last executing test programs: 5.678484904s ago: executing program 3 (id=2718): bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x6, 0x600, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x200, 0x8020, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000070000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000028008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="150a0000000000006111800000000000180000000000000000000000000000009500000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0500000002000000010000000400000000000000", @ANYRES32, @ANYBLOB="000000fdff000000000000a0d3c78600f5ff00a6fe8fef71e59521fb30c32d893bcc669c830212c7d882810f1fb000"/56, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x2a979d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32=r4, @ANYBLOB="fdffffff00000000000000000000030000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000020000000400"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r8}, 0xfffffffffffffda7) ioctl$SIOCSIFHWADDR(r3, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) 5.16526018s ago: executing program 3 (id=2714): r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000000), &(0x7f0000000280)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb704000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0x3) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000ad37d13babfd0000000000060000000200000020700400ace20af17e00000000202020631af8ffdbffffffb902000000000000b703000000000000850000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x44}, {0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r1}, 0x18) unlink(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/user\x00') syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="04000000040000000400000025bf"], 0x48) close(r6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYRESOCT, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) 4.725604955s ago: executing program 0 (id=2717): sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, 0x0, 0x31}, 0x24048850) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000580)={&(0x7f0000000340)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/93, 0x5d}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000280)=""/45, 0x2d}, {&(0x7f0000000700)=""/181, 0xb5}, {&(0x7f00000007c0)=""/183, 0xb7}, {&(0x7f0000000880)=""/67, 0x43}], 0x7, &(0x7f0000000a00)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe8}, 0x40000120) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r6}, 0x69) 3.801322565s ago: executing program 0 (id=2727): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0xf, 0x0, 0x0, 0x0, 0x0, 0xb08e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) close(0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000280)=""/238, 0xee}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x200, 0x80020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x3}, 0x80, 0x0, 0x1, 0x1, 0x7, 0x39b8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00"/14], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r5, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001540)='ns/net\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="186df358bc6cb70cef0000000000000085000000190000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 2.858164857s ago: executing program 0 (id=2741): socketpair(0x1e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x110684}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000611208000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x1f00, 0x8, '\x00', 0x0, @cgroup_sockopt=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$cgroup_type(r3, &(0x7f0000000180), 0x40010) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@cgroup=r5, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40010) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xd, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000002817fcbd899d212a6a1ff7aba7f41b8390da1ade09c5130122487377db7e5cd001756adebd30fb2575f4ac087cb4f4d41d214e95335ed570f154bb7dfccd4e65c475abd0d66e5fe9d060040006ba043bdaf2fc66ebf00c17871ad7ff74a4e172e3d5df7d13ea8b4930520f66f3893fc6cfde667f5047306adc770454e1f34a66ecc38d9bdc390cf67dcc1d67c82b82cc86b2e99ac2c7db2cd29cf599f6586f9298b6d434582a2bef549b05466070992ae6bac403928449"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r9, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000d3f299c0a5b7f61dc4038c218a39fab4f76a84ba32ff7936ca6cd25b2dad23afb81dbf0202b3cf6456f9e36a43b1c5e102ae2b1d7283118b63ff69f189f54eb282c9ed5256d06d558b48e6c67865c69968fa162d5ff6c30b396e5d11c6", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000030000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r11}, 0x18) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) 2.58929513s ago: executing program 3 (id=2744): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffe00000000000}}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00', @ANYRES32], 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000100)={0x0, 0x0}) close(r4) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x900) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r8, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff2300000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001010404000011000000b7030000000000006a0a00fe000000008500000032000000b700000001000000950000000000000075cdc4b57b0c65752a3ad50000007ddd0000cb450063dedba767ade51f7f1f66acd19100002000000000000000ff7f0000b52f17cee19d0001000000000000000000cb04fcbb4e4d0b9bafe3ba431351a58a885ba9918d37b056b9bbd11b6b9f6cf7db6d574620260000000000008062d77e85cef4a2ab938f65aac33c4d620de2c9b7dc10d7d313f9f57606b83b994fc4051ade12f41deff6df6a936b4ec3827c739bb39aad16cc75fe369258673b5df11cc2afb53611cc32a790bc0b80e80eae8f5e64be2c9d2d29db3d36dd0cf8f79a015c7bd3f15aa6aadbeab2a01685108e61aa00000000000000000000000000c67c6c6a06e828e5216f601b19db1af1b5d356d0f062137d866d11be4ba3f0151fdbbd4e97d62ecc645e143a60f10800000000000000826151e3b42bcae95239ef5ca2a730a00c87c493db0300e63fda97a296820000000001000000eecc952a3fd2c46f3c1cde71a19d1a2982492a210e00d2bfea3b8d188df2eff8d56aaae7d32a2e180022537395019f02ec4b85f6aad7faca088de9b26797a8446b16c28d85f225992dbdd5bb01ba51508951c7a7d6ca0916c3a12912715649c2b1c7192a4251b59d378d3f00000000000000665c8b7e89eddfc3783f6c9129a7c5f8ee5f50579e2f638f7eb12f63be72a3d81ab324d6e417b1c2cbfdcada0a16e31790e26cf19588a7e0496ee2782224cf30f810da86cf1a3204f4c9404f5d7321a4fefc4d1c9139ca4b65b99909950000006b42077ca60fdecb2717e21f8f187b1866108b6e8c71e2603217606637ece1fa89917e131f4034a8383e99c3568fd04201b37cd92ca6ebf94a2d8310f7032775cfd75652f87b039d5430b3c6643e9146d2478ce31344b554aca7670000000000000010c65608fda6ed5d08e7a796042aa127d874105787d0347aa37801faff5b9050803a19ff6205aa5c263e407a2f7de56f7a0000e094fa4e3f05528caab5a430c08dd810bc97204b767dd969721a26aa740000000000bc433fe2d0a6ef2a8a91cd3cb305aa80dadef8b0caca780000000000000000863e21db415a222bb1a7ab94bfe4a74157d794f9d0430c2c0eb563350559829865a3dd08fb31bd0801e09aa3ee45e61a56fc83076451cff7632e49a41eadb5044a0d5f73d6932161ae5e9ce218a35cd8e7b747887b1a74798982d0b492c3f0ff53189d80733eb04f8124877b648ff438f7d66c7efcc09a8f3330b6c22d14e80db8e5608bdeab9388b758a15f4ce70390c214bc6838798f5b9b0b500d4e8b5174f329b8501c6feb7a6982bcea74a0f2ced7fa2059234a8d10b7f0597151d5c9067d57d85f4ae933eaf5174ba122f3f702ef8695578d3c08562c9fc185f0f65d11b4c58ae52500cbe99cde3758a5cbe6093dd328ac820e2de309d25a324647aadffcecf0f3bbaeda7af4436d9ffbce1b240a2f5e346eba8812e6329e01b087bde7da4a6448f478102e90c8134f531de08d4cf4f6f35b15a202544c0ced0c1715fd3a90099f785a13a2412bedba2981dd22bd9d736c00000000000000000000000000000000eb6fec8d7d2f77f4d470a9caa5b1bfc00cd1d40830ac35f229f8ffe1c02a63d3c2d9"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x57) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)) 2.520375211s ago: executing program 4 (id=2745): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000000080)='syz0\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x3f) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="050000000400000004000000040000000000", @ANYRES32=0x0, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="00000000005ea2d53d00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(r4, 0x0) 2.218676494s ago: executing program 3 (id=2751): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0xf, 0x0, 0x0, 0x0, 0x0, 0xb08e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) close(0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000280)=""/238, 0xee}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x200, 0x80020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x3}, 0x80, 0x0, 0x1, 0x1, 0x7, 0x39b8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00"/14], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r3, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001540)='ns/net\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="186df358bc6cb70cef0000000000000085000000190000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 1.786899219s ago: executing program 3 (id=2753): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0xf, 0x0, 0x0, 0x0, 0x0, 0xb08e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) close(0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r2}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000280)=""/238, 0xee}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x200, 0x80020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x3}, 0x80, 0x0, 0x1, 0x1, 0x7, 0x39b8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00"/14], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r5, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001540)='ns/net\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) 1.72478181s ago: executing program 0 (id=2754): r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000000), &(0x7f0000000280)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb704000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0x3) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000ad37d13babfd0000000000060000000200000020700400ace20af17e00000000202020631af8ffdbffffffb902000000000000b703000000000000850000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x44}, {0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r1}, 0x18) unlink(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/user\x00') syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="04000000040000000400000025bf"], 