ac2d88b206a4b741650e78d152126d4c116da6c19f4b547bb12ca6a10f0b12e8057cafcbf47cd363ac531ac3d6b2d5e7c84798105f05e78846d39d8790a8c460438a6f0702b6cd9e6f3d95a56439923ca63d5b34355dcdc1fda2d9eeeaa0e6cca29770ae544a0b01b547e2823144a33c35af84f4638a94425fe922dc86cf8f429470c0051742382b5811c02cc4d88ca0804c97e89c85c14704e757c3a70144ffde5e1650024b54709f13d69a74ffc669dd9955e5c9948e27f8754a76efca43d4b30d9760f8087f7ba75844f67d529eed27fb90338159f458c1728082470184f61c91c03247b4a38258a255611ce1627c66891a302888f5d74581029452cab14c0aac538f35bad98efb6092857a80f6e12ac549e594f08eb396f76f294cbb962e4b821269fb7afeb6ca171b961ea46bb5d959b2f3aa72090067c589c28a0bd642ad2634232996b552a33ec528115456e007e4b0413efca0c80c64ee195b900d62df03b24caade83d3aca19c6b1e927bd68ada78124f397bf5fe9c9e92ee072bbd6e90b7b2996aae4a425b8ef1354b6fc31fdb55ab0e0c1887653410966d1e4f7b048f5673ff9c4b7d6f12121d118681605792887d2c0eca04990b20a44f283b4f80e239bc4e86e94c0ec6e7bb8cc8d6ea7ee7991f97dac3b210e74a593befa88aa2ceef7169e4c5acb177361e950ff43d2e5cf6d025b373cbe73b6e95b6da70377bd64eb8496e8bcb87bf34651cae545105e274d5856000b1d619bab1c968a359e9e1048cee13f37ef586f7a4e8fd1e2dd66fd2d45e26c9734299c4bf3e6772dba7ee52ef170acba58a65dfb64c71bd8a08b486867d34fa92fdf90bb31f2cb7031d8096b6e5f63e05c68546303bb8ec1ec085d551980f5a44f05352ab76217a71432aa67c9f229d184919606555b3eef3f506b106c870f2f52ddfe31f9a09bbb35d7ee26861cb9a77c50ad974dfff5af5a85fc38bd1bd6e391039010cbdf8532407d840ecb727108f4c7b9d61f8f26460ef15d69d46d2c9492521937e8b1c1b7b5b3eecb061dff62bc3d1141f31c88028d73aa77bf72b3bda94093aed2fea0fd29b44acf92b7a2412dfbdd5e3857d445dd0d1bc084cc7968430d226242f5073175e9d436cddf4dbb81a2b1038045855db457a1495e6e26cb4e176093eb66df33abfa6a22a8901a92215a80ad190a0d3d954b21e7b681ce211268cfa2280fdbdc8266c43bc3156b3e603908e8644161de1d857663bb774b9d50d25be82fbc1e72790e2ffc0dc96b6146c1be9714fd1d753daf62e40fe982304edd2dbea712c069c1a2929eaad7dd39623e307f473f0f9b3a80db021550283a6dca3142514dd623a096a9c6e6a65911adabca41faf39dede0e7fea8026232d1f2beb1e7b6914afc301a6c87ff7e52d0b94a412d8b9fadf2b46b0e9eabc7a576b6fe477713d813384b83dbe971842a89aecb6165c63a14a577513b1c907f58ecd1e0062250bc0ccd5300a8e0a9f2613954b289db2ed064af1fef7bcdb47a1a6ecaf54744c17ace2f89a34fb8e8aac8f2e2c2784ae4eaaab1197b686c7de0ccd805d843db1bc10d85faf937a67e9f3d879c06ae216c0d54eb3aaab31c92c420899ffce4257eee77ff7c2dce4544faae3af6bf4da977019efcd9773c74de7a60a08ae20cb27d8b2ad8f323de5355bba4dad6abd89285c3eb60f5090bfa71fa810d19f2fa627212b0407443ec4a62793185a3c22d34fee00fc32cfdebc347dc4aa816e3d581a4119ab1208a4fc79a2c34b76288c40642f580894c9b2ad80e0eada4aeb87b3bcd275ae3c9a39194bb656e22c76395947709876dbe47bc98054767bc8d3edb2d454c6c5523fb60068f02884cb48ab625b177021bbeb16a7c4dd687f38b6ee9718cf08719630eba81ebb4dcd7acdb373a604a7d5ca2331b0f2b9b67723276704b4884e8d365634bfa232021fad4e3377c33f006ea9216babb73f7088194be68f016743ecad40fe180fcdf80a12b50ff656a034b2c571e772cb36ac5fd515753390f563449f6439ae405f90d82fa0a9026bc8bc9bf24150a95d424ddb742a64e01a1609f6ec6b945ce10dd38e24621da5ea4d4f0cdc6eaa7a7c1ad168258feaa5cf01c5389d15bfaf98cb23d9169d57aea7ec286d860826f5eb11c5c829490466b19025f412cdf3ad5b0ec4810e2df38c37bdcc29463a5a6a7e5e4a0dcecf8a6e7e24e2c28", &(0x7f0000000300)=""/14, &(0x7f0000001780)="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", &(0x7f0000000340)="49a4054b57384ee8524c6a53e6bd401b77a8c09ca25c292e39162715b91ccfb908", 0xbdbc, r3, 0x4}, 0x38) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$sock(r5, &(0x7f0000002a40)={&(0x7f0000000500)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x30}}, 0x80, &(0x7f0000002940)=[{&(0x7f0000000580)="77bee5fcb40b4776e84101a712b6b5d4ddd9775a3abe8a892fdbbe8814fc89e0ffcb0a6449edac53570408af722b5531acfaf8c7a2679ce188f55bfef3b5d2eaf2568941ad39479563d1b33fe732c9226c3520aed768420a3515d7c71aea0192b0922d37988d16517b125a209bb17e22c0061238ff8cfa29625aed69a02bd0951a9eb03479cfec1aaeadd0bf7541ac9e3df9ca8430d5d3753006f0a3cd5c58631adbddc7175f8349f57678dc", 0xac}, {&(0x7f0000000640)}, {&(0x7f0000002780)="938262a4ac9ef18e8b090e195deb37947c067cde67069cbd74442c3f6cb593472938add973e9b3529de75b1e34b77382363a2386f9e3a5187b6c053a4f4d121c34d6733275b4f9a3f3e24080eb24df6e50bfa5fa74710a0e412bcb5ce1cf501d1419156ad4ba4ae699bf2a9926af25e1daeb11bea7a959d7a18b73c0d051e647baeeba9e70d6ee0dbafc160ddbb66baf6c44ff09df74ed8595353584bb4eef8cfc4248913844544527aa1442176c0756accc9baa43cd0c9bacdf239107c39094df7ab30b90d47c1e268e8e38ee2799aad84da823d664b380c6468b68c378042bb30ea36666e65ca3", 0xe8}, {&(0x7f0000000680)="491eb23deac4957e7231f9f0069b837b45e4e2f94ef3601a08be0bedadf64e3645df05fd48db2d958d56392c910654466d54c6dd91c77be2387e4537631d40f68ffcacfbd8f60f71dc84ccaa", 0x4c}, {&(0x7f0000002880)="b96840c4c398fb0dbd540f111010ae1c883f22b7b510b57ac014c84fc56584745b6352f0c2434557571ca607ca51100da854ec7ae5ed4beae8471c902afc66c7ecc98311f36314b8e7223ff650b1215489efae984a3153887092cfb328bc88b9d38fc1cc50ca931409c70cb37d17863bd22d30330cd488b14e", 0x79}, {&(0x7f0000002900)="8656ec3a60ca17f4457eb0e68a263372a8ca24c1dcac72078f9bf828685f5ee7", 0x20}], 0x6, &(0x7f00000029c0)=[@txtime={{0x18, 0x1, 0x3d, 0x5a}}, @txtime={{0x18, 0x1, 0x3d, 0x37804c97}}, @timestamping={{0x14, 0x1, 0x25, 0x686}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}], 0x78}, 0x4000) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x4}, 0x400}, 0x0, 0x10, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000002a80)=ANY=[@ANYBLOB="0400000004000000040000000000010008080000", @ANYRES32, @ANYBLOB="00000000f9000000fc0000000000040000000000404bcf522df307229282a32d39a6c55d27e44551b5d39b2d84d512cc5a9fa060126c409d058789ed471f119b75a04993171e6db2bade506f92c20e25f9c45b31d0e2c7", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffffffff00"/28], 0x48) 5.491914423s ago: executing program 4 (id=3909): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, 0x0, &(0x7f0000000300)}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000832600", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={r1, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, &(0x7f0000000400)=[0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xcb, &(0x7f0000000840)=[{}], 0x8, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0x76, 0x8, 0x8, &(0x7f0000000a40)}}, 0x10) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000240)=ANY=[@ANYBLOB='1-1,'], 0x31) close(r5) sendmsg$inet(r4, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="54000000000000000000000400000000000000600000000100010001000000010000000700000007442cc05000000000000000010000ee06000000080000000100000e4a0000002000650e"], 0x88}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000045ab3c73e9d193030401"], 0x50) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r8) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'veth0_to_bridge\x00', 0x20}) 5.170422148s ago: executing program 4 (id=3915): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000db000004dfffffff00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) (rerun: 64) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r3, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="002010000018110000ffff0000", @ANYBLOB="83b40587b8a1188b955e9ff12bac41c24a64cf287edab587d6764d249c0c7356d075d3636d7963cfff9383cc2a85764af2d41bcdeae87aebd9d39fefa4f923cae893cd1f3584b655674325168177094743c01c4dbbe07bf8ecc2d2bf3ef8bacb10743202e53b1e76ec4637a12057a69c690f9723bb3f1bdcf199d6776202d95b425e6198fc60c24d6952daea46ae32439f5afb59064977d3d0fdd8ccd37a0bb4e9dfb54bc53e5ef4fc16aad1ceb340bb70a7d7802301db73fa1593d7970545cb8a1301c5eaff144e1cf5f262d9b08580b474d1aba8904444d9645ce792b016e79eb638626410b65f76", @ANYRES64=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000005000000"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x13, &(0x7f00000009c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r6}, 0x10) unlink(0x0) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r7}, 0x10) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="b65c8f2280386e900a0020d71ffe231400010100feff9e0000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"/28], 0x50) (async, rerun: 32) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd88500000004000000"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x12, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa}, 0x94) (async, rerun: 32) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async, rerun: 64) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) (rerun: 64) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x4a, 0xfc, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x2408, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0xe82}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) 5.164382348s ago: executing program 2 (id=3916): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000022c0)={0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f0000000040)="51a286fae78775d984338f5c01bea4ec86c4cb236703104cebfa50386d360c82eb9740d354ccc61f92954e1e274c2ffde0b1372176fea94eb2bf0658970af005d42a9822aefa6b38f4508e64efaba1173b82973a7c7ee7c41e38a4250f2f05f829b2e7ac1bf32c8c5f8eeeb23ae9f698fb786612d2360963e156521eeb65f439f7312251d3f869add2ffed5ec568fc476c657b435f1acc44a96d426700ba018910601bd2e182d1a518fd76d02f7d0daafa238066fc06d775d344de70a60ea67bac23b7ad83a2156eccea40dbd77ac6d1afb39a7929f15bcca4d99fe99242065ae2550e212f71028d90dc0ed9dc8d628fced75a420862d128cd27573f26b0b51430fc810e810303bb886e924dfaff37f4d925ca8487c22ae662507971976db5785e6f2d5e7c19244b47222d898b197433c43055e4d69755d3aae80bcf55e0b319627b0ed851140f4574284e74029c2ed50eba93c8ebf1b8ea0258bc4a2b3b1a92b6f7216d192ade5ed5b9cbb427cc10bca3599f6823778133525232d8909c38829caff29043d274b3c9c971f736d4cebeacfadda8700d7856a41df02569091e348913cf7c11f39efe412626a34eb8fc0795f10e383c2a8fa484f761fc5cfb1173920048d68afcc7a99ffdffe637862dfbec9caf663ad7b0c0e58e2fa5aea8e1385bc55e30b3523a43051ad028a97cada8d72739da94380257020370791f51e094962de7b09859ffd73ae5de39b20e3dff97e45cad1850923d8b3968b68ea72237e1716cff6ccd1eec1a6950b45a8f02891636b4ea1ead76fb56e5390e3577ba54f4e47d4664c0ea05caa398f0d144e7b6c0e8d92b326e0c95343037ab3f07267f7795b47b5060cb3d1e91b4be09cf28a156811b89712976c95826f138eb344efb54e32cf434e99613c8a0715a24bf991933d4d0688eed212673cf22080126daa3e9441d8ba2db456ca73281dfd00a2059b6214e4cfaf9b7bc36e54b36d253b126ba7c9e2a2c69b6ef3272aa9ce552930cecf9131b0c935fa8fff21bea4b2bc0242d0eee825ea38582bfd3edf50eaaef4e9ed709be4a8097e4b04782d1e3ab05bd08f2f91b5c65de1a5479d3a0f62dfcdab81794e4b670ced21b19558547588ae9224e92e0502ebe5f27cb1440305478d2ea7cea95f1c79ac2c5ba52e3f761e9e5de2457e35b213a07d864bf159b9707892c4f2785a935e9b82d21e3bea0865817b242f75a2f362a9504c77e32aa77fbffa5421a3c3d7a472d8d98024c2bbe48871084e098a29675bdec85b07d525f67132ba9c7038c8abd40fcd370c63ad7d9fb9442ad217c9e33954fc14424a530fbe95d7c0d087d5bc648c5647dac1bea9cd651d88f6776d9578d7601997303e310547f5ae4c1a1ad9c0942644b3a381ed42fbbde8957ed8047287271ea51bf1aea6c1f0ab65e90d7fa29a0aff956fe2cde79616e531ab1e87fd80bd7ebd08adfb29baf172b3645eb096212b6752f9b08a08edb00ed1fe07e196ed01aff8c0c74547686d1b4ccb800eea4ed5771c2e9128dd49848ac9ee82c0aa0dd96e3fc5fa409c10c18feeb1b5d783c0a49dede677b2c9db61400c0dfa90c249e0c5a95cddd85f0fc0ff010aac173b5ce6d7d0cd9cdaedd711142860a5c666197de4c5ddb2e475ebdc46efe451991cba32594e5f40cb45cf7a8f02cc3779088e495c4410b218d9ae46d6ee090893368c6866c832ccbaf737e12f75e684898e4da7922867c438bf3586c620091eca2afb4683984a752de6438ab4f19ab38c164a9b3bf6ffad23708048b4617440ea7baf79479eb7799bed3b13c96593ad543a15b228eca601e85959bb0ba4e1469a5b5bd560ebd243b056d184d41579ffcdb3bd5bc525b822e148c87ee1bf9b240271960eb054bb8cd9981857554136f3d83ae78da4c7f6dd8602baba107f71f7f10bbe76067c6a7656112b306335a51f978cdb6dee9d50b6356e4b44bf9b730ad7c273df392a2ee57c7a83e8eef403e68209a80e3adae6052a098595ba6334da41f2c1ceac144bfc514258214a8c9208020692f623b2f7dfb96e0ac1e2e9a61ad2fbea9c75464c763393fdcdcc89e16ba1f382f44b917fa27cb54b6984e35d8af76267ddcc54e44c4ca9c773804049606aa8f3564e58ce30e650a0effafdba36879be381979f947d4cdcc4ab1adc3b677a4f67c3cb91e1c73821c50bf4414b5011e0805d8cea9b5fdf5d76d2a1731276bf71cb657c912a1349085c7fd0fe3053c051da020f78b79565ecf6b1145087afa68998a4a3dc466a339b88c3cd4e4eb6966235d71304aab4b52c199ffbcb9df9e571b92d230f1a65a001129df3d78465a5c8a842b0d84ddacf231e4a16ada364a1b4c423c809f1742ce4d7af35aa8402d0d0ef2f1a697c0ee2638e106fa8e5f5845fcc200e620e8c886203e8000c32699bc2ab30e40a2aba9994cf5acdf0d436ed1cdca045c21424d53354eccec725f8a70eda5ad5193e5a9043d65f81f58913f110d05c93aa17c8b228760e6374a1e28d24db5c94ad999986b5db2fe2c725234f05d53fc5b851bd46eb23ab9913d4de9e06a7de9bfe5eacce7012e481dad5d4de6f882285f4aed41f04e43cf2ba91ec91bac84f0db71647f99c8311616ba1bc6a1afd15f8ff15db15e625bb1298a1721b5602e0436b45e2477ebf523950eba2e0ac245ec3b916831e0ee71544dd02285531572a190552cacc7185e6b37dd7521963147d7878fb3f1397a20ff9b1d1a5d637c374788396cb0c353c3ce07cae5c4db85e83e7113702019d2dae8fd190e70132c5c29c68e854adb392771db51bd9f6672089ce34c06018e4e98ef640fbbbf950ec15da74a7909f592c43e0c2bdb8025f0d1535bb1e685415e990c2c6dfdb06b2ef7c60df96690b1a49c08b058ca3e9201aff0f9c8d52f78177ce1998d1f82f29a24a76122e854144a8e0257a8f76c220faf3601ba0db6209d9a7c7df55cd37463d54876a30fb8dd688748d4c2afc8595111697cbf7fca89a7c7e0f1ba239484d9c94b58d6c52b7da9140875df02bc17319ce7235228e141c7aa39374a10d837109b1496f08e5e084e198986743c1aa10a6c3cb3328abc318f156e4e3c197a3f36513e6201e611c1a48b6508151883f7eec6740ceedca569508f97b2f2334ce739f618891c5fc2e2b3d196a1ddb8658ca6ff8d1b6de8865b051965ea21ac1a29ea9e1620c0f9f83272f003c99a59d60bd74b42fcbe8c47576f851fe64d58e98e17e277ea1ca00cbe2365939b8cc542ad2d2edee7f6c2ecb1ef259dccd7f187694510f093a5726f7c6ec45befddfbf14fbc9f81c8a3703c8a63177b75b732685ac8bc00cae66411f48695bad50f356ee1792d10eaf22e313f3d4fbf92f2eb81150e1a5b431657eb273ca6f35244ee14f1d7d624d074ab34deb763a645c2c9e227951a5ccd0e1e0fe3700fc8e79498f6d0ba38fa5f84317fac4c1e4432a43e57c626fa48ad17b1238462a52c286a02ba2a1096e130c0b244741c56b4f02036cde425f2fd296a1353915e7325a56d213e0f2d2532a9f24e40b154081e67c4630b7bff4790e34819b09eba7150425f43424b71c126a6d3b2337353728b20e4f7bd53431fd37b686f509b1a3e8ce9cc11336e7656548b5b3cb9df980c62ada9fcd86f0a57f46c6d409e26d96000ee8a7658fa72e1f33d99a600bd145e286baa9d91ff111946cb42ad65cf4fa224a6513857582b1c18b2b06ca5708d93c227d2c0a09cd8403b0a5083e0d6dc46ff175d307d83c5ff14241945d002a41d3f8172c6e0ae167e3847b9c8c07e6cbaba4e3d2eebf2d6cb1c17dac53fad7ded8dbe43680d59a603ae9e6e3c0fe83394f207e26c97a9d79077072de23bca4c4297e64bfe8694f35ceeb8f6eb2fed8925cb94f2dc4efe810d154f524c551b3c98aa70b545584eab42bc233850568fcadd8e93a4de0415e73cfac26d054a3fb428bf8c5bd982799db024278ce573d8feb97aa03968efab19b82bc2580ed8a02bb2f17f1d18f96c658fdf70eb1d1e6db12fad40650f897f6f98736255f39ba33f3e4a229ba49f43998902b43692d972ad1827c2c581a9684b531605588a05d5556e8971fe3ac66f3ba3073452bd2ac9d6212e4eec146dcecab72731cc3c35cffc7912d608e49ac394b593b99688c23fc7ff0c1c7d63169d4e9747dcb7f6532395e8307280a588b3afd796027becb9c64337c29cf3b2498687b6eda1cca07c4c37f227e5f26482a6c433d48e5f180a77704095dcd45ff05e6b182c63642ac9e7502f6b8d5dd503e319deda236e622fc52b047f3f09ac161386a6a24055b8fda2ad0e1032d1fca52b102fe912749089ade5e1512a8e1604930f7fe1e4d9d15a902eb3a99ad7064d159e17e196d5ac9f371451585ea05b2827929839d1bf2bce7375cf9772a3708a88c6ff7bbb7b069256159081aa65ddf01104bf2fd66769052ce538390cba82d4ec871fcf7e74a9252013e158558331a93dc58f2f62710c9cc3d538ced74ac5837826bf2494716b630e30fc689c4c61de0ca587f22c609646d79def6ab6ba0e6327b795628a8a1dc5a2c6b98e81aad8feb4cfc789466e215c4659055e945d934e22c6c2c03d24ac765892360a841670e747a6d857edd4301bae95b0c207a2b50e06dda360e52b24a936a20b7da8bc48c7daaf35f5b4e8ae0fadb2b9c2c3a71606bc173444107d64a03037a016f29f68a57cbb883717f4af5ad6ef7dc79c2815aaf7effe37d7d009bfe3b5fa479c762505ce22b46734e22ac8dbd0bec10ea4f9aad36a4fbb722115bb995004623b51a88671c4c1c2e8c0c645477ed51cdd83e8578dc129e7bcbcda4104e55fd97275a92eeea5b3e1288c4d4a51d20461766e7d9e0ecda4001a80907a4df3837933e6d344f310992179880d0fa34d7b1f0341eca47795a73c29bf3a09f3efc5b230386377af7bcd9abb148ff31a114f2b8cbc70473a57d6fcdc0399ea326788534ba9cb6219d9eef38d7a5a7c73d1a50c1368b0337bfc3992ed769670e3ada2cd3f6bb8525d9d257f18db7f483f1ed27dfe4e45fc77b1453871a0a27452e57456b575f09d8d7204d610b1f9b1d7235e850856210f69b08f169630fe27cb1785599cfc197415101c619b029af110132188a4727a091facfdd8d59612f0f3e04ffdcbbaba0c30790c90112a1eb868a760363437f6d397a0aed337784a742b28d0ffabf3887b660ca20ec18d166b70b78ffab078c2bfcd058649b7d42c845ea22a6201d196a530a70775bf464e03f01d8af51ca4715b0af38b559d7f1a632433ce2584e131fda936c57ea392c467ee2c28d26db20c50ffce4a4b0e653aaf06fc69a4afbe65ae0cca87396de8a05cbf6b35609e102d4388d8fd8365f8de68ac703a42587447bdd903ef66f284bc6d0dd31859874dcfe009f200af0936a0210ef9ad5327d64df9cc3f3a8ca692fde8ce574309b349c412634f3242fabd2851440e2de39b793e69b541077ceac74cacbd7cd98dfc520a1f51b870018dbfacd1931b91c944ed3a54b855a2b2c083a5bfa2aca213a5e1c0772465bd1c0d75ca4fef08bd53d69ddc738e20d8c5c8e7d32163a9f06c28c19e806b64437adeca4cfa216bfe2b71d57e91e2816cbb2ce29c07541d633806fa7c6a0f7f627997d501e753f480c646c52be220cbb5741563c562e2f94faba96c38bebfd21e813a7ed4c84c4e059b4716e1faf5b2b073d85caf8b820b5ddf132c5c747bb1caa1b9fe62ee4f42e569477154205322fa770b720781b5278f3e834418be52814018252d8db05dd3", 0x1000}, {&(0x7f0000001040)="eac57f5bd78dbbc39929bb325d253910981e8751a33b168f407d305056ab8fb27eabddec5243bfbd55399b23e91a414b4bacba65efd4f5f381372f5a5f4919f9b4a467bd763889dd0c07ebef65998f1889e9b105fe8d135362f8f8a417025889957e4ee9283bcecd0627a2734e8dc6a9f7ac45231e366ff6c60e9f38e9028c684135b39087c5df7d79bc5c0e42f3a39deb", 0x91}, {&(0x7f0000001100)="df5942513fd290e8a41b2ef3c107ace31b0f73a4b68e6a8fb42bb4fd3d98c383ce9feded60d7f18ab2f8fa9f31e89fcb61e0df0f51e94580dc48b6130ad6", 0x3e}, {&(0x7f0000001140)="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", 0x1000}, {&(0x7f0000002140)="b9e0d6e4a44dd1dae2f4c3a5d373ac9967c26c3446554c458ef396bcbe3aab69d2f44bbc1521ba111780eb80414fdeeb33ec677826df97051fb703d590964d4a2e5ae101b8be4b85e423afac2c38baeb56b38a0cb8a9a12d560f5ecf144898c6920dbe353365295d8e", 0x69}], 0x5, &(0x7f0000002240)=[@ip_tos_u8={{0x11}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0xe8a3}}, @ip_tos_u8={{0x11}}], 0x60}, 0x1) r1 = getpid() r2 = perf_event_open(&(0x7f00000023c0)={0x3, 0x80, 0xf, 0x5, 0x0, 0x10, 0x0, 0xa, 0x0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000002380), 0xa}, 0x4, 0xfffffffffffffffc, 0xb39, 0x8, 0x6, 0x10001, 0x7, 0x0, 0x4, 0x0, 0x1}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000002300)={0x1, 0x80, 0x6, 0x7f, 0xf, 0xa9, 0x0, 0x1, 0x402, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20d, 0x4, @perf_config_ext={0x10000, 0xfffffffffffffff7}, 0x0, 0x3, 0x9, 0x3, 0x4, 0x0, 0x800, 0x0, 0x7ff, 0x0, 0x3}, r1, 0x0, r2, 0xb) recvmsg$unix(0xffffffffffffffff, &(0x7f0000002700)={0x0, 0x0, &(0x7f0000002540)=[{&(0x7f0000002440)=""/213, 0xd5}], 0x1, &(0x7f0000002580)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x158}, 0x102) r24 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002740)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x9, '\x00', 0x0, r12, 0x3, 0x0, 0x1}, 0x50) r25 = perf_event_open$cgroup(&(0x7f0000002800)={0x5, 0x80, 0x34, 0x2b, 0x6, 0x9, 0x0, 0x7, 0x92020, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f00000027c0), 0xa}, 0x6000, 0xfffffffffffffffa, 0x6, 0x0, 0x3, 0x4, 0xde, 0x0, 0x7, 0x0, 0x4}, r11, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r16, 0x2405, r25) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002b40)={r6, 0x0, 0x73, 0xc7, &(0x7f0000002880)="ebcdb79fb9dee60f93b9e3f7fe03888616bb211357f88aa6501e074212b8e0c7f9f1cb42baa8e52015a005d7ddd581af31d1e7eaca5e731ca6d3a31e49aee44f70ca0233a907333055a4f077c8703d593572d5c1575d8494fca7f9fe27321babbadbcfbd0ea324f483d42acf5edaf84258ff7f", &(0x7f0000002900)=""/199, 0x80, 0x0, 0x80, 0xb1, &(0x7f0000002a00)="32cb3aae42fb59415b6042412937b91c5cbefcdd79c5cb9462ad445a77a475e7e735aba12ed9615a8ae0b8f5346ab327d6ab7bb36fe0d27e1bc0bf5552191d0c72fe31317fcd6cedb31a13e51cc9bce27ba8d0cf8fb4be10e59cabd578a8a44bed637ef2e73c6d1fe8590d6424b366389646e174781208e3efd9e02e6f9ebedb", &(0x7f0000002a80)="24193bcc45c2b03156b1d0e0119bafc3cfbfddd0ca8ef3433ee662b9863e66add3f6ee4b7d82a9c7b420d21d72de34c8a4bc30e4dccc308d261ebdb59a3dfda7fb36d95de29327629728c4b5459d58580dc91260df8e0ad78e7b8be53be4b146e03c372f348a1c4461b1091b5c1acd2da5a0fc9147aba541d9033436b48eb692d5bb005663eb98f703466a954d4f2d1927c765110b4aa62b9afca39ab5accdfce80159dd6a760ca129c468b653e2a46275", 0x0, 0x0, 0x1c2b}, 0x50) close(r23) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r10, 0x4008240b, &(0x7f0000002bc0)={0x0, 0x80, 0x4f, 0xd, 0x2, 0x3, 0x0, 0x5f, 0x400, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xf83, 0x4, @perf_config_ext={0x80000000, 0x9}, 0x10000, 0x1, 0x0, 0x3, 0x80000000, 0x1, 0x477, 0x0, 0x0, 0x0, 0x4}) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000002c40)={0x0, 0x0}, 0x8) write$cgroup_subtree(r22, &(0x7f0000002c80)={[{0x2d, 'cpu'}, {0x2b, 'cpuset'}, {0x2d, 'cpu'}, {0x2b, 'memory'}, {0x2d, 'rdma'}, {0x2b, 'io'}]}, 0x24) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002f00)={&(0x7f0000002d00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x130, 0x130, 0x8, [@datasec={0xf, 0x2, 0x0, 0xf, 0x3, [{0x4, 0xfffffffc, 0xffffffdf}, {0x3, 0x38c, 0x5}], "324605"}, @union={0x2, 0x7, 0x0, 0x5, 0x1, 0x0, [{0x9, 0x0, 0x2}, {0xd, 0x2}, {0x0, 0x1, 0xfd}, {0x5, 0x0, 0x7}, {0x10, 0x3, 0x9}, {0x8, 0x4, 0x9}, {0x9, 0x2, 0xff}]}, @ptr={0xf, 0x0, 0x0, 0x2, 0x2}, @datasec={0x3, 0xa, 0x0, 0xf, 0x1, [{0x5, 0x1, 0xe9}, {0x5, 0x40, 0x5}, {0x3, 0x3, 0x2}, {0x1, 0x855, 0xa}, {0x3, 0x4be, 0x8}, {0x4, 0x101, 0x8}, {0x3, 0xf3f, 0xce50}, {0x4, 0x200, 0x9}, {0x2, 0x6, 0x9501}, {0x4, 0x8, 0x100}], "f2"}, @typedef={0xc, 0x0, 0x0, 0x8, 0x5}, @restrict={0xd, 0x0, 0x0, 0xb, 0x1}]}, {0x0, [0x30, 0x30, 0x2e, 0x2e, 0x30, 0x30]}}, &(0x7f0000002e80)=""/73, 0x150, 0x49, 0x0, 0xe3d2, 0x10000, @value=r22}, 0x28) recvmsg$unix(r17, &(0x7f00000035c0)={&(0x7f0000002f40), 0x6e, &(0x7f00000034c0)=[{&(0x7f0000002fc0)=""/228, 0xe4}, {&(0x7f00000030c0)=""/70, 0x46}, {&(0x7f0000003140)=""/206, 0xce}, {&(0x7f0000003240)=""/232, 0xe8}, {&(0x7f0000003340)=""/118, 0x76}, {&(0x7f00000033c0)=""/71, 0x47}, {&(0x7f0000003440)=""/50, 0x32}, {&(0x7f0000003480)=""/31, 0x1f}], 0x8, &(0x7f0000003540)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x100) perf_event_open(&(0x7f0000003640)={0x0, 0x80, 0x8, 0x9, 0xa, 0x7, 0x0, 0x40, 0x4840, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000003600), 0x5}, 0x104, 0x8, 0x40, 0x8, 0x1, 0x5933, 0x5, 0x0, 0x100, 0x0, 0x56a}, r27, 0xc, r8, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f00000036c0), 0x4100, 0x0) write$cgroup_type(r7, &(0x7f0000003700), 0x9) r28 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000003740)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r28, 0x400454d9, &(0x7f0000003780)={'dummy0\x00', 0x200}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000003940)={r16, 0x58, &(0x7f00000038c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r30 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003980)=r26, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000003ac0)={0xa, 0x18, &(0x7f00000037c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xffffff68}, {{0x18, 0x1, 0x1, 0x0, r28}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_val={0x18, 0x4, 0x2, 0x0, r22, 0x0, 0x0, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_val={0x18, 0x7, 0x2, 0x0, r28, 0x0, 0x0, 0x0, 0x8}, @jmp={0x5, 0x1, 0x8, 0x3, 0x6, 0xfffffffffffffff8, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000003880)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x15, '\x00', r29, @fallback=0x31, r30, 