last executing test programs: 4.516192841s ago: executing program 1 (id=2361): perf_event_open(&(0x7f00000002c0)={0x7, 0x80, 0x5, 0x0, 0x7, 0xa, 0x0, 0x5, 0x2000, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x767d, 0x2, @perf_config_ext={0x6, 0x7}, 0x100090, 0x3, 0xfffffffd, 0x0, 0x8, 0x3, 0x401, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xb, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000021003c0000003c0000000a000000000000000000000b02000000000000000300000d000000000300000003000000000000000300000004000000030000000000000000000005000000000000002e5f"], &(0x7f0000000b80)=""/4090, 0x5e, 0xffa, 0x1, 0x0, 0x0, @void, @value}, 0x20) 4.515743081s ago: executing program 1 (id=2362): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x6, 0x9, 0x0, 0x8, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x440, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000c76d000000000000008100000081"], 0x48) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="8510000004000000950000000000000018000004000000000000000000000000950000000000000085100000fcffffff9500000000000000f0df6fcdcc3574e8fb9a37"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r5, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xf4240, 0x0, &(0x7f0000001680)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r10}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r11, &(0x7f0000000180), 0x40010) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r6}, &(0x7f00000001c0), &(0x7f0000000300)=r9}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r7}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r12, &(0x7f0000000180), 0x40010) (async) write$cgroup_type(r12, &(0x7f0000000180), 0x40010) openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x200080, 0x0) 4.329635254s ago: executing program 1 (id=2365): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, 0x0, &(0x7f00000003c0)}, 0x20) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f0000000180)=@framed={{0x18, 0x8}, [@initr0]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000400)='{\x05T\x82\x89\x98Yi:') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={r0, 0x0, 0x0}, 0x20) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0xa0001f98, 0x0, 0x0, &(0x7f0000000440), 0x0, 0xa70a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xf7, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff40000", 0x0, 0x8, 0x60000000}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r8 = openat$cgroup_devices(r7, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) close(r8) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB="000000000000000000000000001400fbe4df843c87ce7b1b736d2ea1a10715a90011f8a25f1285d3e8e24c3f913ede554945023e9796c47c575b8b503ce6df1e5705c711403cb5e6c31e7ce1b90a40f817ea47143c009c1cd51858363a7015699880c158", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r9}, &(0x7f0000000a00), &(0x7f0000000a40)=r7}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r9}, &(0x7f0000000880), &(0x7f00000008c0)=r7}, 0x20) 2.731107758s ago: executing program 2 (id=2370): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000001c0)='(pu&00\t&&') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079d}) mkdir(&(0x7f0000000580)='./file0\x00', 0xaa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x1d, &(0x7f00000001c0), 0x4) r8 = openat$cgroup_procs(r5, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000880), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="001900"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$tipc(r7, &(0x7f0000000540)={&(0x7f0000000340)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x4}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000003c0)="ad2222b995009ad9048fe817443431a7d20bcb34f79b89d2542049476c5ee281a1550a84f9b3572e2b77028d4b8c8ffbf0af82d60b88c33a85066428d5091c2bf15c8e122f86ddeb1c61f2e3c971bcb706c19e3706a9cacdf25fd6f02b", 0x5d}], 0x1, &(0x7f0000000500)="74d304d5c46c49bc2dec88015a5a2cf5a22d0f71513dbf6f880cc198d5fce523ca9aeee4908372190ef98b39c8db1f", 0x2f, 0x4000000}, 0x2000c041) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) 2.549577931s ago: executing program 3 (id=2372): perf_event_open(&(0x7f00000002c0)={0x7, 0x80, 0x5, 0x0, 0x7, 0xa, 0x0, 0x5, 0x2000, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x767d, 0x2, @perf_config_ext={0x6, 0x7}, 0x100090, 0x3, 0xfffffffd, 0x0, 0x8, 0x3, 0x401, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xb, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000020003c0000003c0000000a000000000000000000000b02000000000000000300000d000000000300000003000000000000000300000004000000030000000000000000000005000000000000002e5f"], &(0x7f0000000b80)=""/4090, 0x5e, 0xffa, 0x1, 0x0, 0x0, @void, @value}, 0x20) 2.496871962s ago: executing program 3 (id=2373): perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000500)={r3, 0x0, 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r4}, 0x10) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES16], 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, 0x0, 0x0}, 0x20) socketpair(0x1, 0x1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@o_path={0x0, 0x0, 0x0, r5}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x88182, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8983, &(0x7f0000000080)) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 2.155427477s ago: executing program 2 (id=2374): r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ff}, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f2, &(0x7f0000000080)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="150000000400000004000000040080000040040046ece9024850a21b2c080feb418058f470851e474283d1da875efa69a42fea3cf3f724b328f300835f0017d4a9bb05e6690238dd198f1800e5b81e0b223b1c3e36861409d19c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r9}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@fallback, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000400), &(0x7f0000000500)=[0x0, 0x0, 0x0], 0x0, 0xac, &(0x7f0000000540)=[{}, {}], 0x10, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0xcb, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@ifindex=r11, 0xffffffffffffffff, 0x3, 0x2, 0xffffffffffffffff, @void, @value, @void, @void, r10}, 0x20) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0x12, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff8001, 0x0, 0x0, 0x0, 0x6}, [@cb_func={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x84}, @alu={0x4, 0x0, 0x0, 0x9, 0x3, 0x18, 0x4}, @map_val={0x18, 0x3, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0xff000000}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0xc}, @map_fd={0x18, 0x4, 0x1, 0x0, r8}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0xa8}]}, &(0x7f0000000340)='GPL\x00', 0x2, 0xc9, &(0x7f0000000680)=""/201, 0x41100, 0x10, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x1, 0x4, 0x0, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r4, r4, r9, r4], 0x0, 0x10, 0x1, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@map=r8, r5, 0x33, 0x0, 0x0, @void, @value=r12, @void, @void, r10}, 0x20) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='fib_table_lookup\x00', r13}, 0x10) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r14}, 0x0, &(0x7f0000000340)=r15}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r15}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={@fallback=r13, r0, 0x14, 0x4, 0x0, @void, @value=r15, @void, @void, r10}, 0x20) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r16, 0x18000000000002a0, 0x26, 0x0, &(0x7f0000002100)="b9fa030711a5f32e019e14f088a847e0ffff00124000638977fbac141416e000030a94029f03", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.879216261s ago: executing program 4 (id=2375): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000000, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) socketpair(0x11, 0x2, 0x300, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x18, 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000000000700000000000000000e95"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='9p_client_req\x00', r7}, 0x10) r9 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r8}, 0x8) setsockopt$sock_attach_bpf(r6, 0x1, 0x42, &(0x7f0000000040)=r9, 0x3b) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x3, 0x81, 0x3, 0x0, 0x5, 0x10000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000040)}, 0x1, 0x8, 0x0, 0x2, 0x9, 0x2, 0xc, 0x0, 0xffff, 0x0, 0x8}, r5, 0xa, r9, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r10}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 1.529888377s ago: executing program 1 (id=2376): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x4, 0x2000000000000068, &(0x7f00000002c0)=ANY=[@ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) write$cgroup_type(r2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) openat$cgroup_freezer_state(r3, 0x0, 0x2, 0x0) r5 = openat$cgroup_freezer_state(r3, &(0x7f0000000280), 0x2, 0x0) close(r5) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001100)=ANY=[@ANYBLOB="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"/2659], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x200, 0x3040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001080)={r6, 0x18000000000002a0, 0x36, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f086ddeff913e613c26d42000000fbac14140be000031762079f4b4d2f87e5feca6aab845013f232050039", 0x0, 0x2000000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESOCT=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5545ef3ea41e0243, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x10, 0x3, 0x10, &(0x7f0000003f80)) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r7, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd55", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e00001811", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) 1.423680629s ago: executing program 3 (id=2377): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x9, 0x3, 0x0, 0xfffffffffff7bbfe, 0x3, 0x0, 0x0, 0x602}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff5e) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000400)={'bond_slave_0\x00', @broadcast}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000800)='fib6_table_lookup\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 1.397539949s ago: executing program 3 (id=2378): bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00400000000000b31f1edaafe00c6a65eba83fcdda40fd2c16f160372cee", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x5}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x1b}, 0x0, 0xfff0000000000003, 0xffffffffffffffff, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080000020110000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000b01e5f79d9fab15bf0ad1c98d0f8a150ad2f48e7e9e1c2cf8c126c88d7275343cc0bf54f4aaa514992ec4c2bba412ad02cc6d12c6242f32c419faa7ededc3afe1df33606235dbb0381a02516c19bdc4a65008244ca4ebebd0852c797a740561b7c352d294612e539cbe2dee894", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x3, 0x14, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES16=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000045000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x20000800, &(0x7f0000000340)="383caa12cf6ab608793f43dbc69e1fb59f3029b3083407a476087ea4423180b29efbe0dcc3588294f650419fd529f7e1e0bdb50145149b6415d4078f02633f833d8d7da896ba5327251b999a8461228763b4ca02a37fb93774728c1775ad169f318af52d6e260f4ec4ad97a0db4a612ac58ac0b119def56c92aebd4bbaf28d6e2c60bd62c9e8175dc7565e61a5e63751959e20ca036ec6c10f1c2bdac6ed93914f0f2eb79225d3648193345a2934aa635df23803", 0xb4, &(0x7f0000000400), &(0x7f0000000500), &(0x7f0000000540)="103bf1e387ff60cd7c5807fd7ca2860cefd44135dc6b2d1f01727bfef747f2728740c89a07bd6447a65303acb8c969458f60a2de6c2d") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000ffff0018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1.193633522s ago: executing program 0 (id=2380): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff, @void, @value}, 0x94) close(r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00'}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x13, 0xc, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000044e3000000000000000000000000000000700495b8"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x6, 0x7, 0x9, 0x34908, r3, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x100001, 0x0, 0xb, @void, @value, @value}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000500"/29], 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd24}, {0x0, 0x4000}, {0x0, 0x21}, {0x0}, {&(0x7f00000020c0)}], 0x5}, 0x0) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r8, 0x2405, r8) close(r9) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r10) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x4800, 0x40000000000000c8, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.046882064s ago: executing program 3 (id=2381): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00'}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) r2 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000001c0), 0x12) mkdir(&(0x7f0000000180)='./file0\x00', 0x8) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000002c0000002c0000000b00000007000000010000060400000007000000000000000000000001000004ffff000001000000010000000000000000610000000000ff2e"], 0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000001c0)='kmem_cache_free\x00', r6}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r7, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(r7) sendmsg$inet(r8, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r4, &(0x7f00000000c0), 0x12) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r9, 0x401054d5, &(0x7f0000000780)={0x1, &(0x7f00000001c0)=[{0x45, 0x0, 0x2, 0x8}]}) 975.247265ms ago: executing program 2 (id=2382): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) write$cgroup_devices(r0, &(0x7f00000000c0)={'c', ' *:* ', 'm\x00'}, 0x8) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000004c0)={r0, &(0x7f0000000340), 0x0}, 0x20) 883.832857ms ago: executing program 2 (id=2383): perf_event_open(&(0x7f00000002c0)={0x7, 0x80, 0x5, 0x0, 0x7, 0xa, 0x0, 0x5, 0x2000, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x767d, 0x2, @perf_config_ext={0x6, 0x7}, 0x100090, 0x3, 0xfffffffd, 0x0, 0x8, 0x3, 0x401, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xb, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000021003c0000003c0000000a000000000000000000000b02000000000000000300000d000000000300000003000000000000000300000004000000030000000000000000000005000000000000002e5f"], &(0x7f0000000b80)=""/4090, 0x5e, 0xffa, 0x1, 0x0, 0x0, @void, @value}, 0x20) 861.820027ms ago: executing program 2 (id=2384): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb23}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x9, 0x0, &(0x7f00000005c0)="fd39c2c154bc3a8393", 0x0, 0x9df, 0x0, 0x0, 0x14, &(0x7f00000006c0), &(0x7f0000000740)="73ab23ce196c7a92f8166ee60e8be2e134a91bc6", 0x9, 0x0, 0x4}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x14380, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x7, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r0}, &(0x7f0000000500), &(0x7f0000000540)=r1}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x1e000, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r5}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x6da7) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x48) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000f8ffff00080000002c0e683a5ee6a663196165e860caf6ad8f378ed09853a4aa40f1e0bfe7729832b68ff695b4c46066821685998387a3741d4256aa6636f9674b6d029a798f56fbb8052ee76b870b855c656440e58f54015d056b12d43da6ec20e5f9659459352aede8cdf345cea84f4873521ad788a427e19841d38c0afe04ee3533d726f1588b1221fb0ba8bdae35bd1eea63a5d11796f47187fb28880eedd084fd6792f721"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x19, &(0x7f0000000400)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @call={0x85, 