0x48) close(r6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYRESOCT, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.664948941s ago: executing program 2 (id=2756): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0, r1}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0, r1}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x80086601, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r3}, 0x8) (async) r4 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r3}, 0x8) close(r4) (async) close(r4) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r3, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000009c0)={r4, 0x0, 0x0}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r5}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000640)=@base={0x6, 0x4, 0x8004, 0x9eb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x5, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000080000000c000000000000006e535da7ce25d7d2f5b2eca5ce9189d21cd66e95a781765bb23106f76ddccc2d37fdf0c5f47e8a846e8c095658dcbd2f0ccba6b2482a351c790cd9a7979838da623c255b485007366aa162a05ec6ab628acc3c6201", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000, @value}, 0x28) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9ff96e3e6ab7b546, 0x20000000000001fc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9ff96e3e6ab7b546, 0x20000000000001fc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@bloom_filter={0x1e, 0x9, 0xfff, 0xa, 0x0, r0, 0x1, '\x00', 0x0, r8, 0x4, 0x1, 0x0, 0x8, @void, @value, @void, @value}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 1.66319693s ago: executing program 4 (id=2757): sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, 0x0, 0x31}, 0x24048850) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000160000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000580)={&(0x7f0000000340)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/93, 0x5d}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000680)=""/112, 0x70}, {&(0x7f0000000280)=""/45, 0x2d}, {&(0x7f0000000700)=""/181, 0xb5}, {&(0x7f00000007c0)=""/183, 0xb7}, {&(0x7f0000000880)=""/67, 0x43}], 0x7, &(0x7f0000000a00)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe8}, 0x40000120) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r6}, 0x69) 1.555782132s ago: executing program 1 (id=2759): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x80802, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x821, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x401}, 0x9208, 0xfffffffffffff0e9, 0x2, 0xc, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000340)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x96, 0x0}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, &(0x7f0000000040)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000800)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r5}, 0xc) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) close(r6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB="0000000000000de1bef500000000080000000000aef5ecbbbb447eaa754ac170a8bb3275e56a53a4c80a4ff40b531da9c4cdacccc0732045cd55181b333a9e8ee6409efdfdf0d7f950f6a3d55522ea0b1f728507478703edc0382fadc662ef1c8306acebbc25c4dccd2c59d60c520513710f50d1476144bb108611809951e973218420abc3670e262a83b123aeed6a08e489eb34e7f8126482dbcdec8f8ef7f240e20000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r8}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0x3}, 0xf00, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendmsg(r2, &(0x7f00000008c0)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4, 0x4, {0xa, 0x4e24, 0x80000400, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10}}}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000380)="a09b9e78b102482c6eb0c876b8128a51ed739490be39e07e35690eaf6d557d8c921d20e659d0f79eabbc65e31d84880cc0f395ec88aa1a20561d5823bd01620910cb0ccb35e4aedde9b4e2e37144500d6cc3a73af11b841f861575ed7d9574177d67278f5e41cfb038f43b97bbdb225bb3420d58e23802134fa8992a92e05df41cd3bb20775c3eeae26910c525c5e7ee201ae2e8", 0x94}, {&(0x7f0000000c40)="cc19189ac5b6a27075537b9a10d8c14151c27aadce09325fecb77dc7d9b460a2aab27e7ca6af67ebddfbdbb49b86c99aef5309dc6b90beba2f8a290b1d2b4140e66d71af07d5e0b3b2e381efcddc27d4ffbbdfadad68aa1386e8b744ba844e3211e0919c712a77d096d259497ebf3207fb7d51fb1a1faaf8cdba81067ef02763ce393d3e510d2ffd9a2c742aa417eefb021966abbb08b4a284525f90264ed30c4e9cf5b8cbed3ce0ff5c42bda44ca43df45413e51dbff46cd18043fd9cccac147116ee79429d13ff487340", 0xcb}, {&(0x7f00000004c0)="30237ece24766ae43d0ab9ce1695b75492f8f38ebb9414e9ce1ba920db3ce0a549a267e0a1546d5d34df6dcdbdbe861d5dc6600737c3d10bb7431b1ad9d9ba3a2c390b97e93ae54cc88f96c64ae75dc64b7a6a347d9a351f856e41f396349aba67e2e4a023407ac70e2e994059dcda630d0f3eb2b699d1f483cd01fea0483053940f49c4baf6cf7f049522cde3a066365d7195d01081a0dc3217f4705ef743870eee0d1f826a19ee725bdd0eb3756237396e2825b028176f32c71d8a", 0xbc}, {&(0x7f0000000900)="5a5df4746e8a4c8293486bd10438bc3a16a123de4f8b01e9f4c3df986ef773df219e621b4ac87e", 0x27}, {&(0x7f00000005c0)}, {&(0x7f0000000600)="509b065bb1fa894cc1f94a9d04dc3ee9cf7bde72f73b6b75d79ee80a6b6de274a0f382e123d4f55ae9fb36291dab09d710c19ebb0fb03ed9834d55cdb8487856311aa1d8e8c2adb7bbea3f3ba3a07546d7b51deb4cd111d0735ef259a34ae81c8d09fbcf93d6979f3ce7a905975876326bbf4538171f74ba5735f7f597521306798f4f4a879580027c182ae0dfe6abcb3fcffc0bf7e3eacea70a4fbfe388497bcd803b2d332a269a5b", 0xa9}, {&(0x7f00000006c0)="3f0bd15e236d2ff4d798793ec7dff72c312642656500ef678937f715d61e033e626d13543f031523365bd28829b5450724110bbf6a1e2d497062a197b623ccfe45474379a17acb0c68613122be237284bdde20bb046bf029c53ae46c", 0x5c}, {&(0x7f0000000740)}], 0x8, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x148}, 0x240000c0) close(r9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000300), 0x200200, 0x0) 1.334733764s ago: executing program 1 (id=2760): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 1.252395785s ago: executing program 1 (id=2761): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB, @ANYRES64=0x0], 0x10) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x3) socketpair$tipc(0xa, 0x2, 0x11, &(0x7f0000000040)) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000faff0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="06808000000000000000"]) (async) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x7f, 0xa9, 0x3, 0x9820, r0, 0x8, '\x00', 0x0, r3, 0x2, 0x0, 0x1, 0xe, @value=r4, @void, @void, @value}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000000000008f93603702318897588cc90000000000000000", @ANYRES32=0x0, @ANYRES32], 0x48) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000280)='GPL\x00') close(r6) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) close(r5) 1.252026755s ago: executing program 1 (id=2762): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)}, 0x11) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000019c0)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYBLOB='&\x00\x00\x00\x00\x00\x00\x00\x00'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x32, 0x0, 0xff34) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x7, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000085000000a000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 1.084691967s ago: executing program 1 (id=2763): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0xf, 0x0, 0x0, 0x0, 0x0, 0xb08e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) close(0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000280)=""/238, 0xee}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x200, 0x80020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x3}, 0x80, 0x0, 0x1, 0x1, 0x7, 0x39b8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00"/14], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r3, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001540)='ns/net\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="186df358bc6cb70cef0000000000000085000000190000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 939.577409ms ago: executing program 1 (id=2764): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xa, 0xd6, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000002240), &(0x7f0000002300), 0x8001, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) 890.40546ms ago: executing program 2 (id=2765): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000016c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x10, 0xc, &(0x7f0000001380)=ANY=[@ANYRES64, @ANYRES64=r0], 0x0, 0xfffffffc, 0x0, 0x0, 0x41100, 0x18, '\x00', 0x0, @sk_msg=0x7, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffe35, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000013c0)=@base={0xb, 0x5, 0x5, 0x9, 0x1861, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002a80)={&(0x7f0000002a40)='cachefiles_ondemand_copen\x00', r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0b000000ff"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002a00)={{r2}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="1b0900000000000000001b000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000500"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000029c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(r4, &(0x7f0000001180)='ns/time_for_children\x00') mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000003000), 0x201, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) r7 = getpid() sendmsg$unix(r6, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}], 0x40, 0x4084}, 0x20008000) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000010c0)={&(0x7f0000001080)='btrfs_transaction_commit\x00', 0xffffffffffffffff, 0x0, 0x5c}, 0x18) perf_event_open(&(0x7f0000001000)={0x4, 0x80, 0xd4, 0x2, 0x9, 0x7, 0x0, 0x5, 0x890, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xd4, 0x7f}, 0x10, 0x7, 0x5, 0x5, 0xb, 0x6, 0x8, 0x0, 0x3}, r7, 0x0, r8, 0x1) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="1200000084000000080000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xe, &(0x7f0000001440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018000000000000000000000000000000950000002304f866"], &(0x7f0000000200)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000240)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe66, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xb, 