0x8, &(0x7f00000039c0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000003a00)={0x3, 0xd, 0x5, 0xa02}, 0x10, r26, r4, 0x4, &(0x7f0000003a40)=[r21, r10, r20, r24, r18, r20, r19], &(0x7f0000003a80)=[{0x0, 0x2, 0x8, 0x7}, {0x5, 0x3, 0x3, 0x1}, {0x2, 0x5, 0x2}, {0x2, 0x2, 0x9, 0xb}], 0x10, 0x3}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000003c00)={{r22, 0xffffffffffffffff}, &(0x7f0000003b80), &(0x7f0000003bc0)=r6}, 0x20) r32 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000003e40)=@o_path={&(0x7f0000003e00)='./file0\x00', 0x0, 0x0, r4}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000003ec0)={0xd, 0x15, &(0x7f0000003c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x63a3c7d5}, [@cb_func={0x18, 0x6}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x8, 0x1, 0x0, r31}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5265, 0x0, 0x0, 0x0, 0x4d2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f0000003d00)='syzkaller\x00', 0x800, 0x31, &(0x7f0000003d40)=""/49, 0x41000, 0x0, '\x00', r29, @sock_ops=0x3, 0xffffffffffffffff, 0x8, &(0x7f0000003d80)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000003dc0)={0x4, 0xb, 0x4, 0x6}, 0x10, 0x0, r4, 0x0, &(0x7f0000003e80)=[r15, r17, r17, r32], 0x0, 0x10, 0x40}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000004340)={0xb, 0x16, &(0x7f0000003f80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x97f8}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x3}, @map_val={0x18, 0x4, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x6}, @ldst={0x2, 0x3, 0x3, 0x9, 0x0, 0xffffffffffffffff, 0x4}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffff8}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000004040)='GPL\x00', 0x4, 0xcf, &(0x7f0000004080)=""/207, 0x41100, 0x20, '\x00', r29, @fallback=0x2d, r13, 0x8, &(0x7f0000004180)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000041c0)={0x4, 0xb, 0x5, 0x1}, 0x10, r26, r12, 0x5, &(0x7f0000004280)=[r11, 0xffffffffffffffff, r14, r21, r8, r3, r22], &(0x7f00000042c0)=[{0x5, 0x3, 0xc, 0x4}, {0x3, 0x4, 0xd, 0xa}, {0x3, 0x1, 0x8, 0x4}, {0x2, 0x4, 0x8, 0xc}, {0x1, 0x1, 0x7, 0xb}], 0x10, 0x76}, 0x94) 5.127091869s ago: executing program 2 (id=3917): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x1a, 0x20, &(0x7f0000000f40)=ANY=[@ANYBLOB="18000000180000000000000003000085266db5e414f61e9659f1f5566085466a6b8d0fc98bd77670b47067401ed96f38cbf0e54d3baf30d5c5367cc07ea66077673e653473bcbc6d0165691391a1f5c6", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000000d960300ffff00001837000004000000000000000000000041540001fcffffffb7080000000000007b8af8ff00000000b7080000ff0100007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000080000001823", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r4, &(0x7f0000000340)={[{0x2b, 'blkio'}, {0x2b, 'net_prio'}, {0x2d, 'blkio'}, {0x2b, 'freezer'}, {0x2b, 'perf_event'}, {0x2d, 'freezer'}, {0x2d, 'freezer'}, {0x2b, 'perf_event'}, {0x2d, 'net_cls'}]}, 0x54) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYRES8=r4], &(0x7f00000007c0)='syzkaller\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x15, 0x11, &(0x7f0000000dc0)=ANY=[], &(0x7f0000000700)='GPL\x00', 0xd, 0x18, &(0x7f0000000780)=""/24, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000940)={0x0, 0xe, 0x5, 0x1000}, 0x10, 0x0, r3, 0x4, 0x0, &(0x7f0000000b00)=[{0x4, 0x1, 0xe, 0x4}, {0x1, 0x5, 0x2, 0x1}, {0x5, 0x4, 0xd, 0x3}, {0x1, 0x1, 0x10, 0xc}], 0x10, 0x8d2}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000800000000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) socketpair(0x2, 0x5, 0x84, &(0x7f0000000040)) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x9, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5}, 0x50) 5.013053291s ago: executing program 3 (id=3919): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000840)=ANY=[@ANYBLOB="1d45420788a4ea10667d3d3377f8fa38df40392dff89ea3840218c58e07d57aa0bacfde9e3046e7b9fa14bca93c5192783051debe058de0bc85536ff81d6dc7f7845e3279f57c2152a33a3406ffe711bbd5635af5f05ac19f059ce71ed2a946d71b01ab791a898d1f29b0a31092fba9b1c2e8cbf1218c21929c06fc8128f81893fb6d5cec75e76b69b25fe3859338ec362b1d60fee9c2d6f06cb0c1df0e43a33928154e38a8f44dc08cc9134513e17e3fae0219ffd7dbd1e209d7e6a73c979ec499db7cc", @ANYRES32, @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r3}, 0x18) (async) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) (async) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000540), 0x4) (async) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x10) (async, rerun: 64) close(0xffffffffffffffff) (rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_netprio_ifpriomap(r5, &(0x7f0000000480)=ANY=[@ANYBLOB="7d61637674e37030323500ddc9642ec66dd8c7defc4a6c96e7bcfc28c03c3106a71840660f76e2bc199e50df34c66f58e346d5feab73b02de6a5703989030d0777b66dc00b73748f030000000000000085f88c4c9627ffaa185d219caf8e50c6b855657aee85439c0612fe4cdabf800d60c0878ca3aabc8ce96c7a513c315b42b3fc36ceded1b13a5ad1f8e3cbd7b350"], 0xb) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0xfffffdf0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1f, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a}, 0x94) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x3, 0x1, 0x2, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x13, 0x1b2271bd, 0x50802d75, 0xc, 0x2410, 0x1, 0x4, '\x00', 0x0, r5, 0x2, 0x1, 0x2}, 0x50) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x920, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x208, 0x20000000, 0x0, 0x9, 0x0, 0xffff0000, 0x0, 0x0, 0x62c0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) 4.994344651s ago: executing program 4 (id=3920): bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x1ffffffffffffdf4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={&(0x7f0000000340)="3ff0a24de276a6f5912d45c26f6a0419acde262e48e2450705a14756eacd1ecd285d2aee19d22f90bd51caa60da109247dff2b16c4e8cd010b88f52a06e53c98c1036e36ed8170ece26fce86a30f2d13a9fdf8a71da8abb357ef203b406df7a267671cee81ccabbe5aeb06bb9ea3125f64250561977b8dcfaae8d924134260fd056635792e66ddcfa6b8006a6928f9a5c81c458059edf944418fddb1d20e96af4f2217f2185ab367062aa2b909c09b1d5a", &(0x7f0000000000)=""/72, &(0x7f00000001c0)="a718da7fe29b3288a5dd2f8d41315bc7e563b84740abac41a9b98ed54dc6ccf1657a08df6c3b621cdfa74c1587", &(0x7f00000004c0)="e626953525afe627a3fa342536d6bc4ea8e0baf63f84670bf8988e34d88cc0511711583d440f26f412ac0599eea8ccaf00462ee86e5cecd762ec3c61aa03a16686c1138a7ff55beaa86423c51c5827cb290d868e76ab4dca9d3ec98360d9155a947c95df41246682740199b38ce2c8e00f424b4c3e04d486d28d698bc40821df2ad99955d96b7abfb2acd7cd4f5e9362c458a67ce42c98cbe271f1cce9391ed0e5a0d8ba1a53bd1a15b0bb905c5da80de936d0952c2a0f035e75369b12a596a5b4f1a8e21f6aa469c6f7cb54bd467f6db7cb2be671db3189c45b22ae3e50659e1560d3470d1bb984c0265aafb0c3defaf5f7a1bd", 0x2, r3}, 0x38) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 4.897264813s ago: executing program 32 (id=3920): bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x1ffffffffffffdf4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={&(0x7f0000000340)="3ff0a24de276a6f5912d45c26f6a0419acde262e48e2450705a14756eacd1ecd285d2aee19d22f90bd51caa60da109247dff2b16c4e8cd010b88f52a06e53c98c1036e36ed8170ece26fce86a30f2d13a9fdf8a71da8abb357ef203b406df7a267671cee81ccabbe5aeb06bb9ea3125f64250561977b8dcfaae8d924134260fd056635792e66ddcfa6b8006a6928f9a5c81c458059edf944418fddb1d20e96af4f2217f2185ab367062aa2b909c09b1d5a", &(0x7f0000000000)=""/72, &(0x7f00000001c0)="a718da7fe29b3288a5dd2f8d41315bc7e563b84740abac41a9b98ed54dc6ccf1657a08df6c3b621cdfa74c1587", &(0x7f00000004c0)="e626953525afe627a3fa342536d6bc4ea8e0baf63f84670bf8988e34d88cc0511711583d440f26f412ac0599eea8ccaf00462ee86e5cecd762ec3c61aa03a16686c1138a7ff55beaa86423c51c5827cb290d868e76ab4dca9d3ec98360d9155a947c95df41246682740199b38ce2c8e00f424b4c3e04d486d28d698bc40821df2ad99955d96b7abfb2acd7cd4f5e9362c458a67ce42c98cbe271f1cce9391ed0e5a0d8ba1a53bd1a15b0bb905c5da80de936d0952c2a0f035e75369b12a596a5b4f1a8e21f6aa469c6f7cb54bd467f6db7cb2be671db3189c45b22ae3e50659e1560d3470d1bb984c0265aafb0c3defaf5f7a1bd", 0x2, r3}, 0x38) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 4.825217594s ago: executing program 3 (id=3924): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r3}, &(0x7f00000003c0), &(0x7f0000000200)='%-010d \x00'}, 0x20) (async) sendmsg$tipc(r2, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) (async) close(r1) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000007900e70000000000180b00000000000000000000000000009500000000000000d50a0000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) 4.769334254s ago: executing program 3 (id=3926): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) recvmsg(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x36}, 0x41fe) r6 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x11, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, r6, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x2c, 0x2, 0x3, &(0x7f0000000300)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000791218000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc0, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2620}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r2, 0xe0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000900)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0], 0x0, 0xef, &(0x7f00000009c0)=[{}], 0x8, 0x10, &(0x7f0000000a00), &(0x7f0000000a40), 0x8, 0xf3, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x12, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe40, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x6b, 0x60000000}, 0x2c) 4.255011782s ago: executing program 2 (id=3930): bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/12, @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x51, 0x1, 0x0, 0x0, 0x0, 0xd, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0xc18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x0, 0x4, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) unlink(0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='U', 0x1080}], 0x29a, 0x0, 0x3e80}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0x20000038, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x38) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.089256617s ago: executing program 5 (id=3921): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="13000000100000000200"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000f82d33043bacd884ca929498151a1de16367ffb511a3d3af856a34af72338d19a3a23299f27f3d2794da235f94d84bc5b33153d4dbc4258be0612cb9a7c53f4165424d04eb955c30b0"], 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0xffffffff}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7d}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getpid() r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1.834513381s ago: executing program 5 (id=3938): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x1, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000009d79bba8d784a051408ae19b2d6dbc6ee11b6ecb692b5f95521cebb9a9053d93f81b9ff355520a853c04c3527b6b047bde0d6cac8d97e4c9db62e331e65b8d91", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004001700080200000100400000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.791649062s ago: executing program 0 (id=3939): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x18) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) (async) 1.720806563s ago: executing program 0 (id=3940): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000090f46f53f15495f66c4e146e31aeb4000000000000076c6c207c25b7990939484880e5e02a049b1553e9c506255ebbef000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xc, &(0x7f0000000900)=ANY=[@ANYBLOB="180000000000000000000000eaffffff17f8d30a70640223292f18a85c01d201a54e7f107f7ebc15bcd9811159e4f7ffe5cf4a3ab628dd2c0c3e62e14e5624724b6cde9dc5000000000000000800000800000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r3}, &(0x7f0000000000), &(0x7f0000000640)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000680)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x29840, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000340)}, 0x424, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r5, &(0x7f0000000600), 0x12) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x20, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x4, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94, 0x4, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, 0x0, 0xfffffffc}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x5, 0x80, 0x0, 0xff, 0x8, 0x0, 0x7602, 0x0, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37}, 0x20) 1.406778308s ago: executing program 3 (id=3942): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000004080000000000000003000000000000000000000002000000000000000000000000000002000000000000000000000004"], 0x0, 0x56}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r2, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r3, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)=r4}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xf, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r8}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r5, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0xf, 0xffff5647, 0x10, 0xe2, 0x2490, r9, 0xb, '\x00', 0x0, r10, 0x2, 0x4, 0x2}, 0x50) unlink(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) r11 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000200)='ns/mnt\x00') ioctl$TUNSETIFF(r11, 0xb701, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) 1.346740978s ago: executing program 5 (id=3943): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYRES32=r0], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000001680)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r4}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1.324520129s ago: executing program 1 (id=3944): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000007000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f00000002c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000001380), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000013c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r2, @ANYRES8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001280)={r1, &(0x7f00000011c0)="fb30020a41d9dadedd2fddeb2688264cca7cec49afa9872daa645689388c415a33a1da00820cac7a4ed48949bead5c3fdb98152c8ed5b6f21eda93f56504f732179987747c6325c151fdf39cb1ec0846426c9225d73a6301e0f8a1ea3b25cb3ce141569a12d4a7c0760d7d527f10419054c3b76acdb42e7ffa914ed20a90af6ef80cf63e76d1a588e71cc6127ab2d74b26f11d07b8b05b30a7e673", &(0x7f0000000040)=""/57}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000100), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55, 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001340)={{r0}, &(0x7f00000012c0), &(0x7f0000001300)=r3}, 0x20) 1.25504654s ago: executing program 0 (id=3945): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r2) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000200), &(0x7f00000003c0)=r3}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)=r3}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001540)={0x11, 0x29, &(0x7f0000001600)=ANY=[@ANYBLOB="1800000005000000000000008500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180000000d000000000000000400000085100000fdffffffb7080000000000007b8af8ff00000000b7080000df5400007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000080000001823000051a20d46c83d8ead94847305c2fcd3906bb90410272e731b8eb0a74b6180d7910a18a1e25ccf2cd8ce43dba6b1ed15630641daa776aa8dc157dc5df34369b5a54a3c9d88b8f232dbb94ad2733150c7e71e548fb75c7d0fc1", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a500000018230000", @ANYRES32=r4, @ANYBLOB="00000000020000001057ffff0400000018630000020000000000000003000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f00000011c0)='GPL\x00', 0x2, 0x0, &(0x7f0000001200), 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001440)={0x2, 0x4, 0x40, 0x4}, 0x10, 0x0, 0x0, 0x9, 0x0, &(0x7f0000001480)=[{0x0, 0x4, 0xb, 0x4}, {0x0, 0x4, 0x9, 0x3}, {0x2, 0x3, 0x7, 0x6}, {0x5, 0x1, 0xb, 0xa}, {0x5, 0x4, 0x7}, {0x4, 0x3, 0x4, 0x7}, {0x0, 0x5, 0xb, 0xb}, {0x4, 0x2, 0xd, 0xa}, {0x2, 0x5, 0xd, 0x5}], 0x10, 0x6}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000003000), 0x201, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003, 0xfffd}, 0x0, 0xffffffffffffffe1, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7b, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 1.062268933s ago: executing program 2 (id=3946): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x28) close(r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffd0}, [@jmp={0x5, 0x0, 0x4, 0x0, 0x0, 0x2}, @alu={0x7}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, @alu={0x0, 0x0, 0x2}]}, &(0x7f0000000180)='GPL\x00'}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.sectors\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x8002, 0x0, 0x1}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r6, &(0x7f00000005c0), 0x2, 0x0) 990.566734ms ago: executing program 1 (id=3947): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x2}, 0xc27a, 0x200000000000000, 0x7, 0x5, 0x1, 0x200000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r3, &(0x7f0000000780)}, 0x20) 908.411385ms ago: executing program 3 (id=3948): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={0x0, r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f00000001c0), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r4, 0x0, 0x0) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) write$cgroup_int(r5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x52}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f2, &(0x7f0000000080)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000ec0)=@name={0x1e, 0x2, 0x1, {{0x1, 0x2}, 0x1}}, 0x10, 0x0}, 0x460c4) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x71, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 891.107936ms ago: executing program 1 (id=3949): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xa, 0x4, 0x4, 0xa, 0x40}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000001200)=ANY=[@ANYBLOB="1800000000000000000000000000000071121b0000000000950000000000000002e331491bf206"], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92344f242b416ae9eeefc0e9c6f203cb1276bfdbb4ddffffff7f82dc2b938189a7ca02f732e4c2eab72bf40c0682fd0a0c4ac106b29e220dc2880072599456d4c4e6f3fe684ab8373bb4df9d72876ef3834293812e927c01c7da1322da44c7f2ed1084a12f56d1cb39df9858037458a4ca037604007600b6be484e4c9517af216bd8ed42f7dd01008e49f4a94608c9a20819e02fc22e6be45574d4ed88b37ab8d7674c644dca2f1b4d745fd95c41f9dfc1adafd1e5a3e7f2e898961cb43e438c4e41ae43ea118e14ffffffffe4b8a80366ce5401ec61921a1b529cc8b99bffffb1ac006c67767b03b95151aeb89e6d4a43c625aa228504e4afd8c1cc3eb215ba22f43115f4d39dc7beedb130d9f2be90133a4500000058b8c9370634060105baa664953514605fba3973aa021945b985a8a66e0200000057033815717b4fdbe55b37cb8d7f41aacfbd4089ea1bd22440f64909a09b5a759a703e71f358e11ac8e13db15d792e604a4f279b3bd6621bdf2c17bc0400001000000000ff8d81006200607a9a76e5d9656a7154c75773902a1bdf399df3925130312d095e9c1f973d091c198c1a11edb6b3cc425fe203d2f2655a76865c2c34e2470fcfb1248c0add5431a7fbcb0ef4f66a09af93a09fab1daae4b518d7a5d95a017864010067d6bab101446ebfe3fdeed7ee7bb0749cacf56cf27409c60fca2e0004000000000000a9cb6f4a78444986f9b1ab61f9dab53038010000004abbfc59d6d1b18fe380df4bf024f120bd755d82033f2fb7d8fc9e0de834f7646c8dd27da1297d0c77b294e097e293db7f002c0024ab2fb4d32972cba6f49051cec1ff5d16231bbb90a2d201a500000000000000007700b06fa191ebd3a0c2ef0058ffebd7cc4cf80f74a7cdac01d998c24f34a5ba9a4a2039d0416e3f8107671141ffffffe0c7d8e94a27a06a4e3d9acee835fd0571e5bbb3e6d2b5eba505000000968983811f832dc5390f83e817c602c4f1f0d0504255c22ee8674053d0e160e5255366139bbe5863e23c3dd42d21f542816edf56a93d0a7e6f08f9ffffff64875fea6ff57ba6ae25c5e8ca4f78d5a01308243b08f1caa46be5244d64f8e875857f083144c642f71cdc8e5634c1360c056430fe77ee7ed7ac1f9743786b2fb8e0fcfcc3d36c93230b7b1da97c971c8c84a427edc3492b97e73d2060acfd8145e4a5851bc4d6fdc5ad939d7795f3879baa88bd194d48e50c84892c97c800d156b059a718f6b10274b077a710f27ab8ee953de70ea860b74a0f3c3dc11177b11cc2e62a95f1ecf607a8dc38e525f415a1bd46b38845ebca04061bacbf627f7975fe599678fee48f83b5989543729e3600000000bc86cd51704f309130f534741377ea7b7bea3c46c0c4c4b7c27c5d057d95ac85a41cdcee8e6fa31f7d2137ed1fb4b21c13b9a2c5e3f7c9ef9e45a35adbf0b9312be929863f000000000000004a82bc080de1f87808d0711dd76f2977ca7f2684bfa5c14a0cd6f1f561e34e4e8e51e81d4a355a7d00d917c16a2bb0cfb2b5f59dfead7ac6e7fa84746e2e425769b9ee2c8ff10e934847604d930f62924d0562ce17f6dadf5053ed8f33092a41bb46e1878c5295fecc27f9c6d1f62da58c0002ea00000000009aa38a05e70591d5cdab1c488ef3c1984c7c0a566cfc2a080000009ec206a54fb49056a555414178ef00d8b8f3c59f01eb5d83415994efcc6ec4b3c275cd6b1b5ff82ef7d7abb1d218e7a1d0afa285706841aac9ccc89df41c39dd58dd70569dde45f8adeaad7d3328fbb6e279f745d2872f0208635e465ca443c3a64c7803760880af23fb3f430a0311fffc96dd13b951642f1433f65b4e170a62a5f7b7d0f9d5cef0d17289c43d4aee0001f7a343899434594cc23e1c864164e130754b337e560f285dc670a31241bf657babf0615b85dc200a10294b7d5885b43ac62fc7f97a85586168483427072a535f2c7481ec261c00f725de74e48d9a86f7d4a5d28da3f099ca3e6472b9d7c86d961f525f799b4517141f018af0673b8296f867eca1ec07be11bc497a6f7d2b752bcf77c2908b64630e7fa0c2261bc2d5de32ab6bbcf296d36807544aa7c3d3301fe227b713a371414c98695e559f9cbf6b046184064a5f24a4cc6f41f21fc24a3ad7d20a89e00a9dc99a40f890869d35fba3ce6f297661d3f8ba21c65badf55d1859581f9e7ef3e2693b46a8fc85be061ce79a08002c04dc04de8b6536123b24be2ef80eb06b2db900fb30596c1574b2a31f81d61ccfd58080d2330b9c7b87b5d17d48c32daffead3414b91603e250eeedc7d601000000037426f643797be3e93da96b5643d3feed0b7c885d06006b830d7cbf3152f27522f5142dcc84a9e48a07518f0142167abf5d6685d09945cbc778bcc3e7dcfaee5d9c1689a3bafc0d3b51b5a3bfd6007954c36d532960964183842601e5364ecb6ad9168040388c7640bfa2f88643de7eebf4da8d1c3e76daace5217761d933d06bbe9609fcf5971aa1e77c3123910e63daaadd8878ad468eabaf78a96012a4ada1a9cd217fb2a0da2d521454ea9e8fcd3b5badfd6f00003a73345b841d04a02bf441955b932c59608a555bc44873272812e0fb874618a0b56b4cf44990f60000000000000000000000b20000da0ca6797590ed13b0bccf71a39e05e877893646d185a77882f866785af6b0149e336c31fb177e3e85f4c60cd4de4ce6ea73a95f434328620fa493937386ad2e2a0d60eb815aa05c33e02c32276dab36d14c63af66a31409ab2a403ec3c7a4e07bd745efa2835a8c932f22aa6da40af9bcdf808b916bc8deb37d5b8c422b65c42d17e61751c561ce775a31b52703d398d52694cfbb7d2b3791b030093b321d9f16b2f06676cf94d75cbba6491ae0b5a16ce92320321314d8d2e88d1cd7e7b1216bdaecba309a38e107103e649d46958cc6ba2d660dd41b78d832beb7206ae01508377273ea96e40760410aeed1866971e04f578e9d856d01000000045aea928f5f669be0636dc3f34f90c34531735f271527412d1ae755a9243da523d713071f9370b509a34eeb46415b2f0d271a7072cbd17e293f20132e6c15756e92776c6a0d7c3a9f512ce17edf3f1ea190853bbf93e220a6ce968b79d504c057000e7d8f8249a8158e68a90bbea8bfab2bd3c067c28e185fe62ce7020f5282cf045b9c790984c6fb65fd3187bd8bfcbe663df6b7770000f58fbad41e6eee5c9595950c4172b9c925403b2f99bbf3cb1981bb0d14bded8eae35e08278020a1ec7f508628056fd3d408a02a1cf8594bcbb21a88f477673442804f714212d000045b9f563b5352fe460a30489b1b6a6d37daead86151492f7fd4b5c64007b68a1b04027eac124478a2ef7f59fe472795785de83578cb96334e0f7c1370dc397d3aa42d937b5718b7610cdcdfe104db7801ec74980b8b111a2748321f81512e4204eb2b024b9fc9e0f257f8c6037b93b2caa236d4354b32434d5a6b01e00000000ee2ea723ea2e1accb97a200609c77e0000000000000000d3a54ccd6e13a966801e9341260d6cbce5fe03999214462cbaa297448677ab659102d0f430fbeae119a7ef2e962d2829d4dd2201c4b30d491269594c88252fbd09aced90609851bd9e5c307e7e0d39e73579c1f3563eff1a6237d3699d61acdc8e36010d76093ddd237df1c4181b0a0c4543b4249e9ff2f5e8b5e0ba2048d542de40f643fda4036124b8feb2dd45d0fa52300518c8052cc09ad73f89734fce82cc627356aa2c651ed2644f34cfbc32e8b29cf29e895e43b473ddb9a43421b4b25f8bbce8e2d7cb8547d156d5972021ae4c9e30f85413276ddebde55999d2ec3c524632b74d703147ba09e0dcb26c4b89636d28428b67e955f53bfd0c9eeb7a9d17000000000096cd8ecf1c511eea07aefa1c5cae1841efa9329d80eafefe00000000000000009111274a44c722ff9f5151aa7cb99ea3e8b2c51eadbd2d0ba1a25b08cc3e67cd186c12ea62a55ff905388bb30d1a63d42593c9aea3a84f5a6fc470d8aaaafeccb373ca26c3685679e6a048af19fca3fc5315a33687"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x1e6, 