0x0, 0x0, 0x50}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 660.38434ms ago: executing program 4 (id=2385): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000040), 0x2, 0x0) ioctl$TUNGETVNETLE(r0, 0x4010744d, &(0x7f0000000180)) 573.547951ms ago: executing program 1 (id=2386): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0xfe40) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r1, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)=r2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4bc, 0x7fffffff}, 0x11100, 0x0, 0xfffffffc, 0x4, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x100) close(r3) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000000001a000000000000006c00000000009500000000000000c49b23458dae42e10ba0bd3b39b5eb663ae903d46c6d00a463181efcec9c867cccf26a8581c85a071928df9742e76a62108e8fe07bf4f72806175fb697926f56852d135314a1d2e5b69a8fb925574ae6c85a906f2b09b728b808710e25f16110adb92d6b7ad7f2e6f6310a4d3502564a3a8903"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x3}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1801000000001f00000000000000ea1f850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xff4d, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r5}, 0x18) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x1, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0x7bb}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xf, 0x3, &(0x7f0000000680)=@framed={{0x18, 0x8}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x8}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 530.536432ms ago: executing program 4 (id=2387): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10005, 0x0, 0xffffffffffffffff, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) close(r4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) (async) write$cgroup_pid(r4, &(0x7f00000005c0), 0x12) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_type(r9, 0x0, 0x0) (async) socketpair(0x15, 0x5, 0x5, &(0x7f0000000200)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYRES32=0x1, @ANYBLOB="000000000000000045510000478994", @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0x10003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305829, &(0x7f0000000040)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r7, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 528.128452ms ago: executing program 3 (id=2388): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{}, &(0x7f0000000980), &(0x7f0000000b40)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r2}, &(0x7f0000000000), &(0x7f00000005c0)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x41420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8937, 0x0) 430.853204ms ago: executing program 4 (id=2389): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYBLOB="9ad7cb55d907ffbed57b77e2a2c6db63", @ANYBLOB="43da5f2e", @ANYRES32=r1, @ANYRESDEC=r2], 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc0189436, 0x2000141a) openat$cgroup_freezer_state(r3, &(0x7f0000000080), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xf7, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 427.253784ms ago: executing program 1 (id=2390): mkdir(&(0x7f0000000580)='./file0\x00', 0xaa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000f6ffffffffff1701000020207025000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x1d, &(0x7f00000001c0), 0x4) r6 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000880), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="4000000000000000ecffffff0000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x31) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r8, @ANYBLOB="ff00"/20, @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="00000000040000000000000000eca9afe0803031df02db5f3edf79bf"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r7, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', r10, 0x2, r8, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000780), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x9, 0x5, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000f600000000000000000000000095000000000000000e0000000000000000000000000000cbf50d0fda263b3e6266313f4d1bfdc9f6ec7b84425681628e885acaa38bf80211fb757f61b67229a4d8b4b346bc8bb827144d0407adfdef42a1989c7aaeadd22e2c66efc5a281b949754d67ab1bdd9d6d0e0e4da5b943e7e0d8878c547b964516f87b29bce0bcab1f2a5a61ff67e875f1546bd2e8"], &(0x7f0000000680)='GPL\x00', 0xfffffffe, 0xa3, &(0x7f00000006c0)=""/163, 0x40f00, 0x20, '\x00', r10, @fallback=0x1e, r11, 0x8, &(0x7f00000007c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000800)={0x5, 0xc, 0x1, 0x2}, 0x10, 0x0, r1, 0x2, 0x0, &(0x7f0000000840)=[{0x0, 0x2, 0xb}, {0x3, 0x2, 0x8, 0x1}], 0x10, 0x7f, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYRESDEC=r2], 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x16, 0xf, &(0x7f0000000a80)=ANY=[@ANYBLOB="1800000000000000000000000200000018110000", @ANYRES32=r9, @ANYRES64=r4], &(0x7f0000000480)='GPL\x00', 0x2, 0x4c, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000040)='mm_lru_insertion\x00', r12}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$tipc(r5, &(0x7f0000000540)={&(0x7f0000000340)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x4}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000003c0)="ad2222b995009ad9048fe817443431a7d20bcb34f79b89d2542049476c5ee281a1550a84f9b3572e2b77028d4b8c8ffbf0af82d60b88c33a85066428d5091c2bf15c8e122f86ddeb1c61f2e3c971bcb706c19e3706a9cacdf25fd6f02b3063f040404b37d00e4e6f6cc20859bcb806f18d5e8f7b126c19431fdb56af", 0x7c}], 0x1, &(0x7f0000000500)="74d304d5c46c49bc2dec88015a5a2cf5a22d0f71513dbf6f880cc198d5fce523ca9aeee4908372190ef98b39c8db1f", 0x2f, 0x4000000}, 0x2000c041) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) 345.556465ms ago: executing program 4 (id=2391): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0xfffffffffffffeb5, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x100678, 0xc8, 0x80000001, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x775}, 0x0, 0x2000000000000000, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000c9"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa067707"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x2f, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x61a}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x56e266b}}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x5}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xf7, &(0x7f0000000640)=""/247, 0x41000, 0x58, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0)={0x2, 0x10, 0x5, 0x21305a32}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000400)=[r0, r0, r0, r0], &(0x7f0000000740)=[{0x0, 0x3, 0x8, 0x3}, {0x0, 0x4, 0x4, 0x9}, {0x3, 0x1, 0x2, 0x6c0bd3bb8d62dd9e}, {0x5, 0x4, 0x4, 0xf}, {0x0, 0x5, 0x5, 0xc}, {0x4, 0x1, 0x4, 0x7}], 0x10, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000040)='f2fs_shutdown\x00', r6, 0x0, 0x8000000000000001}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749da00000097f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff472558014391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d74e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f3431f67fc65b75c202e43816e34ff41db85bacd77b25242830b788ae1e00000000000000000000000000c8b8b5b137dcb7a7949e12307d1fce56fe5b76d2f3f5a7692379542e3fd9a5a7dc57e1dec0bdce65b5db59a0733c9b9da612adb91948ecbfaff8fc206b8350fe268b98aaa2e288be77aedddcc7fb7d631e69b176e2e6678fe1237cb2"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x4a) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r9}, 0x10) 284.284426ms ago: executing program 0 (id=2392): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000071122700000000009500000700000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x8, 0x7, 0x1, 0x50, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4, 0x5, @void, @value, @void, @value}, 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000000c0)={&(0x7f0000000200)="40d0ec0f4a9bbb2dbf5ce5bfe1199f27e9c4b1b9427660d109c09c400becb9f40dcd294f2294be264db245325202cc27b36f48ea6a593fe4b1b32b937e7218afc734dd7648d98e91594b053dc64a8709ea1f6ebb5521ccc62541be606467e654fc67fc7f222192464ba608d6a834641cad6505bd45ee201bd086e3d2f0458e2ec12529b3", &(0x7f0000000000)=""/33, &(0x7f0000000080)="cdcfe0950a0b5c9e54858590f57b1ab8127e3023189630578396", &(0x7f00000002c0)="ef1ac499514696edd49fd66d87ebe80dcd2875f619c8aef764f1d40087a26619cb513132cf0e39549e9f732f4876b97f292463db2d339e9fc1eb68b8753838b4ebb516efcc0530be011be6cf3ab36ed12de3b15aaf05600d6f491151700e9658541dea1ccec01eba5c703483a3e8e513", 0x0, r0}, 0x38) 228.673017ms ago: executing program 0 (id=2393): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) write$cgroup_devices(r0, &(0x7f00000000c0)={'c', ' *:* ', 'm\x00'}, 0x8) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000004c0)={r0, &(0x7f0000000340), 0x0}, 0x20) 125.803938ms ago: executing program 0 (id=2394): perf_event_open(&(0x7f00000002c0)={0x7, 0x80, 0x5, 0x0, 0x7, 0xa, 0x0, 0x5, 0x2000, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x767d, 0x2, @perf_config_ext={0x6, 0x7}, 0x100090, 0x3, 0xfffffffd, 0x0, 0x8, 0x3, 0x401, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xb, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000203c0000003c0000000a000000000000000000000b02000000000000000300000d000000000300000003000000000000000300000004000000030000000000000000000005000000000000002e5f"], &(0x7f0000000b80)=""/4090, 0x5e, 0xffa, 0x1, 0x0, 0x0, @void, @value}, 0x20) 125.412918ms ago: executing program 0 (id=2395): r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x42008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x17}, 0x0, 0xc8, 0x0, 0x0, 0x34}, 0x0, 0x7, 0xffffffffffffffff, 0x9) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000001811000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000030000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000030000009500000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000e0ffffffffffffff809e6d1b520000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES16=r0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r5}, 0x10) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x10) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r7, 0x0, 0x0}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r3}, 0x10) (async) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r8}, 0x10) (async) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r9}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000fdffffff00"/25], 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r10) 122.973678ms ago: executing program 0 (id=2396): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1a"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0xc8, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xe) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.freeze\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x3, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) 57.209839ms ago: executing program 4 (id=2397): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00'}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[], 0x48) recvmsg(r1, &(0x7f0000000900)={0x0, 0x40, &(0x7f0000000200)=[{&(0x7f0000000380)=""/188, 0xcb}], 0x1}, 0x10103) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x6, 0x4, 0xdd, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r6}, &(0x7f0000000080), &(0x7f0000000180), 0x2000000}, 0x20) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r8}, 0x10) 0s ago: executing program 2 (id=2398): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYRES8=r2, @ANYRES16=r0, @ANYBLOB="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", @ANYRESOCT=r1, @ANYRES32=r0, @ANYRES8=r0], 0x128}, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000000c0)={0x7fffffff}, 0x8) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x6, 0x4, 0x1, 0x0, r5, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r6}, &(0x7f0000000840), &(0x7f0000000880)=r5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() syz_open_procfs$namespace(r9, &(0x7f0000000080)='ns/user\x00') sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r10, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) syz_clone(0x4080b000, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): rocess permissive=1 [ 16.731487][ T24] audit: type=1400 audit(1750122801.940:63): avc: denied { siginh } for pid=217 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.163' (ED25519) to the list of known hosts. [ 23.513563][ T24] audit: type=1400 audit(1750122808.790:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.514645][ T267] cgroup: Unknown subsys name 'net' [ 23.537134][ T24] audit: type=1400 audit(1750122808.790:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.565603][ T24] audit: type=1400 audit(1750122808.820:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.565879][ T267] cgroup: Unknown subsys name 'devices' [ 23.800390][ T267] cgroup: Unknown subsys name 'hugetlb' [ 23.806396][ T267] cgroup: Unknown subsys name 'rlimit' [ 23.975365][ T24] audit: type=1400 audit(1750122809.250:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.999735][ T24] audit: type=1400 audit(1750122809.250:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 24.001231][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.025697][ T24] audit: type=1400 audit(1750122809.250:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 24.059591][ T24] audit: type=1400 audit(1750122809.310:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.059603][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 24.096610][ T24] audit: type=1400 audit(1750122809.310:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.123230][ T24] audit: type=1400 audit(1750122809.320:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.150778][ T24] audit: type=1400 audit(1750122809.320:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.695352][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.702795][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.710617][ T278] device bridge_slave_0 entered promiscuous mode [ 24.733632][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.740975][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.748851][ T278] device bridge_slave_1 entered promiscuous mode [ 24.780009][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.787076][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.795035][ T276] device bridge_slave_0 entered promiscuous mode [ 24.818833][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.825978][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.833367][ T276] device bridge_slave_1 entered promiscuous mode [ 24.844296][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.852014][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.859478][ T275] device bridge_slave_0 entered promiscuous mode [ 24.867171][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.874526][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.883127][ T275] device bridge_slave_1 entered promiscuous mode [ 24.898280][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.905671][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.913684][ T277] device bridge_slave_0 entered promiscuous mode [ 24.924070][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.931657][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.939091][ T277] device bridge_slave_1 entered promiscuous mode [ 24.983201][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.990301][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.997552][ T279] device bridge_slave_0 entered promiscuous mode [ 25.029575][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.036739][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.044507][ T279] device bridge_slave_1 entered promiscuous mode [ 25.093084][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.100294][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.107616][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.114887][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.167426][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.174725][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.182206][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.189549][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.198287][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.205986][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.213320][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.220407][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.229636][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.237074][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.244548][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.252515][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.292350][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.299729][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.307335][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.314515][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.342476][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.350804][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.359173][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.366888][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.375363][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.383413][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.392427][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.400104][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.407871][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.416385][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.424251][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.453339][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.462216][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.469276][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.476858][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.484587][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.492262][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.501315][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.508524][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.515941][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.524473][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.531991][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.539366][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.547818][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.556663][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.581265][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.590966][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.599750][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.607649][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.616441][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.624479][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.632310][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.641022][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.648281][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.672588][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.681737][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.691465][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.698992][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.706924][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.716024][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.723465][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.731695][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.740372][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.747942][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.755848][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.764306][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.772670][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.781003][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.789496][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.799420][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.817068][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.825258][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.833783][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.843543][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.851877][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.860516][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.869018][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.878100][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.896035][ T275] device veth0_vlan entered promiscuous mode [ 25.908239][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.917590][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.926931][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.937197][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.946462][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.954708][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.967281][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.975924][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.989070][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.997097][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.013007][ T277] device veth0_vlan entered promiscuous mode [ 26.019624][ T278] device veth0_vlan entered promiscuous mode [ 26.026066][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.034128][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.042215][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.050765][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.059351][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.067977][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.077372][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.086109][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.095394][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.103277][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.113282][ T276] device veth0_vlan entered promiscuous mode [ 26.127503][ T275] device veth1_macvtap entered promiscuous mode [ 26.135624][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.144017][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.153178][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.162146][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.171653][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.181681][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.190404][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.205314][ T279] device veth0_vlan entered promiscuous mode [ 26.217470][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.226214][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.235138][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.244388][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.254117][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.262575][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.273399][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.282519][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.294094][ T276] device veth1_macvtap entered promiscuous mode [ 26.306515][ T278] device veth1_macvtap entered promiscuous mode [ 26.313992][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.322570][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.332339][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.340883][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.348763][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.356974][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.366280][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.375026][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.386025][ T277] device veth1_macvtap entered promiscuous mode [ 26.394541][ T279] device veth1_macvtap entered promiscuous mode [ 26.410664][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.419198][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.426820][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.435985][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.445474][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.455051][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.464268][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.473524][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.482922][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.491962][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.500570][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.509001][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.520552][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.528886][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.550122][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.560127][ T276] request_module fs-gadgetfs succeeded, but still no fs? [ 26.569695][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.579241][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.587649][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.604161][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.613702][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.622899][ T275] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 26.723854][ T309] tap0: tun_chr_ioctl cmd 1074025675 [ 26.734286][ T309] tap0: persist enabled [ 26.749530][ T309] tap0: tun_chr_ioctl cmd 1074025675 [ 26.764301][ T309] tap0: persist enabled [ 26.776471][ C1] hrtimer: interrupt took 25194 ns [ 26.914299][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.923315][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.417287][ T324] device sit0 entered promiscuous mode [ 27.753512][ T333] device sit0 entered promiscuous mode [ 28.107759][ T349] tap0: tun_chr_ioctl cmd 2147767507 [ 28.140234][ T345] device sit0 entered promiscuous mode [ 28.451150][ T361] bridge0: port 3(veth0) entered blocking state [ 28.457758][ T361] bridge0: port 3(veth0) entered disabled state [ 28.466547][ T361] device veth0 entered promiscuous mode [ 28.472857][ T361] bridge0: port 3(veth0) entered blocking state [ 28.479375][ T361] bridge0: port 3(veth0) entered forwarding state [ 28.935888][ T390] device sit0 entered promiscuous mode [ 29.257300][ T393] device sit0 left promiscuous mode [ 29.449834][ T400] device sit0 entered promiscuous mode [ 29.567705][ T24] kauditd_printk_skb: 45 callbacks suppressed [ 29.567716][ T24] audit: type=1400 audit(1750122814.840:119): avc: denied { create } for pid=406 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 29.687135][ T404] device sit0 entered promiscuous mode [ 29.889464][ T24] audit: type=1400 audit(1750122815.170:120): avc: denied { attach_queue } for pid=412 comm="syz.4.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 29.967075][ T24] audit: type=1400 audit(1750122815.240:121): avc: denied { read } for pid=419 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.601806][ T462] cgroup: syz.2.42 (462) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 30.708553][ T462] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 30.922559][ T501] device sit0 left promiscuous mode [ 31.011385][ T503] device sit0 entered promiscuous mode [ 31.947036][ T24] audit: type=1400 audit(1750122817.220:122): avc: denied { create } for pid=543 comm="syz.4.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 32.880697][ T24] audit: type=1400 audit(1750122818.160:123): avc: denied { create } for pid=611 comm="syz.3.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 33.163603][ T620] device syzkaller0 entered promiscuous mode [ 33.440120][ T24] audit: type=1400 audit(1750122818.710:124): avc: denied { ioctl } for pid=643 comm="syz.0.77" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 33.830478][ T662] device pim6reg1 entered promiscuous mode [ 34.559663][ T685] ÿÿÿÿÿÿ: renamed from vlan1 [ 34.708872][ T24] audit: type=1400 audit(1750122819.980:125): avc: denied { read } for pid=708 comm="syz.0.93" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 35.394205][ T748] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 35.401825][ T748] pim6reg0: linktype set to 260 [ 35.805087][ T783] device syzkaller0 entered promiscuous mode [ 35.874738][ T24] audit: type=1400 audit(1750122821.150:126): avc: denied { relabelfrom } for pid=782 comm="syz.1.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 35.924355][ T24] audit: type=1400 audit(1750122821.150:127): avc: denied { relabelto } for pid=782 comm="syz.1.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 36.455667][ T811] device syzkaller0 entered promiscuous mode [ 36.516527][ T827] device pim6reg1 entered promiscuous mode [ 37.399736][ T872] syz.1.136[872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.399822][ T872] syz.1.136[872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.786888][ T24] audit: type=1400 audit(1750122823.060:128): avc: denied { create } for pid=886 comm="syz.3.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 38.454700][ T24] audit: type=1400 audit(1750122823.730:129): avc: denied { create } for pid=897 comm="syz.3.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 38.587284][ T907] device syzkaller0 entered promiscuous mode [ 39.485188][ T930] device vxcan1 entered promiscuous mode [ 39.695989][ T938] device sit0 left promiscuous mode [ 39.732577][ T944] device sit0 entered promiscuous mode [ 41.533833][ T24] audit: type=1400 audit(1750122826.810:130): avc: denied { create } for pid=991 comm="syz.0.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 41.663441][ T999] device vxcan1 entered promiscuous mode [ 41.680460][ T24] audit: type=1400 audit(1750122826.960:131): avc: denied { create } for pid=1000 comm="syz.2.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 41.825884][ T24] audit: type=1400 audit(1750122827.100:132): avc: denied { create } for pid=1018 comm="syz.3.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 42.157113][ T24] audit: type=1400 audit(1750122827.430:133): avc: denied { create } for pid=1041 comm="syz.1.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 42.189336][ T1026] device pim6reg1 entered promiscuous mode [ 42.988087][ T24] audit: type=1400 audit(1750122828.260:134): avc: denied { create } for pid=1077 comm="syz.1.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 43.221881][ T1078] device sit0 left promiscuous mode [ 43.714878][ T1094] device syzkaller0 entered promiscuous mode [ 43.859104][ T24] audit: type=1400 audit(1750122829.140:135): avc: denied { create } for pid=1111 comm="syz.1.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 43.925586][ T1110] device sit0 left promiscuous mode [ 44.214344][ T1134] device sit0 entered promiscuous mode [ 44.355657][ T1127] device veth1_to_bond entered promiscuous mode [ 44.710734][ T1161] device pim6reg1 entered promiscuous mode [ 45.187392][ T1181] device pim6reg1 entered promiscuous mode [ 45.344169][ T24] audit: type=1400 audit(1750122830.620:136): avc: denied { create } for pid=1203 comm="syz.4.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 45.565364][ T24] audit: type=1400 audit(1750122830.840:137): avc: denied { create } for pid=1212 comm="syz.4.