0xf, &(0x7f0000001600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7020000140000000000000000008500000083000000bf090000000000005509010000000000950000000000e3ffbf91000000000000b7020000020000008500000084000000b7000000000059c639044bbea7b037de54f3ff0bbc26baabea4dbf778ccc24b8f8d36addc2564f8f29ec55486d46d05041151beaf311cef36f7e766b69bb94d3ee3e7218625b1ee0"], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000001100), 0x8) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f0000001140)={'veth0_to_team\x00', 0x800}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r11, 0xfca804a0, 0x8, 0x8, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r13, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 888.321659ms ago: executing program 3 (id=2766): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r3}, &(0x7f00000001c0), &(0x7f0000000300)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r5}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000340)='workqueue_activate_work\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000003c0)=ANY=[@ANYRES8=r8, @ANYBLOB="027846390606d1dca0a2cd4345055afdc00674f130e11461ef967496da80ac6722eef31e673bbfdbe5ba72584684bdab71c2a1a41435aba37836b6571e4c0cd5163af04ca1dc2dba10507756b3df2f782d686b0baed47aed9a6b04cc2839929af6e8bc2626d508864bd8e556797a4cbfe646", @ANYRES8=r7, @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYRES32=r10], 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r11}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r12, &(0x7f0000000000), 0xfffffd26) sendmsg$unix(r12, 0x0, 0x40051) bpf$ITER_CREATE(0xb, &(0x7f0000000380)={r12}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 873.75215ms ago: executing program 0 (id=2767): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%pK \x00'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r0, &(0x7f00000000c0)="b241f2e3758c3285e03273d7ec8140936e548badf9eabde5ab417fa65d14918d29b298d7b67358e3580b7ccf5531dba1ce284258993c5fdb9b7b82e1c1c920d8c24d6e3b39c2c3b05a48e4e7990eebb6a5bd7d6a82fb6a4a43dbcaa25e62fdee628a91e0cef8c6e2095c71ebe2a77aca9216317798c59fb2fde92c9797480b6c15e39d87b08ae465835dfa0ddb1ce39e33a51d49da8eef88a400121d460a16ca3aa7fb545e2ff436dc2767538d370381014b21c85a6edbb64182b009892c875629fa0dec7de96593af1b8df655258f16bffa06909c216b83c60350d67f9cb6576ba72d2a46c0", &(0x7f00000001c0)=""/217}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{r0, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pS \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r0, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@func={0x2, 0x0, 0x0, 0xc, 0x1}]}, {0x0, [0x5f, 0x30, 0x0, 0x5f]}}, &(0x7f0000000580)=""/4, 0x2a, 0x4, 0x0, 0x9f5, 0x0, @void, @value}, 0x28) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_lsm={0x1d, 0x1d, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x449}, [@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @alu={0x0, 0x1, 0x6, 0x0, 0x4, 0x40, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @tail_call, @jmp={0x5, 0x1, 0xb, 0x4, 0x8, 0x6, 0x1}]}, &(0x7f0000000780)='GPL\x00', 0x401, 0x7b, &(0x7f00000007c0)=""/123, 0x41100, 0x1, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000880)={0x3, 0x8, 0x8}, 0x10, 0x0, 0x0, 0x9, &(0x7f00000008c0)=[r0], &(0x7f0000000900)=[{0x5, 0x1, 0x2, 0x1}, {0x0, 0x4, 0x6, 0x8}, {0x4, 0x2, 0x2, 0x7}, {0x3, 0x5, 0x3, 0xc}, {0x0, 0x5, 0x10, 0x6}, {0x1, 0x2, 0x2, 0x3}, {0x2, 0x5, 0xb, 0x4}, {0x1, 0x3, 0x3, 0x9}, {0x2, 0x2, 0xb, 0x5}], 0x10, 0x8, @void, @value}, 0x94) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000ac0)=@bpf_ext={0x1c, 0x9, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x7fff}, [@alu={0x7, 0x1, 0x0, 0xa, 0x9, 0xffffffffffffffc0, 0xffffffffffffffff}, @generic={0x8, 0x7, 0x4, 0x3, 0xe7}, @map_val={0x18, 0x7, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xad29}, @call={0x85, 0x0, 0x0, 0x8d}, @alu={0x4, 0x0, 0x6, 0x7, 0xb, 0x6, 0x10}]}, &(0x7f0000000440)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x38, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000600)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x4, 0x7, 0x8919, 0x4}, 0x10, 0x4374, r4, 0x1, 0x0, &(0x7f0000000a80)=[{0x1, 0x3, 0x8, 0x5}], 0x10, 0xffff, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=@bloom_filter={0x1e, 0x3ff, 0x4886, 0x80000001, 0x20, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0xffff55b8, 0x5, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000c80)={{r6}, &(0x7f0000000c00), &(0x7f0000000c40)='%-010d \x00'}, 0x20) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000dc0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x18, 0x2, &(0x7f0000000cc0)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0xc2, 0xb, 0x6, 0xbd, 0x9}], &(0x7f0000000d00)='syzkaller\x00', 0x8, 0x42, &(0x7f0000000d40)=""/66, 0x41000, 0x40, '\x00', r2, 0x0, r7, 0x8, &(0x7f0000000e00)={0x7, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, &(0x7f0000000e40)=[{0x0, 0x4, 0xf, 0xa}, {0x0, 0x5, 0xf, 0x3}, {0x5, 0x1, 0x10, 0x8}, {0x5, 0x2, 0x1, 0x6}, {0x5, 0x1, 0x9, 0xc}, {0x5, 0x5, 0x0, 0x2}, {0x3, 0x5, 0x9, 0xc}, {0x3, 0x3, 0x4, 0x5}, {0x4, 0x3, 0xa, 0x5}], 0x10, 0x5, @void, @value}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001200)={0x1, 0x0}, 0x8) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x2, 0x10, &(0x7f0000000fc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@call={0x85, 0x0, 0x0, 0x66}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001040)='GPL\x00', 0x48c, 0xe5, &(0x7f0000001080)=""/229, 0x41000, 0x50, '\x00', r2, @fallback=0x30, r7, 0x8, &(0x7f0000001180)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x3, 0xb, 0xc, 0xc}, 0x10, r8, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000001240)=[{0x1, 0x3, 0x5, 0x16e073446ebb7dba}, {0x3, 0x4, 0xb, 0x2}, {0x3, 0x2, 0xa, 0x5}, {0x2, 0x5, 0xe, 0x8}], 0x10, 0x3, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000013c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001340), &(0x7f0000001380)=r5}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001640)={{r6, 0xffffffffffffffff}, &(0x7f00000015c0), &(0x7f0000001600)=r4}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001740)={0x11, 0x1b, &(0x7f0000001400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0xb}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@generic={0x4, 0x8, 0xe, 0x7, 0xd0}, @tail_call={{0x18, 0x2, 0x1, 0x0, r10}}, @jmp={0x5, 0x1, 0x6, 0xa, 0x9, 0xfffffffffffffffe, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @ldst={0x0, 0x1, 0x6, 0x9, 0xa, 0xfffffffffffffffe, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x4f}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001500)='syzkaller\x00', 0xfffffff8, 0x0, 0x0, 0x41100, 0x8, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001540)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000001580)={0x4, 0x2, 0xffff, 0x7}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001680)=[r0, r9, r11], &(0x7f00000016c0)=[{0x3, 0x4, 0x0, 0x7}, {0x0, 0x4, 0x7, 0x9}, {0x0, 0x1, 0xd, 0x3}, {0x4, 0x4, 0x1, 0x5}, {0x5, 0x3, 0x9}], 0x10, 0x3, @void, @value}, 0x94) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000001800)={'b', ' *:* ', 'wm\x00'}, 0x9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) recvmsg$unix(r12, &(0x7f0000002c40)={&(0x7f0000001880)=@abs, 0x6e, &(0x7f0000002b80)=[{&(0x7f0000001900)=""/86, 0x56}, {&(0x7f0000001980)=""/3, 0x3}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/3, 0x3}, {&(0x7f0000002a00)=""/214, 0xd6}, {&(0x7f0000002b00)=""/74, 0x4a}], 0x6, &(0x7f0000002c00)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}, 0x2000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002d80)={@map=r10, 0x22, 0x1, 0xffff, &(0x7f0000002c80)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000002cc0)=[0x0, 0x0], &(0x7f0000002d00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002d40)=[0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000003fc0)={&(0x7f0000002dc0)="d13cb1e263e7ebe7b8508805a73ec96afe4e5c295329cdc695886ac4f9103650f1abc78c46bf2022503bfc2137e93f68c7fecb33fd0f254b9061e7ba5808cd921538c9afe71891b9e00fbad6ee9f799d241ebe01f77ab6abbd515bfda8e1711967d2dd94e23865", &(0x7f0000002e40)=""/249, &(0x7f0000002f40)="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", &(0x7f0000003f40)="b95d4e04618a2ab6e17bdf0a94ba106720cec14647a04f44bb925cfa6c3b7b0e5c05047fb41dd91de15302083a6e53cca1555f5243b2f0ff19010085ebfb2ddcbcba81870c8de7a05f8616ddd9d0dfcd212daa0526f723413b1f8157ff", 0x3, r16}, 0x38) ioctl$PERF_EVENT_IOC_SET_FILTER(r14, 0x40082406, &(0x7f0000004000)='%-010d \x00') r17 = getpid() perf_event_open(&(0x7f0000004040)={0x4, 0x80, 0x75, 0x7f, 0xd9, 0x9, 0x0, 0x32463b89, 0x1d000, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb, 0x4, @perf_config_ext={0x8, 0xfff}, 0x800, 0x8, 0x1, 0x8, 0x1, 0x4, 0x5, 0x0, 0xd, 0x0, 0x9}, r17, 0xd, r13, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000040c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r18, &(0x7f00000043c0)={&(0x7f0000004100)=@nfc_llcp, 0x80, &(0x7f0000004380)=[{&(0x7f0000004180)=""/191, 0xbf}, {&(0x7f0000004240)=""/12, 0xc}, {&(0x7f0000004280)=""/206, 0xce}], 0x3}, 0x21) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000004480)={r15, &(0x7f0000004400)="b1539d", &(0x7f0000004440)=""/3}, 0x20) perf_event_open(&(0x7f00000044c0)={0x1, 0x80, 0xc, 0x8, 0x7, 0x9, 0x0, 0x10000, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x28d5bad7112542d9, @perf_config_ext={0xa, 0x5}, 0x4111, 0x2, 0xfcb, 0x9, 0x7, 0x8, 0x9, 0x0, 0x4, 0x0, 0x80000000}, r17, 0xb, r13, 0x8) ioctl$TUNSETIFF(r14, 0x400454ca, &(0x7f0000004540)={'wg1\x00', 0x1000}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000004580)={0x2, 0x4, 0x8, 0x1, 0x80, r13, 0x400, '\x00', r2, r3, 0x0, 0x3, 0x1, 0x0, @void, @value, @void, @value}, 0x50) 794.54954ms ago: executing program 4 (id=2768): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[@ANYBLOB="85000000a800000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, 0x0, 0x31}, 0x24048850) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r6}, 0x69) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x12, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={@map=r7, 0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x2, 0xc, 0x1400, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 689.754352ms ago: executing program 2 (id=2769): sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, 0x0, 0x31}, 0x24048850) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r4}, 0x69) 684.427532ms ago: executing program 4 (id=2770): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r2, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r1}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)}, 0x11) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000019c0)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB='&\x00\x00\x00\x00\x00\x00\x00\x00'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6, 0x0, 0x1000000}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x32, 0x0, 0xff34) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[], 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x7, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000085000000a000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 561.565234ms ago: executing program 2 (id=2771): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRESHEX=r0, @ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000f32d3e15e1bb742a2c3ed4d0d19842cef9ef1a1c5151bd304421b589b6fcc9d4d45f1bf5f6002cd288f4d54ac8a94d9fe48db6aaf9e213e9d7d0eb8edf2f225389fa973d772fd4be603c1659ae5c1a5dfa92c44b98ed75606283a4033f1f37e05734a8b745f5b2bf909906fbaedd5c8f742b807906a3fd7af52c1a25b448"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x14, 0xc, &(0x7f00000008c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f375ffff86dd6317ce62070000000000000000431ccaf57b0000000000000001f804"], 0xfe1b) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2d, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="851000677eca427b3a54bb3d", @ANYRES32, @ANYBLOB="0809cd0000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYRES32=r3, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x1000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000009000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='mm_page_alloc\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) 330.427746ms ago: executing program 2 (id=2772): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) getpid() r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8949, &(0x7f0000000200)={'vlan1\x00', @random="0106002010ff"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000280)="c47954761a61d7227ebda8523e1264faf4dce07d507bbc70269e21555764020297fb2473b1e34239c147ecdc8ce4cb464dfb2a77647a8e7ee82c8b9fc97c7423a93d6536971b75653fce8d1d88b23d6c99fa558e9c8ff9c3d2b9d597f0b66473705ac1bcd7a5f33801ad9a7f"}, 0x20) syz_open_procfs$namespace(0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000000000000000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/13, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 328.807136ms ago: executing program 4 (id=2773): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)}, 0x11) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000019c0)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYBLOB='&\x00\x00\x00\x00\x00\x00\x00\x00'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x32, 0x0, 0xff34) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x7, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000085000000a000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 34.419569ms ago: executing program 4 (id=2774): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0xf, 0x0, 0x0, 0x0, 0x0, 0xb08e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) close(0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000280)=""/238, 0xee}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x200, 0x80020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x3}, 0x80, 0x0, 0x1, 0x1, 0x7, 0x39b8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00"/14], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r3, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001540)='ns/net\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="186df358bc6cb70cef0000000000000085000000190000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 620.22µs ago: executing program 0 (id=2775): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000ffffff7f0000000000805028ff5a7ade9062380eedbf55891ef16a9ded2e8ec95bff5acbb1cf7d6f50ee83"], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x7101}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x6, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000faffffff0000000000004000850000002c0000001800000004000000000000000700000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x27, 0x8, 0x0, &(0x7f0000000280)="ed7e17526b2d6f70", 0x0, 0x1403, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x2e20, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000400)="46c3c0b8016877bbdaac0e8aecffa931053a9f5a488744b0845ec5fb", 0x1c}, {&(0x7f0000001380)="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", 0x1000}, {&(0x7f0000002380)="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", 0x1000}], 0x3, &(0x7f0000000740)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r5, 0xffffffffffffffff, r2]}}, @rights={{0x18, 0x1, 0x1, [r4, r4]}}], 0x58, 0x4000090}, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0300000004430000040000000a0000000000", @ANYRES32=0x1, @ANYBLOB="02"], 0x48) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3d) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000001340)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge_slave_0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f0000000080)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r9}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r0, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', r10, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f00000009c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b70200001c000000b7030000000000008500000005000000bca900000000000035094f35cf6b27cd70a30100000000009500000000000000b702000004000000632af8ff00000000b509000000000000c3aaf8fff1000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffff40000000000800000018220000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 0s ago: executing program 2 (id=2776): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f00000100000012"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001100)={{r0}, &(0x7f0000001080), &(0x7f00000001c0)=r1}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r3, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0xb1}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r6 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000040000000300000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r8, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): ied { noatsecure } for pid=227 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.334206][ T28] audit: type=1400 audit(1744446391.943:63): avc: denied { write } for pid=227 comm="sh" path="pipe:[14177]" dev="pipefs" ino=14177 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 14.339026][ T28] audit: type=1400 audit(1744446391.943:64): avc: denied { rlimitinh } for pid=227 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.344755][ T28] audit: type=1400 audit(1744446391.943:65): avc: denied { siginh } for pid=227 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.177' (ED25519) to the list of known hosts. [ 21.628999][ T28] audit: type=1400 audit(1744446399.253:66): avc: denied { mounton } for pid=281 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.630150][ T281] cgroup: Unknown subsys name 'net' [ 21.651453][ T28] audit: type=1400 audit(1744446399.253:67): avc: denied { mount } for pid=281 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.678366][ T28] audit: type=1400 audit(1744446399.273:68): avc: denied { unmount } for pid=281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.678477][ T281] cgroup: Unknown subsys name 'devices' [ 21.790003][ T281] cgroup: Unknown subsys name 'hugetlb' [ 21.795413][ T281] cgroup: Unknown subsys name 'rlimit' [ 21.930375][ T28] audit: type=1400 audit(1744446399.553:69): avc: denied { setattr } for pid=281 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.953344][ T28] audit: type=1400 audit(1744446399.553:70): avc: denied { mounton } for pid=281 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.977854][ T28] audit: type=1400 audit(1744446399.553:71): avc: denied { mount } for pid=281 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.986913][ T285] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 22.009659][ T28] audit: type=1400 audit(1744446399.633:72): avc: denied { relabelto } for pid=285 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.034823][ T28] audit: type=1400 audit(1744446399.633:73): avc: denied { write } for pid=285 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.065225][ T28] audit: type=1400 audit(1744446399.683:74): avc: denied { read } for pid=281 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.090544][ T28] audit: type=1400 audit(1744446399.683:75): avc: denied { open } for pid=281 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.090588][ T281] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.768185][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.775038][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.782454][ T291] device bridge_slave_0 entered promiscuous mode [ 22.798336][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.805170][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.812521][ T291] device bridge_slave_1 entered promiscuous mode [ 22.825271][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.832233][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.839488][ T292] device bridge_slave_0 entered promiscuous mode [ 22.858800][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.865620][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.872914][ T292] device bridge_slave_1 entered promiscuous mode [ 22.885476][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.892440][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.899746][ T294] device bridge_slave_0 entered promiscuous mode [ 22.913999][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.920841][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.928043][ T294] device bridge_slave_1 entered promiscuous mode [ 22.954845][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.961703][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.968894][ T293] device bridge_slave_0 entered promiscuous mode [ 22.989184][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.996020][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.003227][ T293] device bridge_slave_1 