0x0, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0x0, 0x197, &(0x7f0000000000), &(0x7f0000000b80)="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"/407, 0x5dc}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xb, 0x5, 0x400, 0xa, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000004080000000000000003000000000000000000000002000000000000000000000000000002000000000000000000000004"], 0x0, 0x56}, 0x28) unlink(&(0x7f0000000040)='./file0\x00') 826.066097ms ago: executing program 5 (id=3950): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[], 0x48) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r4 = openat$cgroup_ro(r2, &(0x7f0000000180)='freezer.parent_freezing\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r4, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x92) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x18, 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000440)='GPL\x00', 0x20000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='9p_client_req\x00', r6}, 0x10) sendmsg$unix(r4, &(0x7f0000000580)={&(0x7f0000000300)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000003c0)=[{&(0x7f00000006c0)="054b079aacccd914490e0b3ab8dc6862e7e69feff772837905df58df4e2164fd8e9f18dee9ea67d4cf316bf690a46d5277d7fb295688ff59b794dbafc5bc2f38508176cfac184b5ecbd9273d7ce5850967a6a31d61b539e2dce840f1fabd39d69cc2c9107a8ebb7b319615b1283b664daeacc1943b8440f04d3d79102808679f4b0a962ea68893c1dc71ec53a4fa967895baae22a631a3a8dac6c656a9be91572dce8819daaa65612af9cd7f2cfccee751fe04ee5cf20eb70e052d723ef0a5b998e287a8fcf96c47bd649521a30a0448ef0f6412314d4b9c2b06202786c12fd0d0f94d7f3eb25d298fa2e5ad09a0825857b19a55506a424f51498f2fa67d", 0xfe}, {&(0x7f00000007c0)}], 0x2, &(0x7f0000000b40)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r5, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="000000001c000000200000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x80}, 0x4004894) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_subtree(r7, &(0x7f0000000200), 0x2, 0x0) openat$cgroup_ro(r4, &(0x7f00000001c0)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_subtree(r8, &(0x7f0000000040)={[{0x2b, 'cpu'}]}, 0x5) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r1}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r1}, &(0x7f0000000380), &(0x7f0000000400)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x15, 0x4, 0x3, &(0x7f0000000180)) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='scsi_eh_wakeup\x00', r0, 0x0, 0x5a8d}, 0x18) 822.248517ms ago: executing program 1 (id=3951): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1900000004000000080000f70b7aa88759571f99ceed5dd7b2374c956d339b472ad09c2b52c4b2cb5fc1e4f480aa32d2109bc2bf034321a52758f57c771cb7bfe51e00"/82, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1f, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x81, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xfdef) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) socketpair(0x1e, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 460.830103ms ago: executing program 2 (id=3952): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x8000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xb}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYRES8=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x10) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000040)='percpu_free_percpu\x00', r3}, 0x18) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001a40)={r2, 0x58, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40001) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001a80)={0x1b, 0x0, 0x0, 0x6, 0x0, r2, 0x800, '\x00', r4, r5, 0x5, 0x4, 0x5}, 0x50) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0x1, 0x2}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001940)={0x2, 0x4, 0x8, 0x1, 0x80, r6, 0xa, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x3}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f00000007c0)={&(0x7f0000000180)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000280)=""/160, 0xa0}, {&(0x7f0000000340)=""/208, 0xd0}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f0000000440)=""/111, 0x6f}, {&(0x7f00000004c0)=""/154, 0x9a}, {&(0x7f0000000580)=""/233, 0xe9}], 0x6, &(0x7f0000000700)=""/140, 0x8c}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) 401.905784ms ago: executing program 2 (id=3953): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000a40)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000980)={&(0x7f0000000200)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000c80)=[{&(0x7f0000000280)="98eb5137d8874442c6ca13e0", 0xc}, {&(0x7f0000000340)="5809af7d8a626e1fb0f0461b1c3d9194e26b2fd4bf83a71183b37612296c20f7fd5fffac5abcea0be98330ba721edc75f3d0f5ea2156c0a81e114abcf8970433482ffca35a32aacbdc1c7403210a02f677406ddf2182dbf2eda7018f7f641f766f21d9b280d1b6c0d7c3f5babefc6122102676950285f95497f95fa25a0bd44fc021a7777de706102bb7bebc13ab56de0f14b359927edc81e5d9adb14ab53514231d3912ff03c60a075f3fe39a977bf0dd36f6b4c363026ce272efb6b69db132da2a0390a5da", 0xc6}, {&(0x7f0000000480)="d6758ed5e00d1540cd900c0af2e1e6beccd0b718cafca720d290e586eb2e9e152ee1f217dbc30ad37f7719b0368108248fe067c201a25a9fb57608628e904e4a00c93d6829faddab6cdc1bc0f784a8b7a2e90eba780fb29847", 0x59}, {&(0x7f0000000500)="ce6ff1817f22964bd16d4c4ad44dc551e25c583a2cbe1c9f0fd4d1a1c9a444e6a81c8819c1ec4807a2f6ab4b3083ea2a2991247e44a6039f8e9d0a0941fd5fab7ea2dfbc4457e4092f52e5ae717610c50bba82c7f5f0dffae15104f1bc1fbd7868b41c70e7a172e6dc02b143c08d52dfb34ec5bb61917100b81518588f8747fb898b9b21e9e7834bd238ba8f508221982fa972329dc4a996cf2c348df1340971372286d958064e70f81a67f1763525213ea558ebb6c54d60", 0xb8}, {&(0x7f0000000700)="c2dc90b9db1dfb2584544d454ad801813969969400602015bc2bd08d51b04e8f0ee931dc72361173301ec25cb3929ebc27b9181c253b19ebb83cb3e0ff4fa5d2ac5350cbf34ed8eb817fccd7f8f950b913deb49caac037ef1377e38516f603326f32fba9cb892cc23e7eeccba1f847e06a8c1bdc1d6ded5e4ee4d5cd1ac2684eb4faae0e4c99494114c460c34131227f763916bde353902693325780512a274f44ad1ed1cdaf16a405f7af63fdd75644d5e7a640143911d32ebba49a0aeb104ae04064e884897f2ae22f64b27c03af8c58c66ea9cad67b7943237866e86b48a7dc680202f34eef8136285882a6f7f13d5b0486378f6b8bba8039", 0xfa}, {&(0x7f0000000640)="4448da8998eeb30d284fd00fa973d9f8b625d50f75362237b89ee0ff310698fb80ec249e727b9597c76b2775fb0e6a24cca12cc6049df44075a2f3e51fd478f965c479e62a49bef6be5d72c12eca89c10d64e5a03c605abdd4", 0x59}, {&(0x7f00000008c0)="5236e5a1f4a1708ba4c43b87d85f4c1df46afa60da01d6b2e64babdf4d9150511ee6aecc4453e795e1957d6aadbc375e18223df7149f14bb90166e05d14201e4fed21a3b50e3bac78b6ace8b524412a6b5c9a252be767124917370b3290751d0c4134f73d2a9f80e792c8ce930c12a941b03ac3c00965c7b642b8f1116adfd6e893304401a0eb9ce562619286db638be9b0782963a50f6195379c70daed1b67627075363f7fce3f97bc2ffa04487fca221ace13c5bf68c9b", 0xb8}, {&(0x7f0000000ac0)="665bee0b32a01b73920dcf7e6597bd32abc353c0cae6b5526a333b7c74219314c4413a9dc439a4a53a51012f1dfb0e0f2b62fc7b4beb6e447113ccb6f01c506bfc9b174828877b2ad1880827c231f53b77b9fab9ec059880bda376dada2238c49ca7ee1b78ed81bbabaf6a0fbfe3c2bee2f0c0c26f137b9a416b007ba0aefdbab98398757312f9228c9ce74b680b5b09bddebcc480b1d5cb148b0af7997c27158fc341578a893ae09855f1e6a31f3a3ef9dfeb46cfbc8fb547bab21384295549fad68e100f6ae81e6ea54f4a56", 0xcd}, {&(0x7f0000001340)="295a58c2c1ce4d7435639a84f2e413096db894496b151b58acbd8a94a4382446772452d6ae268a052aba3cd1caa0bcd638b217b6b747bbb6cc4ca6d7ccffff7057e685d03a97529777429a2745d3418809273c97e3424d9dbdb3db18e477238762b4c271c61dbb4b9c2b8f5d33a4339d7ab71d7cb5454bc889b9ee554fdecf5d934c6c26f29c6074e1f65e179df8542df31699faebf29e9301aac7144c56b8d08c07cf63168758a6884cdb30145dd8023384e3a6e2438c75ff06e5e7a6ea6cf47917f55aa43e9bba2ff1828888c86519def3757416b69676bfb5fc969b5db7aeedee0f5e4bf4849bba992ca3cceecb198c8b303d64b66b5cfa9ba247f519a7c0f6b70eec2831a7df320eba0bdb6d9878496b5b3cc094e988c5191d610f5db39f5bb1ca3aff34b86d17222eae2617a8d8707f75229ac275fdd7d3b24a4bf62da506f9dcacd1bbf3f8b763a8213bf78e118604e3f45a6d9b93b285fc687d6bed69f6bf5ffa32ebc4e3d80eaaf56b5d3f3135346b3998cd701f43990f89d8f6a3d3e202b3bf9d612788248045896d3aab35b981579ec60d0ff381b075c3af5a2b00f147d663e1a04508c73c263c36e06a7d11c6a5939cbb2c92f8897bf92b236c04652f002f915088fd89ccbdd503f656699090601ee120686c42371844b97d03ddd2d9ad617aae3753193590d6b9d4225356db09884ccdb02f4a24a9ec868facad094c4e9f51e050adc8fa1642f5f3d460438f2c82ff2153347b1a592216377655560630dcee955ffd14cf10b7de377242629d0955c43a1451c30808d2cd6056a1b85cc545df2a77bdb78ae73773a13f287c950aec16b9d9619e07aeff4bae70b76cdfc6a5c3a7e1d0f64c09ee4d91755a228b09ca104d4371a062a34e2d90a4b655870a195f22d39ada806ad92a95ccdb85f9b86b065918f3d5ca5712896cab021c3e52923519a586351cd8ba96f0e334272ddeb9a62e3e02bca2540bb45a67cd31d4376bb15806c8be88e7af9d5ec1e6bb82abb575dd1912b677220cb3d254e9b5fcb652ba42944a63a04fb53d0eabf6f36cd49854184238fee14adc2c71a4ae5a253f1f0fa474397c2655be495f92e032edf230e3de5550b4ade2bc2d61e74e7839e9d0c09adc8325fda2e2ea7c515549cc7a4692840b1fb31066ac1495e6603172fb554949d5ceebf0abd5c1987ae22de8992afb4b8771585ad1dc511b6136df8a82321dbe980c6f5812896de327b923c71b8639ac30a6e914ae194c0131d00cedc608ffc9bb5a94cf11c966d5681436cbaaa5dbd41fab6d8dcbb6d0573bd2d562a68927fa52cf567eec9309177d3107ff33adffd1ad580c31855626845adaf3872810a56a1116106698c069f38b9d019d0dcf3921784a61cd11c0a54032a3e96f4249179c663d92fc018f475e080d6b0d9b7d60ca3516fbd964ff10680e9c3dc9d0b53899210975251e81bd96eeb675ffb9dcda3b366dc3f81f80e1b563f710321d84816cdbdf1c7182e6b383cb77ded858cbf128071fbb3e425c60ed59232ff62df5f5cad8255443e71f8037e83c3c3afa4822fa7820f395dc32656e46842f7b88eb0a4cf84f6c6f9cc7d0257ba5c60c0d815471f31426c97b29c1e3397ec053a4091c99aa4576facb8c50bf44946d15428a43131a7f639da1df29bd772070fb108acf5392d73555c43f571080b768df4fbd43005cf0d7057e37417acfe910cea5f654e1a1a4a41520d2e79bdf7d65fd52395ee8dcb279b3b5c5500daae1240cb66cf20dbc52cbcca73b55721bb89ca1db49a22f903b08ea0e8afbf260244cbe9fd19706516a32d394fbf0f39c36ca1c8376e3779cdeacca31d2db2563208aad6b6b34e103f4f5aaa7bcdfa29c1f7abbe892619a7f92563f7d36b9076c8074952a130d85736bc00af37f6a0be44c90038e820e3803d6079f20139125e542627b5a09ec9734f44648532691f74e787122ac6cc9609cacfc4f2bc929b774f4deb0ddcd1c31f51912c8ab65a61239824a3a9a368e28b85e56dda6e02136207506696a8cd318e206700f726278a49fa5090a260bd556c5ea310732155ab9475f42ea126d7cdc0ccb49e98eeb1b6933f3b12c54dfa385888bb9532f6cd3186cec6a2b0651021a4370818b7d1b9bb822e0accfb1924111b92adf968378939045f11b432b0243f4ffe7baf47d18a1792468247f6b9fa2455e5d9cb729ba7f4ace90bdf32c28e1f58dad44448a9ac667c265bd977da48cad2c65c1076a4dfc1145858fbc05002ec8d8128e57cec494c215d88e10138add429b6e44240a03e779a7221660b8c71b304278fc2620deaa7fdb5b421c5735452204f7ed66c935dcf5ef5eaa8ea62dd8a53fb91e7f35de4df42f52cc377bcef62350b05754250b53ff36687978309000664d0da23dfc27170a735cb001b18d874c39d69b4c41d7d0be28cf2092f53157cea6315acece023bd65e0d6b4f6b66de6ff13295c41350cf55e7f346553671784ecaff8585df802c17acda01adb649651d9aa60d236aa7d813d992dbbc5981e5d3e9ee7fa4d5db881448add16a006e039fe5d6ec382cbf9271633436c975c08144e90273bc8a11565fc8338d102c8b10bda70761f90adaa87049e67174036fb148fff7326942c0bf18cae2276a05a82fbf04e0fc9ce2cab6f5e661962ee1ab902fadcd42d81ffaf784af723e99d79c3eb70eee422df9fc030da06508ad878c174917faa29422a8d87814691a932108c8583796f89bb5eee6ba75a4e8f64a8853698f10bb4bd49017374cc66b07fa3ec8033d55acc2508d4cfd4cd6d80b0b9e25bb417f1eef73d3cf1f369af1cdfebf91f47ba3808698f7baafca3dbd491d8797d48903fb4129b96208d7312ee18cc59930ac21dc2c6501b74c8db3446c3a8a6148230ab57f86e34b78b8e29c02c82fd8aabe1af6b1ba3094cf738b97e3d77c4b0f6b2ebf7b244728c66414618ba9184509cfa356a2295d2ac34b335e93622fa5542e2992de15a693ca50f6b6220645816a72df8eb5e1d650040ae526526d499d2ea6bed57ab48344da5d0be002ce84f0ef8c49856b939f45c5146d656ac2b991cc655233cdc7bf63c5725efc8551143944aed9010ce21fba1efea3261f934fd0a16ac5eec65f4ab0fb9203b4fb8128cbefd8d335c54ebb0abf5a622724ce166f0b7c397ccda0fa0d28598ff3304050c129b32ee5e7254fc8be7de12897fbd765d1ad9922b664e5ebea029675381713abe884e058214d7db9987151aa5f718d2be73d4e5ed8547d0b2aa93db5f6f9c1d69a1ebf57f75756a27348d974923320fd7edc19e9c4b3f606f3dddfda034ab6ec3c4201f2d3cbf49c10b9ab6a98fc21671009552835235575d79d4de015dcc74c3ffa3b4cfd85eeb96c5c2cb20fa3eb196a59f18364906aea98b2db5026c170e9820492f7013946f5a70f93d556c24fc8daf100050f7de9ff0df9a17d92f5d27739d4c64c3ea86f30acace4d200f4035c393be14244cca2388501260e2cc7c30fd4816662d0911640975c293296a6125778bd1aac54bf463fb93198fcffc00dce7df9bf6675caa408ae8d613c7bbd5899d82455c30890fdc8dd2898754aa0c32f9c68a534d8a44b9f608eea8dbfc16b7c3af83f2b2cb264b5055fdd58a49e3a91683cea11af66a07a58018249c0941f7d181a3caecaca2676d80d39a67352c51478215c9f81bc6da6d0319a28f88ae28a753f3e421c8c2dfd7442e88cf65d95511331e5828e37daa2038ae2b91b9f3e0f704ab0bad3e1d067724ff92e7b3e7c96d8854fa33d94253a5e2449be27a30d7f55b0c40e1c49620c59bc711f7e6e0759987d48a22e6da7ac4a405735dfc19b27a56267a461e43b3980a26206d846756ecf18ca96241b1da7426a27797b7664f1b59357e01754d5f19ea33d2b001a9701e3c142853ff4040b54269703beb952d933d02d8c2e352d697b0c8ae78e8ff69c48b22561a6274b1cc7814fb8099a71649962566c94225546316443e60fe88c5a540e2e047ae7bc240f68870227ba0d450da1b9b8b2aa74c8d4e7f4b28910554830460024d31a93e5f3ba36d1a14ab796c21244130466a858a866a6d3400b36ca0f56985f909946c66ec5ec48fe84887c8f628fbed60b43054b4140d8b3dc75d92d2fa1a7122a8343af4bc38b619b3cfa72f16e1457339a19173eff4c09de9049c256a297d910e672c604260a1b9fd61762eda67dc684e37e4a97216d11a70edb22e0af642a509da896ad5572aac45fe0c7c19c2e278e06b6591dba4e3aeb5fe7f6488a581a5d497c01317893ed50e371f3e3c7510329f31204f6a429f991308baef91c6c349d65da165fde8bdb92ec30d829f56a2e485fd01ded8f7b80cca945e600c527fdab63eda35b96d98d213f05176eba83c4c0277555a76487c234888a3fcd072e8256b322563524706fe1a92e6d850a08b5d1e3700d8c308071657a54ff67471cb84f0509e693f46694ab8871c34e82c412f54e4b264c1e90e63815f1b97a733f2576869b06cd8a006cd2598ef46ade6c7238a05c51e8f236de26b0b51ccf90f0d1c4da6b4ab267f7d7eb6806890099be24070d5bb4af911d67b0f1e949486f34b5a027e6092c503c0c50b67f25d29b8346fab710f78fdcd0b0265a37651765dac34cc864daa3dce2f1486bb497ba56a7a27c6aa3397250f702f4a97bef3b86f6beaad63d525c2b84eb94b8d6ee159e7e5070d7e67c7966b7d25100bc49a2c019854befa23b44660bf1e5be5ed93ee1dc7bd39c0190e08697f4242323c659f4fa77c8cc7c9cedab2240150ebb5a6d593664b0c02f2fe11cb2ff667df2e092e7b03001edaaf25c44391ae2ca13b656d4db3f0d96376d297a034e2105dc7ff153fdacce195db4ae4e454bf47e2392723225ea993f5a82fb801410c21b89d4f48fb286051d941787b9948195bd72c760e29456791c82d2f185a7020eb5785d216029586ace7b20a0f78fa1f02d804cd906453ff8a57227490404198229e4afc77aadadc93e665bba1b3d6ced21cc29d42bbc0e5e66dfa3d9f0e5c082912d0b3a522fb788ef31a8607c6c97d80c0c6896b94c7aa12920d574ca3d2bfa6fdab69e79c8ceee186e94d2eb107b3132c87de5d1e7a78b0249bff693a1f651ccb4a76496fb39c5509d32097373e7d79617078dabf7236bdad1724117a4b370a0bcb577d98ed3ca8ad68e0e6df845ec96551bd5fc15f98fd10b9881d8c405c328b1147b7dd287a2fb3992040307258e261d4b397418bed4446f051835117ad37ebdf09aa1b57c9dbc968fa66bf0f5baf1880fdffd448369762b2047072bfafbeabdda0e7c9ae35c820316c6581a528a7f78c7dfe5721ea6b6f4c83f31dec8b7e1e6fabf182cbcc593ab40b24a71d672101e4f8d33ede64d258f4e4ef1fa641ca23d9bb9c4fc81e8c9b0910ad0c8d029881a2ea4f97637c4e3a4e03a7ee41c88c15555d8ca6feda188334c26b1d68de27995ad5221c0c385fe0ffe70a39c37d66998dfe2bf95346fefdcec9cd885e96106636efd0b3978a469891083007568915286528e8369a2f9a92d2e9dc502386c478fd153f52afeabb00750f5c53f4a45a8e0f8dbef8261e8310d50fe8ccaa9c32202eff557f9a524a38b19199bf72c48b1ed774034ece08a50e05cb03b7526898fd92b49d006653ccceb78ac596b5673add21bf68f2d45711468876481210ec40fa013aeeabba87994f02d90c9a63c5867fe6a1add914138046aa216847cd247da74592de502c5fc2016a7c0c65b34f2fce512de40baf204e13c1608e2", 0x1000}, {&(0x7f00000005c0)="8e699d7e4e1b769d6b9ba217b1d2d686a1e53c8ece51e105400445d8ca20d549090e", 0x22}], 0xa, &(0x7f0000000d40)=ANY=[@ANYBLOB="14fbffffffffffffff0000000200000000000000000000006c000000000000000000000007000000861f00000000020d01eb5aca19ad108958a392010c92b5dd8199077a8f119efb3e5562c7c3013d69d5164414a161ac14143900000005ac1414440000000807271aac1414bbe0000002ac1e0101e0000001ac1414aae00000017f000001ac1e00016401010000000000000014000000000000000000000001000000ba00000000000000280000000000000000000000070000000107137c64010100ac1414bb64010101e00000020101000014000000000000000000000001000000000000000000000014000000000000000000000002"], 0xf8}, 0xc0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB="020000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0x5, 0x0, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000000001811", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xc, &(0x7f0000000080)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x6f, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='rxrpc_tx_packet\x00', r3, 0x0, 0xd}, 0x18) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x2a979d) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES64=0x0, @ANYRES32, @ANYRESOCT=r0], 0x48) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x99, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb3ff, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) 333.392935ms ago: executing program 1 (id=3954): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f0000000140)={'bond0\x00', 0x100}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) 295.893825ms ago: executing program 0 (id=3955): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0xff58) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r3}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}, 0x108001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r4}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) (async) close(r6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20882, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x1, 0x6, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xa1e2}, 0x0, 0x4, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20882, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x1, 0x6, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xa1e2}, 0x0, 0x4, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000004000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000004000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) 155.846637ms ago: executing program 0 (id=3956): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000ec0)=ANY=[@ANYBLOB="1c00000000000000000000000000000000000000e241788b0c79dee8180874b41c7bc599f4f0b501e69c07309acf2769bc4fa0546183ac3f369cdb66eceb6c27cfc7039f9c9e995a339024b5d0aa8fbf655338c0edfd7d2626e0e53470ecd30bd85015d5bf30c04adb7986f24cff84d0", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e00)={0x18, 0x19, &(0x7f0000000b80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @alu={0x4, 0x0, 0xd, 0xa, 0x3, 0xffffffffffffffc0, 0xffffffffffffffe0}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @map_val={0x18, 0x9, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000005c0)='syzkaller\x00', 0xfffffffc, 0x30, &(0x7f0000000600)=""/48, 0x41100, 0x43, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c80)={0x1, 0x4, 0x6, 0xc}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000d80)=[r0, r0, r0, r0, r0], &(0x7f0000000dc0)=[{0x1, 0x4, 0xa, 0xa}], 0x10, 0x4}, 0x94) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3}, 0x50) r4 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r2}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x20005, 0xf, 0x4, 0x10885, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0, @void, @value, @value=r4}, 0x50) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={r5, 0x20, &(0x7f00000004c0)={&(0x7f0000000480)=""/62, 0x3e, 0x0, &(0x7f0000000b00)=""/78, 0x4e}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x14, 0x5, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x49, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, r1, 0xffffff36, 0x0, 0x0, 0x0, 0x6}, 0x94) socketpair(0x1e, 0x6, 0xc, &(0x7f0000000300)={0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000ac0)={&(0x7f0000000340)=@id={0x1e, 0x3, 0x2, {0x4e22}}, 0x10, &(0x7f0000000740)=[{&(0x7f0000000840)="53560a8948c09abe816afcc90c951fb752fe4b1a278dcc9e24231332bfbbc81f576dc8f952533d76d55921f72759357bf699dd47a78be72575c1bddbd965d98800830ade80b037de1d667424a6ef6c750e207fad5c32ab0bc09dacda76eea3b834ad11f1a36ede1570c6ef446d12682116c2541a0272011336394b317d248be9eaad692cc9bf0adaaee036cbf0e116dcfd6d90d723c8113828834e6bfe7bdaa285af49eef86dbfb03e76a4a7d14647ff9e524f7e308a62404653b9f7abd4e1d2272dc60e94a778371c8e", 0xca}, {&(0x7f0000000380)="05208b663cb5edbe6e2eb4922db0b652b1b32f9c", 0x14}, {&(0x7f0000000940)="79c4a9c32c15f3f37bb86e94e508a8ffae27b2cdad4de6003bafaea99bd2db8c8f66c7e4cec7a1fb6c54894a3880dc5b7b4b073427d7f7cff23113b2e31b5f41828ce7018c75f412d9", 0x49}, {&(0x7f00000009c0)="60e1bb1b85bb776a9cb97432c3b913d0fd4b9fbd8b8b6d7b443d06c6716b30dc9e7ce16625925fab902e7c54ebb3b75c26a3cf1ea946ed3594b0e80aef8cb1bb80f2651f49bb6a6e2e9c830c33cf6ef7fc40b40ccc985941991de25ac0eea72d214b4b843806f708", 0x68}], 0x4, &(0x7f0000000a40)="2c4cd960e5b94b21c8d6515c4b46a694e7b76579ab026ffae98a62dd6e05614b009c093ad0bb1eda0be07cb694b9199b37945315712865edd376f6c0e2273e2854", 0x41, 0x4000000}, 0x20000000) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r8}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x32}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r9}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 114.179088ms ago: executing program 3 (id=3957): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r3, &(0x7f0000000280)=ANY=[], 0xffdd) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000740)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000002c0)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)=@generic={&(0x7f0000000240)='./file0\x00', r6}, 0x18) 86.325568ms ago: executing program 1 (id=3958): sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x31) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf}, 0x94) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000005c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0xff, '\x00', 0x0, r2, 0x0, 0x4}, 0x50) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r7, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) (async) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x59, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x18) 0s ago: executing program 0 (id=3959): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x2}, 0xc27a, 0x200000000000000, 0x7, 0x5, 0x1, 0x200000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r3, &(0x7f0000000780)}, 0x20) kernel console output (not intermixed with test programs): 2] ? load_elf_binary+0x2890/0x2890 [ 86.655591][ T1542] ? kvmalloc_node+0x88/0x130 [ 86.660304][ T1542] ? _raw_spin_unlock+0x4d/0x70 [ 86.665198][ T1542] ? __kasan_check_write+0x14/0x20 [ 