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 56.984027][ T1294] device pim6reg1 entered promiscuous mode [ 57.123101][ T1295] device wg2 entered promiscuous mode [ 57.224434][ T1304] syz.0.254 (1304) used obsolete PPPIOCDETACH ioctl [ 57.390987][ T1318] device wg2 entered promiscuous mode [ 57.598970][ T1323] device wg2 left promiscuous mode [ 57.707345][ T1324] device wg2 entered promiscuous mode [ 58.111717][ T1338] device syzkaller0 entered promiscuous mode [ 58.132086][ T1343] device sit0 left promiscuous mode [ 58.194657][ T1349] device pim6reg1 entered promiscuous mode [ 58.233208][ T1351] device wg2 entered promiscuous mode [ 58.695354][ T24] audit: type=1400 audit(1750122843.970:138): avc: denied { create } for pid=1375 comm="syz.0.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 59.309616][ T1424] device syzkaller0 entered promiscuous mode [ 60.013859][ T24] audit: type=1400 audit(1750122845.290:139): avc: denied { create } for pid=1448 comm="syz.0.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 60.295569][ T1470] device pim6reg1 entered promiscuous mode [ 60.415227][ T1486] cgroup: fork rejected by pids controller in /syz4 [ 61.182170][ T1517] device sit0 entered promiscuous mode [ 61.528706][ T1518] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.536282][ T1518] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.610124][ T1518] device bridge_slave_0 entered promiscuous mode [ 61.688840][ T1518] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.717648][ T1518] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.758714][ T1518] device bridge_slave_1 entered promiscuous mode [ 62.127186][ T24] audit: type=1400 audit(1750122847.400:140): avc: denied { create } for pid=1518 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.167842][ T24] audit: type=1400 audit(1750122847.400:141): avc: denied { write } for pid=1518 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.273090][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.288153][ T24] audit: type=1400 audit(1750122847.400:142): avc: denied { read } for pid=1518 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.309605][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.387808][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.406430][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.418785][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.426112][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.437079][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.476088][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.513131][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.521981][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.529107][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.704226][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 62.730235][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.772773][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.805751][ T1518] device veth0_vlan entered promiscuous mode [ 62.854630][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 62.881458][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 62.944656][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 62.994142][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 63.012099][ T1602] syz.1.332[1602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.012183][ T1602] syz.1.332[1602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.046842][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 63.099905][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 63.175316][ T1518] device veth1_macvtap entered promiscuous mode [ 63.200067][ T7] device bridge_slave_1 left promiscuous mode [ 63.216558][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.224605][ T7] device bridge_slave_0 left promiscuous mode [ 63.235337][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.264648][ T7] device veth1_macvtap left promiscuous mode [ 63.299842][ T7] device veth0_vlan left promiscuous mode [ 63.422256][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 63.430422][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 63.440053][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 63.520434][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 63.531662][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 64.052140][ T1670] device sit0 left promiscuous mode [ 64.195035][ T1672] device lo entered promiscuous mode [ 64.250372][ T1684] device syzkaller0 entered promiscuous mode [ 64.770809][ T24] audit: type=1400 audit(1750122850.050:143): avc: denied { append } for pid=1708 comm="syz.2.362" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 65.331462][ T1733] device syzkaller0 entered promiscuous mode [ 65.403184][ T1728] device wg2 entered promiscuous mode [ 66.082603][ T1764] €Â0: renamed from pim6reg1 [ 66.454193][ T1792] device veth1_macvtap left promiscuous mode [ 66.683246][ T1797] device macsec0 entered promiscuous mode [ 66.833690][ T24] audit: type=1400 audit(1750122852.110:144): avc: denied { create } for pid=1796 comm="syz.4.387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 67.397794][ T1813] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 67.756919][ T1834] device veth0_vlan left promiscuous mode [ 67.779304][ T1834] device veth0_vlan entered promiscuous mode [ 68.173692][ T1854] device sit0 left promiscuous mode [ 68.211832][ T1854] device sit0 entered promiscuous mode [ 69.430362][ T1881] device veth1_macvtap left promiscuous mode [ 69.674741][ T24] audit: type=1400 audit(1750122854.950:145): avc: denied { write } for pid=1893 comm="syz.4.413" name="cgroup.subtree_control" dev="cgroup2" ino=298 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 69.728308][ T24] audit: type=1400 audit(1750122854.990:146): avc: denied { open } for pid=1893 comm="syz.4.413" path="" dev="cgroup2" ino=298 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 69.882988][ T1895] device syzkaller0 entered promiscuous mode [ 70.125730][ T1900] device syzkaller0 entered promiscuous mode [ 70.730856][ T1931] device sit0 entered promiscuous mode [ 71.570370][ T1959] device sit0 left promiscuous mode [ 71.639938][ T1959] device sit0 entered promiscuous mode [ 72.711903][ T2003] device syzkaller0 entered promiscuous mode [ 73.053000][ T2018] device wg2 entered promiscuous mode [ 74.772593][ T2062] device pim6reg1 entered promiscuous mode [ 76.409654][ T2125] device pim6reg1 entered promiscuous mode [ 77.003685][ T2164] syz.1.488[2164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.005126][ T2164] syz.1.488[2164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.042863][ T2166] device pim6reg1 entered promiscuous mode [ 77.171259][ T2172] device macsec0 entered promiscuous mode [ 78.641106][ T2233] Ÿë: port 1(ip6gretap0) entered blocking state [ 78.660067][ T2233] Ÿë: port 1(ip6gretap0) entered disabled state [ 78.676558][ T2233] device ip6gretap0 entered promiscuous mode [ 78.743343][ T2236] device pim6reg1 entered promiscuous mode [ 79.813606][ T2289] device pim6reg1 entered promiscuous mode [ 80.091854][ T2311] €Â0: renamed from pim6reg1 [ 80.235278][ T2321] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.242543][ T2321] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.338067][ T2305] device pim6reg1 entered promiscuous mode [ 80.364980][ T2324] device syzkaller0 entered promiscuous mode [ 80.506475][ T2337] sock: sock_set_timeout: `syz.0.538' (pid 2337) tries to set negative timeout [ 80.536821][ T2333] device wg2 left promiscuous mode [ 80.921175][ T2362] device sit0 left promiscuous mode [ 80.980347][ T2363] device sit0 entered promiscuous mode [ 81.068224][ T24] audit: type=1400 audit(1750122866.340:147): avc: denied { create } for pid=2361 comm="syz.1.546" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 81.242563][ T24] audit: type=1400 audit(1750122866.520:148): avc: denied { create } for pid=2369 comm="syz.2.547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 81.762930][ T2393] device syzkaller0 entered promiscuous mode [ 81.994824][ T2400] device syzkaller0 entered promiscuous mode [ 82.944231][ T24] audit: type=1400 audit(1750122868.220:149): avc: denied { create } for pid=2436 comm="syz.2.567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 83.406412][ T24] audit: type=1400 audit(1750122868.680:150): avc: denied { create } for pid=2456 comm="syz.0.574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 83.567861][ T24] audit: type=1400 audit(1750122868.680:151): avc: denied { create } for pid=2456 comm="syz.0.574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 84.901845][ T2519] device sit0 entered promiscuous mode [ 85.278464][ T2545] device bridge_slave_1 left promiscuous mode [ 85.285485][ T2545] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.311067][ T2545] device bridge_slave_0 left promiscuous mode [ 85.325519][ T2545] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.949285][ T2563] device xfrm0 entered promiscuous mode [ 86.886125][ T2600] syz.2.611 uses obsolete (PF_INET,SOCK_PACKET) [ 87.933788][ T2673] cgroup: fork rejected by pids controller in /syz2 [ 88.760068][ T2694] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.793522][ T2694] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.843875][ T2694] device bridge_slave_0 entered promiscuous mode [ 88.913862][ T2694] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.964918][ T2694] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.003738][ T2694] device bridge_slave_1 entered promiscuous mode [ 89.445864][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.472480][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.542359][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.591794][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.635715][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.643813][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.673196][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.682693][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.691974][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.699618][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.707528][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.780384][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 89.811132][ T24] audit: type=1400 audit(1750122875.090:152): avc: denied { create } for pid=2745 comm="syz.4.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 89.838516][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 89.928579][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 89.941234][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 89.988929][ T2694] device veth0_vlan entered promiscuous mode [ 90.031297][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 90.040701][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 90.054774][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 90.063865][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 90.107082][ T2694] device veth1_macvtap entered promiscuous mode [ 90.117518][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 90.128921][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 90.142800][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 90.160403][ T112] device veth1_macvtap left promiscuous mode [ 90.166788][ T112] device veth0_vlan left promiscuous mode [ 90.285709][ T2773] syz.1.664[2773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.285807][ T2773] syz.1.664[2773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.343959][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 90.374401][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 90.391150][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 90.400873][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 92.440809][ T2831] device pim6reg1 entered promiscuous mode [ 93.132055][ T2846] device sit0 left promiscuous mode [ 93.336892][ T2856] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 93.345963][ T2856] syzkaller0: linktype set to 804 [ 93.762112][ T2870] device dummy0 entered promiscuous mode [ 94.080860][ T24] audit: type=1400 audit(1750122879.350:153): avc: denied { create } for pid=2880 comm="syz.1.692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 94.118253][ T2883] device veth1_macvtap left promiscuous mode [ 94.460056][ T2904] device veth0_vlan left promiscuous mode [ 94.486281][ T2904] device veth0_vlan entered promiscuous mode [ 94.565045][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.580125][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.606823][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.491718][ T2942] device sit0 left promiscuous mode [ 96.541143][ T2942] device sit0 entered promiscuous mode [ 96.817809][ T2948] device syzkaller0 entered promiscuous mode [ 99.008200][ T3015] device sit0 left promiscuous mode [ 99.071537][ T3019] device sit0 entered promiscuous mode [ 99.319057][ T3031] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 99.493277][ T3029] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.502611][ T3029] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.085047][ T3050] device sit0 entered promiscuous mode [ 101.326095][ T3067] device wg2 left promiscuous mode [ 101.601251][ T3073] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.609998][ T3073] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.221855][ T3103] device sit0 left promiscuous mode [ 102.562418][ T3123] syz.3.754[3123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.562479][ T3123] syz.3.754[3123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.642103][ T24] audit: type=1400 audit(1750122887.920:154): avc: denied { create } for pid=3134 comm="syz.1.758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 102.712298][ T3123] device veth0_vlan left promiscuous mode [ 102.730364][ T3123] device veth0_vlan entered promiscuous mode [ 103.044689][ T3159] device pim6reg1 entered promiscuous mode [ 103.108692][ T3167] kfree: port 1(veth1) entered blocking state [ 103.184264][ T3167] kfree: port 1(veth1) entered disabled state [ 103.246994][ T3167] device veth1 entered promiscuous mode [ 104.032582][ T3205] device pim6reg1 entered promiscuous mode [ 105.261164][ T3237] syz.0.785[3237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.756015][ T3270] syz.4.794[3270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.831497][ T3270] syz.4.794[3270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.244703][ T3293] ------------[ cut here ]------------ [ 106.323771][ T3293] trace type BPF program uses run-time allocation [ 106.373282][ T3293] WARNING: CPU: 1 PID: 3293 at kernel/bpf/verifier.c:10496 check_map_prog_compatibility+0x5d6/0x740 [ 106.459498][ T3293] Modules linked in: [ 106.482720][ T3293] CPU: 1 PID: 3293 Comm: syz.2.804 Not tainted 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 106.495759][ T3293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 106.516135][ T3293] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 106.548613][ T3293] Code: 85 e9 14 fe ff ff e8 89 f7 ef ff 31 c0 e9 15 fe ff ff e8 7d f7 ef ff c6 05 43 9b 2c 05 01 48 c7 c7 80 6b 05 85 e8 2a 5f f8 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 106.629333][ T3293] RSP: 0018:ffffc90000b77468 EFLAGS: 00010246 [ 106.635664][ T3293] RAX: b4046d19b91d3700 RBX: 0000000000000001 RCX: ffff88811fb9cf00 [ 106.644263][ T3293] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 106.652829][ T3293] RBP: ffffc90000b774b0 R08: dffffc0000000000 R09: ffffed103ee2a5f8 [ 106.661073][ T3293] R10: ffffed103ee2a5f8 R11: 1ffff1103ee2a5f7 R12: ffff88810ac60000 [ 106.689184][ T3311] device sit0 left promiscuous mode [ 106.696542][ T3293] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88811679d800 [ 106.728239][ T3293] FS: 00007fcf7a10a6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 106.746726][ T3293] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 106.753435][ T3293] CR2: 0000000100000001 CR3: 0000000116f95000 CR4: 00000000003506b0 [ 106.761955][ T3293] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 106.770212][ T3293] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 106.778360][ T3293] Call Trace: [ 106.781921][ T3293] ? __fdget+0x1a1/0x230 [ 106.786245][ T3293] resolve_pseudo_ldimm64+0x526/0x1020 [ 106.791955][ T3293] ? bpf_check+0xd720/0xd720 [ 106.796695][ T3293] ? kvmalloc_node+0x88/0x130 [ 106.802087][ T3293] bpf_check+0x8db4/0xd720 [ 106.806954][ T3293] ? bpf_get_btf_vmlinux+0x60/0x60 [ 106.812516][ T3293] ? 