entered promiscuous mode [ 23.061627][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.068629][ T295] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.075856][ T295] device bridge_slave_0 entered promiscuous mode [ 23.092885][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.099812][ T295] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.106911][ T295] device bridge_slave_1 entered promiscuous mode [ 23.220585][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.227433][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.234538][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.241329][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.272082][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.278937][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.286022][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.292856][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.300922][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.307755][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.314889][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.321653][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.334324][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.341176][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.348268][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.355050][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.394167][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.401025][ T295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.408107][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.414911][ T295] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.447831][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.456191][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.464079][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.471293][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.478377][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.485340][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.492437][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.499462][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.506467][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.513707][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.520691][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.550061][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.557899][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.566305][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.574316][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.581151][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.588924][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.596942][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.603779][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.611018][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.619072][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.625891][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.633133][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.641135][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.647949][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.655193][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.663287][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.670136][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.677291][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.685283][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.692111][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.699369][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.706621][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.713951][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.722009][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.729039][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.736152][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.744202][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.751034][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.758216][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.785067][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.793142][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.800981][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.809507][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.817204][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.825066][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.832853][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.840811][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.848696][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.856499][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.867270][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.875202][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.893882][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.901791][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.909742][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.917837][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.926428][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.934712][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.947832][ T293] device veth0_vlan entered promiscuous mode [ 23.961062][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.968591][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.975807][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.983729][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.991800][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.000047][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.008113][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.015475][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.026945][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.035138][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.047501][ T291] device veth0_vlan entered promiscuous mode [ 24.059107][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.067094][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.075002][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.083015][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.091247][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.099356][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.106182][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.113506][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.121290][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.129158][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.136421][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.143879][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.151240][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.160830][ T294] device veth0_vlan entered promiscuous mode [ 24.169370][ T292] device veth0_vlan entered promiscuous mode [ 24.177619][ T293] device veth1_macvtap entered promiscuous mode [ 24.184555][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.192387][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.200290][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.208912][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.216835][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.223676][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.230893][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.238076][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.259760][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.267531][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.275692][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.284063][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.292270][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.300469][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.308473][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.316773][ T292] device veth1_macvtap entered promiscuous mode [ 24.327498][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.334964][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.343146][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.357447][ T291] device veth1_macvtap entered promiscuous mode [ 24.364772][ T293] request_module fs-gadgetfs succeeded, but still no fs? [ 24.381045][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.389301][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.397516][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.405789][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.413943][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.422114][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.429972][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.437861][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.449545][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.457605][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.468014][ T294] device veth1_macvtap entered promiscuous mode [ 24.494364][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.505926][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.514290][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.569152][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.598737][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.626823][ C1] hrtimer: interrupt took 27139 ns [ 24.632409][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.670963][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.708765][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.741180][ T295] device veth0_vlan entered promiscuous mode [ 24.778453][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.793912][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.897392][ T295] device veth1_macvtap entered promiscuous mode [ 24.905864][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.914373][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.923236][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.999558][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.064908][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.148284][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.213781][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.797766][ T375] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.804830][ T375] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.918762][ T375] device bridge_slave_1 left promiscuous mode [ 27.976713][ T375] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.984493][ T375] device bridge_slave_0 left promiscuous mode [ 27.990499][ T375] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.554156][ T425] device sit0 entered promiscuous mode [ 31.264768][ T432] device syzkaller0 entered promiscuous mode [ 32.443299][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 32.443316][ T28] audit: type=1400 audit(1744446410.063:108): avc: denied { cpu } for pid=449 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 32.532473][ T28] audit: type=1400 audit(1744446410.123:109): avc: denied { read } for pid=449 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 32.713195][ T28] audit: type=1400 audit(1744446410.333:110): avc: denied { create } for pid=452 comm="syz.2.