86.670343][ T1542] ? put_files_struct+0x23b/0x330 [ 86.675399][ T1542] do_coredump+0x1ac9/0x27f0 [ 86.680209][ T1542] ? simple_acl_create+0x1c0/0x1c0 [ 86.685429][ T1542] ? bpf_trace_run2+0xb8/0x200 [ 86.690220][ T1542] ? get_signal+0xb98/0x12e0 [ 86.694956][ T1542] ? ____kasan_slab_free+0x130/0x160 [ 86.700261][ T1542] ? kmem_cache_free+0x2ac/0x2d0 [ 86.705225][ T1542] get_signal+0xf23/0x12e0 [ 86.709669][ T1542] arch_do_signal_or_restart+0xbf/0x10f0 [ 86.715327][ T1542] ? __send_signal+0x8b8/0xb80 [ 86.720253][ T1542] ? send_signal+0x479/0x5b0 [ 86.724865][ T1542] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 86.730520][ T1542] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 86.736364][ T1542] ? force_sig+0xb5/0x100 [ 86.740722][ T1542] ? send_sig+0x70/0x70 [ 86.744950][ T1542] exit_to_user_mode_loop+0xa2/0xe0 [ 86.750343][ T1542] irqentry_exit_to_user_mode+0x4e/0x80 [ 86.756129][ T1542] irqentry_exit+0x12/0x60 [ 86.760578][ T1542] exc_general_protection+0x1ca/0x250 [ 86.766060][ T1542] ? asm_exc_general_protection+0x8/0x30 [ 86.771718][ T1542] asm_exc_general_protection+0x1e/0x30 [ 86.777349][ T1542] RIP: 0033:0x7f5ec79da931 [ 86.781780][ T1542] Code: 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 86.801634][ T1542] RSP: 002b:0000200000000160 EFLAGS: 00010217 [ 86.807993][ T1542] RAX: 0000000000000000 RBX: 00007f5ec7c01fa0 RCX: 00007f5ec79da929 [ 86.815972][ T1542] RDX: 0000200000000040 RSI: 0000200000000160 RDI: 0000000000000400 [ 86.824032][ T1542] RBP: 00007f5ec7a5cb39 R08: 00002000000001c0 R09: 00002000000001c0 [ 86.832275][ T1542] R10: 0000200000000180 R11: 0000000000000206 R12: 0000000000000000 [ 86.840437][ T1542] R13: 0000000000000000 R14: 00007f5ec7c01fa0 R15: 00007fff74135868 [ 86.877324][ T1542] memory: usage 303700kB, limit 307200kB, failcnt 29400 [ 86.884296][ T1542] memory+swap: usage 393120kB, limit 9007199254740988kB, failcnt 0 [ 87.114227][ T1542] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 87.167685][ T1542] Memory cgroup stats for /syz4: [ 87.167804][ T1542] anon 270336 [ 87.167804][ T1542] file 302911488 [ 87.167804][ T1542] kernel_stack 0 [ 87.167804][ T1542] percpu 0 [ 87.167804][ T1542] sock 0 [ 87.167804][ T1542] shmem 301289472 [ 87.167804][ T1542] file_mapped 1486848 [ 87.167804][ T1542] file_dirty 0 [ 87.167804][ T1542] file_writeback 7974912 [ 87.167804][ T1542] anon_thp 0 [ 87.167804][ T1542] inactive_anon 301101056 [ 87.167804][ T1542] active_anon 8515584 [ 87.167804][ T1542] inactive_file 36864 [ 87.167804][ T1542] active_file 1429504 [ 87.167804][ T1542] unevictable 0 [ 87.167804][ T1542] slab_reclaimable 0 [ 87.167804][ T1542] slab_unreclaimable 0 [ 87.167804][ T1542] slab 0 [ 87.167804][ T1542] workingset_refault_anon 66 [ 87.167804][ T1542] workingset_refault_file 3696 [ 87.167804][ T1542] workingset_activate_anon 0 [ 87.167804][ T1542] workingset_activate_file 3630 [ 87.167804][ T1542] workingset_restore_anon 0 [ 87.167804][ T1542] workingset_restore_file 3564 [ 87.401464][ T1542] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0,oom_memcg=/syz4,task_memcg=/syz4,task=syz.4.345,pid=1544,uid=0 [ 87.416928][ T1542] Memory cgroup out of memory: OOM victim 1544 (syz.4.345) is already exiting. Skip killing the task [ 90.854740][ T2222] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 90.881761][ T2222] pim6reg0: linktype set to 769 [ 91.056966][ T24] audit: type=1400 audit(1750816482.230:143): avc: denied { append } for pid=2227 comm="syz.3.538" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 92.015706][ T2284] device pim6reg1 entered promiscuous mode [ 92.605255][ T2330] FAULT_INJECTION: forcing a failure. [ 92.605255][ T2330] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 92.904576][ T2330] CPU: 1 PID: 2330 Comm: syz.0.565 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 92.915817][ T2330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 92.926154][ T2330] Call Trace: [ 92.929470][ T2330] __dump_stack+0x21/0x24 [ 92.933936][ T2330] dump_stack_lvl+0x169/0x1d8 [ 92.938642][ T2330] ? thaw_kernel_threads+0x220/0x220 [ 92.943929][ T2330] ? vsnprintf+0x1871/0x1960 [ 92.948519][ T2330] ? show_regs_print_info+0x18/0x18 [ 92.953791][ T2330] dump_stack+0x15/0x1c [ 92.957944][ T2330] should_fail+0x3c1/0x510 [ 92.962354][ T2330] should_fail_usercopy+0x1a/0x20 [ 92.967394][ T2330] _copy_to_user+0x20/0x90 [ 92.971826][ T2330] simple_read_from_buffer+0xe9/0x160 [ 92.977206][ T2330] proc_fail_nth_read+0x19a/0x210 [ 92.982343][ T2330] ? proc_fault_inject_write+0x2f0/0x2f0 [ 92.988375][ T2330] ? rw_verify_area+0x1c0/0x360 [ 92.993236][ T2330] ? proc_fault_inject_write+0x2f0/0x2f0 [ 92.998891][ T2330] vfs_read+0x1fe/0xa10 [ 93.003064][ T2330] ? kernel_read+0x70/0x70 [ 93.007486][ T2330] ? __kasan_check_write+0x14/0x20 [ 93.012599][ T2330] ? mutex_lock+0x8c/0xe0 [ 93.016922][ T2330] ? mutex_trylock+0xa0/0xa0 [ 93.021508][ T2330] ? __fget_files+0x2c4/0x320 [ 93.026192][ T2330] ? __fdget_pos+0x2d2/0x380 [ 93.030779][ T2330] ? ksys_read+0x71/0x240 [ 93.035105][ T2330] ksys_read+0x140/0x240 [ 93.039392][ T2330] ? vfs_write+0xd60/0xd60 [ 93.043832][ T2330] ? ____fput+0x15/0x20 [ 93.047998][ T2330] __x64_sys_read+0x7b/0x90 [ 93.053288][ T2330] do_syscall_64+0x31/0x40 [ 93.057886][ T2330] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 93.063790][ T2330] RIP: 0033:0x7f07bc4af33c [ 93.068225][ T2330] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 93.087843][ T2330] RSP: 002b:00007f07baaf8030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 93.096292][ T2330] RAX: ffffffffffffffda RBX: 00007f07bc6d8080 RCX: 00007f07bc4af33c [ 93.104268][ T2330] RDX: 000000000000000f RSI: 00007f07baaf80a0 RDI: 0000000000000006 [ 93.112243][ T2330] RBP: 00007f07baaf8090 R08: 0000000000000000 R09: 0000000000000000 [ 93.120360][ T2330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.128339][ T2330] R13: 0000000000000000 R14: 00007f07bc6d8080 R15: 00007ffe9660f608 [ 93.467707][ T24] audit: type=1400 audit(1750816484.650:144): avc: denied { create } for pid=2358 comm="syz.1.574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 95.257628][ T2444] device syzkaller0 entered promiscuous mode [ 95.541792][ T2467] device pim6reg1 entered promiscuous mode [ 95.939612][ T24] audit: type=1400 audit(1750816487.120:145): avc: denied { create } for pid=2494 comm="syz.1.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 96.532576][ T2509] Q±6ã×\b‹¡Y­4: renamed from lo [ 98.283736][ T24] audit: type=1400 audit(1750816489.240:146): avc: denied { setattr } for pid=2558 comm="syz.1.618" path="pipe:[14572]" dev="pipefs" ino=14572 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 98.378324][ T24] audit: type=1400 audit(1750816489.560:147): avc: denied { create } for pid=2560 comm="syz.2.619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 98.453336][ T24] audit: type=1400 audit(1750816489.600:148): avc: denied { create } for pid=2569 comm="syz.4.622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 98.513050][ T2561] device syzkaller0 entered promiscuous mode [ 98.750744][ T2594] device veth0_vlan left promiscuous mode [ 98.854012][ T2594] device veth0_vlan entered promiscuous mode [ 98.893582][ T24] audit: type=1400 audit(1750816490.070:149): avc: denied { create } for pid=2596 comm="syz.3.628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 101.724122][ T2729] device pim6reg1 entered promiscuous mode [ 101.806703][ T2735] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 101.903764][ T2737] syz.3.668[2737] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.903818][ T2737] syz.3.668[2737] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.918975][ T2738] syz.3.668[2738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.930973][ T2738] syz.3.668[2738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.147923][ T2841] device syzkaller0 entered promiscuous mode [ 105.368865][ T24] audit: type=1400 audit(1750816496.510:150): avc: denied { create } for pid=2843 comm="syz.1.693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 105.393498][ T2841] device syzkaller0 left promiscuous mode [ 106.167734][ T2872] device syzkaller0 entered promiscuous mode [ 108.880370][ T2939] device sit0 left promiscuous mode [ 110.440876][ T2970] device syzkaller0 entered promiscuous mode [ 110.482459][ T2970] ªªªªªª: renamed from vlan0 [ 110.606463][ T2965] device veth0_vlan left promiscuous mode [ 110.619481][ T2965] device veth0_vlan entered promiscuous mode [ 110.650920][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 110.660075][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 110.669964][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 110.950683][ T2995] ÿÿÿÿÿÿ: renamed from vlan1 [ 111.746905][ T3018] device veth0_vlan left promiscuous mode [ 111.773046][ T3018] device veth0_vlan entered promiscuous mode [ 111.861168][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 111.880727][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 111.967516][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.658167][ T3165] device lo entered promiscuous mode [ 117.736914][ T3252] Â: renamed from pim6reg1 [ 117.894992][ T3263] device sit0 entered promiscuous mode [ 118.068090][ T3281] syz.4.825[3281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.068148][ T3281] syz.4.825[3281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.289333][ T3288] device syzkaller0 entered promiscuous mode [ 118.594952][ T3300] syz.2.830[3300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.595018][ T3300] syz.2.830[3300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.637841][ T3300] syz.2.830[3300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.686398][ T3300] syz.2.830[3300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.155237][ T3308] device syzkaller0 entered promiscuous mode [ 119.430258][ T24] audit: type=1400 audit(1750816510.610:151): avc: denied { create } for pid=3336 comm="syz.3.841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 119.750677][ T3338] device syzkaller0 entered promiscuous mode [ 119.920853][ T3357] device syzkaller0 entered promiscuous mode [ 119.927915][ T3353] device sit0 entered promiscuous mode [ 120.164044][ T24] audit: type=1400 audit(1750816511.340:152): avc: denied { attach_queue } for pid=3370 comm="syz.2.851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 120.494789][ T3394] device sit0 entered promiscuous mode [ 121.021409][ T3416] device syzkaller0 entered promiscuous mode [ 121.084366][ T3422] device sit0 entered promiscuous mode [ 121.206727][ T24] audit: type=1400 audit(1750816512.380:153): avc: denied { create } for pid=3430 comm="syz.4.866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 121.420109][ T24] audit: type=1400 audit(1750816512.600:154): avc: denied { create } for pid=3437 comm="syz.1.867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 122.456784][ T3474] device syzkaller0 entered promiscuous mode [ 123.010286][ T24] audit: type=1400 audit(1750816514.190:155): avc: denied { create } for pid=3505 comm="syz.2.888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 123.239191][ T3530] device veth0_vlan left promiscuous mode [ 123.305225][ T3530] device veth0_vlan entered promiscuous mode [ 123.942507][ T3567] device syzkaller0 entered promiscuous mode [ 124.754261][ T3601] device syzkaller0 entered promiscuous mode [ 125.104894][ T3632] device sit0 left promiscuous mode [ 125.224064][ T3641] syz.0.927[3641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.224125][ T3641] syz.0.927[3641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.250762][ T3632] device sit0 entered promiscuous mode [ 125.474662][ T3643] device veth0_vlan left promiscuous mode [ 125.547630][ T3643] device veth0_vlan entered promiscuous mode [ 125.663560][ T3652] device syzkaller0 entered promiscuous mode [ 126.685765][ T3707] device syzkaller0 entered promiscuous mode [ 127.808648][ T3757] device syzkaller0 entered promiscuous mode [ 129.249134][ T3801] device pim6reg1 entered promiscuous mode [ 130.174708][ T3835] FAULT_INJECTION: forcing a failure. [ 130.174708][ T3835] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 130.267030][ T3835] CPU: 1 PID: 3835 Comm: syz.0.985 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 130.278265][ T3835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 130.288325][ T3835] Call Trace: [ 130.291622][ T3835] __dump_stack+0x21/0x24 [ 130.295948][ T3835] dump_stack_lvl+0x169/0x1d8 [ 130.300624][ T3835] ? thaw_kernel_threads+0x220/0x220 [ 130.305913][ T3835] ? show_regs_print_info+0x18/0x18 [ 130.311107][ T3835] dump_stack+0x15/0x1c [ 130.315260][ T3835] should_fail+0x3c1/0x510 [ 130.319678][ T3835] should_fail_usercopy+0x1a/0x20 [ 130.324711][ T3835] strncpy_from_user+0x24/0x2e0 [ 130.329558][ T3835] ? kmem_cache_alloc+0x165/0x2e0 [ 130.334579][ T3835] ? getname_flags+0xb9/0x500 [ 130.339266][ T3835] getname_flags+0xf4/0x500 [ 130.343786][ T3835] do_mkdirat+0x4b/0x340 [ 130.348034][ T3835] __x64_sys_mkdirat+0x7b/0x90 [ 130.352803][ T3835] do_syscall_64+0x31/0x40 [ 130.357220][ T3835] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 130.363108][ T3835] RIP: 0033:0x7f07bc4b0929 [ 130.367532][ T3835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 130.387411][ T3835] RSP: 002b:00007f07bab19038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 130.395829][ T3835] RAX: ffffffffffffffda RBX: 00007f07bc6d7fa0 RCX: 00007f07bc4b0929 [ 130.403800][ T3835] RDX: 00000000000001ff RSI: 00002000000001c0 RDI: ffffffffffffffff [ 130.411773][ T3835] RBP: 00007f07bab19090 R08: 0000000000000000 R09: 0000000000000000 [ 130.419774][ T3835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 130.427755][ T3835] R13: 0000000000000000 R14: 00007f07bc6d7fa0 R15: 00007ffe9660f608 [ 130.908006][ T3876] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 131.091142][ T3893] Â: renamed from pim6reg1 [ 131.114866][ T3888] FAULT_INJECTION: forcing a failure. [ 131.114866][ T3888] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 131.128349][ T3888] CPU: 0 PID: 3888 Comm: syz.0.1000 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 131.140132][ T3888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 131.150319][ T3888] Call Trace: [ 131.153634][ T3888] __dump_stack+0x21/0x24 [ 131.157994][ T3888] dump_stack_lvl+0x169/0x1d8 [ 131.162677][ T3888] ? thaw_kernel_threads+0x220/0x220 [ 131.167967][ T3888] ? vsnprintf+0x1871/0x1960 [ 131.172570][ T3888] ? show_regs_print_info+0x18/0x18 [ 131.177792][ T3888] dump_stack+0x15/0x1c [ 131.181951][ T3888] should_fail+0x3c1/0x510 [ 131.186392][ T3888] should_fail_usercopy+0x1a/0x20 [ 131.191438][ T3888] _copy_to_user+0x20/0x90 [ 131.195872][ T3888] simple_read_from_buffer+0xe9/0x160 [ 131.201273][ T3888] proc_fail_nth_read+0x19a/0x210 [ 131.206395][ T3888] ? proc_fault_inject_write+0x2f0/0x2f0 [ 131.212124][ T3888] ? rw_verify_area+0x1c0/0x360 [ 131.217079][ T3888] ? proc_fault_inject_write+0x2f0/0x2f0 [ 131.222839][ T3888] vfs_read+0x1fe/0xa10 [ 131.227011][ T3888] ? kernel_read+0x70/0x70 [ 131.231450][ T3888] ? __kasan_check_write+0x14/0x20 [ 131.236577][ T3888] ? mutex_lock+0x8c/0xe0 [ 131.240921][ T3888] ? mutex_trylock+0xa0/0xa0 [ 131.245525][ T3888] ? __fget_files+0x2c4/0x320 [ 131.250390][ T3888] ? __fdget_pos+0x2d2/0x380 [ 131.255253][ T3888] ? ksys_read+0x71/0x240 [ 131.259607][ T3888] ksys_read+0x140/0x240 [ 131.263977][ T3888] ? vfs_write+0xd60/0xd60 [ 131.268419][ T3888] __x64_sys_read+0x7b/0x90 [ 131.272935][ T3888] do_syscall_64+0x31/0x40 [ 131.277359][ T3888] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 131.283267][ T3888] RIP: 0033:0x7f07bc4af33c [ 131.287699][ T3888] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 131.307404][ T3888] RSP: 002b:00007f07bab19030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 131.315920][ T3888] RAX: ffffffffffffffda RBX: 00007f07bc6d7fa0 RCX: 00007f07bc4af33c [ 131.323908][ T3888] RDX: 000000000000000f RSI: 00007f07bab190a0 RDI: 0000000000000007 [ 131.331896][ T3888] RBP: 00007f07bab19090 R08: 0000000000000000 R09: 0000000000000000 [ 131.339978][ T3888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 131.348094][ T3888] R13: 0000000000000000 R14: 00007f07bc6d7fa0 R15: 00007ffe9660f608 [ 132.791680][ T4007] device veth0_vlan left promiscuous mode [ 132.797961][ T4007] device veth0_vlan entered promiscuous mode [ 132.805257][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.816628][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 132.824843][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 136.272470][ T4083] device syzkaller0 entered promiscuous mode [ 139.496435][ T4127] cgroup: fork rejected by pids controller in /syz2 [ 140.665665][ T4150] device pim6reg1 entered promiscuous mode [ 140.992333][ T4158] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.052730][ T4158] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.093631][ T4158] device bridge_slave_0 entered promiscuous mode [ 141.155183][ T4158] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.203005][ T4158] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.249919][ T4158] device bridge_slave_1 entered promiscuous mode [ 141.521720][ T4188] device veth0_vlan left promiscuous mode [ 141.527835][ T4188] device veth0_vlan entered promiscuous mode [ 141.534974][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.543415][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.551165][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 141.624769][ T24] audit: type=1400 audit(1750816532.800:156): avc: denied { write } for pid=4158 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 141.677834][ T24] audit: type=1400 audit(1750816532.800:157): avc: denied { read } for pid=4158 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 141.699371][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 141.706985][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 141.753309][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 141.769410][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 141.778367][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.785439][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.793037][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 141.806094][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 141.814813][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.822085][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.830140][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 141.839080][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 141.847419][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 141.959442][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 141.993976][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 142.029879][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 142.084917][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 142.148238][ T4158] device veth0_vlan entered promiscuous mode [ 142.230426][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 142.256413][ T4158] device veth1_macvtap entered promiscuous mode [ 142.301106][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 142.317291][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 142.381158][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 142.423690][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 142.531637][ T49] device veth1 left promiscuous mode [ 142.538288][ T49] bridge0: port 3(veth1) entered disabled state [ 142.602426][ T49] device bridge_slave_1 left promiscuous mode [ 142.637274][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.691492][ T49] device bridge_slave_0 left promiscuous mode [ 142.729777][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.758696][ T49] device veth1_macvtap left promiscuous mode [ 143.278933][ T4239] device syzkaller0 entered promiscuous mode [ 143.298220][ T4235] device pim6reg1 entered promiscuous mode [ 143.649399][ T4259] device pim6reg1 entered promiscuous mode [ 144.044120][ T4296] device macsec0 entered promiscuous mode [ 144.516789][ T4319] device pim6reg1 entered promiscuous mode [ 144.650193][ T4334] device veth0_vlan left promiscuous mode [ 144.700187][ T4334] device veth0_vlan entered promiscuous mode [ 144.756090][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 144.779810][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 144.808709][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 145.340886][ T4352] device syzkaller0 entered promiscuous mode [ 145.367933][ T4358] device wg2 entered promiscuous mode [ 148.006679][ T4432] device pim6reg1 entered promiscuous mode [ 148.086019][ T4438] device sit0 entered promiscuous mode [ 150.347623][ T4578] device pim6reg1 entered promiscuous mode [ 150.695023][ T4579] device syzkaller0 entered promiscuous mode [ 150.891847][ T4584] device syzkaller0 entered promiscuous mode [ 151.324465][ T4607] GPL: port 1(erspan0) entered blocking state [ 151.332386][ T4607] GPL: port 1(erspan0) entered disabled state [ 151.357722][ T4607] device erspan0 entered promiscuous mode [ 151.371390][ T4610] GPL: port 1(erspan0) entered blocking state [ 151.377561][ T4610] GPL: port 1(erspan0) entered forwarding state [ 152.037147][ T4637] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 152.079576][ T4637] pim6reg0: linktype set to 769 [ 152.452204][ T4648] device pim6reg1 entered promiscuous mode [ 153.023969][ T4681] syz.0.1231[4681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.024028][ T4681] syz.0.1231[4681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.925295][ T4701] device veth0_vlan left promiscuous mode [ 154.021874][ T4701] device veth0_vlan entered promiscuous mode [ 154.098396][ T4711] device syzkaller0 entered promiscuous mode [ 154.269878][ T4715] device syzkaller0 entered promiscuous mode [ 154.580165][ T4750] device syzkaller0 entered promiscuous mode [ 154.610166][ T4755] device syzkaller0 entered promiscuous mode [ 154.992538][ T4779] device veth0_vlan left promiscuous mode [ 155.008745][ T4779] device veth0_vlan entered promiscuous mode [ 155.052100][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.061292][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.075010][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.419056][ T4798] device syzkaller0 entered promiscuous mode [ 155.563486][ T4804] syz.1.1268[4804] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.563554][ T4804] syz.1.1268[4804] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.871609][ T24] audit: type=1400 audit(1750816547.050:158): avc: denied { create } for pid=4819 comm="syz.2.1273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 156.190925][ T4841] device syzkaller0 entered promiscuous mode [ 157.080886][ T4892] device syzkaller0 entered promiscuous mode [ 157.459212][ T4925] device sit0 left promiscuous mode [ 157.531325][ T4925] device sit0 entered promiscuous mode [ 157.579033][ T4936] device syzkaller0 entered promiscuous mode [ 157.598633][ T4938] device wg2 entered promiscuous mode [ 158.182659][ T4992] device syzkaller0 entered promiscuous mode [ 158.190008][ T4995] device sit0 left promiscuous mode [ 158.233355][ T5000] device sit0 entered promiscuous mode [ 158.269245][ T5003] device syzkaller0 entered promiscuous mode [ 158.924383][ T5012] device syzkaller0 entered promiscuous