0xffffffffa002c000 [ 106.816961][ T3293] ? is_bpf_text_address+0x177/0x190 [ 106.823085][ T3293] ? selinux_bpf_prog_alloc+0x51/0x140 [ 106.828938][ T3293] ? __kernel_text_address+0xa0/0x100 [ 106.834550][ T3293] ? unwind_get_return_address+0x4d/0x90 [ 106.836297][ T3312] device sit0 entered promiscuous mode [ 106.841961][ T3293] ? stack_trace_save+0xe0/0xe0 [ 106.851887][ T3293] ? arch_stack_walk+0xee/0x140 [ 106.856956][ T3293] ? stack_trace_save+0x98/0xe0 [ 106.862167][ T3293] ? stack_trace_snprint+0xf0/0xf0 [ 106.867372][ T3293] ? __kasan_slab_alloc+0x69/0xf0 [ 106.872768][ T3293] ? selinux_bpf_prog_alloc+0x51/0x140 [ 106.878303][ T3293] ? __kasan_kmalloc+0xec/0x110 [ 106.883402][ T3293] ? __kasan_kmalloc+0xda/0x110 [ 106.888762][ T3293] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 106.894375][ T3293] ? selinux_bpf_prog_alloc+0x51/0x140 [ 106.900328][ T3293] ? security_bpf_prog_alloc+0x62/0x90 [ 106.906120][ T3293] ? bpf_prog_load+0x949/0x1420 [ 106.911443][ T3293] ? __se_sys_bpf+0x442/0x680 [ 106.916439][ T3293] ? __x64_sys_bpf+0x7b/0x90 [ 106.921461][ T3293] ? do_syscall_64+0x31/0x40 [ 106.926168][ T3293] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 106.933207][ T3293] ? memset+0x35/0x40 [ 106.937540][ T3293] ? bpf_obj_name_cpy+0x193/0x1e0 [ 106.942995][ T3293] bpf_prog_load+0xf5a/0x1420 [ 106.948121][ T3293] ? map_freeze+0x320/0x320 [ 106.953170][ T3293] ? selinux_bpf+0xc7/0xf0 [ 106.957853][ T3293] ? security_bpf+0x82/0xa0 [ 106.963123][ T3293] __se_sys_bpf+0x442/0x680 [ 106.967950][ T3293] ? __x64_sys_bpf+0x90/0x90 [ 106.972907][ T3293] ? fpu__clear_all+0x20/0x20 [ 106.977874][ T3293] __x64_sys_bpf+0x7b/0x90 [ 106.982773][ T3293] do_syscall_64+0x31/0x40 [ 106.987450][ T3293] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 106.993816][ T3293] RIP: 0033:0x7fcf7baa1929 [ 106.999011][ T3293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 107.019233][ T3293] RSP: 002b:00007fcf7a10a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 107.027966][ T3293] RAX: ffffffffffffffda RBX: 00007fcf7bcc8fa0 RCX: 00007fcf7baa1929 [ 107.036421][ T3293] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 107.044788][ T3293] RBP: 00007fcf7bb23b39 R08: 0000000000000000 R09: 0000000000000000 [ 107.053504][ T3293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 107.079982][ T3293] R13: 0000000000000000 R14: 00007fcf7bcc8fa0 R15: 00007ffdbd84eb08 [ 107.120726][ T3293] ---[ end trace f1f1aaeed7940746 ]--- [ 110.717349][ T3350] device syzkaller0 entered promiscuous mode [ 110.951181][ T24] audit: type=1400 audit(1750122896.220:155): avc: denied { ioctl } for pid=3366 comm="syz.0.824" path="" dev="cgroup2" ino=197 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 111.105009][ T24] audit: type=1400 audit(1750122896.350:156): avc: denied { create } for pid=3373 comm="syz.2.826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 111.666336][ T3410] device wg2 left promiscuous mode [ 112.004542][ T3422] device veth1_macvtap left promiscuous mode [ 112.681764][ T3445] device syzkaller0 entered promiscuous mode [ 113.888200][ T3490] device bridge_slave_1 left promiscuous mode [ 113.951232][ T3490] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.021481][ T3490] device bridge_slave_0 left promiscuous mode [ 114.046272][ T3490] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.724176][ T3626] device syzkaller0 entered promiscuous mode [ 117.946901][ T3630] device sit0 entered promiscuous mode [ 118.375647][ T3635] device syzkaller0 left promiscuous mode [ 118.611057][ T3657] syz.1.904[3657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.611121][ T3657] syz.1.904[3657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.826869][ T3661] device pim6reg1 entered promiscuous mode [ 120.252395][ T3732] kfree: port 1(veth1) entered blocking state [ 120.299784][ T3732] kfree: port 1(veth1) entered disabled state [ 120.335467][ T3732] device veth1 entered promiscuous mode [ 120.507091][ T24] audit: type=1400 audit(1750122905.780:157): avc: denied { create } for pid=3757 comm="syz.1.931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 122.079018][ T3814] device syzkaller0 entered promiscuous mode [ 125.399672][ T3842] device pim6reg1 entered promiscuous mode [ 125.692019][ T24] audit: type=1400 audit(1750122910.960:158): avc: denied { create } for pid=3843 comm="syz.0.956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 126.135891][ T3869] device syzkaller0 entered promiscuous mode [ 126.574708][ T3892] device sit0 left promiscuous mode [ 126.779702][ T3894] device macsec0 entered promiscuous mode [ 128.139528][ T3947] device syzkaller0 entered promiscuous mode [ 128.993868][ T3990] device syzkaller0 entered promiscuous mode [ 129.665846][ T4039] Â: renamed from pim6reg1 [ 130.995829][ T4111] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.004821][ T4111] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.046125][ T4108] device veth0_vlan left promiscuous mode [ 131.055208][ T4108] device veth0_vlan entered promiscuous mode [ 131.153258][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.171748][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.183626][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.370777][ T24] audit: type=1400 audit(1750122916.650:159): avc: denied { create } for pid=4123 comm="syz.1.1033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 131.882261][ T4164] device wg2 entered promiscuous mode [ 132.852178][ T4200] device sit0 entered promiscuous mode [ 133.990044][ T4236] device pim6reg1 entered promiscuous mode [ 135.395684][ T4280] device veth0_vlan left promiscuous mode [ 135.405635][ T4280] device veth0_vlan entered promiscuous mode [ 135.479911][ T4281] device sit0 entered promiscuous mode [ 135.769929][ T4292] syz.0.1078[4292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.770018][ T4292] syz.0.1078[4292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.722065][ T4380] syz.4.1100[4380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.851905][ T4380] syz.4.1100[4380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.940260][ T4366] device pim6reg1 entered promiscuous mode [ 139.099790][ T4406] device pim6reg1 entered promiscuous mode [ 139.114769][ T4366] syz.4.1100[4366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.119992][ T24] audit: type=1400 audit(1750122924.400:160): avc: denied { create } for pid=4400 comm="syz.0.1109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 139.647831][ T24] audit: type=1400 audit(1750122924.920:161): avc: denied { create } for pid=4427 comm="syz.2.1116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 139.872430][ T94] udevd[94]: worker [3352] terminated by signal 33 (Unknown signal 33) [ 139.915787][ T94] udevd[94]: worker [3352] failed while handling '/devices/virtual/block/loop0' [ 139.978504][ T94] udevd[94]: worker [3358] terminated by signal 33 (Unknown signal 33) [ 140.000609][ T94] udevd[94]: worker [3358] failed while handling '/devices/virtual/block/loop1' [ 140.281110][ T24] audit: type=1400 audit(1750122925.560:162): avc: denied { read } for pid=4483 comm="syz.3.1131" dev="nsfs" ino=4026532520 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 140.372143][ T24] audit: type=1400 audit(1750122925.560:163): avc: denied { open } for pid=4483 comm="syz.3.1131" path="cgroup:[4026532520]" dev="nsfs" ino=4026532520 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 140.620778][ T4499] device syzkaller0 entered promiscuous mode [ 140.719128][ T4506] device pim6reg1 entered promiscuous mode [ 140.898237][ T24] audit: type=1400 audit(1750122926.170:164): avc: denied { ioctl } for pid=4517 comm="syz.4.1140" path="net:[4026533156]" dev="nsfs" ino=4026533156 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 141.926502][ T4586] device veth0_vlan left promiscuous mode [ 141.950811][ T4586] device veth0_vlan entered promiscuous mode [ 142.004361][ T4591] device veth0_vlan left promiscuous mode [ 142.016802][ T4591] device veth0_vlan entered promiscuous mode [ 142.069593][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 142.086332][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 142.118509][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 144.342567][ T4718] device veth1_macvtap entered promiscuous mode [ 144.390674][ T4718] device macsec0 entered promiscuous mode [ 144.453506][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 144.545217][ T4728] device veth0_vlan left promiscuous mode [ 144.577329][ T4728] device veth0_vlan entered promiscuous mode [ 144.646633][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 144.667556][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 144.715510][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 145.028595][ T4757] ÿÿÿÿÿÿ: renamed from vlan1 [ 145.443210][ T4775] device syzkaller0 entered promiscuous mode [ 145.541616][ T4795] device sit0 left promiscuous mode [ 145.907990][ T4799] device syzkaller0 entered promiscuous mode [ 146.101469][ T4804] device veth0_vlan left promiscuous mode [ 146.148055][ T4804] device veth0_vlan entered promiscuous mode [ 146.493979][ T4819] device sit0 entered promiscuous mode [ 147.106276][ T4839] syz.0.1229[4839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.128042][ T4839] syz.0.1229[4839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.883449][ T4875] device sit0 left promiscuous mode [ 148.050591][ T4891] device veth0_vlan left promiscuous mode [ 148.102987][ T4891] device veth0_vlan entered promiscuous mode [ 148.340010][ T4878] device pim6reg1 entered promiscuous mode [ 149.417421][ T4940] device pim6reg1 entered promiscuous mode [ 154.026126][ T5009] device pim6reg1 entered promiscuous mode [ 154.826148][ T5028] device veth0_to_team entered promiscuous mode [ 155.688825][ T5082] syz.4.1298[5082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.688912][ T5082] syz.4.1298[5082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.842363][ T5089] device veth0_vlan left promiscuous mode [ 155.932635][ T5089] device veth0_vlan entered promiscuous mode [ 155.977028][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.986118][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.001357][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 156.320311][ T5103] device syzkaller0 entered promiscuous mode [ 156.592767][ T5122] device pim6reg1 entered promiscuous mode [ 157.816664][ T5194] device syzkaller0 entered promiscuous mode [ 158.331540][ T24] audit: type=1400 audit(1750122943.610:165): avc: denied { create } for pid=5238 comm="syz.0.1341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 158.420238][ T5243] device pim6reg1 entered promiscuous mode [ 159.668935][ T5286] device sit0 left promiscuous mode [ 162.010698][ T24] audit: type=1400 audit(1750122947.290:166): avc: denied { create } for pid=5383 comm="syz.2.1380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 162.154706][ T5390] device syzkaller0 entered promiscuous mode [ 162.269813][ T5408] device veth0_vlan left promiscuous mode [ 162.276260][ T5408] device veth0_vlan entered promiscuous mode [ 162.290634][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.305296][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 162.341817][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.046430][ T94] udevd[94]: worker [5325] terminated by signal 33 (Unknown signal 33) [ 166.070483][ T94] udevd[94]: worker [5325] failed while handling '/devices/virtual/block/loop4' [ 166.524411][ T94] udevd[94]: worker [3348] terminated by signal 33 (Unknown signal 33) [ 166.544284][ T94] udevd[94]: worker [3348] failed while handling '/devices/virtual/block/loop3' [ 166.896607][ T5613] device wg2 left promiscuous mode [ 166.968904][ T5622] device wg2 entered promiscuous mode [ 167.192552][ T5644] syz.1.1452[5644] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.192603][ T5644] syz.1.1452[5644] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.366004][ T5644] device veth1_macvtap entered promiscuous mode [ 167.566612][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 167.639999][ T5657] device wg2 left promiscuous mode [ 169.891285][ T5718] device vxcan1 entered promiscuous mode [ 170.393596][ T5749] syz.4.1483[5749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.393684][ T5749] syz.4.1483[5749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.821847][ T5780] device pim6reg1 entered promiscuous mode [ 171.537947][ T5819] device veth0_to_team entered promiscuous mode [ 172.758583][ T5861] device sit0 left promiscuous mode [ 172.800920][ T5862] device sit0 entered promiscuous mode [ 173.192286][ T5870] Â: renamed from pim6reg1 [ 174.018233][ T5913] device syzkaller0 entered promiscuous mode [ 174.287691][ T5917] device syzkaller0 entered promiscuous mode [ 174.377105][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.385620][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.535385][ T5926] device bridge_slave_1 left promiscuous mode [ 174.549550][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.581960][ T5926] device bridge_slave_0 left promiscuous mode [ 174.600697][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.749698][ T5933] device veth1_to_bond entered promiscuous mode [ 174.822205][ T5940] device pim6reg1 entered promiscuous mode [ 175.487189][ T5959] device syzkaller0 entered promiscuous mode [ 176.676039][ T6025] device syzkaller0 left promiscuous mode [ 179.075714][ T6121] device sit0 left promiscuous mode [ 179.604621][ T6139] device syzkaller0 entered promiscuous mode [ 179.836487][ T6162] device syzkaller0 entered promiscuous mode [ 180.368026][ T6198] syz.0.1613[6198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.368892][ T6198] syz.0.1613[6198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.030338][ T6237] device pim6reg1 entered promiscuous mode [ 182.478673][ T6293] syz.3.1641[6293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.479988][ T6293] syz.3.1641[6293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.380264][ T6329] device veth1_macvtap left promiscuous mode [ 183.520076][ T6329] device macsec0 left promiscuous mode [ 185.369305][ T24] audit: type=1400 audit(1750122970.640:167): avc: denied { create } for pid=6408 comm="syz.2.1674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 185.533127][ T6411] ÿÿÿÿÿÿ: renamed from vlan1 [ 186.424599][ T24] audit: type=1400 audit(1750122971.700:168): avc: denied { read } for pid=6447 comm="syz.1.1685" name="cgroup.subtree_control" dev="cgroup2" ino=334 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 186.641715][ T6460] bridge0: port 3(veth0) entered disabled state [ 186.648999][ T6460] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.657027][ T6460] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.523627][ T6513] FAULT_INJECTION: forcing a failure. [ 188.523627][ T6513] name failslab, interval 1, probability 0, space 0, times 1 [ 188.619982][ T6513] CPU: 1 PID: 6513 Comm: syz.1.1703 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 188.631413][ T6513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 