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 32.798363][ T28] audit: type=1400 audit(1744446410.353:111): avc: denied { write } for pid=449 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.156361][ T460] device sit0 entered promiscuous mode [ 34.624373][ T28] audit: type=1400 audit(1744446412.243:112): avc: denied { create } for pid=485 comm="syz.3.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 34.921162][ T28] audit: type=1400 audit(1744446412.543:113): avc: denied { setopt } for pid=485 comm="syz.3.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 35.842507][ T509] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.849566][ T509] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.936552][ T509] device bridge_slave_1 left promiscuous mode [ 35.943713][ T509] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.957742][ T509] device bridge_slave_0 left promiscuous mode [ 35.963854][ T509] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.423578][ T589] device pim6reg1 entered promiscuous mode [ 40.747387][ T28] audit: type=1400 audit(1744446418.363:114): avc: denied { create } for pid=588 comm="syz.2.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 41.563014][ T608] device syzkaller0 entered promiscuous mode [ 41.588641][ T28] audit: type=1400 audit(1744446419.213:115): avc: denied { relabelfrom } for pid=607 comm="syz.4.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 41.617322][ T28] audit: type=1400 audit(1744446419.233:116): avc: denied { relabelto } for pid=607 comm="syz.4.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 41.660602][ T610] device syzkaller0 entered promiscuous mode [ 44.346301][ T655] device syzkaller0 entered promiscuous mode [ 44.549520][ T664] device syzkaller0 entered promiscuous mode [ 48.476317][ T723] device sit0 left promiscuous mode [ 48.829034][ T724] device sit0 entered promiscuous mode [ 49.039057][ T729] device syzkaller0 entered promiscuous mode [ 49.191544][ T736] device sit0 entered promiscuous mode [ 52.594449][ T794] device syzkaller0 entered promiscuous mode [ 53.263523][ T807] device sit0 entered promiscuous mode [ 54.273207][ T827] device wg2 entered promiscuous mode [ 54.450103][ T841] device syzkaller0 entered promiscuous mode [ 55.443348][ T28] audit: type=1400 audit(1744446433.063:117): avc: denied { create } for pid=881 comm="syz.2.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 55.788253][ T28] audit: type=1400 audit(1744446433.403:118): avc: denied { read } for pid=885 comm="syz.2.149" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 55.905720][ T28] audit: type=1400 audit(1744446433.433:119): avc: denied { open } for pid=885 comm="syz.2.149" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 55.993372][ T893] device syzkaller0 entered promiscuous mode [ 56.392342][ T28] audit: type=1400 audit(1744446434.013:120): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 56.564327][ T28] audit: type=1400 audit(1744446434.183:121): avc: denied { ioctl } for pid=910 comm="syz.2.156" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 56.588757][ T909] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.595761][ T909] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.783213][ T909] device bridge_slave_1 left promiscuous mode [ 56.808601][ T909] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.838700][ T909] device bridge_slave_0 left promiscuous mode [ 56.844655][ T909] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.489239][ T937] device syzkaller0 entered promiscuous mode [ 57.906901][ T960] device syzkaller0 entered promiscuous mode [ 59.030623][ T991] device syzkaller0 entered promiscuous mode [ 60.480572][ T1037] device syzkaller0 entered promiscuous mode [ 60.544240][ T1046] device syzkaller0 entered promiscuous mode [ 61.141580][ T1065] device veth0_vlan left promiscuous mode [ 61.147766][ T1065] device veth0_vlan entered promiscuous mode [ 61.353798][ T28] audit: type=1400 audit(1744446438.963:122): avc: denied { create } for pid=1076 comm="syz.4.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 61.769235][ T28] audit: type=1400 audit(1744446439.393:123): avc: denied { create } for pid=1092 comm="syz.3.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 61.769969][ T1089] device syzkaller0 entered promiscuous mode [ 62.293437][ T1110] Driver unsupported XDP return value 0 on prog (id 290) dev N/A, expect packet loss! [ 62.349673][ T1113] device pim6reg1 entered promiscuous mode [ 63.184933][ T1139] device syzkaller0 entered promiscuous mode [ 64.721989][ T1199] device syzkaller0 entered promiscuous mode [ 65.110959][ T28] audit: type=1400 audit(1744446442.733:124): avc: denied { create } for pid=1219 comm="syz.2.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 65.215410][ T1217] device pim6reg1 entered promiscuous mode [ 65.781003][ T28] audit: type=1400 audit(1744446443.403:125): avc: denied { create } for pid=1241 comm="syz.0.246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 66.037833][ T1253] device syzkaller0 entered promiscuous mode [ 67.081605][ T28] audit: type=1400 audit(1744446444.703:126): avc: denied { create } for pid=1299 comm="syz.0.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 67.651695][ T1310] device syzkaller0 entered promiscuous mode [ 68.752027][ T1343] device veth1_macvtap left promiscuous mode [ 69.156445][ T1366] device syzkaller0 entered promiscuous mode [ 70.356640][ T1409] device sit0 left promiscuous mode [ 70.640977][ T1421] device sit0 entered promiscuous mode [ 70.994089][ T1428] device syzkaller0 entered promiscuous mode [ 71.514855][ T28] audit: type=1400 audit(1744446449.133:127): avc: denied { create } for pid=1457 comm="syz.3.301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 72.072222][ T1464] device syzkaller0 entered promiscuous mode [ 72.589171][ T1487] device syzkaller0 entered promiscuous mode [ 73.199611][ T1510] device veth0_vlan left promiscuous mode [ 73.226219][ T1510] device veth0_vlan entered promiscuous mode [ 73.419929][ T1330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 73.449007][ T1330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.490051][ T1330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.736986][ T1515] device syzkaller0 entered promiscuous mode [ 74.309159][ T28] audit: type=1400 audit(1744446451.923:128): avc: denied { create } for pid=1547 comm="syz.4.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 74.672479][ T28] audit: type=1400 audit(1744446452.293:129): avc: denied { ioctl } for pid=1554 comm="syz.1.328" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.844538][ T28] audit: type=1400 audit(1744446452.353:130): avc: denied { tracepoint } for pid=1554 comm="syz.1.328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 74.848018][ T1546] device syzkaller0 entered promiscuous mode [ 76.927482][ T28] audit: type=1400 audit(1744446454.543:131): avc: denied { create } for pid=1612 comm="syz.0.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 77.153622][ T1617] device syzkaller0 entered promiscuous mode [ 80.917812][ T28] audit: type=1400 audit(1744446458.533:132): avc: denied { create } for pid=1729 comm="syz.2.374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 81.342462][ T1741] device wg2 entered promiscuous mode [ 81.970102][ T28] audit: type=1400 audit(1744446459.593:133): avc: denied { create } for pid=1765 comm="syz.3.382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 82.092581][ T28] audit: type=1400 audit(1744446459.593:134): avc: denied { read } for pid=1765 comm="syz.3.382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 82.152746][ T1771] device wg2 entered promiscuous mode [ 82.248290][ T28] audit: type=1400 audit(1744446459.653:135): avc: denied { write } for pid=1765 comm="syz.3.382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 82.342826][ T28] audit: type=1400 audit(1744446459.753:136): avc: denied { write } for pid=1770 comm="syz.1.384" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 82.356378][ T1757] device syzkaller0 entered promiscuous mode [ 82.638189][ T1786] device sit0 left promiscuous mode [ 84.988113][ C0] sched: RT throttling activated [ 87.322530][ T28] audit: type=1400 audit(1744446464.943:137): avc: denied { setopt } for pid=1855 comm="syz.1.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 90.820265][ T28] audit: type=1400 audit(1744446468.443:138): avc: denied { create } for pid=1933 comm="syz.1.422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 90.965535][ T28] audit: type=1400 audit(1744446468.573:139): avc: denied { create } for pid=1936 comm="syz.2.424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 93.937530][ T28] audit: type=1400 audit(1744446471.553:140): avc: denied { ioctl } for pid=2016 comm="syz.4.446" path="socket:[20709]" dev="sockfs" ino=20709 ioctlcmd=0x8924 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 94.133180][ T2025] device wg2 left promiscuous mode [ 95.737337][ T2082] tun0: tun_chr_ioctl cmd 1074025677 [ 95.768219][ T2082] tun0: linktype set to 769 [ 96.038465][ T2091] device syzkaller0 entered promiscuous mode [ 97.684793][ T2156] device sit0 entered promiscuous mode [ 99.099126][ T2204] device wg2 left promiscuous mode [ 99.195853][ T2204] device wg2 entered promiscuous mode [ 100.771586][ T28] audit: type=1400 audit(1744446478.393:141): avc: denied { create } for pid=2284 comm="syz.4.