mode [ 159.141725][ T5037] IPv6: wlan1: Disabled Multicast RS [ 159.194036][ T5040] device sit0 left promiscuous mode [ 159.218821][ T5040] device sit0 entered promiscuous mode [ 159.526202][ T5049] device syzkaller0 entered promiscuous mode [ 160.661706][ T5088] device syzkaller0 entered promiscuous mode [ 160.987925][ T5117] device wg2 left promiscuous mode [ 161.018236][ T5117] device pim6reg1 entered promiscuous mode [ 161.045516][ T5123] device wg2 left promiscuous mode [ 161.072010][ T5123] device wg2 entered promiscuous mode [ 161.746844][ T5150] device syzkaller0 entered promiscuous mode [ 162.068704][ T5166] device sit0 left promiscuous mode [ 162.125488][ T5172] device sit0 entered promiscuous mode [ 163.325050][ T5236] device pim6reg1 entered promiscuous mode [ 164.997768][ T5295] device syzkaller0 entered promiscuous mode [ 165.011925][ T5294] device sit0 left promiscuous mode [ 165.125806][ T5303] device syzkaller0 entered promiscuous mode [ 165.387302][ T5308] device syzkaller0 entered promiscuous mode [ 169.809610][ T5435] device pim6reg1 entered promiscuous mode [ 170.781411][ T5465] device veth1_macvtap left promiscuous mode [ 171.315209][ T5505] device wg2 left promiscuous mode [ 171.383695][ T5511] device wg2 entered promiscuous mode [ 171.543228][ T5521] device syzkaller0 entered promiscuous mode [ 173.251343][ T9] bridge0: port 3(veth0) entered disabled state [ 173.287422][ T5601] device sit0 left promiscuous mode [ 173.659080][ T5650] device bridge_slave_0 entered promiscuous mode [ 173.938019][ T5660] device wg2 entered promiscuous mode [ 174.666023][ T5707] device sit0 entered promiscuous mode [ 175.660355][ T5756] device syzkaller0 entered promiscuous mode [ 176.913850][ T5814] FAULT_INJECTION: forcing a failure. [ 176.913850][ T5814] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 176.933957][ T5814] CPU: 0 PID: 5814 Comm: syz.3.1558 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 176.945420][ T5814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 176.955486][ T5814] Call Trace: [ 176.958789][ T5814] __dump_stack+0x21/0x24 [ 176.963134][ T5814] dump_stack_lvl+0x169/0x1d8 [ 176.967843][ T5814] ? show_regs_print_info+0x18/0x18 [ 176.973049][ T5814] ? vfs_write+0xac8/0xd60 [ 176.977693][ T5814] dump_stack+0x15/0x1c [ 176.981949][ T5814] should_fail+0x3c1/0x510 [ 176.986710][ T5814] should_fail_usercopy+0x1a/0x20 [ 176.991838][ T5814] _copy_from_user+0x20/0xd0 [ 176.996533][ T5814] __se_sys_bpf+0x181/0x680 [ 177.001043][ T5814] ? __x64_sys_bpf+0x90/0x90 [ 177.005821][ T5814] ? fpu__clear_all+0x20/0x20 [ 177.010854][ T5814] __x64_sys_bpf+0x7b/0x90 [ 177.015331][ T5814] do_syscall_64+0x31/0x40 [ 177.019851][ T5814] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 177.025747][ T5814] RIP: 0033:0x7f1e34388929 [ 177.030173][ T5814] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 177.049876][ T5814] RSP: 002b:00007f1e329f1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 177.058332][ T5814] RAX: ffffffffffffffda RBX: 00007f1e345affa0 RCX: 00007f1e34388929 [ 177.066342][ T5814] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000012 [ 177.074345][ T5814] RBP: 00007f1e329f1090 R08: 0000000000000000 R09: 0000000000000000 [ 177.082336][ T5814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 177.090444][ T5814] R13: 0000000000000000 R14: 00007f1e345affa0 R15: 00007ffcf85a78c8 [ 177.133765][ T5816] device pim6reg1 entered promiscuous mode [ 179.182319][ T5872] device pim6reg1 entered promiscuous mode [ 179.393818][ T5887] device sit0 entered promiscuous mode [ 179.436085][ T5888] device sit0 left promiscuous mode [ 179.488647][ T5889] device sit0 entered promiscuous mode [ 180.028444][ T5909] device wg2 entered promiscuous mode [ 180.412666][ T5947] device batadv_slave_0 entered promiscuous mode [ 180.453545][ T5954] device pim6reg1 entered promiscuous mode [ 181.029280][ T5977] device sit0 left promiscuous mode [ 181.081362][ T5977] device sit0 entered promiscuous mode [ 181.241439][ T5993] device syzkaller0 entered promiscuous mode [ 181.692877][ T24] audit: type=1400 audit(1750816572.870:159): avc: denied { create } for pid=6020 comm="syz.3.1617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 183.100683][ T6103] device wg2 left promiscuous mode [ 183.205314][ T6105] device wg2 entered promiscuous mode [ 183.295053][ T6103] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.303591][ T6103] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.342457][ T6106] device bridge_slave_1 left promiscuous mode [ 183.349885][ T6106] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.357446][ T6106] device bridge_slave_0 left promiscuous mode [ 183.363555][ T6106] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.699224][ T6133] device wg2 left promiscuous mode [ 183.758472][ T6133] device wg2 entered promiscuous mode [ 183.869172][ T6139] ÿ: renamed from bond_slave_0 [ 183.974838][ T6146] device syzkaller0 entered promiscuous mode [ 185.057914][ T6180] device syzkaller0 entered promiscuous mode [ 185.230811][ T6208] device pim6reg1 entered promiscuous mode [ 185.528350][ T6219] device pim6reg1 entered promiscuous mode [ 185.645834][ T6230] device syzkaller0 entered promiscuous mode [ 185.955585][ T6261] device syzkaller0 entered promiscuous mode [ 185.967846][ T6263] FAULT_INJECTION: forcing a failure. [ 185.967846][ T6263] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 186.139606][ T6263] CPU: 1 PID: 6263 Comm: syz.4.1688 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 186.151039][ T6263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 186.161188][ T6263] Call Trace: [ 186.164499][ T6263] __dump_stack+0x21/0x24 [ 186.168866][ T6263] dump_stack_lvl+0x169/0x1d8 [ 186.173547][ T6263] ? thaw_kernel_threads+0x220/0x220 [ 186.178845][ T6263] ? show_regs_print_info+0x18/0x18 [ 186.184046][ T6263] ? memcpy+0x56/0x70 [ 186.188120][ T6263] dump_stack+0x15/0x1c [ 186.192273][ T6263] should_fail+0x3c1/0x510 [ 186.197556][ T6263] should_fail_usercopy+0x1a/0x20 [ 186.202578][ T6263] _copy_to_user+0x20/0x90 [ 186.206994][ T6263] bpf_verifier_vlog+0x1b4/0x330 [ 186.211928][ T6263] __btf_verifier_log+0xd1/0x120 [ 186.216859][ T6263] ? btf_check_sec_info+0x330/0x330 [ 186.222050][ T6263] ? memcpy+0x56/0x70 [ 186.226030][ T6263] btf_parse_hdr+0x3df/0x7b0 [ 186.230625][ T6263] btf_new_fd+0x4af/0xa00 [ 186.234951][ T6263] bpf_btf_load+0x5e/0x70 [ 186.239363][ T6263] __se_sys_bpf+0x48a/0x680 [ 186.243893][ T6263] ? __x64_sys_bpf+0x90/0x90 [ 186.248498][ T6263] ? fpu__clear_all+0x20/0x20 [ 186.253259][ T6263] __x64_sys_bpf+0x7b/0x90 [ 186.257680][ T6263] do_syscall_64+0x31/0x40 [ 186.262093][ T6263] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 186.268314][ T6263] RIP: 0033:0x7f5ec79da929 [ 186.272730][ T6263] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 186.292348][ T6263] RSP: 002b:00007f5ec6043038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 186.300758][ T6263] RAX: ffffffffffffffda RBX: 00007f5ec7c01fa0 RCX: 00007f5ec79da929 [ 186.308725][ T6263] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000012 [ 186.316700][ T6263] RBP: 00007f5ec6043090 R08: 0000000000000000 R09: 0000000000000000 [ 186.324661][ T6263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 186.332634][ T6263] R13: 0000000000000000 R14: 00007f5ec7c01fa0 R15: 00007fff74135868 [ 186.355491][ T6270] device syzkaller0 entered promiscuous mode [ 187.157185][ T6319] FAULT_INJECTION: forcing a failure. [ 187.157185][ T6319] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 187.176044][ T6319] CPU: 1 PID: 6319 Comm: syz.1.1706 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 187.187420][ T6319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 187.197582][ T6319] Call Trace: [ 187.200910][ T6319] __dump_stack+0x21/0x24 [ 187.205364][ T6319] dump_stack_lvl+0x169/0x1d8 [ 187.210066][ T6319] ? thaw_kernel_threads+0x220/0x220 [ 187.215375][ T6319] ? show_regs_print_info+0x18/0x18 [ 187.220776][ T6319] ? memcpy+0x56/0x70 [ 187.224781][ T6319] dump_stack+0x15/0x1c [ 187.228967][ T6319] should_fail+0x3c1/0x510 [ 187.233430][ T6319] should_fail_usercopy+0x1a/0x20 [ 187.238657][ T6319] _copy_to_user+0x20/0x90 [ 187.243172][ T6319] bpf_verifier_vlog+0x1b4/0x330 [ 187.248112][ T6319] __btf_verifier_log+0xd1/0x120 [ 187.253156][ T6319] ? btf_check_sec_info+0x330/0x330 [ 187.258365][ T6319] ? memcpy+0x56/0x70 [ 187.262437][ T6319] btf_parse_hdr+0x40a/0x7b0 [ 187.267035][ T6319] btf_new_fd+0x4af/0xa00 [ 187.271483][ T6319] bpf_btf_load+0x5e/0x70 [ 187.275820][ T6319] __se_sys_bpf+0x48a/0x680 [ 187.280329][ T6319] ? __x64_sys_bpf+0x90/0x90 [ 187.285193][ T6319] ? fpu__clear_all+0x20/0x20 [ 187.289883][ T6319] __x64_sys_bpf+0x7b/0x90 [ 187.294314][ T6319] do_syscall_64+0x31/0x40 [ 187.298733][ T6319] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 187.304632][ T6319] RIP: 0033:0x7fa282d5a929 [ 187.309057][ T6319] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 187.328676][ T6319] RSP: 002b:00007fa2813c3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 187.337206][ T6319] RAX: ffffffffffffffda RBX: 00007fa282f81fa0 RCX: 00007fa282d5a929 [ 187.345505][ T6319] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000012 [ 187.353498][ T6319] RBP: 00007fa2813c3090 R08: 0000000000000000 R09: 0000000000000000 [ 187.361483][ T6319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 187.370003][ T6319] R13: 0000000000000000 R14: 00007fa282f81fa0 R15: 00007fff9399c3b8 [ 188.997887][ T6359] FAULT_INJECTION: forcing a failure. [ 188.997887][ T6359] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 189.074262][ T6359] CPU: 0 PID: 6359 Comm: syz.2.1718 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 189.085623][ T6359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 189.095689][ T6359] Call Trace: [ 189.098989][ T6359] __dump_stack+0x21/0x24 [ 189.103339][ T6359] dump_stack_lvl+0x169/0x1d8 [ 189.108023][ T6359] ? thaw_kernel_threads+0x220/0x220 [ 189.113346][ T6359] ? show_regs_print_info+0x18/0x18 [ 189.119168][ T6359] ? memcpy+0x56/0x70 [ 189.123348][ T6359] dump_stack+0x15/0x1c [ 189.127620][ T6359] should_fail+0x3c1/0x510 [ 189.132047][ T6359] should_fail_usercopy+0x1a/0x20 [ 189.137174][ T6359] _copy_to_user+0x20/0x90 [ 189.141694][ T6359] bpf_verifier_vlog+0x1b4/0x330 [ 189.146646][ T6359] __btf_verifier_log+0xd1/0x120 [ 189.151594][ T6359] ? btf_check_sec_info+0x330/0x330 [ 189.156797][ T6359] ? memcpy+0x56/0x70 [ 189.160779][ T6359] btf_parse_hdr+0x435/0x7b0 [ 189.165417][ T6359] btf_new_fd+0x4af/0xa00 [ 189.169755][ T6359] bpf_btf_load+0x5e/0x70 [ 189.174140][ T6359] __se_sys_bpf+0x48a/0x680 [ 189.178671][ T6359] ? __x64_sys_bpf+0x90/0x90 [ 189.183313][ T6359] ? fpu__clear_all+0x20/0x20 [ 189.188008][ T6359] __x64_sys_bpf+0x7b/0x90 [ 189.192489][ T6359] do_syscall_64+0x31/0x40 [ 189.196933][ T6359] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 189.202946][ T6359] RIP: 0033:0x7f2ef1e0c929 [ 189.207390][ T6359] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 189.227618][ T6359] RSP: 002b:00007f2ef0475038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 189.236123][ T6359] RAX: ffffffffffffffda RBX: 00007f2ef2033fa0 RCX: 00007f2ef1e0c929 [ 189.244107][ T6359] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000012 [ 189.252096][ T6359] RBP: 00007f2ef0475090 R08: 0000000000000000 R09: 0000000000000000 [ 189.260075][ T6359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 189.268050][ T6359] R13: 0000000000000000 R14: 00007f2ef2033fa0 R15: 00007ffdcf329918 [ 189.357949][ T6370] device syzkaller0 entered promiscuous mode [ 189.845689][ T6405] device pim6reg1 entered promiscuous mode [ 190.489011][ T6438] device wg2 left promiscuous mode [ 190.854412][ T6458] device veth0_vlan left promiscuous mode [ 190.870991][ T6458] device veth0_vlan entered promiscuous mode [ 190.923832][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 190.940590][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 190.971237][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 191.404034][ T6467] FAULT_INJECTION: forcing a failure. [ 191.404034][ T6467] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 191.436938][ T6467] CPU: 0 PID: 6467 Comm: syz.0.1751 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 191.448254][ T6467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 191.458354][ T6467] Call Trace: [ 191.461664][ T6467] __dump_stack+0x21/0x24 [ 191.466012][ T6467] dump_stack_lvl+0x169/0x1d8 [ 191.470703][ T6467] ? thaw_kernel_threads+0x220/0x220 [ 191.476001][ T6467] ? show_regs_print_info+0x18/0x18 [ 191.481305][ T6467] ? memcpy+0x56/0x70 [ 191.485315][ T6467] dump_stack+0x15/0x1c [ 191.489528][ T6467] should_fail+0x3c1/0x510 [ 191.493963][ T6467] should_fail_usercopy+0x1a/0x20 [ 191.499001][ T6467] _copy_to_user+0x20/0x90 [ 191.503431][ T6467] bpf_verifier_vlog+0x1b4/0x330 [ 191.508465][ T6467] __btf_verifier_log+0xd1/0x120 [ 191.513408][ T6467] ? btf_check_sec_info+0x330/0x330 [ 191.518600][ T6467] ? memcpy+0x56/0x70 [ 191.522573][ T6467] btf_parse_hdr+0x48b/0x7b0 [ 191.527334][ T6467] btf_new_fd+0x4af/0xa00 [ 191.531653][ T6467] bpf_btf_load+0x5e/0x70 [ 191.535973][ T6467] __se_sys_bpf+0x48a/0x680 [ 191.540462][ T6467] ? __x64_sys_bpf+0x90/0x90 [ 191.545043][ T6467] ? fpu__clear_all+0x20/0x20 [ 191.549738][ T6467] __x64_sys_bpf+0x7b/0x90 [ 191.554147][ T6467] do_syscall_64+0x31/0x40 [ 191.558561][ T6467] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 191.564528][ T6467] RIP: 0033:0x7f07bc4b0929 [ 191.568936][ T6467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 191.588529][ T6467] RSP: 002b:00007f07bab19038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 191.596941][ T6467] RAX: ffffffffffffffda RBX: 00007f07bc6d7fa0 RCX: 00007f07bc4b0929 [ 191.604911][ T6467] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000012 [ 191.612874][ T6467] RBP: 00007f07bab19090 R08: 0000000000000000 R09: 0000000000000000 [ 191.621030][ T6467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 191.629094][ T6467] R13: 0000000000000000 R14: 00007f07bc6d7fa0 R15: 00007ffe9660f608 [ 191.703836][ T6468] device veth0_vlan left promiscuous mode [ 191.717434][ T6468] device veth0_vlan entered promiscuous mode [ 191.902076][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.912355][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.925388][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 194.360642][ T6526] device pim6reg1 entered promiscuous mode [ 195.905598][ T6585] device veth0_vlan left promiscuous mode [ 195.953450][ T6585] device veth0_vlan entered promiscuous mode [ 195.996756][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 196.019035][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 196.048962][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 196.095621][ T6588] device pim6reg1 entered promiscuous mode [ 197.729463][ T6653] device sit0 left promiscuous mode [ 198.132894][ T6657] device syzkaller0 entered promiscuous mode [ 198.154354][ T6658] device sit0 entered promiscuous mode [ 200.364685][ T6762] device sit0 left promiscuous mode [ 200.753144][ T6772] device sit0 entered promiscuous mode [ 200.927918][ T6775] FAULT_INJECTION: forcing a failure. [ 200.927918][ T6775] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 201.065078][ T6775] CPU: 1 PID: 6775 Comm: syz.3.1841 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 201.076408][ T6775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 201.086572][ T6775] Call Trace: [ 201.089887][ T6775] __dump_stack+0x21/0x24 [ 201.094223][ T6775] dump_stack_lvl+0x169/0x1d8 [ 201.098992][ T6775] ? thaw_kernel_threads+0x220/0x220 [ 201.104290][ T6775] ? show_regs_print_info+0x18/0x18 [ 201.109494][ T6775] ? string+0x292/0x2b0 [ 201.113757][ T6775] dump_stack+0x15/0x1c [ 201.117919][ T6775] should_fail+0x3c1/0x510 [ 201.122339][ T6775] should_fail_usercopy+0x1a/0x20 [ 201.127380][ T6775] _copy_to_user+0x20/0x90 [ 201.131889][ T6775] bpf_verifier_vlog+0x1b4/0x330 [ 201.136830][ T6775] __btf_verifier_log+0xd1/0x120 [ 201.141773][ T6775] ? bpf_btf_load+0x5e/0x70 [ 201.146294][ T6775] ? __se_sys_bpf+0x48a/0x680 [ 201.150979][ T6775] ? __x64_sys_bpf+0x7b/0x90 [ 201.155577][ T6775] ? do_syscall_64+0x31/0x40 [ 201.160170][ T6775] ? btf_check_sec_info+0x330/0x330 [ 201.165363][ T6775] __btf_verifier_log_type+0x387/0x610 [ 201.170903][ T6775] ? bpf_trace_run1+0x200/0x200 [ 201.175831][ T6775] ? kvfree+0x35/0x40 [ 201.180069][ T6775] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 201.186208][ T6775] ? btf_int_show+0x2bf0/0x2bf0 [ 201.191134][ T6775] ? kvfree+0x35/0x40 [ 201.195544][ T6775] ? __bpf_trace_kmem_free+0x6f/0x90 [ 201.200918][ T6775] ? kvfree+0x35/0x40 [ 201.204903][ T6775] btf_fwd_check_meta+0x34e/0x440 [ 201.209936][ T6775] btf_check_all_metas+0x230/0x820 [ 201.215036][ T6775] btf_parse_type_sec+0xea/0x15a0 [ 201.220056][ T6775] ? btf_check_sec_info+0x27a/0x330 [ 201.225339][ T6775] ? btf_check_sec_info+0x330/0x330 [ 201.230529][ T6775] ? btf_verifier_log+0x2a0/0x2a0 [ 201.235546][ T6775] ? memcpy+0x56/0x70 [ 201.239523][ T6775] ? btf_parse_hdr+0x5d6/0x7b0 [ 201.244274][ T6775] ? btf_parse_str_sec+0x1aa/0x260 [ 201.249385][ T6775] btf_new_fd+0x562/0xa00 [ 201.253722][ T6775] bpf_btf_load+0x5e/0x70 [ 201.258128][ T6775] __se_sys_bpf+0x48a/0x680 [ 201.262627][ T6775] ? __x64_sys_bpf+0x90/0x90 [ 201.267303][ T6775] ? fpu__clear_all+0x20/0x20 [ 201.272017][ T6775] __x64_sys_bpf+0x7b/0x90 [ 201.276427][ T6775] do_syscall_64+0x31/0x40 [ 201.280923][ T6775] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 201.286804][ T6775] RIP: 0033:0x7f1e34388929 [ 201.291298][ T6775] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 201.311077][ T6775] RSP: 002b:00007f1e329f1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 201.319480][ T6775] RAX: ffffffffffffffda RBX: 00007f1e345affa0 RCX: 00007f1e34388929 [ 201.327448][ T6775] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000012 [ 201.335580][ T6775] RBP: 00007f1e329f1090 R08: 0000000000000000 R09: 0000000000000000 [ 201.343540][ T6775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.351586][ T6775] R13: 0000000000000000 R14: 00007f1e345affa0 R15: 00007ffcf85a78c8 [ 204.016996][ T6899] tap0: tun_chr_ioctl cmd 1074025675 [ 204.073204][ T6899] tap0: persist enabled [ 204.103578][ T6902] tap0: tun_chr_ioctl cmd 1074025675 [ 204.189239][ T6902] tap0: persist enabled [ 206.032491][ T6934] device pim6reg1 entered promiscuous mode [ 206.467054][ T6947] device wg2 left promiscuous mode [ 206.532299][ T6951] device veth0_vlan left promiscuous mode [ 206.636240][ T6951] device veth0_vlan entered promiscuous mode [ 209.056023][ T7001] device wg2 entered promiscuous mode [ 209.533083][ T7023] device wg2 left promiscuous mode [ 209.608731][ T7029] device pim6reg1 entered promiscuous mode [ 210.372003][ T7063] tap0: tun_chr_ioctl cmd 1074025675 [ 210.383689][ T7063] tap0: persist enabled [ 210.407738][ T7059] device pim6reg1 entered promiscuous mode [ 210.452119][ T7063] tap0: tun_chr_ioctl cmd 1074025675 [ 210.465972][ T7063] tap0: persist enabled [ 210.864608][ T7088] device veth0_vlan left promiscuous mode [ 210.876212][ T7088] device veth0_vlan entered promiscuous mode [ 210.897796][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 210.907210][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 210.914717][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 211.361909][ T7101] device wg2 entered promiscuous mode [ 211.577418][ T7111] tun0: tun_chr_ioctl cmd 1074025678 [ 211.582757][ T7111] tun0: group set to 1 [ 212.576998][ T7149] device macsec0 entered promiscuous mode [ 213.121700][ T7159] device syzkaller0 entered promiscuous mode [ 213.606047][ T7163] device macsec0 entered promiscuous mode [ 214.501751][ T7187] device sit0 left promiscuous mode [ 214.903927][ T7195] device macsec0 left promiscuous mode [ 214.972211][ T7209] device syzkaller0 entered promiscuous mode [ 215.137459][ T7217] device sit0 entered promiscuous mode [ 215.808500][ T7241] device wg2 left promiscuous mode [ 215.897156][ T7241] device wg2 entered promiscuous mode [ 216.189782][ T7252] device syzkaller0 entered promiscuous mode [ 216.583975][ T24] audit: type=1400 audit(1750816607.760:160): avc: denied { create } for pid=7268 comm="syz.1.1992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 217.341081][ T7298] device syzkaller0 entered promiscuous mode [ 220.145012][ T7351] device syzkaller0 entered promiscuous mode [ 222.130994][ T7363] device sit0 left promiscuous mode [ 222.301806][ T7376] device sit0 entered promiscuous mode [ 222.492187][ T7389] device syzkaller0 entered promiscuous mode [ 222.665402][ T7403] device wg2 left promiscuous mode [ 222.845873][ T7403] device wg2 entered promiscuous mode [ 223.549042][ T7440] device syzkaller0 entered promiscuous mode [ 224.167903][ T7462] device wg2 left promiscuous mode [ 224.289601][ T7470] device wg2 entered promiscuous mode [ 224.917777][ T7488] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.994115][ T7488] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.006074][ T7488] device bridge_slave_0 entered promiscuous mode [ 225.023917][ T7488] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.034521][ T7488] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.042230][ T7488] device bridge_slave_1 entered promiscuous mode [ 225.063761][ T7505] device sit0 left promiscuous mode [ 225.125273][ T7508] device sit0 entered promiscuous mode [ 225.218391][ T24] audit: type=1400 audit(1750816616.390:161): avc: denied { create } for pid=7504 comm="syz.3.2062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 225.762104][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.772994][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.910111][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.926468][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.987235][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.994332][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.115794][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 226.125772][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.147537][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.163777][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.171074][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.196454][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 226.212249][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 226.262361][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 226.275874][ T7488] device veth0_vlan entered promiscuous mode [ 226.286417][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 226.305046][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 226.343142][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 226.390629][ T7488] device veth1_macvtap entered promiscuous mode [ 226.407310][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 226.432549][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 226.460742][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 226.592158][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 226.601402][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 226.610222][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 226.618877][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 