188.641709][ T6513] Call Trace: [ 188.645026][ T6513] __dump_stack+0x21/0x24 [ 188.649640][ T6513] dump_stack_lvl+0x169/0x1d8 [ 188.654339][ T6513] ? show_regs_print_info+0x18/0x18 [ 188.659562][ T6513] dump_stack+0x15/0x1c [ 188.663850][ T6513] should_fail+0x3c1/0x510 [ 188.668275][ T6513] ? btf_new_fd+0x113/0xa00 [ 188.673339][ T6513] __should_failslab+0xa4/0xe0 [ 188.678125][ T6513] should_failslab+0x9/0x20 [ 188.682840][ T6513] kmem_cache_alloc_trace+0x3a/0x2e0 [ 188.688192][ T6513] btf_new_fd+0x113/0xa00 [ 188.692693][ T6513] bpf_btf_load+0x5e/0x70 [ 188.697173][ T6513] __se_sys_bpf+0x48a/0x680 [ 188.702265][ T6513] ? __x64_sys_bpf+0x90/0x90 [ 188.707137][ T6513] ? fpu__clear_all+0x20/0x20 [ 188.711834][ T6513] __x64_sys_bpf+0x7b/0x90 [ 188.716432][ T6513] do_syscall_64+0x31/0x40 [ 188.721118][ T6513] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 188.727333][ T6513] RIP: 0033:0x7f3388109929 [ 188.731851][ T6513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 188.753348][ T6513] RSP: 002b:00007f3386772038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 188.761783][ T6513] RAX: ffffffffffffffda RBX: 00007f3388330fa0 RCX: 00007f3388109929 [ 188.769774][ T6513] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000012 [ 188.777750][ T6513] RBP: 00007f3386772090 R08: 0000000000000000 R09: 0000000000000000 [ 188.786138][ T6513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 188.794131][ T6513] R13: 0000000000000000 R14: 00007f3388330fa0 R15: 00007ffc11714bd8 [ 189.091504][ T6499] device syzkaller0 entered promiscuous mode [ 191.591817][ T6624] device syzkaller0 entered promiscuous mode [ 192.790317][ T6698] device syzkaller0 entered promiscuous mode [ 193.226940][ T6710] FAULT_INJECTION: forcing a failure. [ 193.226940][ T6710] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 193.295875][ T6710] CPU: 1 PID: 6710 Comm: syz.2.1759 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 193.307584][ T6710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 193.318171][ T6710] Call Trace: [ 193.321523][ T6710] __dump_stack+0x21/0x24 [ 193.326337][ T6710] dump_stack_lvl+0x169/0x1d8 [ 193.331401][ T6710] ? thaw_kernel_threads+0x220/0x220 [ 193.336857][ T6710] ? show_regs_print_info+0x18/0x18 [ 193.342169][ T6710] ? memcpy+0x56/0x70 [ 193.346163][ T6710] dump_stack+0x15/0x1c [ 193.350313][ T6710] should_fail+0x3c1/0x510 [ 193.354738][ T6710] should_fail_usercopy+0x1a/0x20 [ 193.359756][ T6710] _copy_to_user+0x20/0x90 [ 193.364171][ T6710] bpf_verifier_vlog+0x1b4/0x330 [ 193.369113][ T6710] __btf_verifier_log+0xd1/0x120 [ 193.374157][ T6710] ? btf_check_sec_info+0x330/0x330 [ 193.379434][ T6710] ? memcpy+0x56/0x70 [ 193.383514][ T6710] btf_parse_hdr+0x35c/0x7b0 [ 193.388120][ T6710] btf_new_fd+0x4af/0xa00 [ 193.392733][ T6710] bpf_btf_load+0x5e/0x70 [ 193.397143][ T6710] __se_sys_bpf+0x48a/0x680 [ 193.401725][ T6710] ? __x64_sys_bpf+0x90/0x90 [ 193.406397][ T6710] ? fpu__clear_all+0x20/0x20 [ 193.411271][ T6710] __x64_sys_bpf+0x7b/0x90 [ 193.415679][ T6710] do_syscall_64+0x31/0x40 [ 193.420116][ T6710] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 193.426034][ T6710] RIP: 0033:0x7fcf7baa1929 [ 193.430590][ T6710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 193.450745][ T6710] RSP: 002b:00007fcf7a10a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 193.459560][ T6710] RAX: ffffffffffffffda RBX: 00007fcf7bcc8fa0 RCX: 00007fcf7baa1929 [ 193.467980][ T6710] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000012 [ 193.476380][ T6710] RBP: 00007fcf7a10a090 R08: 0000000000000000 R09: 0000000000000000 [ 193.485105][ T6710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 193.493573][ T6710] R13: 0000000000000000 R14: 00007fcf7bcc8fa0 R15: 00007ffdbd84eb08 [ 193.928033][ T6741] device pim6reg1 entered promiscuous mode [ 195.062343][ T6815] device wg2 entered promiscuous mode [ 195.255227][ T6825] device syzkaller0 entered promiscuous mode [ 196.500131][ T6868] device wg2 entered promiscuous mode [ 197.427742][ T6918] FAULT_INJECTION: forcing a failure. [ 197.427742][ T6918] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 197.571229][ T6918] CPU: 1 PID: 6918 Comm: syz.0.1817 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 197.584161][ T6918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 197.595763][ T6918] Call Trace: [ 197.599945][ T6918] __dump_stack+0x21/0x24 [ 197.604435][ T6918] dump_stack_lvl+0x169/0x1d8 [ 197.613315][ T6918] ? thaw_kernel_threads+0x220/0x220 [ 197.618876][ T6918] ? show_regs_print_info+0x18/0x18 [ 197.624456][ T6918] ? memcpy+0x56/0x70 [ 197.628557][ T6918] dump_stack+0x15/0x1c [ 197.633004][ T6918] should_fail+0x3c1/0x510 [ 197.637926][ T6918] should_fail_usercopy+0x1a/0x20 [ 197.643073][ T6918] _copy_to_user+0x20/0x90 [ 197.647700][ T6918] bpf_verifier_vlog+0x1b4/0x330 [ 197.652743][ T6918] __btf_verifier_log+0xd1/0x120 [ 197.658041][ T6918] ? btf_check_sec_info+0x330/0x330 [ 197.664120][ T6918] ? memcpy+0x56/0x70 [ 197.668192][ T6918] btf_parse_hdr+0x435/0x7b0 [ 197.673391][ T6918] btf_new_fd+0x4af/0xa00 [ 197.678182][ T6918] bpf_btf_load+0x5e/0x70 [ 197.683070][ T6918] __se_sys_bpf+0x48a/0x680 [ 197.687763][ T6918] ? __x64_sys_bpf+0x90/0x90 [ 197.692740][ T6918] ? fpu__clear_all+0x20/0x20 [ 197.697643][ T6918] __x64_sys_bpf+0x7b/0x90 [ 197.702269][ T6918] do_syscall_64+0x31/0x40 [ 197.707072][ T6918] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 197.713474][ T6918] RIP: 0033:0x7f0a5fb7e929 [ 197.717909][ T6918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 197.739007][ T6918] RSP: 002b:00007f0a5e1e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 197.747654][ T6918] RAX: ffffffffffffffda RBX: 00007f0a5fda5fa0 RCX: 00007f0a5fb7e929 [ 197.755754][ T6918] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000012 [ 197.764118][ T6918] RBP: 00007f0a5e1e7090 R08: 0000000000000000 R09: 0000000000000000 [ 197.772222][ T6918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 197.780474][ T6918] R13: 0000000000000000 R14: 00007f0a5fda5fa0 R15: 00007fff1b1cd7a8 [ 197.856981][ T6929] device syzkaller0 entered promiscuous mode [ 198.634667][ T6950] device wg2 left promiscuous mode [ 199.220608][ T6977] device wg2 entered promiscuous mode [ 199.972067][ T7017] device pim6reg1 entered promiscuous mode [ 199.992885][ T7020] Â: renamed from pim6reg1 [ 200.105914][ T7024] device veth0_vlan left promiscuous mode [ 200.130765][ T7024] device veth0_vlan entered promiscuous mode [ 200.139572][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 200.148914][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 200.166820][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 200.193223][ T7027] device syzkaller0 entered promiscuous mode [ 200.267436][ T7055] syz.3.1857[7055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.340113][ T7061] device veth0_vlan left promiscuous mode [ 200.393061][ T7061] device veth0_vlan entered promiscuous mode [ 200.401794][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 200.417017][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 200.426885][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 200.944994][ T7124] device syzkaller0 entered promiscuous mode [ 201.063186][ T7136] device wg2 left promiscuous mode [ 201.259414][ T7136] device wg2 entered promiscuous mode [ 201.485286][ T7151] device pim6reg1 entered promiscuous mode [ 202.228145][ T7221] FAULT_INJECTION: forcing a failure. [ 202.228145][ T7221] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 202.318618][ T7221] CPU: 1 PID: 7221 Comm: syz.4.1901 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 202.331595][ T7221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 202.343134][ T7221] Call Trace: [ 202.346540][ T7221] __dump_stack+0x21/0x24 [ 202.351133][ T7221] dump_stack_lvl+0x169/0x1d8 [ 202.356070][ T7221] ? thaw_kernel_threads+0x220/0x220 [ 202.361412][ T7221] ? show_regs_print_info+0x18/0x18 [ 202.366973][ T7221] ? memcpy+0x56/0x70 [ 202.371150][ T7221] dump_stack+0x15/0x1c [ 202.375422][ T7221] should_fail+0x3c1/0x510 [ 202.379846][ T7221] should_fail_usercopy+0x1a/0x20 [ 202.385181][ T7221] _copy_to_user+0x20/0x90 [ 202.389607][ T7221] bpf_verifier_vlog+0x1b4/0x330 [ 202.394554][ T7221] __btf_verifier_log+0xd1/0x120 [ 202.399853][ T7221] ? btf_check_sec_info+0x330/0x330 [ 202.405396][ T7221] ? memcpy+0x56/0x70 [ 202.409471][ T7221] btf_parse_hdr+0x49d/0x7b0 [ 202.414222][ T7221] btf_new_fd+0x4af/0xa00 [ 202.418875][ T7221] bpf_btf_load+0x5e/0x70 [ 202.423547][ T7221] __se_sys_bpf+0x48a/0x680 [ 202.428495][ T7221] ? __x64_sys_bpf+0x90/0x90 [ 202.433298][ T7221] ? fpu__clear_all+0x20/0x20 [ 202.438194][ T7221] __x64_sys_bpf+0x7b/0x90 [ 202.443279][ T7221] do_syscall_64+0x31/0x40 [ 202.448121][ T7221] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 202.454129][ T7221] RIP: 0033:0x7f0193ef2929 [ 202.459034][ T7221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 202.478665][ T7221] RSP: 002b:00007f019255b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 202.487355][ T7221] RAX: ffffffffffffffda RBX: 00007f0194119fa0 RCX: 00007f0193ef2929 [ 202.495354][ T7221] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000012 [ 202.503322][ T7221] RBP: 00007f019255b090 R08: 0000000000000000 R09: 0000000000000000 [ 202.511295][ T7221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 202.519972][ T7221] R13: 0000000000000000 R14: 00007f0194119fa0 R15: 00007ffdf6a50298 [ 203.795884][ T7277] FAULT_INJECTION: forcing a failure. [ 203.795884][ T7277] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 203.946649][ T7277] CPU: 1 PID: 7277 Comm: syz.3.1919 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 203.958068][ T7277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 203.969133][ T7277] Call Trace: [ 203.972644][ T7277] __dump_stack+0x21/0x24 [ 203.977004][ T7277] dump_stack_lvl+0x169/0x1d8 [ 203.982260][ T7277] ? thaw_kernel_threads+0x220/0x220 [ 203.987689][ T7277] ? show_regs_print_info+0x18/0x18 [ 203.993173][ T7277] ? string+0x292/0x2b0 [ 203.997346][ T7277] dump_stack+0x15/0x1c [ 204.001579][ T7277] should_fail+0x3c1/0x510 [ 204.006114][ T7277] should_fail_usercopy+0x1a/0x20 [ 204.011343][ T7277] _copy_to_user+0x20/0x90 [ 204.015922][ T7277] bpf_verifier_vlog+0x1b4/0x330 [ 204.021223][ T7277] __btf_verifier_log+0xd1/0x120 [ 204.026168][ T7277] ? unwind_get_return_address+0x4d/0x90 [ 204.031793][ T7277] ? btf_check_sec_info+0x330/0x330 [ 204.037012][ T7277] ? put_dec+0xd7/0xe0 [ 204.041262][ T7277] __btf_verifier_log_type+0x387/0x610 [ 204.047007][ T7277] ? format_decode+0x1bb/0x1520 [ 204.051855][ T7277] ? btf_int_show+0x2bf0/0x2bf0 [ 204.056703][ T7277] ? sort_r+0xe04/0xe20 [ 204.060854][ T7277] btf_ref_type_check_meta+0x7d/0x4d0 [ 204.066705][ T7277] btf_check_all_metas+0x230/0x820 [ 204.072028][ T7277] ? __btf_verifier_log+0x120/0x120 [ 204.077801][ T7277] btf_parse_type_sec+0xea/0x15a0 [ 204.084103][ T7277] ? btf_check_sec_info+0x27a/0x330 [ 204.089698][ T7277] ? btf_check_sec_info+0x330/0x330 [ 204.095158][ T7277] ? btf_verifier_log+0x2a0/0x2a0 [ 204.100220][ T7277] ? memcpy+0x56/0x70 [ 204.104497][ T7277] ? btf_parse_hdr+0x5d6/0x7b0 [ 204.109749][ T7277] ? btf_parse_str_sec+0x1aa/0x260 [ 204.114992][ T7277] btf_new_fd+0x562/0xa00 [ 204.119317][ T7277] bpf_btf_load+0x5e/0x70 [ 204.123759][ T7277] __se_sys_bpf+0x48a/0x680 [ 204.128290][ T7277] ? __x64_sys_bpf+0x90/0x90 [ 204.132950][ T7277] ? fpu__clear_all+0x20/0x20 [ 204.137635][ T7277] __x64_sys_bpf+0x7b/0x90 [ 204.142247][ T7277] do_syscall_64+0x31/0x40 [ 204.146673][ T7277] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 204.152648][ T7277] RIP: 0033:0x7fefe7445929 [ 204.157147][ T7277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 204.177323][ T7277] RSP: 002b:00007fefe5aae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 204.186119][ T7277] RAX: ffffffffffffffda RBX: 00007fefe766cfa0 RCX: 00007fefe7445929 [ 204.194295][ T7277] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000012 [ 204.202386][ T7277] RBP: 00007fefe5aae090 R08: 0000000000000000 R09: 0000000000000000 [ 204.210364][ T7277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 204.218503][ T7277] R13: 0000000000000000 R14: 00007fefe766cfa0 R15: 00007ffca4fe0548 [ 204.371463][ T7283] device pim6reg1 entered promiscuous mode [ 205.265811][ T7322] FAULT_INJECTION: forcing a failure. [ 205.265811][ T7322] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 205.279780][ T7322] CPU: 0 PID: 7322 Comm: syz.3.1933 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 205.292285][ T7322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 205.303075][ T7322] Call Trace: [ 205.306576][ T7322] __dump_stack+0x21/0x24 [ 205.311159][ T7322] dump_stack_lvl+0x169/0x1d8 [ 205.316265][ T7322] ? thaw_kernel_threads+0x220/0x220 [ 205.321799][ T7322] ? show_regs_print_info+0x18/0x18 [ 205.327059][ T7322] ? string+0x292/0x2b0 [ 205.331477][ T7322] dump_stack+0x15/0x1c [ 205.335818][ T7322] should_fail+0x3c1/0x510 [ 205.340305][ T7322] should_fail_usercopy+0x1a/0x20 [ 205.345778][ T7322] _copy_to_user+0x20/0x90 [ 205.350284][ T7322] bpf_verifier_vlog+0x1b4/0x330 [ 205.355707][ T7322] __btf_verifier_log+0xd1/0x120 [ 205.360934][ T7322] ? unwind_get_return_address+0x4d/0x90 [ 205.366764][ T7322] ? btf_check_sec_info+0x330/0x330 [ 205.372147][ T7322] ? put_dec+0xd7/0xe0 [ 205.376239][ T7322] __btf_verifier_log_type+0x387/0x610 [ 205.381780][ T7322] ? format_decode+0x1bb/0x1520 [ 205.386714][ T7322] ? btf_int_show+0x2bf0/0x2bf0 [ 205.391565][ T7322] ? sort_r+0xe04/0xe20 [ 205.395872][ T7322] btf_ref_type_check_meta+0x7d/0x4d0 [ 205.401392][ T7322] btf_check_all_metas+0x230/0x820 [ 205.406650][ T7322] ? __btf_verifier_log+0x120/0x120 [ 205.411982][ T7322] btf_parse_type_sec+0xea/0x15a0 [ 205.417424][ T7322] ? btf_check_sec_info+0x27a/0x330 [ 205.423696][ T7322] ? btf_check_sec_info+0x330/0x330 [ 205.429449][ T7322] ? btf_verifier_log+0x2a0/0x2a0 [ 205.434757][ T7322] ? memcpy+0x56/0x70 [ 205.439013][ T7322] ? btf_parse_hdr+0x5d6/0x7b0 [ 205.444057][ T7322] ? btf_parse_str_sec+0x1aa/0x260 [ 205.449652][ T7322] btf_new_fd+0x562/0xa00 [ 205.454830][ T7322] bpf_btf_load+0x5e/0x70 [ 205.459421][ T7322] __se_sys_bpf+0x48a/0x680 [ 205.463990][ T7322] ? __x64_sys_bpf+0x90/0x90 [ 205.469338][ T7322] ? fpu__clear_all+0x20/0x20 [ 205.474186][ T7322] __x64_sys_bpf+0x7b/0x90 [ 205.478753][ T7322] do_syscall_64+0x31/0x40 [ 205.483667][ T7322] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 205.490065][ T7322] RIP: 0033:0x7fefe7445929 [ 205.495239][ T7322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 205.516387][ T7322] RSP: 002b:00007fefe5aae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 205.525008][ T7322] RAX: ffffffffffffffda RBX: 00007fefe766cfa0 RCX: 00007fefe7445929 [ 205.533185][ T7322] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000012 [ 205.541255][ T7322] RBP: 00007fefe5aae090 R08: 0000000000000000 R09: 0000000000000000 [ 205.549742][ T7322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 205.558074][ T7322] R13: 0000000000000000 R14: 00007fefe766cfa0 R15: 00007ffca4fe0548 [ 205.617806][ T7324] device syzkaller0 entered promiscuous mode [ 206.561774][ T7370] FAULT_INJECTION: forcing a failure. [ 206.561774][ T7370] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 206.576911][ T7370] CPU: 1 PID: 7370 Comm: syz.0.1947 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 206.589202][ T7370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 206.601140][ T7370] Call Trace: [ 206.604664][ T7370] __dump_stack+0x21/0x24 [ 206.609637][ T7370] dump_stack_lvl+0x169/0x1d8 [ 206.614500][ T7370] ? thaw_kernel_threads+0x220/0x220 [ 206.619938][ T7370] ? show_regs_print_info+0x18/0x18 [ 206.625255][ T7370] ? memcpy+0x56/0x70 [ 206.629476][ T7370] dump_stack+0x15/0x1c [ 206.633884][ T7370] should_fail+0x3c1/0x510 [ 206.638428][ T7370] should_fail_usercopy+0x1a/0x20 [ 206.644432][ T7370] _copy_to_user+0x20/0x90 [ 206.649315][ T7370] bpf_verifier_vlog+0x1b4/0x330 [ 206.654491][ T7370] __btf_verifier_log+0xd1/0x120 [ 206.659476][ T7370] ? btf_check_sec_info+0x330/0x330 [ 206.664792][ T7370] ? put_dec+0xd7/0xe0 [ 206.668957][ T7370] __btf_verifier_log_type+0x4a0/0x610 [ 206.675640][ T7370] ? format_decode+0x1bb/0x1520 [ 206.680907][ T7370] ? btf_int_show+0x2bf0/0x2bf0 [ 206.685861][ T7370] ? sort_r+0xe04/0xe20 [ 206.690107][ T7370] btf_ref_type_check_meta+0x7d/0x4d0 [ 206.695851][ T7370] btf_check_all_metas+0x230/0x820 [ 206.701006][ T7370] ? __btf_verifier_log+0x120/0x120 [ 206.706375][ T7370] btf_parse_type_sec+0xea/0x15a0 [ 206.711433][ T7370] ? btf_check_sec_info+0x27a/0x330 [ 206.717020][ T7370] ? btf_check_sec_info+0x330/0x330 [ 206.722998][ T7370] ? btf_verifier_log+0x2a0/0x2a0 [ 206.728634][ T7370] ? memcpy+0x56/0x70 [ 206.732791][ T7370] ? btf_parse_hdr+0x5d6/0x7b0 [ 206.738207][ T7370] ? btf_parse_str_sec+0x1aa/0x260 [ 206.743961][ T7370] btf_new_fd+0x562/0xa00 [ 206.748294][ T7370] bpf_btf_load+0x5e/0x70 [ 206.752616][ T7370] __se_sys_bpf+0x48a/0x680 [ 206.757111][ T7370] ? __x64_sys_bpf+0x90/0x90 [ 206.762142][ T7370] ? fpu__clear_all+0x20/0x20 [ 206.766997][ T7370] __x64_sys_bpf+0x7b/0x90 [ 206.771514][ T7370] do_syscall_64+0x31/0x40 [ 206.775951][ T7370] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 206.781855][ T7370] RIP: 0033:0x7f0a5fb7e929 [ 206.786278][ T7370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 206.806403][ T7370] RSP: 002b:00007f0a5e1e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 206.815171][ T7370] RAX: ffffffffffffffda RBX: 00007f0a5fda5fa0 RCX: 00007f0a5fb7e929 [ 206.823226][ T7370] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000012 [ 206.831279][ T7370] RBP: 00007f0a5e1e7090 R08: 0000000000000000 R09: 0000000000000000 [ 206.839531][ T7370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 206.847596][ T7370] R13: 0000000000000000 R14: 00007f0a5fda5fa0 R15: 00007fff1b1cd7a8 [ 207.319123][ T7390] syz.3.1953[7390] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.319189][ T7390] syz.3.1953[7390] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.099440][ T7414] device sit0 entered promiscuous mode [ 208.444131][ T7417] device veth0_vlan left promiscuous mode [ 208.486713][ T7417] device veth0_vlan entered promiscuous mode [ 208.547626][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 208.561758][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 208.570005][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 208.962430][ T7449] device pim6reg1 entered promiscuous mode [ 209.235485][ T7458] device sit0 entered promiscuous mode [ 211.157512][ T7534] device pim6reg1 entered promiscuous mode [ 211.191794][ T7531] device wg2 entered promiscuous mode [ 211.551108][ T7554] tap0: tun_chr_ioctl cmd 2147767507 [ 211.862772][ T7563] device sit0 left promiscuous mode [ 212.337414][ T7605] syz.3.2015[7605] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.337477][ T7605] syz.3.2015[7605] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.614925][ T7609] device pim6reg1 entered promiscuous mode [ 212.975350][ T7624] device veth1_macvtap left promiscuous mode [ 212.996294][ T7624] device macsec0 left promiscuous mode [ 213.018663][ T7629] FAULT_INJECTION: forcing a failure. [ 213.018663][ T7629] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 213.102514][ T7629] CPU: 1 PID: 7629 Comm: syz.2.2021 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 213.114219][ T7629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 213.124551][ T7629] Call Trace: [ 213.127947][ T7629] __dump_stack+0x21/0x24 [ 213.132758][ T7629] dump_stack_lvl+0x169/0x1d8 [ 213.137456][ T7629] ? thaw_kernel_threads+0x220/0x220 [ 213.143189][ T7629] ? show_regs_print_info+0x18/0x18 [ 213.148788][ T7629] ? string+0x292/0x2b0 [ 213.152967][ T7629] dump_stack+0x15/0x1c [ 213.157468][ T7629] should_fail+0x3c1/0x510 [ 213.162330][ T7629] should_fail_usercopy+0x1a/0x20 [ 213.167676][ T7629] _copy_to_user+0x20/0x90 [ 213.172211][ T7629] bpf_verifier_vlog+0x1b4/0x330 [ 213.177338][ T7629] btf_verifier_log+0x1dc/0x2a0 [ 213.182828][ T7629] ? bpf_verifier_vlog+0x1fd/0x330 [ 213.187937][ T7629] ? btf_id_cmp_func+0x80/0x80 [ 213.192805][ T7629] ? __btf_verifier_log+0xd1/0x120 [ 213.198486][ T7629] ? btf_check_sec_info+0x330/0x330 [ 213.203751][ T7629] btf_func_proto_log+0x349/0x670 [ 213.208871][ T7629] __btf_verifier_log_type+0x3f9/0x610 [ 213.214470][ T7629] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 213.221359][ T7629] ? btf_int_show+0x2bf0/0x2bf0 [ 213.226740][ T7629] ? kvmalloc_node+0x88/0x130 [ 213.232925][ T7629] btf_func_proto_check_meta+0xf4/0x160 [ 213.238918][ T7629] btf_check_all_metas+0x230/0x820 [ 213.244352][ T7629] btf_parse_type_sec+0xea/0x15a0 [ 213.249733][ T7629] ? btf_check_sec_info+0x27a/0x330 [ 213.255159][ T7629] ? btf_check_sec_info+0x330/0x330 [ 213.260405][ T7629] ? btf_verifier_log+0x2a0/0x2a0 [ 213.265475][ T7629] ? memcpy+0x56/0x70 [ 213.269489][ T7629] ? btf_parse_hdr+0x5d6/0x7b0 [ 213.274255][ T7629] ? btf_parse_str_sec+0x1aa/0x260 [ 213.279461][ T7629] btf_new_fd+0x562/0xa00 [ 213.283893][ T7629] bpf_btf_load+0x5e/0x70 [ 213.288233][ T7629] __se_sys_bpf+0x48a/0x680 [ 213.292829][ T7629] ? __x64_sys_bpf+0x90/0x90 [ 213.297549][ T7629] ? __bpf_trace_sys_enter+0x62/0x70 [ 213.302858][ T7629] __x64_sys_bpf+0x7b/0x90 [ 213.307279][ T7629] do_syscall_64+0x31/0x40 [ 213.311748][ T7629] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 213.317745][ T7629] RIP: 0033:0x7fcf7baa1929 [ 213.322158][ T7629] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 213.343753][ T7629] RSP: 002b:00007fcf7a10a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 213.352331][ T7629] RAX: ffffffffffffffda RBX: 00007fcf7bcc8fa0 RCX: 00007fcf7baa1929 [ 213.360428][ T7629] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000012 [ 213.368412][ T7629] RBP: 00007fcf7a10a090 R08: 0000000000000000 R09: 0000000000000000 [ 213.376723][ T7629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 213.384701][ T7629] R13: 0000000000000000 R14: 00007fcf7bcc8fa0 R15: 00007ffdbd84eb08 [ 214.284619][ T7673] FAULT_INJECTION: forcing a failure. [ 214.284619][ T7673] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 214.404379][ T7673] CPU: 1 PID: 7673 Comm: syz.3.2035 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 214.416693][ T7673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 214.427466][ T7673] Call Trace: [ 214.430806][ T7673] __dump_stack+0x21/0x24 [ 214.435526][ T7673] dump_stack_lvl+0x169/0x1d8 [ 214.440701][ T7673] ? thaw_kernel_threads+0x220/0x220 [ 214.446270][ T7673] ? show_regs_print_info+0x18/0x18 [ 214.451753][ T7673] ? string+0x292/0x2b0 [ 214.456113][ T7673] dump_stack+0x15/0x1c [ 214.460370][ T7673] should_fail+0x3c1/0x510 [ 214.465432][ T7673] should_fail_usercopy+0x1a/0x20 [ 214.470603][ T7673] _copy_to_user+0x20/0x90 [ 214.475279][ T7673] bpf_verifier_vlog+0x1b4/0x330 [ 214.480261][ T7673] btf_verifier_log+0x1dc/0x2a0 [ 214.485262][ T7673] ? bpf_verifier_vlog+0x1fd/0x330 [ 214.490751][ T7673] ? btf_id_cmp_func+0x80/0x80 [ 214.495625][ T7673] ? __btf_verifier_log+0xd1/0x120 [ 214.500939][ T7673] ? btf_check_sec_info+0x330/0x330 [ 214.506760][ T7673] btf_func_proto_log+0x52e/0x670 [ 214.511794][ T7673] __btf_verifier_log_type+0x3f9/0x610 [ 214.517394][ T7673] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 214.523604][ T7673] ? btf_int_show+0x2bf0/0x2bf0 [ 214.528781][ T7673] ? kvmalloc_node+0x88/0x130 [ 214.533621][ T7673] btf_func_proto_check_meta+0xf4/0x160 [ 214.539636][ T7673] btf_check_all_metas+0x230/0x820 [ 214.544886][ T7673] btf_parse_type_sec+0xea/0x15a0 [ 214.550140][ T7673] ? btf_check_sec_info+0x27a/0x330 [ 214.555421][ T7673] ? btf_check_sec_info+0x330/0x330 [ 214.560609][ T7673] ? btf_verifier_log+0x2a0/0x2a0 [ 214.565633][ T7673] ? memcpy+0x56/0x70 [ 214.569606][ T7673] ? btf_parse_hdr+0x5d6/0x7b0 [ 214.574449][ T7673] ? btf_parse_str_sec+0x1aa/0x260 [ 214.579842][ T7673] btf_new_fd+0x562/0xa00 [ 214.584351][ T7673] bpf_btf_load+0x5e/0x70 [ 214.588849][ T7673] __se_sys_bpf+0x48a/0x680 [ 214.593475][ T7673] ? __x64_sys_bpf+0x90/0x90 [ 214.598070][ T7673] ? fpu__clear_all+0x20/0x20 [ 214.602743][ T7673] __x64_sys_bpf+0x7b/0x90 [ 214.607149][ T7673] do_syscall_64+0x31/0x40 [ 214.611557][ T7673] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 214.617440][ T7673] RIP: 0033:0x7fefe7445929 [ 214.621847][ T7673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 214.641717][ T7673] RSP: 002b:00007fefe5aae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 214.650642][ T7673] RAX: ffffffffffffffda RBX: 00007fefe766cfa0 RCX: 00007fefe7445929 [ 214.658703][ T7673] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000012 [ 214.666693][ T7673] RBP: 00007fefe5aae090 R08: 0000000000000000 R09: 0000000000000000 [ 214.674685][ T7673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 214.682759][ T7673] R13: 0000000000000000 R14: 00007fefe766cfa0 R15: 00007ffca4fe0548 [ 215.339206][ T7705] device sit0 entered promiscuous mode [ 215.653275][ T7717] FAULT_INJECTION: forcing a failure. [ 215.653275][ T7717] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 215.666779][ T7717] CPU: 0 PID: 7717 Comm: syz.2.2050 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 215.678068][ T7717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 215.688234][ T7717] Call Trace: [ 215.691755][ T7717] __dump_stack+0x21/0x24 [ 215.696283][ T7717] dump_stack_lvl+0x169/0x1d8 [ 215.701609][ T7717] ? thaw_kernel_threads+0x220/0x220 [ 215.707136][ T7717] ? show_regs_print_info+0x18/0x18 [ 215.713414][ T7717] ? memcpy+0x56/0x70 [ 215.717524][ T7717] dump_stack+0x15/0x1c [ 215.722003][ T7717] should_fail+0x3c1/0x510 [ 215.726663][ T7717] should_fail_usercopy+0x1a/0x20 [ 215.732158][ T7717] _copy_to_user+0x20/0x90 [ 215.736694][ T7717] bpf_verifier_vlog+0x1b4/0x330 [ 215.742173][ T7717] btf_verifier_log+0x1dc/0x2a0 [ 215.747205][ T7717] ? bpf_verifier_vlog+0x1fd/0x330 [ 215.753055][ T7717] ? btf_id_cmp_func+0x80/0x80 [ 215.757865][ T7717] ? __btf_verifier_log+0xd1/0x120 [ 215.763125][ T7717] ? btf_check_sec_info+0x330/0x330 [ 215.768326][ T7717] btf_func_proto_log+0x53d/0x670 [ 215.773543][ T7717] __btf_verifier_log_type+0x3f9/0x610 [ 215.779174][ T7717] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 215.785256][ T7717] ? btf_int_show+0x2bf0/0x2bf0 [ 215.790112][ T7717] ? kvmalloc_node+0x88/0x130 [ 215.794889][ T7717] btf_func_proto_check_meta+0xf4/0x160 [ 215.800740][ T7717] btf_check_all_metas+0x230/0x820 [ 215.805861][ T7717] btf_parse_type_sec+0xea/0x15a0 [ 215.811003][ T7717] ? btf_check_sec_info+0x27a/0x330 [ 215.816654][ T7717] ? btf_check_sec_info+0x330/0x330 [ 215.822038][ T7717] ? btf_verifier_log+0x2a0/0x2a0 [ 215.827269][ T7717] ? memcpy+0x56/0x70 [ 215.831247][ T7717] ? btf_parse_hdr+0x5d6/0x7b0 [ 215.836001][ T7717] ? btf_parse_str_sec+0x1aa/0x260 [ 215.841109][ T7717] btf_new_fd+0x562/0xa00 [ 215.845452][ T7717] bpf_btf_load+0x5e/0x70 [ 215.849880][ T7717] __se_sys_bpf+0x48a/0x680 [ 215.854396][ T7717] ? __x64_sys_bpf+0x90/0x90 [ 215.859001][ T7717] ? __bpf_trace_sys_enter+0x62/0x70 [ 215.864299][ T7717] __x64_sys_bpf+0x7b/0x90 [ 215.868747][ T7717] do_syscall_64+0x31/0x40 [ 215.873167][ T7717] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 215.879074][ T7717] RIP: 0033:0x7fcf7baa1929 [ 215.883493][ T7717] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 215.904901][ T7717] RSP: 002b:00007fcf7a10a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 215.913362][ T7717] RAX: ffffffffffffffda RBX: 00007fcf7bcc8fa0 RCX: 00007fcf7baa1929 [ 215.922564][ T7717] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000012 [ 215.931799][ T7717] RBP: 00007fcf7a10a090 R08: 0000000000000000 R09: 0000000000000000 [ 215.940361][ T7717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 215.950040][ T7717] R13: 0000000000000000 R14: 00007fcf7bcc8fa0 R15: 00007ffdbd84eb08 [ 217.001215][ T7738] device veth0_vlan left promiscuous mode [ 217.007696][ T7738] device veth0_vlan entered promiscuous mode [ 218.152595][ T7755] FAULT_INJECTION: forcing a failure. [ 218.152595][ T7755] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 218.210390][ T7755] CPU: 0 PID: 7755 Comm: syz.3.2062 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 218.221815][ T7755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 218.231896][ T7755] Call Trace: [ 218.235359][ T7755] __dump_stack+0x21/0x24 [ 218.239761][ T7755] dump_stack_lvl+0x169/0x1d8 [ 218.244983][ T7755] ? thaw_kernel_threads+0x220/0x220 [ 218.250278][ T7755] ? show_regs_print_info+0x18/0x18 [ 218.255464][ T7755] ? memcpy+0x56/0x70 [ 218.259617][ T7755] dump_stack+0x15/0x1c [ 218.263881][ T7755] should_fail+0x3c1/0x510 [ 218.268324][ T7755] should_fail_usercopy+0x1a/0x20 [ 218.273752][ T7755] _copy_to_user+0x20/0x90 [ 218.278360][ T7755] bpf_verifier_vlog+0x1b4/0x330 [ 218.283327][ T7755] __btf_verifier_log+0xd1/0x120 [ 218.288270][ T7755] ? btf_check_sec_info+0x330/0x330 [ 218.293496][ T7755] ? btf_func_proto_log+0x53d/0x670 [ 218.299605][ T7755] __btf_verifier_log_type+0x4a0/0x610 [ 218.305148][ T7755] ? btf_int_show+0x2bf0/0x2bf0 [ 218.310213][ T7755] ? __bpf_trace_kmem_free+0x6f/0x90 [ 218.315504][ T7755] ? kfree+0x24a/0x270 [ 218.319704][ T7755] btf_func_proto_check_meta+0xf4/0x160 [ 218.325254][ T7755] btf_check_all_metas+0x230/0x820 [ 218.330364][ T7755] btf_parse_type_sec+0xea/0x15a0 [ 218.335572][ T7755] ? btf_check_sec_info+0x27a/0x330 [ 218.340893][ T7755] ? btf_check_sec_info+0x330/0x330 [ 218.346094][ T7755] ? btf_verifier_log+0x2a0/0x2a0 [ 218.351200][ T7755] ? memcpy+0x56/0x70 [ 218.355442][ T7755] ? btf_parse_hdr+0x5d6/0x7b0 [ 218.360290][ T7755] ? btf_parse_str_sec+0x1aa/0x260 [ 218.365556][ T7755] btf_new_fd+0x562/0xa00 [ 218.369919][ T7755] bpf_btf_load+0x5e/0x70 [ 218.374341][ T7755] __se_sys_bpf+0x48a/0x680 [ 218.379271][ T7755] ? __x64_sys_bpf+0x90/0x90 [ 218.383945][ T7755] ? fpu__clear_all+0x20/0x20 [ 218.388709][ T7755] __x64_sys_bpf+0x7b/0x90 [ 218.393208][ T7755] do_syscall_64+0x31/0x40 [ 218.397678][ T7755] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 218.403700][ T7755] RIP: 0033:0x7fefe7445929 [ 218.408322][ T7755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 218.428849][ T7755] RSP: 002b:00007fefe5aae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 218.438259][ T7755] RAX: ffffffffffffffda RBX: 00007fefe766cfa0 RCX: 00007fefe7445929 [ 218.447120][ T7755] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000012 [ 218.455587][ T7755] RBP: 00007fefe5aae090 R08: 0000000000000000 R09: 0000000000000000 [ 218.464481][ T7755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 218.473085][ T7755] R13: 0000000000000000 R14: 00007fefe766cfa0 R15: 00007ffca4fe0548 [ 218.486470][ T7759] device sit0 left promiscuous mode [ 218.530712][ T7762] device sit0 entered promiscuous mode [ 218.768801][ T7758] device pim6reg1 entered promiscuous mode [ 219.205905][ T7813] FAULT_INJECTION: forcing a failure. [ 219.205905][ T7813] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 219.281072][ T7813] CPU: 0 PID: 7813 Comm: syz.1.2079 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 219.293978][ T7813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 219.304239][ T7813] Call Trace: [ 219.308073][ T7813] __dump_stack+0x21/0x24 [ 219.312416][ T7813] dump_stack_lvl+0x169/0x1d8 [ 219.317437][ T7813] ? thaw_kernel_threads+0x220/0x220 [ 219.323285][ T7813] ? show_regs_print_info+0x18/0x18 [ 219.328625][ T7813] ? string+0x292/0x2b0 [ 219.332852][ T7813] dump_stack+0x15/0x1c [ 219.337321][ T7813] should_fail+0x3c1/0x510 [ 219.342981][ T7813] should_fail_usercopy+0x1a/0x20 [ 219.348492][ T7813] _copy_to_user+0x20/0x90 [ 219.353422][ T7813] bpf_verifier_vlog+0x1b4/0x330 [ 219.358403][ T7813] __btf_verifier_log+0xd1/0x120 [ 219.363534][ T7813] ? bpf_verifier_vlog+0x1fd/0x330 [ 219.368743][ T7813] ? btf_check_sec_info+0x330/0x330 [ 219.374108][ T7813] ? __btf_verifier_log+0xd1/0x120 [ 219.379404][ T7813] __btf_verifier_log_type+0x387/0x610 [ 219.385103][ T7813] ? __btf_verifier_log_type+0x4a0/0x610 [ 219.390929][ T7813] ? btf_int_show+0x2bf0/0x2bf0 [ 219.395795][ T7813] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 219.401881][ T7813] ? btf_int_show+0x2bf0/0x2bf0 [ 219.406755][ T7813] btf_struct_check_meta+0x354/0xa70 [ 219.412050][ T7813] btf_check_all_metas+0x230/0x820 [ 219.417153][ T7813] btf_parse_type_sec+0xea/0x15a0 [ 219.422483][ T7813] ? btf_check_sec_info+0x27a/0x330 [ 219.427812][ T7813] ? btf_check_sec_info+0x330/0x330 [ 219.433317][ T7813] ? btf_verifier_log+0x2a0/0x2a0 [ 219.438527][ T7813] ? memcpy+0x56/0x70 [ 219.443056][ T7813] ? btf_parse_hdr+0x5d6/0x7b0 [ 219.448046][ T7813] ? btf_parse_str_sec+0x1aa/0x260 [ 219.453385][ T7813] btf_new_fd+0x562/0xa00 [ 219.458529][ T7813] bpf_btf_load+0x5e/0x70 [ 219.464166][ T7813] __se_sys_bpf+0x48a/0x680 [ 219.468921][ T7813] ? __x64_sys_bpf+0x90/0x90 [ 219.473685][ T7813] ? fpu__clear_all+0x20/0x20 [ 219.479543][ T7813] __x64_sys_bpf+0x7b/0x90 [ 219.484566][ T7813] do_syscall_64+0x31/0x40 [ 219.490117][ T7813] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 219.497033][ T7813] RIP: 0033:0x7f3388109929 [ 219.501672][ T7813] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 219.521986][ T7813] RSP: 002b:00007f3386772038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 219.530744][ T7813] RAX: ffffffffffffffda RBX: 00007f3388330fa0 RCX: 00007f3388109929 [ 219.539502][ T7813] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000012 [ 219.547584][ T7813] RBP: 00007f3386772090 R08: 0000000000000000 R09: 0000000000000000 [ 219.555929][ T7813] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 219.564179][ T7813] R13: 0000000000000000 R14: 00007f3388330fa0 R15: 00007ffc11714bd8 [ 219.589914][ T7817] device sit0 left promiscuous mode [ 219.617823][ T7818] device syzkaller0 entered promiscuous mode [ 219.652629][ T7821] device sit0 entered promiscuous mode [ 220.193400][ T7860] FAULT_INJECTION: forcing a failure. [ 220.193400][ T7860] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 220.317475][ T7860] CPU: 0 PID: 7860 Comm: syz.0.2092 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 220.329261][ T7860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 220.339902][ T7860] Call Trace: [ 220.343437][ T7860] __dump_stack+0x21/0x24 [ 220.348068][ T7860] dump_stack_lvl+0x169/0x1d8 [ 220.353081][ T7860] ? thaw_kernel_threads+0x220/0x220 [ 220.360549][ T7860] ? show_regs_print_info+0x18/0x18 [ 220.366058][ T7860] dump_stack+0x15/0x1c [ 220.370785][ T7860] should_fail+0x3c1/0x510 [ 220.376029][ T7860] should_fail_usercopy+0x1a/0x20 [ 220.381194][ T7860] _copy_to_user+0x20/0x90 [ 220.385830][ T7860] bpf_verifier_vlog+0x1b4/0x330 [ 220.390882][ T7860] btf_verifier_log+0x1dc/0x2a0 [ 220.395753][ T7860] ? __btf_verifier_log+0xd1/0x120 [ 220.400885][ T7860] ? btf_id_cmp_func+0x80/0x80 [ 220.405653][ T7860] ? __btf_verifier_log+0xd1/0x120 [ 220.410784][ T7860] btf_struct_log+0x5d/0xa0 [ 220.415296][ T7860] __btf_verifier_log_type+0x3f9/0x610 [ 220.420855][ T7860] ? __btf_verifier_log_type+0x4a0/0x610 [ 220.427670][ T7860] ? btf_int_show+0x2bf0/0x2bf0 [ 220.432679][ T7860] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 220.438851][ T7860] ? btf_int_show+0x2bf0/0x2bf0 [ 220.443782][ T7860] btf_struct_check_meta+0x354/0xa70 [ 220.449565][ T7860] btf_check_all_metas+0x230/0x820 [ 220.454795][ T7860] btf_parse_type_sec+0xea/0x15a0 [ 220.460839][ T7860] ? btf_check_sec_info+0x27a/0x330 [ 220.466831][ T7860] ? btf_check_sec_info+0x330/0x330 [ 220.472754][ T7860] ? btf_verifier_log+0x2a0/0x2a0 [ 220.477901][ T7860] ? memcpy+0x56/0x70 [ 220.481987][ T7860] ? btf_parse_hdr+0x5d6/0x7b0 [ 220.486882][ T7860] ? btf_parse_str_sec+0x1aa/0x260 [ 220.492371][ T7860] btf_new_fd+0x562/0xa00 [ 220.496741][ T7860] bpf_btf_load+0x5e/0x70 [ 220.501099][ T7860] __se_sys_bpf+0x48a/0x680 [ 220.505727][ T7860] ? __x64_sys_bpf+0x90/0x90 [ 220.510384][ T7860] ? fpu__clear_all+0x20/0x20 [ 220.515343][ T7860] __x64_sys_bpf+0x7b/0x90 [ 220.519803][ T7860] do_syscall_64+0x31/0x40 [ 220.524331][ T7860] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 220.530239][ T7860] RIP: 0033:0x7f0a5fb7e929 [ 220.534676][ T7860] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 220.554840][ T7860] RSP: 002b:00007f0a5e1e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 220.563979][ T7860] RAX: ffffffffffffffda RBX: 00007f0a5fda5fa0 RCX: 00007f0a5fb7e929 [ 220.572139][ T7860] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000012 [ 220.580604][ T7860] RBP: 00007f0a5e1e7090 R08: 0000000000000000 R09: 0000000000000000 [ 220.589507][ T7860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 220.599283][ T7860] R13: 0000000000000000 R14: 00007f0a5fda5fa0 R15: 00007fff1b1cd7a8 [ 222.278777][ T7907] FAULT_INJECTION: forcing a failure. [ 222.278777][ T7907] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 222.322772][ T7907] CPU: 1 PID: 7907 Comm: syz.0.2107 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 222.334400][ T7907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 222.344565][ T7907] Call Trace: [ 222.347895][ T7907] __dump_stack+0x21/0x24 [ 222.352343][ T7907] dump_stack_lvl+0x169/0x1d8 [ 222.357042][ T7907] ? thaw_kernel_threads+0x220/0x220 [ 222.362520][ T7907] ? show_regs_print_info+0x18/0x18 [ 222.367737][ T7907] ? memcpy+0x56/0x70 [ 222.371736][ T7907] dump_stack+0x15/0x1c [ 222.375903][ T7907] should_fail+0x3c1/0x510 [ 222.380661][ T7907] should_fail_usercopy+0x1a/0x20 [ 222.385718][ T7907] _copy_to_user+0x20/0x90 [ 222.390164][ T7907] bpf_verifier_vlog+0x1b4/0x330 [ 222.395139][ T7907] __btf_verifier_log+0xd1/0x120 [ 222.400179][ T7907] ? btf_check_sec_info+0x330/0x330 [ 222.405391][ T7907] ? __btf_verifier_log+0xd1/0x120 [ 222.410661][ T7907] __btf_verifier_log_type+0x4a0/0x610 [ 222.416239][ T7907] ? __btf_verifier_log_type+0x4a0/0x610 [ 222.421890][ T7907] ? btf_int_show+0x2bf0/0x2bf0 [ 222.427139][ T7907] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 222.433421][ T7907] ? btf_int_show+0x2bf0/0x2bf0 [ 222.438301][ T7907] btf_struct_check_meta+0x354/0xa70 [ 222.443953][ T7907] btf_check_all_metas+0x230/0x820 [ 222.449168][ T7907] btf_parse_type_sec+0xea/0x15a0 [ 222.454208][ T7907] ? btf_check_sec_info+0x27a/0x330 [ 222.459643][ T7907] ? btf_check_sec_info+0x330/0x330 [ 222.464860][ T7907] ? btf_verifier_log+0x2a0/0x2a0 [ 222.470869][ T7907] ? memcpy+0x56/0x70 [ 222.475292][ T7907] ? btf_parse_hdr+0x5d6/0x7b0 [ 222.480098][ T7907] ? btf_parse_str_sec+0x1aa/0x260 [ 222.485352][ T7907] btf_new_fd+0x562/0xa00 [ 222.489894][ T7907] bpf_btf_load+0x5e/0x70 [ 222.494330][ T7907] __se_sys_bpf+0x48a/0x680 [ 222.498975][ T7907] ? __x64_sys_bpf+0x90/0x90 [ 222.503649][ T7907] ? fpu__clear_all+0x20/0x20 [ 222.508438][ T7907] __x64_sys_bpf+0x7b/0x90 [ 222.513041][ T7907] do_syscall_64+0x31/0x40 [ 222.517499][ T7907] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 222.523539][ T7907] RIP: 0033:0x7f0a5fb7e929 [ 222.528151][ T7907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 222.548136][ T7907] RSP: 002b:00007f0a5e1e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 222.556679][ T7907] RAX: ffffffffffffffda RBX: 00007f0a5fda5fa0 RCX: 00007f0a5fb7e929 [ 222.564858][ T7907] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000012 [ 222.573416][ T7907] RBP: 00007f0a5e1e7090 R08: 0000000000000000 R09: 0000000000000000 [ 222.581687][ T7907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 222.590210][ T7907] R13: 0000000000000000 R14: 00007f0a5fda5fa0 R15: 00007fff1b1cd7a8 [ 223.114041][ T7942] device veth0_vlan left promiscuous mode [ 223.135432][ T7942] device veth0_vlan entered promiscuous mode [ 224.103517][ T7981] device sit0 entered promiscuous mode [ 224.354985][ T7990] device syzkaller0 entered promiscuous mode [ 224.643535][ T8005] device pim6reg1 entered promiscuous mode [ 224.738830][ T8005] device veth0_vlan left promiscuous mode [ 224.788905][ T8005] device veth0_vlan entered promiscuous mode [ 224.880429][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.894225][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.947085][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 226.761383][ T8116] device pim6reg1 entered promiscuous mode [ 228.708550][ T8243] device pim6reg1 entered promiscuous mode [ 228.737454][ T8221] device pim6reg1 entered promiscuous mode [ 228.753226][ T8247] FAULT_INJECTION: forcing a failure. [ 228.753226][ T8247] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 228.798433][ T8247] CPU: 0 PID: 8247 Comm: syz.3.2207 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 228.810174][ T8247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 228.820703][ T8247] Call Trace: [ 228.824360][ T8247] __dump_stack+0x21/0x24 [ 228.828818][ T8247] dump_stack_lvl+0x169/0x1d8 [ 228.833567][ T8247] ? thaw_kernel_threads+0x220/0x220 [ 228.839163][ T8247] ? show_regs_print_info+0x18/0x18 [ 228.844638][ T8247] ? string+0x292/0x2b0 [ 228.848926][ T8247] dump_stack+0x15/0x1c [ 228.853318][ T8247] should_fail+0x3c1/0x510 [ 228.857841][ T8247] should_fail_usercopy+0x1a/0x20 [ 228.863099][ T8247] _copy_to_user+0x20/0x90 [ 228.867764][ T8247] bpf_verifier_vlog+0x1b4/0x330 [ 228.872802][ T8247] btf_verifier_log+0x1dc/0x2a0 [ 228.877735][ T8247] ? bpf_verifier_vlog+0x1fd/0x330 [ 228.883015][ T8247] ? btf_id_cmp_func+0x80/0x80 [ 228.888307][ T8247] ? __btf_verifier_log+0xd1/0x120 [ 228.893629][ T8247] ? btf_check_sec_info+0x330/0x330 [ 228.899129][ T8247] btf_func_proto_log+0x349/0x670 [ 228.904187][ T8247] __btf_verifier_log_type+0x3f9/0x610 [ 228.909949][ T8247] ? btf_modifier_resolve+0x3e4/0xc10 [ 228.915410][ T8247] ? btf_int_show+0x2bf0/0x2bf0 [ 228.920436][ T8247] btf_parse_type_sec+0x1440/0x15a0 [ 228.926922][ T8247] btf_new_fd+0x562/0xa00 [ 228.931648][ T8247] bpf_btf_load+0x5e/0x70 [ 228.936736][ T8247] __se_sys_bpf+0x48a/0x680 [ 228.941632][ T8247] ? __x64_sys_bpf+0x90/0x90 [ 228.946513][ T8247] ? fpu__clear_all+0x20/0x20 [ 228.951204][ T8247] __x64_sys_bpf+0x7b/0x90 [ 228.956173][ T8247] do_syscall_64+0x31/0x40 [ 228.960739][ T8247] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 228.966886][ T8247] RIP: 0033:0x7fefe7445929 [ 228.971771][ T8247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 228.993556][ T8247] RSP: 002b:00007fefe5aae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 229.001988][ T8247] RAX: ffffffffffffffda RBX: 00007fefe766cfa0 RCX: 00007fefe7445929 [ 229.009975][ T8247] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000012 [ 229.018301][ T8247] RBP: 00007fefe5aae090 R08: 0000000000000000 R09: 0000000000000000 [ 229.026358][ T8247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 229.034805][ T8247] R13: 0000000000000000 R14: 00007fefe766cfa0 R15: 00007ffca4fe0548 [ 229.168167][ T8255] device pim6reg1 entered promiscuous mode [ 230.462958][ T8326] FAULT_INJECTION: forcing a failure. [ 230.462958][ T8326] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 230.499481][ T8326] CPU: 0 PID: 8326 Comm: syz.1.2231 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 230.511095][ T8326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 230.521664][ T8326] Call Trace: [ 230.525161][ T8326] __dump_stack+0x21/0x24 [ 230.529743][ T8326] dump_stack_lvl+0x169/0x1d8 [ 230.534834][ T8326] ? thaw_kernel_threads+0x220/0x220 [ 230.540235][ T8326] ? show_regs_print_info+0x18/0x18 [ 230.545450][ T8326] ? string+0x292/0x2b0 [ 230.549625][ T8326] dump_stack+0x15/0x1c [ 230.553794][ T8326] should_fail+0x3c1/0x510 [ 230.558751][ T8326] should_fail_usercopy+0x1a/0x20 [ 230.563911][ T8326] _copy_to_user+0x20/0x90 [ 230.569221][ T8326] bpf_verifier_vlog+0x1b4/0x330 [ 230.574635][ T8326] btf_verifier_log+0x1dc/0x2a0 [ 230.579912][ T8326] ? bpf_verifier_vlog+0x1fd/0x330 [ 230.585152][ T8326] ? btf_id_cmp_func+0x80/0x80 [ 230.590298][ T8326] ? __btf_verifier_log+0xd1/0x120 [ 230.595549][ T8326] ? btf_check_sec_info+0x330/0x330 [ 230.600778][ T8326] btf_func_proto_log+0x52e/0x670 [ 230.605830][ T8326] __btf_verifier_log_type+0x3f9/0x610 [ 230.611314][ T8326] ? btf_modifier_resolve+0x3e4/0xc10 [ 230.616877][ T8326] ? btf_int_show+0x2bf0/0x2bf0 [ 230.621821][ T8326] btf_parse_type_sec+0x1440/0x15a0 [ 230.627317][ T8326] btf_new_fd+0x562/0xa00 [ 230.631834][ T8326] bpf_btf_load+0x5e/0x70 [ 230.636484][ T8326] __se_sys_bpf+0x48a/0x680 [ 230.641219][ T8326] ? __x64_sys_bpf+0x90/0x90 [ 230.646256][ T8326] ? fpu__clear_all+0x20/0x20 [ 230.651050][ T8326] __x64_sys_bpf+0x7b/0x90 [ 230.655579][ T8326] do_syscall_64+0x31/0x40 [ 230.660378][ T8326] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 230.666433][ T8326] RIP: 0033:0x7f3388109929 [ 230.670864][ T8326] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 230.691688][ T8326] RSP: 002b:00007f3386772038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 230.700473][ T8326] RAX: ffffffffffffffda RBX: 00007f3388330fa0 RCX: 00007f3388109929 [ 230.709102][ T8326] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000012 [ 230.717351][ T8326] RBP: 00007f3386772090 R08: 0000000000000000 R09: 0000000000000000 [ 230.725320][ T8326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 230.734485][ T8326] R13: 0000000000000000 R14: 00007f3388330fa0 R15: 00007ffc11714bd8 [ 230.767016][ T8327] device bridge_slave_1 left promiscuous mode [ 230.798551][ T8327] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.806447][ T8327] device bridge_slave_0 left promiscuous mode [ 230.813798][ T8327] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.016788][ T8413] device veth0_vlan left promiscuous mode [ 234.047184][ T8413] device veth0_vlan entered promiscuous mode [ 234.229427][ T8422] syz.1.2259[8422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.229488][ T8422] syz.1.2259[8422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.290944][ T8422] syz.1.2259[8422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.329137][ T8422] syz.1.2259[8422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.786878][ T8454] device macsec0 entered promiscuous mode [ 235.579866][ T8478] syz.4.2276[8478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.579925][ T8478] syz.4.2276[8478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.707570][ T8478] syz.4.2276[8478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.731731][ T8478] syz.4.2276[8478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.840581][ T8488] device sit0 left promiscuous mode [ 235.877656][ T8491] device sit0 entered promiscuous mode [ 236.395525][ T8506] device syzkaller0 entered promiscuous mode [ 236.480244][ T8510] syz.3.2290[8510] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.775985][ T8528] device sit0 left promiscuous mode [ 237.667954][ T8543] device syzkaller0 entered promiscuous mode [ 237.873467][ T8547] device syzkaller0 entered promiscuous mode [ 238.431379][ T8611] device sit0 left promiscuous mode [ 238.483914][ T8608] device wg1 entered promiscuous mode [ 238.549521][ T8605] device sit0 entered promiscuous mode [ 239.461709][ T8639] device sit0 entered promiscuous mode [ 239.982899][ T8651] device syzkaller0 entered promiscuous mode [ 246.046753][ T8801] device pim6reg1 entered promiscuous mode [ 246.963006][ T8840] device syzkaller0 entered promiscuous mode