226.700561][ T7576] device sit0 left promiscuous mode [ 226.708723][ T7574] cgroup: fork rejected by pids controller in /syz4 [ 226.722007][ T7576] device sit0 entered promiscuous mode [ 226.951100][ T7573] device syzkaller0 entered promiscuous mode [ 227.194844][ T24] audit: type=1400 audit(1750816618.370:162): avc: denied { read } for pid=7587 comm="syz.2.2084" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 227.247032][ T24] audit: type=1400 audit(1750816618.370:163): avc: denied { open } for pid=7587 comm="syz.2.2084" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 227.471836][ T1640] device veth1_macvtap left promiscuous mode [ 227.703771][ T7596] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.807012][ T7596] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.848722][ T7596] device bridge_slave_0 entered promiscuous mode [ 227.930294][ T7596] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.984497][ T7596] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.015217][ T7596] device bridge_slave_1 entered promiscuous mode [ 228.149389][ T7631] device syzkaller0 entered promiscuous mode [ 228.578920][ T7638] IPv6: wlan1: Disabled Multicast RS [ 228.639278][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.653801][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.745864][ T7596] device veth0_vlan entered promiscuous mode [ 228.795214][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.805119][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.813816][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.820920][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.828940][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.837463][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.845866][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.852943][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.860765][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.869416][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.877745][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.885780][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.894075][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 228.902515][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 228.910986][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 228.919015][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 228.927494][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.935130][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 228.943374][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 229.364558][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 229.374743][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 229.520977][ T7596] device veth1_macvtap entered promiscuous mode [ 229.575758][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 229.584569][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 229.605991][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 229.628487][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 229.947897][ T7674] device pim6reg1 entered promiscuous mode [ 229.991682][ T7674] device veth1_macvtap left promiscuous mode [ 230.385974][ T7681] device syzkaller0 entered promiscuous mode [ 230.491898][ T7688] device wg2 entered promiscuous mode [ 231.633333][ T7731] device syzkaller0 entered promiscuous mode [ 232.964676][ T7765] device wg2 left promiscuous mode [ 233.128203][ T7770] device wg2 entered promiscuous mode [ 233.629590][ T7776] device syzkaller0 entered promiscuous mode [ 233.786380][ T7774] Â: renamed from pim6reg1 [ 234.310708][ T7802] device pim6reg1 entered promiscuous mode [ 234.333183][ T7802] device macsec0 left promiscuous mode [ 235.465264][ T7836] device veth0_vlan left promiscuous mode [ 235.503787][ T7836] device veth0_vlan entered promiscuous mode [ 236.343597][ T7871] device sit0 left promiscuous mode [ 237.537670][ T7917] veth0_vlan: mtu greater than device maximum [ 238.737323][ T7959] device syzkaller0 entered promiscuous mode [ 238.933592][ T7965] device vlan0 entered promiscuous mode [ 239.071620][ T7975] syz.1.2198[7975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.071678][ T7975] syz.1.2198[7975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.087321][ T7975] syz.1.2198[7975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.177014][ T7975] syz.1.2198[7975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.189388][ T7971] device syzkaller0 entered promiscuous mode [ 240.223441][ T8027] device sit0 left promiscuous mode [ 240.297335][ T8029] device syzkaller0 entered promiscuous mode [ 240.391482][ T8032] device sit0 entered promiscuous mode [ 240.616694][ T8036] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 240.647256][ T8048] cgroup: fork rejected by pids controller in /syz0 [ 240.802326][ T8056] device syzkaller0 entered promiscuous mode [ 240.924149][ T8063] device syzkaller0 entered promiscuous mode [ 241.137237][ T8070] device wg2 left promiscuous mode [ 241.235464][ T8075] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.246248][ T8075] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.279445][ T8075] device bridge_slave_0 entered promiscuous mode [ 241.348361][ T8086] device syzkaller0 entered promiscuous mode [ 241.367159][ T8075] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.374471][ T8075] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.382492][ T8075] device bridge_slave_1 entered promiscuous mode [ 241.418497][ T8086] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 241.424437][ T8086] syzkaller0: Linktype set failed because interface is up [ 241.520735][ T8084] device veth1_macvtap left promiscuous mode [ 241.546989][ T8084] device macsec0 entered promiscuous mode [ 241.852856][ T8075] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.860056][ T8075] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.867361][ T8075] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.874384][ T8075] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.997118][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 242.010891][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 242.045027][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.188521][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 242.201030][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.242204][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 242.264831][ T8075] device veth0_vlan entered promiscuous mode [ 242.299523][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 242.327086][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 242.371731][ T8075] device veth1_macvtap entered promiscuous mode [ 242.405614][ T8120] €Â0: renamed from pim6reg1 [ 242.461615][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 242.471430][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 242.522088][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 242.572287][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 242.617281][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 242.646200][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 242.671825][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 242.697415][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 242.705754][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 244.207140][ T8177] device wg2 left promiscuous mode [ 244.339109][ T1640] device veth0 left promiscuous mode [ 244.344551][ T1640] bridge0: port 3(veth0) entered disabled state [ 244.381328][ T1640] device bridge_slave_1 left promiscuous mode [ 244.427650][ T1640] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.443942][ T1640] device bridge_slave_0 left promiscuous mode [ 244.477068][ T1640] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.502810][ T1640] device veth0_vlan left promiscuous mode [ 245.132034][ T24] audit: type=1400 audit(1750816636.300:164): avc: denied { create } for pid=8217 comm="syz.3.2263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 245.394570][ T8230] device pim6reg1 entered promiscuous mode [ 247.466726][ T8306] device syzkaller0 entered promiscuous mode [ 247.559242][ T8316] device syzkaller0 entered promiscuous mode [ 247.604791][ T8320] device pim6reg1 entered promiscuous mode [ 247.962414][ T8331] device sit0 entered promiscuous mode [ 248.067461][ T8329] device pim6reg1 entered promiscuous mode [ 248.737091][ T8365] device pim6reg1 entered promiscuous mode [ 248.779357][ T8365] device sit0 entered promiscuous mode [ 248.980430][ T8384] device syzkaller0 entered promiscuous mode [ 249.220254][ T8394] device macsec0 entered promiscuous mode [ 249.597052][ T8415] device sit0 left promiscuous mode [ 249.671076][ T8415] device sit0 entered promiscuous mode [ 250.704605][ T8448] device sit0 left promiscuous mode [ 250.814247][ T8460] device sit0 entered promiscuous mode [ 251.049140][ T8473] device syzkaller0 entered promiscuous mode [ 251.269453][ T8495] device veth1_macvtap left promiscuous mode [ 251.275641][ T8495] device macsec0 entered promiscuous mode [ 252.169227][ T8536] tap0: tun_chr_ioctl cmd 2147767517 [ 252.203779][ T8538] device syzkaller0 entered promiscuous mode [ 252.359793][ T8554] device sit0 left promiscuous mode [ 252.374396][ T8555] device sit0 entered promiscuous mode [ 252.863170][ T8576] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.872887][ T8576] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.952132][ T8568] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.964440][ T8568] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.025737][ T8582] device bridge_slave_1 left promiscuous mode [ 253.036985][ T8582] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.053442][ T8582] device bridge_slave_0 left promiscuous mode [ 253.062562][ T8582] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.220982][ T8589] device bridge_slave_1 left promiscuous mode [ 253.227272][ T8589] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.241253][ T8589] device bridge_slave_0 left promiscuous mode [ 253.251596][ T8589] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.740196][ T8607] device pim6reg1 entered promiscuous mode [ 256.180979][ T8697] device pim6reg1 entered promiscuous mode [ 257.302426][ T8740] device syzkaller0 entered promiscuous mode [ 258.544351][ T8754] device syzkaller0 entered promiscuous mode [ 259.490209][ T8774] device syzkaller0 entered promiscuous mode [ 260.857312][ T24] audit: type=1400 audit(1750816652.040:165): avc: denied { associate } for pid=8829 comm="syz.3.2443" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 261.000277][ T8830] device syzkaller0 entered promiscuous mode [ 261.021135][ T8847] device sit0 entered promiscuous mode [ 270.815713][ T8956] device syzkaller0 entered promiscuous mode [ 271.757016][ T8977] device veth0_vlan left promiscuous mode [ 271.788274][ T8977] device veth0_vlan entered promiscuous mode [ 271.843422][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 271.867729][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 271.898781][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 272.603183][ T24] audit: type=1400 audit(1750816663.780:166): avc: denied { create } for pid=9009 comm="syz.4.2498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 272.634134][ T9002] device veth0_vlan left promiscuous mode [ 272.691734][ T9002] device veth0_vlan entered promiscuous mode [ 272.785943][ T9002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.900982][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.923605][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 272.949235][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 273.210431][ T9021] device syzkaller0 entered promiscuous mode [ 274.907588][ T9066] device sit0 entered promiscuous mode [ 275.085437][ T9081] syz.3.2522[9081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.085521][ T9081] syz.3.2522[9081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.639860][ T9102] device pim6reg1 entered promiscuous mode [ 276.626091][ T9119] device syzkaller0 entered promiscuous mode [ 277.789325][ T9148] device syzkaller0 entered promiscuous mode [ 278.785697][ T9182] device syzkaller0 entered promiscuous mode [ 279.614272][ T9216] device pim6reg1 entered promiscuous mode [ 280.391353][ T9229] device syzkaller0 entered promiscuous mode [ 281.025552][ T9249] device wg2 entered promiscuous mode [ 281.269015][ T9257] device syzkaller0 entered promiscuous mode [ 281.517240][ T9272] device syzkaller0 entered promiscuous mode [ 281.602306][ T9282] syz.2.2587[9282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.602369][ T9284] syz.2.2587[9284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.602375][ T9282] syz.2.2587[9282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.620577][ T9328] device syzkaller0 entered promiscuous mode [ 283.054637][ T9347] device syzkaller0 entered promiscuous mode [ 284.512029][ T9382] device syzkaller0 entered promiscuous mode [ 287.253435][ T9494] device sit0 left promiscuous mode [ 288.274019][ T9535] device syzkaller0 entered promiscuous mode [ 288.504885][ T9538] device syzkaller0 entered promiscuous mode [ 288.953105][ T9562] syz.3.2667[9562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.953161][ T9562] syz.3.2667[9562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.356020][ T9629] device sit0 left promiscuous mode [ 290.547434][ T9637] device sit0 entered promiscuous mode [ 291.030865][ T9647] Â: renamed from pim6reg1 [ 292.648472][ T9685] device syzkaller0 entered promiscuous mode [ 292.874478][ T9701] device pim6reg1 entered promiscuous mode [ 293.438728][ T24] audit: type=1400 audit(1750816684.620:167): avc: denied { ioctl } for pid=9722 comm="syz.0.2713" path="uts:[4026532323]" dev="nsfs" ino=4026532323 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 294.152513][ T24] audit: type=1400 audit(1750816685.330:168): avc: denied { create } for pid=9770 comm="syz.2.2729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 295.307109][ T9832] device sit0 left promiscuous mode [ 295.479820][ T9834] device sit0 entered promiscuous mode [ 295.873493][ T9849] device pim6reg1 entered promiscuous mode [ 296.531177][ T9895] ÿÿÿÿÿÿ: renamed from vlan1 [ 296.873296][ T9906] device pim6reg1 entered promiscuous mode [ 297.377667][ T9950] device syzkaller0 entered promiscuous mode [ 297.963940][ T9967] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.972051][ T9967] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.979828][ T9967] device bridge_slave_0 entered promiscuous mode [ 298.010544][ T9967] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.038307][ T9967] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.080054][ T9967] device bridge_slave_1 entered promiscuous mode [ 298.386052][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 298.394265][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 298.533187][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 298.544089][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 298.572518][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.579627][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.589568][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 298.598442][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 298.606706][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.613804][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.622360][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 298.643699][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 298.674929][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 298.720247][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 298.753100][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 298.761493][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 298.769248][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 298.777847][ T9967] device veth0_vlan entered promiscuous mode [ 298.852645][ T9967] device veth1_macvtap entered promiscuous mode [ 298.860800][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 298.889522][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 298.922942][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 298.947797][T10064] device bridge_slave_0 entered promiscuous mode [ 299.188890][T10075] device wg2 entered promiscuous mode [ 299.250873][T10092] device pim6reg1 entered promiscuous mode [ 299.518228][T10113] device syzkaller0 entered promiscuous mode [ 299.721650][ T7] GPL: port 1(erspan0) entered disabled state [ 299.740378][ T7] device erspan0 left promiscuous mode [ 299.746003][ T7] GPL: port 1(erspan0) entered disabled state [ 300.136995][ T7] device veth0 left promiscuous mode [ 300.143623][ T7] bridge0: port 3(veth0) entered disabled state [ 300.184729][ T7] device bridge_slave_1 left promiscuous mode [ 300.192088][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.200212][ T7] device bridge_slave_0 left promiscuous mode [ 300.206580][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.627271][T10160] device syzkaller0 entered promiscuous mode [ 301.268110][T10176] device pim6reg1 entered promiscuous mode [ 302.113835][T10212] device syzkaller0 entered promiscuous mode [ 302.122264][T10204] FAULT_INJECTION: forcing a failure. [ 302.122264][T10204] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 302.135811][T10204] CPU: 1 PID: 10204 Comm: syz.0.2851 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 302.147180][T10204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 302.157330][T10204] Call Trace: [ 302.160672][T10204] __dump_stack+0x21/0x24 [ 302.165006][T10204] dump_stack_lvl+0x169/0x1d8 [ 302.169694][T10204] ? thaw_kernel_threads+0x220/0x220 [ 302.174975][T10204] ? 0xffffffffa0028000 [ 302.179134][T10204] ? show_regs_print_info+0x18/0x18 [ 302.184329][T10204] ? __kernel_text_address+0xa0/0x100 [ 302.189701][T10204] dump_stack+0x15/0x1c [ 302.193860][T10204] should_fail+0x3c1/0x510 [ 302.198275][T10204] should_fail_usercopy+0x1a/0x20 [ 302.203309][T10204] _copy_from_iter_full+0x1ac/0x750 [ 302.208505][T10204] tun_get_user+0x3c5/0x3090 [ 302.213098][T10204] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 302.218555][T10204] ? _raw_spin_lock+0xe0/0xe0 [ 302.223357][T10204] ? do_sys_openat2+0x207/0x6d0 [ 302.228455][T10204] ? do_syscall_64+0x31/0x40 [ 302.233058][T10204] ? tun_do_read+0x1c00/0x1c00 [ 302.237839][T10204] ? kstrtouint_from_user+0x1a0/0x200 [ 302.243211][T10204] ? __fsnotify_parent+0x5f5/0x6c0 [ 302.248319][T10204] ? avc_policy_seqno+0x1b/0x70 [ 302.253171][T10204] ? selinux_file_permission+0x2a5/0x510 [ 302.258812][T10204] ? fsnotify_perm+0x66/0x4b0 [ 302.263484][T10204] tun_chr_write_iter+0x1bf/0x270 [ 302.268513][T10204] vfs_write+0x725/0xd60 [ 302.272754][T10204] ? __bpf_trace_kmem_free+0x6f/0x90 [ 302.278037][T10204] ? kernel_write+0x3c0/0x3c0 [ 302.282715][T10204] ? __fget_files+0x2c4/0x320 [ 302.287403][T10204] ? __fdget_pos+0x1f7/0x380 [ 302.291990][T10204] ? ksys_write+0x71/0x240 [ 302.296427][T10204] ksys_write+0x140/0x240 [ 302.300755][T10204] ? __ia32_sys_read+0x90/0x90 [ 302.305516][T10204] ? fpu__clear_all+0x20/0x20 [ 302.310190][T10204] __x64_sys_write+0x7b/0x90 [ 302.314776][T10204] do_syscall_64+0x31/0x40 [ 302.319192][T10204] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 302.325079][T10204] RIP: 0033:0x7f39c621f929 [ 302.329503][T10204] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 302.349204][T10204] RSP: 002b:00007f39c4888038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 302.357635][T10204] RAX: ffffffffffffffda RBX: 00007f39c6446fa0 RCX: 00007f39c621f929 [ 302.365606][T10204] RDX: 000000000000ffdd RSI: 0000200000000100 RDI: 0000000000000003 [ 302.373763][T10204] RBP: 00007f39c4888090 R08: 0000000000000000 R09: 0000000000000000 [ 302.381825][T10204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 302.389798][T10204] R13: 0000000000000000 R14: 00007f39c6446fa0 R15: 00007ffc1314e6a8 [ 303.549723][T10223] device sit0 left promiscuous mode [ 303.624455][T10227] device sit0 entered promiscuous mode [ 303.921428][T10231] device syzkaller0 entered promiscuous mode [ 304.323800][T10238] device wg2 entered promiscuous mode [ 305.743657][T10253] device syzkaller0 entered promiscuous mode [ 306.081809][T10271] syzkaller0: tun_chr_ioctl cmd 35111 [ 306.190109][T10267] device pim6reg1 entered promiscuous mode [ 306.649665][T10306] device wg2 left promiscuous mode [ 306.693379][T10308] device syzkaller0 entered promiscuous mode [ 306.794884][T10308] FAULT_INJECTION: forcing a failure. [ 306.794884][T10308] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 306.824341][T10306] device wg2 entered promiscuous mode [ 306.895705][T10308] CPU: 0 PID: 10308 Comm: syz.0.2881 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 306.907115][T10308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 306.917269][T10308] Call Trace: [ 306.920575][T10308] __dump_stack+0x21/0x24 [ 306.925086][T10308] dump_stack_lvl+0x169/0x1d8 [ 306.929773][T10308] ? show_regs_print_info+0x18/0x18 [ 306.935087][T10308] dump_stack+0x15/0x1c [ 306.939448][T10308] should_fail+0x3c1/0x510 [ 306.943886][T10308] should_fail_alloc_page+0x4f/0x60 [ 306.949098][T10308] __alloc_pages_nodemask+0x109/0x5f0 [ 306.954633][T10308] ? alloc_skb_with_frags+0xa2/0x560 [ 306.959931][T10308] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 306.965481][T10308] ? __kmalloc_track_caller+0x181/0x320 [ 306.971029][T10308] ? kmem_cache_alloc+0x165/0x2e0 [ 306.976065][T10308] ? kasan_unpoison+0x67/0x90 [ 306.980752][T10308] ? __kasan_check_write+0x14/0x20 [ 306.985876][T10308] ? __alloc_skb+0x38b/0x520 [ 306.990487][T10308] alloc_skb_with_frags+0x1bc/0x560 [ 306.995702][T10308] sock_alloc_send_pskb+0x853/0x980 [ 307.000909][T10308] ? is_bpf_text_address+0x177/0x190 [ 307.006377][T10308] ? sock_kzfree_s+0x60/0x60 [ 307.011061][T10308] ? iov_iter_advance+0x1f7/0x750 [ 307.016094][T10308] tun_get_user+0x4bd/0x3090 [ 307.020689][T10308] ? ____kasan_slab_free+0x125/0x160 [ 307.025974][T10308] ? __kasan_slab_free+0x11/0x20 [ 307.030916][T10308] ? putname+0xfe/0x150 [ 307.035163][T10308] ? __x64_sys_openat+0x136/0x160 [ 307.040188][T10308] ? do_syscall_64+0x31/0x40 [ 307.044790][T10308] ? tun_do_read+0x1c00/0x1c00 [ 307.049571][T10308] ? kstrtouint_from_user+0x1a0/0x200 [ 307.054951][T10308] ? __fsnotify_parent+0x5f5/0x6c0 [ 307.060066][T10308] ? avc_policy_seqno+0x1b/0x70 [ 307.064917][T10308] ? selinux_file_permission+0x2a5/0x510 [ 307.070554][T10308] ? fsnotify_perm+0x66/0x4b0 [ 307.075236][T10308] tun_chr_write_iter+0x1bf/0x270 [ 307.080380][T10308] vfs_write+0x725/0xd60 [ 307.084631][T10308] ? __kasan_slab_free+0x11/0x20 [ 307.089587][T10308] ? kernel_write+0x3c0/0x3c0 [ 307.094267][T10308] ? __fget_files+0x2c4/0x320 [ 307.098946][T10308] ? __fdget_pos+0x1f7/0x380 [ 307.103725][T10308] ? ksys_write+0x71/0x240 [ 307.108150][T10308] ksys_write+0x140/0x240 [ 307.112568][T10308] ? __ia32_sys_read+0x90/0x90 [ 307.117337][T10308] ? fpu__clear_all+0x20/0x20 [ 307.122022][T10308] __x64_sys_write+0x7b/0x90 [ 307.126614][T10308] do_syscall_64+0x31/0x40 [ 307.131063][T10308] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 307.136971][T10308] RIP: 0033:0x7f39c621f929 [ 307.141567][T10308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 307.161188][T10308] RSP: 002b:00007f39c4888038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 307.169721][T10308] RAX: ffffffffffffffda RBX: 00007f39c6446fa0 RCX: 00007f39c621f929 [ 307.177720][T10308] RDX: 000000000000ffdd RSI: 0000200000000100 RDI: 0000000000000003 [ 307.185697][T10308] RBP: 00007f39c4888090 R08: 0000000000000000 R09: 0000000000000000 [ 307.193798][T10308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 307.201964][T10308] R13: 0000000000000000 R14: 00007f39c6446fa0 R15: 00007ffc1314e6a8 [ 308.447580][T10368] device pim6reg1 entered promiscuous mode [ 308.989100][T10378] device syzkaller0 entered promiscuous mode [ 308.998077][T10378] FAULT_INJECTION: forcing a failure. [ 308.998077][T10378] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 309.059194][T10378] CPU: 1 PID: 10378 Comm: syz.0.2900 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 309.070603][T10378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 309.080675][T10378] Call Trace: [ 309.083989][T10378] __dump_stack+0x21/0x24 [ 309.088338][T10378] dump_stack_lvl+0x169/0x1d8 [ 309.093028][T10378] ? show_regs_print_info+0x18/0x18 [ 309.093265][T10386] syz.4.2903[10386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.098235][T10378] dump_stack+0x15/0x1c [ 309.098248][T10378] should_fail+0x3c1/0x510 [ 309.098261][T10378] should_fail_alloc_page+0x4f/0x60 [ 309.098281][T10378] __alloc_pages_nodemask+0x109/0x5f0 [ 309.128929][T10378] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 309.134483][T10378] ? __kmalloc_track_caller+0x181/0x320 [ 309.140137][T10378] ? kmem_cache_alloc+0xd0/0x2e0 [ 309.145071][T10378] ? kasan_unpoison+0x67/0x90 [ 309.149755][T10378] ? __kasan_check_write+0x14/0x20 [ 309.154869][T10378] ? __alloc_skb+0x38b/0x520 [ 309.159546][T10378] alloc_skb_with_frags+0x1bc/0x560 [ 309.164867][T10378] sock_alloc_send_pskb+0x853/0x980 [ 309.170080][T10378] ? is_bpf_text_address+0x177/0x190 [ 309.175381][T10378] ? sock_kzfree_s+0x60/0x60 [ 309.179988][T10378] ? iov_iter_advance+0x1f7/0x750 [ 309.185014][T10378] tun_get_user+0x4bd/0x3090 [ 309.189615][T10378] ? _raw_spin_lock+0xe0/0xe0 [ 309.191577][T10386] syz.4.2903[10386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.194331][T10378] ? __kasan_slab_free+0x11/0x20 [ 309.210627][T10378] ? __x64_sys_openat+0x136/0x160 [ 309.215643][T10378] ? do_syscall_64+0x31/0x40 [ 309.220222][T10378] ? tun_do_read+0x1c00/0x1c00 [ 309.224981][T10378] ? kstrtouint_from_user+0x1a0/0x200 [ 309.230346][T10378] ? __fsnotify_parent+0x5f5/0x6c0 [ 309.235531][T10378] ? avc_policy_seqno+0x1b/0x70 [ 309.240369][T10378] ? selinux_file_permission+0x2a5/0x510 [ 309.246004][T10378] ? fsnotify_perm+0x66/0x4b0 [ 309.250775][T10378] tun_chr_write_iter+0x1bf/0x270 [ 309.255787][T10378] vfs_write+0x725/0xd60 [ 309.260046][T10378] ? __bpf_trace_kmem_free+0x6f/0x90 [ 309.265427][T10378] ? kernel_write+0x3c0/0x3c0 [ 309.270095][T10378] ? __fget_files+0x2c4/0x320 [ 309.274761][T10378] ? __fdget_pos+0x1f7/0x380 [ 309.279335][T10378] ? ksys_write+0x71/0x240 [ 309.283739][T10378] ksys_write+0x140/0x240 [ 309.288156][T10378] ? __ia32_sys_read+0x90/0x90 [ 309.292927][T10378] ? fpu__clear_all+0x20/0x20 [ 309.297605][T10378] __x64_sys_write+0x7b/0x90 [ 309.302181][T10378] do_syscall_64+0x31/0x40 [ 309.306686][T10378] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 309.312654][T10378] RIP: 0033:0x7f39c621f929 [ 309.317060][T10378] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 309.336751][T10378] RSP: 002b:00007f39c4888038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 309.345155][T10378] RAX: ffffffffffffffda RBX: 00007f39c6446fa0 RCX: 00007f39c621f929 [ 309.353123][T10378] RDX: 000000000000ffdd RSI: 0000200000000100 RDI: 0000000000000003 [ 309.361087][T10378] RBP: 00007f39c4888090 R08: 0000000000000000 R09: 0000000000000000 [ 309.369045][T10378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 309.377267][T10378] R13: 0000000000000000 R14: 00007f39c6446fa0 R15: 00007ffc1314e6a8 [ 309.741741][T10399] device bridge_slave_0 left promiscuous mode [ 309.953733][T10405] device syzkaller0 entered promiscuous mode [ 310.175787][T10411] syz.2.2912[10411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.175879][T10411] syz.2.2912[10411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 311.030484][T10439] device pim6reg1 entered promiscuous mode [ 311.921175][T10469] device syzkaller0 entered promiscuous mode [ 312.007288][T10470] FAULT_INJECTION: forcing a failure. [ 312.007288][T10470] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 312.025051][T10470] CPU: 1 PID: 10470 Comm: syz.1.2928 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 312.036451][T10470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 312.046511][T10470] Call Trace: [ 312.049818][T10470] __dump_stack+0x21/0x24 [ 312.054150][T10470] dump_stack_lvl+0x169/0x1d8 [ 312.058833][T10470] ? show_regs_print_info+0x18/0x18 [ 312.064033][T10470] dump_stack+0x15/0x1c [ 312.068194][T10470] should_fail+0x3c1/0x510 [ 312.072614][T10470] should_fail_alloc_page+0x4f/0x60 [ 312.077813][T10470] __alloc_pages_nodemask+0x109/0x5f0 [ 312.083188][T10470] ? alloc_skb_with_frags+0xa2/0x560 [ 312.088476][T10470] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 312.094031][T10470] ? __kmalloc_track_caller+0x181/0x320 [ 312.099583][T10470] ? kmem_cache_alloc+0xd0/0x2e0 [ 312.104539][T10470] ? kasan_unpoison+0x67/0x90 [ 312.109241][T10470] ? __kasan_check_write+0x14/0x20 [ 312.114371][T10470] ? __alloc_skb+0x38b/0x520 [ 312.118971][T10470] alloc_skb_with_frags+0x1bc/0x560 [ 312.124294][T10470] sock_alloc_send_pskb+0x853/0x980 [ 312.129622][T10470] ? is_bpf_text_address+0x177/0x190 [ 312.134925][T10470] ? sock_kzfree_s+0x60/0x60 [ 312.139535][T10470] ? iov_iter_advance+0x1f7/0x750 [ 312.144662][T10470] tun_get_user+0x4bd/0x3090 [ 312.149819][T10470] ? ____kasan_slab_free+0x125/0x160 [ 312.155303][T10470] ? __kasan_slab_free+0x11/0x20 [ 312.160249][T10470] ? putname+0xfe/0x150 [ 312.164402][T10470] ? __x64_sys_openat+0x136/0x160 [ 312.169459][T10470] ? do_syscall_64+0x31/0x40 [ 312.174228][T10470] ? tun_do_read+0x1c00/0x1c00 [ 312.178991][T10470] ? kstrtouint_from_user+0x1a0/0x200 [ 312.184463][T10470] ? __fsnotify_parent+0x5f5/0x6c0 [ 312.189606][T10470] ? avc_policy_seqno+0x1b/0x70 [ 312.194460][T10470] ? selinux_file_permission+0x2a5/0x510 [ 312.200088][T10470] ? fsnotify_perm+0x66/0x4b0 [ 312.204763][T10470] tun_chr_write_iter+0x1bf/0x270 [ 312.209783][T10470] vfs_write+0x725/0xd60 [ 312.214025][T10470] ? __kasan_slab_free+0x11/0x20 [ 312.219050][T10470] ? kernel_write+0x3c0/0x3c0 [ 312.223773][T10470] ? __fget_files+0x2c4/0x320 [ 312.228453][T10470] ? __fdget_pos+0x1f7/0x380 [ 312.233038][T10470] ? ksys_write+0x71/0x240 [ 312.237904][T10470] ksys_write+0x140/0x240 [ 312.242248][T10470] ? __ia32_sys_read+0x90/0x90 [ 312.247100][T10470] ? fpu__clear_all+0x20/0x20 [ 312.251776][T10470] __x64_sys_write+0x7b/0x90 [ 312.256363][T10470] do_syscall_64+0x31/0x40 [ 312.260777][T10470] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 312.266670][T10470] RIP: 0033:0x7fa282d5a929 [ 312.271172][T10470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 312.291129][T10470] RSP: 002b:00007fa2813a2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 312.299817][T10470] RAX: ffffffffffffffda RBX: 00007fa282f82080 RCX: 00007fa282d5a929 [ 312.307913][T10470] RDX: 000000000000ffdd RSI: 0000200000000100 RDI: 0000000000000003 [ 312.315901][T10470] RBP: 00007fa2813a2090 R08: 0000000000000000 R09: 0000000000000000 [ 312.323879][T10470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 312.331954][T10470] R13: 0000000000000000 R14: 00007fa282f82080 R15: 00007fff9399c3b8 [ 313.643645][T10498] €Â0: renamed from pim6reg1 [ 314.149575][T10516] device syzkaller0 entered promiscuous mode [ 315.219188][T10561] device wg2 left promiscuous mode [ 315.232071][T10547] device veth0_vlan left promiscuous mode [ 315.250023][T10547] device veth0_vlan entered promiscuous mode [ 315.279339][T10547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 315.315615][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 315.351444][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 315.366947][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 315.433471][T10566] device syzkaller0 entered promiscuous mode [ 315.456070][T10570] device wg2 entered promiscuous mode [ 315.694353][T10574] device veth1_macvtap left promiscuous mode [ 315.710600][T10574] device macsec0 left promiscuous mode [ 315.830755][T10587] device syzkaller0 entered promiscuous mode [ 316.386993][T10613] device sit0 left promiscuous mode [ 317.194940][T10658] device syzkaller0 entered promiscuous mode [ 317.262667][T10654] device syzkaller0 entered promiscuous mode [ 317.429171][T10663] device syzkaller0 entered promiscuous mode [ 318.101686][T10689] device syzkaller0 entered promiscuous mode [ 318.291434][T10694] device wg2 left promiscuous mode [ 318.361189][T10698] device syzkaller0 entered promiscuous mode [ 318.386561][T10694] device wg2 entered promiscuous mode [ 319.911006][T10753] device syzkaller0 entered promiscuous mode [ 320.127127][T10758] device syzkaller0 entered promiscuous mode [ 320.135759][T10758] FAULT_INJECTION: forcing a failure. [ 320.135759][T10758] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 320.176951][T10758] CPU: 0 PID: 10758 Comm: syz.3.3012 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 320.188545][T10758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 320.198614][T10758] Call Trace: [ 320.201915][T10758] __dump_stack+0x21/0x24 [ 320.206249][T10758] dump_stack_lvl+0x169/0x1d8 [ 320.210935][T10758] ? show_regs_print_info+0x18/0x18 [ 320.216468][T10758] dump_stack+0x15/0x1c [ 320.220624][T10758] should_fail+0x3c1/0x510 [ 320.225049][T10758] should_fail_alloc_page+0x4f/0x60 [ 320.230280][T10758] __alloc_pages_nodemask+0x109/0x5f0 [ 320.235657][T10758] ? alloc_skb_with_frags+0xa2/0x560 [ 320.240946][T10758] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 320.246520][T10758] ? __kmalloc_track_caller+0x181/0x320 [ 320.252079][T10758] ? kmem_cache_alloc+0xd0/0x2e0 [ 320.257032][T10758] ? kasan_unpoison+0x67/0x90 [ 320.261800][T10758] ? __kasan_check_write+0x14/0x20 [ 320.266913][T10758] ? __alloc_skb+0x38b/0x520 [ 320.271502][T10758] alloc_skb_with_frags+0x1bc/0x560 [ 320.276705][T10758] sock_alloc_send_pskb+0x853/0x980 [ 320.281892][T10758] ? is_bpf_text_address+0x177/0x190 [ 320.287167][T10758] ? sock_kzfree_s+0x60/0x60 [ 320.291852][T10758] ? iov_iter_advance+0x1f7/0x750 [ 320.296975][T10758] tun_get_user+0x4bd/0x3090 [ 320.301597][T10758] ? ____kasan_slab_free+0x125/0x160 [ 320.306877][T10758] ? __kasan_slab_free+0x11/0x20 [ 320.311807][T10758] ? putname+0xfe/0x150 [ 320.315955][T10758] ? __x64_sys_openat+0x136/0x160 [ 320.320966][T10758] ? do_syscall_64+0x31/0x40 [ 320.325546][T10758] ? tun_do_read+0x1c00/0x1c00 [ 320.330304][T10758] ? kstrtouint_from_user+0x1a0/0x200 [ 320.335840][T10758] ? __fsnotify_parent+0x5f5/0x6c0 [ 320.340942][T10758] ? avc_policy_seqno+0x1b/0x70 [ 320.345970][T10758] ? selinux_file_permission+0x2a5/0x510 [ 320.351594][T10758] ? fsnotify_perm+0x66/0x4b0 [ 320.356435][T10758] tun_chr_write_iter+0x1bf/0x270 [ 320.361457][T10758] vfs_write+0x725/0xd60 [ 320.365690][T10758] ? __kasan_slab_free+0x11/0x20 [ 320.370645][T10758] ? kernel_write+0x3c0/0x3c0 [ 320.375489][T10758] ? __fget_files+0x2c4/0x320 [ 320.380327][T10758] ? __fdget_pos+0x1f7/0x380 [ 320.384904][T10758] ? ksys_write+0x71/0x240 [ 320.389308][T10758] ksys_write+0x140/0x240 [ 320.393625][T10758] ? __ia32_sys_read+0x90/0x90 [ 320.398384][T10758] ? __bpf_trace_sys_enter+0x62/0x70 [ 320.403659][T10758] __x64_sys_write+0x7b/0x90 [ 320.408246][T10758] do_syscall_64+0x31/0x40 [ 320.412669][T10758] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 320.418570][T10758] RIP: 0033:0x7f8915e98929 [ 320.422978][T10758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 320.442753][T10758] RSP: 002b:00007f8914501038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 320.451159][T10758] RAX: ffffffffffffffda RBX: 00007f89160bffa0 RCX: 00007f8915e98929 [ 320.459209][T10758] RDX: 000000000000ffdd RSI: 0000200000000100 RDI: 0000000000000003 [ 320.467170][T10758] RBP: 00007f8914501090 R08: 0000000000000000 R09: 0000000000000000 [ 320.475128][T10758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 320.483351][T10758] R13: 0000000000000000 R14: 00007f89160bffa0 R15: 00007ffd778f9cf8 [ 321.859990][T10808] device syzkaller0 entered promiscuous mode [ 321.892584][T10808] FAULT_INJECTION: forcing a failure. [ 321.892584][T10808] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 321.916895][T10808] CPU: 1 PID: 10808 Comm: syz.4.3027 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 321.928380][T10808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 321.938520][T10808] Call Trace: [ 321.941807][T10808] __dump_stack+0x21/0x24 [ 321.946307][T10808] dump_stack_lvl+0x169/0x1d8 [ 321.950975][T10808] ? show_regs_print_info+0x18/0x18 [ 321.956168][T10808] dump_stack+0x15/0x1c [ 321.960327][T10808] should_fail+0x3c1/0x510 [ 321.964735][T10808] should_fail_alloc_page+0x4f/0x60 [ 321.969922][T10808] __alloc_pages_nodemask+0x109/0x5f0 [ 321.975285][T10808] ? alloc_skb_with_frags+0xa2/0x560 [ 321.980565][T10808] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 321.986103][T10808] ? __kmalloc_track_caller+0x181/0x320 [ 321.991644][T10808] ? kmem_cache_alloc+0xd0/0x2e0 [ 321.996572][T10808] ? kasan_unpoison+0x67/0x90 [ 322.001239][T10808] ? __kasan_check_write+0x14/0x20 [ 322.006349][T10808] ? __alloc_skb+0x38b/0x520 [ 322.010935][T10808] alloc_skb_with_frags+0x1bc/0x560 [ 322.016123][T10808] sock_alloc_send_pskb+0x853/0x980 [ 322.021308][T10808] ? is_bpf_text_address+0x177/0x190 [ 322.026584][T10808] ? sock_kzfree_s+0x60/0x60 [ 322.031163][T10808] ? iov_iter_advance+0x1f7/0x750 [ 322.036177][T10808] tun_get_user+0x4bd/0x3090 [ 322.040761][T10808] ? ____kasan_slab_free+0x125/0x160 [ 322.046046][T10808] ? __kasan_slab_free+0x11/0x20 [ 322.050974][T10808] ? putname+0xfe/0x150 [ 322.055118][T10808] ? __x64_sys_openat+0x136/0x160 [ 322.060134][T10808] ? do_syscall_64+0x31/0x40 [ 322.064728][T10808] ? tun_do_read+0x1c00/0x1c00 [ 322.069490][T10808] ? kstrtouint_from_user+0x1a0/0x200 [ 322.074855][T10808] ? __fsnotify_parent+0x5f5/0x6c0 [ 322.079955][T10808] ? avc_policy_seqno+0x1b/0x70 [ 322.084794][T10808] ? selinux_file_permission+0x2a5/0x510 [ 322.090416][T10808] ? fsnotify_perm+0x66/0x4b0 [ 322.095083][T10808] tun_chr_write_iter+0x1bf/0x270 [ 322.100100][T10808] vfs_write+0x725/0xd60 [ 322.104417][T10808] ? __bpf_trace_kmem_free+0x6f/0x90 [ 322.109803][T10808] ? kernel_write+0x3c0/0x3c0 [ 322.114481][T10808] ? __fget_files+0x2c4/0x320 [ 322.119166][T10808] ? __fdget_pos+0x1f7/0x380 [ 322.123748][T10808] ? ksys_write+0x71/0x240 [ 322.128150][T10808] ksys_write+0x140/0x240 [ 322.132471][T10808] ? __ia32_sys_read+0x90/0x90 [ 322.137313][T10808] ? fpu__clear_all+0x20/0x20 [ 322.141990][T10808] __x64_sys_write+0x7b/0x90 [ 322.146579][T10808] do_syscall_64+0x31/0x40 [ 322.150996][T10808] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 322.156965][T10808] RIP: 0033:0x7f2c44edf929 [ 322.161557][T10808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 322.181239][T10808] RSP: 002b:00007f2c43548038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 322.189655][T10808] RAX: ffffffffffffffda RBX: 00007f2c45106fa0 RCX: 00007f2c44edf929 [ 322.197619][T10808] RDX: 000000000000ffdd RSI: 0000200000000100 RDI: 0000000000000003 [ 322.205780][T10808] RBP: 00007f2c43548090 R08: 0000000000000000 R09: 0000000000000000 [ 322.213749][T10808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 322.221722][T10808] R13: 0000000000000000 R14: 00007f2c45106fa0 R15: 00007ffd4b5af478 [ 322.673442][T10833] device pim6reg1 entered promiscuous mode [ 322.773125][T10855] device sit0 left promiscuous mode [ 322.844700][T10855] device sit0 entered promiscuous mode [ 323.087960][T10870] device syzkaller0 entered promiscuous mode [ 323.113511][T10870] FAULT_INJECTION: forcing a failure. [ 323.113511][T10870] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 323.190298][T10870] CPU: 0 PID: 10870 Comm: syz.2.3045 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 323.201817][T10870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 323.211923][T10870] Call Trace: [ 323.215230][T10870] __dump_stack+0x21/0x24 [ 323.219565][T10870] dump_stack_lvl+0x169/0x1d8 [ 323.224244][T10870] ? show_regs_print_info+0x18/0x18 [ 323.229967][T10870] dump_stack+0x15/0x1c [ 323.234142][T10870] should_fail+0x3c1/0x510 [ 323.238569][T10870] should_fail_alloc_page+0x4f/0x60 [ 323.243778][T10870] __alloc_pages_nodemask+0x109/0x5f0 [ 323.249169][T10870] ? alloc_skb_with_frags+0xa2/0x560 [ 323.254455][T10870] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 323.260097][T10870] ? __kmalloc_track_caller+0x181/0x320 [ 323.265655][T10870] ? kmem_cache_alloc+0xd0/0x2e0 [ 323.270597][T10870] ? kasan_unpoison+0x67/0x90 [ 323.275281][T10870] ? __kasan_check_write+0x14/0x20 [ 323.280405][T10870] ? __alloc_skb+0x38b/0x520 [ 323.285009][T10870] alloc_skb_with_frags+0x1bc/0x560 [ 323.290212][T10870] sock_alloc_send_pskb+0x853/0x980 [ 323.295417][T10870] ? is_bpf_text_address+0x177/0x190 [ 323.300710][T10870] ? sock_kzfree_s+0x60/0x60 [ 323.305303][T10870] ? iov_iter_advance+0x1f7/0x750 [ 323.310336][T10870] tun_get_user+0x4bd/0x3090 [ 323.314930][T10870] ? ____kasan_slab_free+0x125/0x160 [ 323.320213][T10870] ? __kasan_slab_free+0x11/0x20 [ 323.325153][T10870] ? putname+0xfe/0x150 [ 323.329319][T10870] ? __x64_sys_openat+0x136/0x160 [ 323.334351][T10870] ? do_syscall_64+0x31/0x40 [ 323.338946][T10870] ? tun_do_read+0x1c00/0x1c00 [ 323.343717][T10870] ? kstrtouint_from_user+0x1a0/0x200 [ 323.349107][T10870] ? __fsnotify_parent+0x5f5/0x6c0 [ 323.354322][T10870] ? avc_policy_seqno+0x1b/0x70 [ 323.359189][T10870] ? selinux_file_permission+0x2a5/0x510 [ 323.364827][T10870] ? fsnotify_perm+0x66/0x4b0 [ 323.369619][T10870] tun_chr_write_iter+0x1bf/0x270 [ 323.374662][T10870] vfs_write+0x725/0xd60 [ 323.378884][T10870] ? __kasan_slab_free+0x11/0x20 [ 323.383809][T10870] ? kernel_write+0x3c0/0x3c0 [ 323.388490][T10870] ? __fget_files+0x2c4/0x320 [ 323.393165][T10870] ? __fdget_pos+0x1f7/0x380 [ 323.397745][T10870] ? ksys_write+0x71/0x240 [ 323.402155][T10870] ksys_write+0x140/0x240 [ 323.406473][T10870] ? __ia32_sys_read+0x90/0x90 [ 323.411226][T10870] ? fpu__clear_all+0x20/0x20 [ 323.415891][T10870] __x64_sys_write+0x7b/0x90 [ 323.420480][T10870] do_syscall_64+0x31/0x40 [ 323.424886][T10870] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 323.430767][T10870] RIP: 0033:0x7f9275b50929 [ 323.435219][T10870] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 323.454932][T10870] RSP: 002b:00007f92741b9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 323.463351][T10870] RAX: ffffffffffffffda RBX: 00007f9275d77fa0 RCX: 00007f9275b50929 [ 323.471318][T10870] RDX: 000000000000ffdd RSI: 0000200000000100 RDI: 0000000000000003 [ 323.479287][T10870] RBP: 00007f92741b9090 R08: 0000000000000000 R09: 0000000000000000 [ 323.487247][T10870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 323.495679][T10870] R13: 0000000000000000 R14: 00007f9275d77fa0 R15: 00007ffc03086a38 [ 324.736717][T10917] device syzkaller0 entered promiscuous mode [ 324.763173][T10917] FAULT_INJECTION: forcing a failure. [ 324.763173][T10917] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 324.845410][T10917] CPU: 0 PID: 10917 Comm: syz.3.3060 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 324.856930][T10917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 324.866998][T10917] Call Trace: [ 324.870307][T10917] __dump_stack+0x21/0x24 [ 324.874666][T10917] dump_stack_lvl+0x169/0x1d8 [ 324.879450][T10917] ? show_regs_print_info+0x18/0x18 [ 324.884823][T10917] dump_stack+0x15/0x1c [ 324.888998][T10917] should_fail+0x3c1/0x510 [ 324.893443][T10917] should_fail_alloc_page+0x4f/0x60 [ 324.899017][T10917] __alloc_pages_nodemask+0x109/0x5f0 [ 324.904411][T10917] ? alloc_skb_with_frags+0xa2/0x560 [ 324.909722][T10917] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 324.915294][T10917] ? __kmalloc_track_caller+0x181/0x320 [ 324.920967][T10917] ? kmem_cache_alloc+0xd0/0x2e0 [ 324.925930][T10917] ? kasan_unpoison+0x67/0x90 [ 324.930729][T10917] ? __kasan_check_write+0x14/0x20 [ 324.935937][T10917] ? __alloc_skb+0x38b/0x520 [ 324.940549][T10917] alloc_skb_with_frags+0x1bc/0x560 [ 324.945755][T10917] sock_alloc_send_pskb+0x853/0x980 [ 324.950948][T10917] ? is_bpf_text_address+0x177/0x190 [ 324.956224][T10917] ? sock_kzfree_s+0x60/0x60 [ 324.960808][T10917] ? iov_iter_advance+0x1f7/0x750 [ 324.965824][T10917] tun_get_user+0x4bd/0x3090 [ 324.970406][T10917] ? ____kasan_slab_free+0x125/0x160 [ 324.975682][T10917] ? __kasan_slab_free+0x11/0x20 [ 324.980608][T10917] ? putname+0xfe/0x150 [ 324.984762][T10917] ? __x64_sys_openat+0x136/0x160 [ 324.989939][T10917] ? do_syscall_64+0x31/0x40 [ 324.994621][T10917] ? tun_do_read+0x1c00/0x1c00 [ 324.999389][T10917] ? kstrtouint_from_user+0x1a0/0x200 [ 325.004938][T10917] ? __fsnotify_parent+0x5f5/0x6c0 [ 325.010067][T10917] ? avc_policy_seqno+0x1b/0x70 [ 325.014908][T10917] ? selinux_file_permission+0x2a5/0x510 [ 325.020529][T10917] ? fsnotify_perm+0x66/0x4b0 [ 325.025197][T10917] tun_chr_write_iter+0x1bf/0x270 [ 325.030219][T10917] vfs_write+0x725/0xd60 [ 325.034543][T10917] ? kernel_write+0x3c0/0x3c0 [ 325.039216][T10917] ? __fget_files+0x2c4/0x320 [ 325.043886][T10917] ? __fdget_pos+0x1f7/0x380 [ 325.048468][T10917] ? ksys_write+0x71/0x240 [ 325.052878][T10917] ksys_write+0x140/0x240 [ 325.057199][T10917] ? __ia32_sys_read+0x90/0x90 [ 325.061951][T10917] ? fpu__clear_all+0x20/0x20 [ 325.066616][T10917] __x64_sys_write+0x7b/0x90 [ 325.071199][T10917] do_syscall_64+0x31/0x40 [ 325.075612][T10917] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 325.081519][T10917] RIP: 0033:0x7f8915e98929 [ 325.085929][T10917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 325.105542][T10917] RSP: 002b:00007f8914501038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 325.113962][T10917] RAX: ffffffffffffffda RBX: 00007f89160bffa0 RCX: 00007f8915e98929 [ 325.121930][T10917] RDX: 000000000000ffdd RSI: 0000200000000100 RDI: 0000000000000003 [ 325.129899][T10917] RBP: 00007f8914501090 R08: 0000000000000000 R09: 0000000000000000 [ 325.137864][T10917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 325.145842][T10917] R13: 0000000000000000 R14: 00007f89160bffa0 R15: 00007ffd778f9cf8 [ 325.316596][T10934] FAULT_INJECTION: forcing a failure. [ 325.316596][T10934] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 325.442173][T10934] CPU: 1 PID: 10934 Comm: syz.2.3066 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 325.453571][T10934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 325.463813][T10934] Call Trace: [ 325.467204][T10934] __dump_stack+0x21/0x24 [ 325.471649][T10934] dump_stack_lvl+0x169/0x1d8 [ 325.476346][T10934] ? show_regs_print_info+0x18/0x18 [ 325.481556][T10934] ? sched_clock+0x3a/0x40 [ 325.485991][T10934] ? sched_clock+0x3a/0x40 [ 325.490421][T10934] ? sched_clock_cpu+0x1b/0x3d0 [ 325.495285][T10934] dump_stack+0x15/0x1c [ 325.499775][T10934] should_fail+0x3c1/0x510 [ 325.504202][T10934] should_fail_usercopy+0x1a/0x20 [ 325.509234][T10934] _copy_from_user+0x20/0xd0 [ 325.513867][T10934] ___sys_recvmsg+0x129/0x4f0 [ 325.518557][T10934] ? __sys_recvmsg+0x250/0x250 [ 325.523398][T10934] ? __fdget+0x1a1/0x230 [ 325.527670][T10934] __x64_sys_recvmsg+0x1dd/0x2a0 [ 325.532627][T10934] ? fput+0x1a/0x20 [ 325.536431][T10934] ? ___sys_recvmsg+0x4f0/0x4f0 [ 325.541274][T10934] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 325.547331][T10934] do_syscall_64+0x31/0x40 [ 325.551749][T10934] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 325.557716][T10934] RIP: 0033:0x7f9275b50929 [ 325.562133][T10934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 325.581730][T10934] RSP: 002b:00007f92741b9038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 325.590219][T10934] RAX: ffffffffffffffda RBX: 00007f9275d77fa0 RCX: 00007f9275b50929 [ 325.598269][T10934] RDX: 0000000000000000 RSI: 0000200000000400 RDI: 0000000000000007 [ 325.606227][T10934] RBP: 00007f92741b9090 R08: 0000000000000000 R09: 0000000000000000 [ 325.614276][T10934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 325.622255][T10934] R13: 0000000000000000 R14: 00007f9275d77fa0 R15: 00007ffc03086a38 [ 326.085456][T10950] device wg2 left promiscuous mode [ 326.092150][T10945] device pim6reg1 entered promiscuous mode [ 327.066428][T10975] FAULT_INJECTION: forcing a failure. [ 327.066428][T10975] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 327.100497][T10979] device pim6reg1 entered promiscuous mode [ 327.116983][T10975] CPU: 0 PID: 10975 Comm: syz.0.3081 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 327.128482][T10975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 327.138684][T10975] Call Trace: [ 327.141996][T10975] __dump_stack+0x21/0x24 [ 327.146335][T10975] dump_stack_lvl+0x169/0x1d8 [ 327.151024][T10975] ? show_regs_print_info+0x18/0x18 [ 327.156230][T10975] dump_stack+0x15/0x1c [ 327.160395][T10975] should_fail+0x3c1/0x510 [ 327.165184][T10975] should_fail_usercopy+0x1a/0x20 [ 327.170395][T10975] _copy_to_user+0x20/0x90 [ 327.175257][T10975] simple_read_from_buffer+0xe9/0x160 [ 327.180647][T10975] proc_fail_nth_read+0x19a/0x210 [ 327.185762][T10975] ? proc_fault_inject_write+0x2f0/0x2f0 [ 327.191404][T10975] ? rw_verify_area+0x1c0/0x360 [ 327.196360][T10975] ? proc_fault_inject_write+0x2f0/0x2f0 [ 327.202106][T10975] vfs_read+0x1fe/0xa10 [ 327.206376][T10975] ? kernel_read+0x70/0x70 [ 327.210806][T10975] ? __kasan_check_write+0x14/0x20 [ 327.215912][T10975] ? mutex_lock+0x8c/0xe0 [ 327.220231][T10975] ? mutex_trylock+0xa0/0xa0 [ 327.224814][T10975] ? __fget_files+0x2c4/0x320 [ 327.229491][T10975] ? __fdget_pos+0x2d2/0x380 [ 327.234068][T10975] ? ksys_read+0x71/0x240 [ 327.238480][T10975] ksys_read+0x140/0x240 [ 327.242712][T10975] ? vfs_write+0xd60/0xd60 [ 327.247119][T10975] __x64_sys_read+0x7b/0x90 [ 327.251611][T10975] do_syscall_64+0x31/0x40 [ 327.256017][T10975] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 327.261906][T10975] RIP: 0033:0x7f39c621e33c [ 327.266313][T10975] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 327.286193][T10975] RSP: 002b:00007f39c4888030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 327.294603][T10975] RAX: ffffffffffffffda RBX: 00007f39c6446fa0 RCX: 00007f39c621e33c [ 327.302597][T10975] RDX: 000000000000000f RSI: 00007f39c48880a0 RDI: 0000000000000008 [ 327.310581][T10975] RBP: 00007f39c4888090 R08: 0000000000000000 R09: 0000000000000000 [ 327.318546][T10975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 327.326602][T10975] R13: 0000000000000000 R14: 00007f39c6446fa0 R15: 00007ffc1314e6a8 [ 327.435487][T10980] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.491201][T10980] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.525950][T10980] device bridge_slave_0 entered promiscuous mode [ 327.607322][T10980] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.674149][T10980] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.696489][T10980] device bridge_slave_1 entered promiscuous mode [ 327.902970][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 327.922431][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 327.969484][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 327.984619][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 327.993068][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.000147][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.009241][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 328.018028][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 328.029590][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.036803][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.050664][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 328.059114][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 328.067916][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 328.149460][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 328.173158][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 328.223000][T10980] device veth0_vlan entered promiscuous mode [ 328.239604][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 328.248136][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 328.257055][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 328.306014][T10980] device veth1_macvtap entered promiscuous mode [ 328.333794][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 328.667289][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 328.687630][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 328.719714][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 328.728364][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 329.887498][T11104] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.263758][T11122] device veth1_macvtap left promiscuous mode [ 330.327099][T11122] device macsec0 entered promiscuous mode [ 330.431884][T11122] device veth1_macvtap entered promiscuous mode [ 330.540266][T11124] device veth1_macvtap left promiscuous mode [ 331.121322][T11154] Â: renamed from pim6reg1 [ 331.504373][T11180] device wg2 entered promiscuous mode [ 333.818927][ T9967] cgroup: fork rejected by pids controller in /syz3 [ 333.851153][T11291] device sit0 entered promiscuous mode [ 334.127062][T11297] device wg2 left promiscuous mode [ 334.158897][T11297] device wg2 entered promiscuous mode [ 334.612226][T11323] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.624827][T11323] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.637251][T11323] device bridge_slave_0 entered promiscuous mode [ 334.676227][T11323] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.689236][T11323] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.703374][T11323] device bridge_slave_1 entered promiscuous mode [ 334.900339][T11323] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.907659][T11323] bridge0: port 2(bridge_slave_1) entered forwarding state [ 334.915056][T11323] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.922270][T11323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.955916][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 334.964151][ T1640] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.972520][ T1640] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.994489][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 335.005368][ T1640] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.012638][ T1640] bridge0: port 1(bridge_slave_0) entered forwarding state [ 335.020896][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 335.029172][ T1640] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.036206][ T1640] bridge0: port 2(bridge_slave_1) entered forwarding state [ 335.065559][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 335.074291][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 335.092586][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 335.101035][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 335.112121][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 335.120691][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 335.133409][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 335.141599][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 335.149606][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 335.157623][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 335.165909][T11323] device veth0_vlan entered promiscuous mode [ 335.239632][T11346] syz.2.3199 uses obsolete (PF_INET,SOCK_PACKET) [ 335.260674][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 335.277478][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 335.313716][T11323] device veth1_macvtap entered promiscuous mode [ 335.332736][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 335.355199][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 335.377864][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 335.407092][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 335.468055][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 335.779523][ T7] device bridge_slave_1 left promiscuous mode [ 335.786889][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.795256][ T7] device bridge_slave_0 left promiscuous mode [ 335.801592][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.810366][ T7] device veth1_macvtap left promiscuous mode [ 335.821839][ T7] device veth0_vlan left promiscuous mode [ 335.927823][T11382] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.985013][T11380] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.992773][T11380] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.002665][T11380] device bridge_slave_0 entered promiscuous mode [ 336.012997][T11380] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.034992][T11380] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.043330][T11380] device bridge_slave_1 entered promiscuous mode [ 336.188655][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 336.196267][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 336.252377][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 336.328183][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 336.356967][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.364078][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.371842][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 336.380442][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 336.388964][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.396020][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.403584][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 336.480265][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 336.488696][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 336.627964][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 336.883926][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 336.895178][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 336.909357][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 336.961885][T11380] device veth0_vlan entered promiscuous mode [ 337.001957][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 337.092061][T11380] device veth1_macvtap entered promiscuous mode [ 337.154274][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 337.169344][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 337.222375][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 337.258601][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 337.940563][ T7] device bridge_slave_1 left promiscuous mode [ 337.959401][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.007472][ T7] device bridge_slave_0 left promiscuous mode [ 338.017106][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.570014][T11470] syz.2.3235[11470] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.570089][T11470] syz.2.3235[11470] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.738595][T11520] device pim6reg1 entered promiscuous mode [ 340.941337][T11575] device syzkaller0 entered promiscuous mode [ 343.326135][T11695] device syzkaller0 entered promiscuous mode [ 343.352488][T11692] device pim6reg1 entered promiscuous mode [ 343.662562][T11720] device pim6reg1 entered promiscuous mode [ 344.635295][T11770] device wg2 left promiscuous mode [ 345.277161][T11821] device macsec0 entered promiscuous mode [ 345.335926][T11825] device syzkaller0 entered promiscuous mode [ 345.805556][T11848] device syzkaller0 entered promiscuous mode [ 348.308849][T11945] device syzkaller0 entered promiscuous mode [ 348.623698][T11987] device veth0_to_bridge entered promiscuous mode [ 348.642925][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.681794][T11985] device syzkaller0 entered promiscuous mode [ 348.999626][T12007] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.062401][T12007] device bridge_slave_1 left promiscuous mode [ 349.097637][T12007] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.105506][T12007] device bridge_slave_0 left promiscuous mode [ 349.112055][T12007] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.323203][T12029] device syzkaller0 entered promiscuous mode [ 350.460086][T12092] syz.1.3418[12092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.460178][T12092] syz.1.3418[12092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.993868][T12120] device pim6reg1 entered promiscuous mode [ 352.660484][T12170] syz.4.3441[12170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 352.660573][T12170] syz.4.3441[12170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.931301][T12255] device macsec0 left promiscuous mode [ 355.309735][T12278] ref_ctr_offset mismatch. inode: 0x127 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 355.594561][T12299] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 355.695186][T12299] device syzkaller0 entered promiscuous mode [ 356.096037][T12311] device syzkaller0 entered promiscuous mode [ 356.291474][T12324] syz.4.3485[12324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.291565][T12324] syz.4.3485[12324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.357176][T12368] device pim6reg1 entered promiscuous mode [ 358.436407][T12395] device pim6reg1 entered promiscuous mode [ 358.567234][T12397] device veth1_macvtap entered promiscuous mode [ 358.616886][T12397] device macsec0 entered promiscuous mode [ 358.632570][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 360.143464][T12435] device pim6reg1 entered promiscuous mode [ 360.227203][T12441] device pim6reg1 entered promiscuous mode [ 361.089726][T12504] device veth0_vlan left promiscuous mode [ 361.125591][T12504] device veth0_vlan entered promiscuous mode [ 361.202593][T12504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 361.238629][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 361.258373][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 361.282586][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 361.351129][T12519] syz.3.3543 (12519) used obsolete PPPIOCDETACH ioctl [ 370.399948][T12558] device wg2 entered promiscuous mode [ 371.653994][T12596] device sit0 entered promiscuous mode [ 371.943535][T12603] device veth0_vlan left promiscuous mode [ 371.964133][T12603] device veth0_vlan entered promiscuous mode [ 372.184254][T12606] device syzkaller0 entered promiscuous mode [ 372.217464][T12609] device syzkaller0 entered promiscuous mode [ 372.372651][T12610] device sit0 left promiscuous mode [ 372.431322][T12612] device sit0 entered promiscuous mode [ 372.447845][T12616] device sit0 left promiscuous mode [ 372.489980][T12617] device sit0 entered promiscuous mode [ 372.698676][T12621] device pim6reg1 entered promiscuous mode [ 372.892693][T12629] device sit0 left promiscuous mode [ 373.045558][T12632] device sit0 entered promiscuous mode [ 373.526941][T12649] device veth0_vlan left promiscuous mode [ 373.538261][T12649] device veth0_vlan entered promiscuous mode [ 373.566478][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 373.598459][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 373.638070][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 373.788807][T12646] device syzkaller0 entered promiscuous mode [ 374.406122][T12709] device syzkaller0 entered promiscuous mode [ 377.513205][T12813] device wg2 entered promiscuous mode [ 378.841481][T12859] device syzkaller0 entered promiscuous mode [ 380.452655][T12901] device wg2 entered promiscuous mode [ 382.409403][T12978] device wg2 entered promiscuous mode [ 382.714062][T12979] device syzkaller0 entered promiscuous mode [ 383.208318][T12998] device sit0 left promiscuous mode [ 383.796378][T13015] device syzkaller0 entered promiscuous mode [ 384.683828][T13028] device veth0_vlan left promiscuous mode [ 384.712394][T13028] device veth0_vlan entered promiscuous mode [ 386.922841][T13086] device syzkaller0 entered promiscuous mode [ 389.509608][T13171] device pim6reg1 entered promiscuous mode [ 390.430343][T13188] device pim6reg1 entered promiscuous mode [ 390.522447][T13190] device wg2 left promiscuous mode [ 390.575862][T13186] device wg2 entered promiscuous mode [ 391.169239][T13223] device syzkaller0 entered promiscuous mode [ 391.953179][T13257] device pim6reg1 entered promiscuous mode [ 392.738989][T13279] syz.3.3747[13279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.739077][T13279] syz.3.3747[13279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.232647][T13362] device syzkaller0 entered promiscuous mode [ 401.653368][T13446] device syzkaller0 entered promiscuous mode [ 401.832348][T13483] bridge0: port 1(veth1) entered blocking state [ 401.846325][T13483] bridge0: port 1(veth1) entered disabled state [ 401.863115][T13483] device veth1 entered promiscuous mode [ 402.022367][T13492] bridge0: port 2(bridge_slave_1) entered disabled state [ 402.140989][T13495] @ÿ: renamed from bond_slave_0 [ 402.194728][T13497] device pim6reg1 entered promiscuous mode [ 402.688640][T13523] device syzkaller0 entered promiscuous mode [ 404.770327][T13592] device macsec0 left promiscuous mode [ 405.864028][T13645] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.872891][T13647] device sit0 left promiscuous mode [ 405.950667][T13648] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.957787][T13648] bridge0: port 2(bridge_slave_1) entered forwarding state [ 405.969620][T13648] device bridge0 entered promiscuous mode [ 406.459055][T13683] device sit0 entered promiscuous mode [ 407.637622][T13727] syz.4.3879[13727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.637715][T13727] syz.4.3879[13727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.757104][T13727] device sit0 entered promiscuous mode [ 408.023887][T13733] device pim6reg1 entered promiscuous mode [ 408.100553][T13751] device sit0 left promiscuous mode [ 408.388262][T13780] device pim6reg1 entered promiscuous mode [ 409.103431][T13807] device syzkaller0 entered promiscuous mode [ 409.529263][T13837] device pim6reg1 entered promiscuous mode [ 410.589681][T13889] bridge0: port 1(bridge_slave_0) entered blocking state [ 410.666863][T13889] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.710519][T13889] device bridge_slave_0 entered promiscuous mode [ 410.780269][T13889] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.797449][T13889] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.816469][T13889] device bridge_slave_1 entered promiscuous mode [ 412.035432][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 412.043380][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 412.087574][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 412.096356][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 412.104634][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 412.111673][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 412.193482][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 412.201190][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 412.210200][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 412.219203][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.226256][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 412.233995][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 412.242409][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 412.250657][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 412.258795][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 412.510076][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 412.518641][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 412.549412][T13889] device veth0_vlan entered promiscuous mode [ 412.562461][T13889] device veth1_macvtap entered promiscuous mode [ 412.611753][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 412.653427][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 412.675194][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 412.683823][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 412.692297][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 412.700467][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 412.709168][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 412.727180][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 412.735765][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 412.744548][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 412.782317][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 412.918760][T13925] device pim6reg1 entered promiscuous mode [ 412.975300][T13927] device pim6reg1 entered promiscuous mode [ 413.774969][T13948] device pim6reg1 entered promiscuous mode [ 414.079852][T13953] device veth0_vlan left promiscuous mode [ 414.176724][T13953] device veth0_vlan entered promiscuous mode [ 414.342531][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 414.355431][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 414.386922][ T1640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready SYZFAIL: failed to send rpc fd=3 want=848 sent=0 n=-1 (errno 32: Broken pipe) [ 437.596800][ T24] audit: type=1400 audit(1750816828.770:169): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[13590]" dev="pipefs" ino=13590 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 438.387163][ T7] device veth1 left promiscuous mode [ 438.393019][ T7] bridge0: port 1(veth1) entered disabled state [ 438.401486][ T7] device veth0_vlan left promiscuous mode [ 440.028490][ T7] device bridge_slave_1 left promiscuous mode [ 440.034645][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.042251][ T7] device bridge_slave_0 left promiscuous mode [ 440.048385][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.056030][ T7] device bridge_slave_1 left promiscuous mode [ 440.062214][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.071358][ T7] device bridge_slave_0 left promiscuous mode [ 440.077734][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.085460][ T7] device bridge_slave_1 left promiscuous mode [ 440.091858][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.099216][ T7] device bridge_slave_0 left promiscuous mode [ 440.105309][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.113523][ T7] device veth0_vlan left promiscuous mode [ 440.119409][ T7] device veth1_macvtap left promiscuous mode [ 440.125451][ T7] device veth1_macvtap left promiscuous mode [ 440.131516][ T7] device veth0_vlan left promiscuous mode [ 440.137403][ T7] device veth1_macvtap left promiscuous mode