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 101.446264][ T28] audit: type=1400 audit(1744446479.063:142): avc: denied { create } for pid=2298 comm="syz.1.519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 101.603214][ T102] udevd[102]: worker [319] terminated by signal 33 (Unknown signal 33) [ 101.630902][ T28] audit: type=1400 audit(1744446479.253:143): avc: denied { create } for pid=2314 comm="syz.2.522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 101.651027][ T102] udevd[102]: worker [319] failed while handling '/devices/virtual/block/loop3' [ 102.088249][ T2336] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.095263][ T2336] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.109925][ T102] udevd[102]: worker [2334] terminated by signal 33 (Unknown signal 33) [ 102.127239][ T102] udevd[102]: worker [2334] failed while handling '/devices/virtual/block/loop4' [ 102.335914][ T2336] device bridge_slave_1 left promiscuous mode [ 102.378992][ T2336] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.443538][ T2336] device bridge_slave_0 left promiscuous mode [ 102.452750][ T2336] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.234428][ T2462] device syzkaller0 entered promiscuous mode [ 107.698990][ T2472] device sit0 left promiscuous mode [ 108.256079][ T2482] device syzkaller0 entered promiscuous mode [ 108.646001][ T28] audit: type=1400 audit(1744446486.263:144): avc: denied { create } for pid=2504 comm="syz.2.572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 108.733574][ T2510] device syzkaller0 entered promiscuous mode [ 108.744566][ T2512] device sit0 left promiscuous mode [ 108.864729][ T2515] device sit0 entered promiscuous mode [ 109.892040][ T2575] tap0: tun_chr_ioctl cmd 1074025677 [ 109.923117][ T2575] tap0: linktype set to 823 [ 110.125361][ T2588] device syzkaller0 entered promiscuous mode [ 110.290909][ T2596] device veth0_vlan left promiscuous mode [ 110.297668][ T2596] device veth0_vlan entered promiscuous mode [ 110.452581][ T28] audit: type=1400 audit(1744446488.073:145): avc: denied { create } for pid=2618 comm="syz.4.601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 111.939850][ T2654] device syzkaller0 entered promiscuous mode [ 113.391990][ T2706] device syzkaller0 entered promiscuous mode [ 113.636605][ T28] audit: type=1400 audit(1744446491.253:146): avc: denied { write } for pid=2718 comm="syz.4.631" name="cgroup.subtree_control" dev="cgroup2" ino=284 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 113.776339][ T28] audit: type=1400 audit(1744446491.253:147): avc: denied { open } for pid=2718 comm="syz.4.631" path="" dev="cgroup2" ino=284 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 115.146717][ T2756] device syzkaller0 entered promiscuous mode [ 115.604743][ T2767] device veth1_macvtap left promiscuous mode [ 115.640206][ T2768] device veth1_macvtap entered promiscuous mode [ 115.658186][ T2768] device macsec0 entered promiscuous mode [ 116.667392][ T2806] device syzkaller0 entered promiscuous mode [ 117.784778][ T2850] device syzkaller0 entered promiscuous mode [ 120.043160][ T2911] device syzkaller0 entered promiscuous mode [ 120.566404][ T2936] device pim6reg1 entered promiscuous mode [ 121.654018][ T2957] device syzkaller0 entered promiscuous mode [ 122.721087][ T2989] device pim6reg1 entered promiscuous mode [ 123.572908][ T3006] device syzkaller0 entered promiscuous mode [ 124.532272][ T3031] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 124.685745][ T3031] device syzkaller0 entered promiscuous mode [ 125.205256][ T3052] device macsec0 entered promiscuous mode [ 125.295623][ T3058] device syzkaller0 entered promiscuous mode [ 128.703071][ T3160] device wg2 left promiscuous mode [ 131.356450][ T3218] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 131.483798][ T3218] device syzkaller0 entered promiscuous mode [ 131.730995][ T3228] device sit0 left promiscuous mode [ 135.740457][ T102] udevd[102]: worker [2338] terminated by signal 33 (Unknown signal 33) [ 135.804531][ T102] udevd[102]: worker [2338] failed while handling '/devices/virtual/block/loop2' [ 137.982853][ T3361] device veth0_vlan left promiscuous mode [ 138.099040][ T3361] device veth0_vlan entered promiscuous mode [ 139.865943][ T3395] device wg2 entered promiscuous mode [ 147.181540][ T3551] device veth0_to_team entered promiscuous mode [ 147.291494][ T3553] device syzkaller0 entered promiscuous mode [ 148.529673][ T3588] device syzkaller0 entered promiscuous mode [ 149.823079][ T3615] device syzkaller0 entered promiscuous mode [ 150.841737][ T3639] device syzkaller0 entered promiscuous mode [ 150.932431][ T3639] FAULT_INJECTION: forcing a failure. [ 150.932431][ T3639] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 150.998329][ T3639] CPU: 1 PID: 3639 Comm: syz.4.877 Not tainted 6.1.129-syzkaller-00002-g777d8313618b #0 [ 151.007966][ T3639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 151.017867][ T3639] Call Trace: [ 151.020985][ T3639] [ 151.023761][ T3639] dump_stack_lvl+0x151/0x1b7 [ 151.028273][ T3639] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 151.033573][ T3639] dump_stack+0x15/0x18 [ 151.037664][ T3639] should_fail_ex+0x3d0/0x520 [ 151.042140][ T3642] device syzkaller0 entered promiscuous mode [ 151.042175][ T3639] should_fail+0xb/0x10 [ 151.051985][ T3639] should_fail_usercopy+0x1a/0x20 [ 151.056843][ T3639] _copy_from_iter+0x18d/0xe00 [ 151.061442][ T3639] ? _parse_integer_limit+0x19b/0x1e0 [ 151.066653][ T3639] ? copyout_mc+0x80/0x80 [ 151.070902][ T3639] ? kstrtoull+0x1cd/0x2e0 [ 151.075158][ T3639] ? _parse_integer+0x40/0x40 [ 151.079669][ T3639] tun_get_user+0x489/0x3a90 [ 151.084098][ T3639] ? kstrtouint+0xf6/0x180 [ 151.088345][ T3639] ? kasan_save_free_info+0x2b/0x40 [ 151.093380][ T3639] ? _kstrtol+0x150/0x150 [ 151.097548][ T3639] ? tun_do_read+0x2000/0x2000 [ 151.102147][ T3639] ? ref_tracker_alloc+0x31d/0x450 [ 151.107096][ T3639] ? ref_tracker_dir_print+0x160/0x160 [ 151.112394][ T3639] ? avc_policy_seqno+0x1b/0x70 [ 151.117077][ T3639] ? tun_get+0xe9/0x120 [ 151.121070][ T3639] tun_chr_write_iter+0x129/0x210 [ 151.125929][ T3639] vfs_write+0xaf6/0xed0 [ 151.130005][ T3639] ? __kasan_slab_free+0x11/0x20 [ 151.134781][ T3639] ? file_end_write+0x1c0/0x1c0 [ 151.139468][ T3639] ? __fget_files+0x2cb/0x330 [ 151.143983][ T3639] ? __fdget_pos+0x204/0x390 [ 151.148404][ T3639] ? ksys_write+0x77/0x2c0 [ 151.152658][ T3639] ksys_write+0x199/0x2c0 [ 151.156826][ T3639] ? __this_cpu_preempt_check+0x13/0x20 [ 151.162207][ T3639] ? __ia32_sys_read+0x90/0x90 [ 151.166810][ T3639] ? debug_smp_processor_id+0x17/0x20 [ 151.172014][ T3639] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 151.178000][ T3639] __x64_sys_write+0x7b/0x90 [ 151.182431][ T3639] x64_sys_call+0x2f/0x9a0 [ 151.186684][ T3639] do_syscall_64+0x3b/0xb0 [ 151.190937][ T3639] ? clear_bhb_loop+0x55/0xb0 [ 151.195446][ T3639] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 151.201176][ T3639] RIP: 0033:0x7fe90798d169 [ 151.205433][ T3639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 151.224871][ T3639] RSP: 002b:00007fe9088d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 151.233129][ T3639] RAX: ffffffffffffffda RBX: 00007fe907ba5fa0 RCX: 00007fe90798d169 [ 151.240925][ T3639] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000008 [ 151.248736][ T3639] RBP: 00007fe9088d0090 R08: 0000000000000000 R09: 0000000000000000 [ 151.256549][ T3639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 151.264358][ T3639] R13: 0000000000000000 R14: 00007fe907ba5fa0 R15: 00007ffd3d4893f8 [ 151.272174][ T3639] [ 151.807886][ T3671] tap0: tun_chr_ioctl cmd 1074025677 [ 151.835176][ T3671] tap0: linktype set to 823 [ 151.965408][ T3676] device syzkaller0 entered promiscuous mode [ 152.526534][ T3691] device syzkaller0 entered promiscuous mode [ 152.599035][ T3691] FAULT_INJECTION: forcing a failure. [ 152.599035][ T3691] name failslab, interval 1, probability 0, space 0, times 1 [ 152.668169][ T3691] CPU: 0 PID: 3691 Comm: syz.3.892 Not tainted 6.1.129-syzkaller-00002-g777d8313618b #0 [ 152.677728][ T3691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 152.687619][ T3691] Call Trace: [ 152.690743][ T3691] [ 152.693521][ T3691] dump_stack_lvl+0x151/0x1b7 [ 152.698040][ T3691] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 152.703331][ T3691] dump_stack+0x15/0x18 [ 152.707327][ T3691] should_fail_ex+0x3d0/0x520 [ 152.711836][ T3691] __should_failslab+0xaf/0xf0 [ 152.716439][ T3691] should_failslab+0x9/0x20 [ 152.720774][ T3691] kmem_cache_alloc_node+0x42/0x330 [ 152.725814][ T3691] ? __alloc_skb+0xcc/0x2d0 [ 152.730148][ T3691] __alloc_skb+0xcc/0x2d0 [ 152.734313][ T3691] alloc_skb_with_frags+0xa6/0x680 [ 152.739267][ T3691] ? 0xffffffffa0001f90 [ 152.743251][ T3691] sock_alloc_send_pskb+0x915/0xa50 [ 152.748306][ T3691] ? sock_kzfree_s+0x60/0x60 [ 152.752710][ T3691] ? kstrtoull+0x1cd/0x2e0 [ 152.756967][ T3691] ? iov_iter_advance+0x98/0x1b0 [ 152.761739][ T3691] tun_get_user+0xfaf/0x3a90 [ 152.766170][ T3691] ? _kstrtol+0x150/0x150 [ 152.770776][ T3691] ? tun_do_read+0x2000/0x2000 [ 152.775905][ T3691] ? ref_tracker_alloc+0x31d/0x450 [ 152.780865][ T3691] ? ref_tracker_dir_print+0x160/0x160 [ 152.786149][ T3691] ? avc_policy_seqno+0x1b/0x70 [ 152.790844][ T3691] ? tun_get+0xe9/0x120 [ 152.794913][ T3691] tun_chr_write_iter+0x129/0x210 [ 152.799778][ T3691] vfs_write+0xaf6/0xed0 [ 152.803854][ T3691] ? __kasan_slab_free+0x11/0x20 [ 152.808631][ T3691] ? file_end_write+0x1c0/0x1c0 [ 152.813313][ T3691] ? __fget_files+0x2cb/0x330 [ 152.817822][ T3691] ? __fdget_pos+0x204/0x390 [ 152.822246][ T3691] ? ksys_write+0x77/0x2c0 [ 152.826502][ T3691] ksys_write+0x199/0x2c0 [ 152.830670][ T3691] ? __this_cpu_preempt_check+0x13/0x20 [ 152.836053][ T3691] ? __ia32_sys_read+0x90/0x90 [ 152.840649][ T3691] ? debug_smp_processor_id+0x17/0x20 [ 152.845858][ T3691] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 152.851755][ T3691] __x64_sys_write+0x7b/0x90 [ 152.856188][ T3691] x64_sys_call+0x2f/0x9a0 [ 152.860435][ T3691] do_syscall_64+0x3b/0xb0 [ 152.864705][ T3691] ? clear_bhb_loop+0x55/0xb0 [ 152.869204][ T3691] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 152.874935][ T3691] RIP: 0033:0x7f6ac358d169 [ 152.879192][ T3691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 152.898624][ T3691] RSP: 002b:00007f6ac4329038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 152.906869][ T3691] RAX: ffffffffffffffda RBX: 00007f6ac37a5fa0 RCX: 00007f6ac358d169 [ 152.914678][ T3691] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000008 [ 152.922489][ T3691] RBP: 00007f6ac4329090 R08: 0000000000000000 R09: 0000000000000000 [ 152.930301][ T3691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 152.938112][ T3691] R13: 0000000000000000 R14: 00007f6ac37a5fa0 R15: 00007ffdf0c42a48 [ 152.945936][ T3691] [ 152.952150][ T28] audit: type=1400 audit(1744446530.573:148): avc: denied { remove_name } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 153.069977][ T28] audit: type=1400 audit(1744446530.573:149): avc: denied { rename } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 153.101343][ T3711] device pim6reg1 entered promiscuous mode [ 153.119688][ T28] audit: type=1400 audit(1744446530.603:150): avc: denied { create } for pid=3706 comm="syz.4.897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 153.734193][ T3740] device syzkaller0 entered promiscuous mode [ 153.758729][ T3738] tap0: tun_chr_ioctl cmd 1074025677 [ 153.764383][ T3738] tap0: linktype set to 823 [ 154.152481][ T3758] device syzkaller0 entered promiscuous mode [ 154.208356][ T3764] ip6_vti0: mtu greater than device maximum [ 154.239763][ T3764] device syzkaller0 entered promiscuous mode [ 154.381409][ T3771] device syzkaller0 entered promiscuous mode [ 154.425746][ T3771] FAULT_INJECTION: forcing a failure. [ 154.425746][ T3771] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 154.454303][ T3771] CPU: 0 PID: 3771 Comm: syz.2.923 Not tainted 6.1.129-syzkaller-00002-g777d8313618b #0 [ 154.463838][ T3771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 154.473734][ T3771] Call Trace: [ 154.476860][ T3771] [ 154.479637][ T3771] dump_stack_lvl+0x151/0x1b7 [ 154.484148][ T3771] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 154.489441][ T3771] ? kasan_set_track+0x60/0x70 [ 154.494042][ T3771] ? kasan_save_alloc_info+0x1f/0x30 [ 154.499164][ T3771] ? __kasan_kmalloc+0x9c/0xb0 [ 154.503762][ T3771] ? __kmalloc_node_track_caller+0xb3/0x1e0 [ 154.509490][ T3771] ? alloc_skb_with_frags+0xa6/0x680 [ 154.514611][ T3771] ? sock_alloc_send_pskb+0x915/0xa50 [ 154.519817][ T3771] ? tun_get_user+0xfaf/0x3a90 [ 154.524418][ T3771] dump_stack+0x15/0x18 [ 154.528413][ T3771] should_fail_ex+0x3d0/0x520 [ 154.532930][ T3771] should_fail_alloc_page+0x68/0x90 [ 154.537959][ T3771] prepare_alloc_pages+0x13b/0x6d0 [ 154.542907][ T3771] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 154.547945][ T3771] __alloc_pages+0x162/0x610 [ 154.552369][ T3771] ? prep_new_page+0x110/0x110 [ 154.556993][ T3771] alloc_skb_with_frags+0x1fe/0x680 [ 154.562002][ T3771] ? 0xffffffffa0000968 [ 154.565995][ T3771] sock_alloc_send_pskb+0x915/0xa50 [ 154.571032][ T3771] ? sock_kzfree_s+0x60/0x60 [ 154.575451][ T3771] ? kstrtoull+0x1cd/0x2e0 [ 154.579717][ T3771] ? iov_iter_advance+0x98/0x1b0 [ 154.584499][ T3771] tun_get_user+0xfaf/0x3a90 [ 154.588908][ T3771] ? _kstrtol+0x150/0x150 [ 154.593071][ T3771] ? tun_do_read+0x2000/0x2000 [ 154.597669][ T3771] ? ref_tracker_alloc+0x31d/0x450 [ 154.602618][ T3771] ? ref_tracker_dir_print+0x160/0x160 [ 154.607916][ T3771] ? avc_policy_seqno+0x1b/0x70 [ 154.612602][ T3771] ? tun_get+0xe9/0x120 [ 154.616595][ T3771] tun_chr_write_iter+0x129/0x210 [ 154.621451][ T3771] vfs_write+0xaf6/0xed0 [ 154.625531][ T3771] ? __kasan_slab_free+0x11/0x20 [ 154.630308][ T3771] ? file_end_write+0x1c0/0x1c0 [ 154.634990][ T3771] ? __fget_files+0x2cb/0x330 [ 154.639506][ T3771] ? __fdget_pos+0x204/0x390 [ 154.643930][ T3771] ? ksys_write+0x77/0x2c0 [ 154.648183][ T3771] ksys_write+0x199/0x2c0 [ 154.652347][ T3771] ? __this_cpu_preempt_check+0x13/0x20 [ 154.657745][ T3771] ? __ia32_sys_read+0x90/0x90 [ 154.662329][ T3771] ? debug_smp_processor_id+0x17/0x20 [ 154.667535][ T3771] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 154.673440][ T3771] __x64_sys_write+0x7b/0x90 [ 154.677866][ T3771] x64_sys_call+0x2f/0x9a0 [ 154.682119][ T3771] do_syscall_64+0x3b/0xb0 [ 154.686372][ T3771] ? clear_bhb_loop+0x55/0xb0 [ 154.690885][ T3771] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 154.696616][ T3771] RIP: 0033:0x7f486018d169 [ 154.700866][ T3771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 154.720306][ T3771] RSP: 002b:00007f48610d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 154.728553][ T3771] RAX: ffffffffffffffda RBX: 00007f48603a5fa0 RCX: 00007f486018d169 [ 154.736363][ T3771] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000008 [ 154.744173][ T3771] RBP: 00007f48610d7090 R08: 0000000000000000 R09: 0000000000000000 [ 154.751985][ T3771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 154.759941][ T3771] R13: 0000000000000000 R14: 00007f48603a5fa0 R15: 00007ffce1881948 [ 154.767752][ T3771] [ 155.239577][ T28] audit: type=1400 audit(1744446532.863:151): avc: denied { create } for pid=3788 comm="syz.3.918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 155.544147][ T3810] device syzkaller0 entered promiscuous mode [ 156.447404][ T3832] device syzkaller0 entered promiscuous mode [ 156.485478][ T3832] FAULT_INJECTION: forcing a failure. [ 156.485478][ T3832] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 156.536725][ T3832] CPU: 1 PID: 3832 Comm: syz.0.930 Not tainted 6.1.129-syzkaller-00002-g777d8313618b #0 [ 156.546295][ T3832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 156.556187][ T3832] Call Trace: [ 156.559315][ T3832] [ 156.562087][ T3832] dump_stack_lvl+0x151/0x1b7 [ 156.566604][ T3832] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 156.571896][ T3832] ? __kmalloc_node_track_caller+0xb3/0x1e0 [ 156.577643][ T3832] ? alloc_skb_with_frags+0xa6/0x680 [ 156.582741][ T3832] ? sock_alloc_send_pskb+0x915/0xa50 [ 156.587951][ T3832] dump_stack+0x15/0x18 [ 156.591941][ T3832] should_fail_ex+0x3d0/0x520 [ 156.596460][ T3832] should_fail_alloc_page+0x68/0x90 [ 156.601488][ T3832] prepare_alloc_pages+0x13b/0x6d0 [ 156.606442][ T3832] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 156.611475][ T3832] __alloc_pages+0x162/0x610 [ 156.615903][ T3832] ? prep_new_page+0x110/0x110 [ 156.620499][ T3832] alloc_skb_with_frags+0x1fe/0x680 [ 156.625541][ T3832] sock_alloc_send_pskb+0x915/0xa50 [ 156.630572][ T3832] ? sock_kzfree_s+0x60/0x60 [ 156.634988][ T3832] ? kstrtoull+0x1cd/0x2e0 [ 156.639244][ T3832] ? iov_iter_advance+0x98/0x1b0 [ 156.644021][ T3832] tun_get_user+0xfaf/0x3a90 [ 156.648445][ T3832] ? _kstrtol+0x150/0x150 [ 156.652610][ T3832] ? tun_do_read+0x2000/0x2000 [ 156.657210][ T3832] ? ref_tracker_alloc+0x31d/0x450 [ 156.662174][ T3832] ? ref_tracker_dir_print+0x160/0x160 [ 156.667456][ T3832] ? avc_policy_seqno+0x1b/0x70 [ 156.672139][ T3832] ? tun_get+0xe9/0x120 [ 156.676135][ T3832] tun_chr_write_iter+0x129/0x210 [ 156.680992][ T3832] vfs_write+0xaf6/0xed0 [ 156.685070][ T3832] ? __kasan_slab_free+0x11/0x20 [ 156.689848][ T3832] ? file_end_write+0x1c0/0x1c0 [ 156.694539][ T3832] ? __fget_files+0x2cb/0x330 [ 156.699050][ T3832] ? __fdget_pos+0x204/0x390 [ 156.703471][ T3832] ? ksys_write+0x77/0x2c0 [ 156.707731][ T3832] ksys_write+0x199/0x2c0 [ 156.711889][ T3832] ? __this_cpu_preempt_check+0x13/0x20 [ 156.717274][ T3832] ? __ia32_sys_read+0x90/0x90 [ 156.721873][ T3832] ? debug_smp_processor_id+0x17/0x20 [ 156.727077][ T3832] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 156.732978][ T3832] __x64_sys_write+0x7b/0x90 [ 156.737405][ T3832] x64_sys_call+0x2f/0x9a0 [ 156.741657][ T3832] do_syscall_64+0x3b/0xb0 [ 156.745909][ T3832] ? clear_bhb_loop+0x55/0xb0 [ 156.750426][ T3832] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 156.756155][ T3832] RIP: 0033:0x7f012698d169 [ 156.760403][ T3832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 156.779846][ T3832] RSP: 002b:00007f01278b5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 156.788091][ T3832] RAX: ffffffffffffffda RBX: 00007f0126ba5fa0 RCX: 00007f012698d169 [ 156.795901][ T3832] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000008 [ 156.803721][ T3832] RBP: 00007f01278b5090 R08: 0000000000000000 R09: 0000000000000000 [ 156.811523][ T3832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 156.819334][ T3832] R13: 0000000000000000 R14: 00007f0126ba5fa0 R15: 00007ffe91024708 [ 156.827147][ T3832] [ 158.293804][ T3900] device syzkaller0 entered promiscuous mode [ 159.767201][ T3957] device pim6reg1 entered promiscuous mode [ 160.138232][ T3968] syz.3.967[3968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.138300][ T3968] syz.3.967[3968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.810810][ T3988] device sit0 entered promiscuous mode [ 161.673488][ T4011] device veth0_vlan left promiscuous mode [ 161.734324][ T4011] device veth0_vlan entered promiscuous mode [ 162.106453][ T28] audit: type=1400 audit(1744446539.723:152): avc: denied { create } for pid=4032 comm="syz.3.983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 162.598282][ T28] audit: type=1400 audit(1744446540.223:153): avc: denied { create } for pid=4052 comm="syz.3.987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 162.778874][ T28] audit: type=1400 audit(1744446540.403:154): avc: denied { append } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 162.929973][ T28] audit: type=1400 audit(1744446540.403:155): avc: denied { open } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 163.143332][ T28] audit: type=1400 audit(1744446540.403:156): avc: denied { getattr } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 164.828724][ T4100] device wg2 left promiscuous mode [ 167.246698][ T4167] device syzkaller0 entered promiscuous mode [ 167.742835][ T6] syzkaller0: tun_net_xmit 76 [ 167.747476][ T6] syzkaller0: tun_net_xmit 48 [ 168.872415][ T4207] device syzkaller0 entered promiscuous mode [ 169.642148][ T4236] device syzkaller0 entered promiscuous mode [ 170.350499][ T28] audit: type=1400 audit(1744446547.973:157): avc: denied { create } for pid=4256 comm="syz.2.1040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 171.764484][ T4305] bond_slave_1: mtu less than device minimum [ 171.872639][ T4313] device syzkaller0 entered promiscuous mode [ 175.426115][ T4387] device syzkaller0 entered promiscuous mode [ 175.606143][ T4393] device syzkaller0 entered promiscuous mode [ 175.724427][ T4413] syz.2.1082[4413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.724490][ T4413] syz.2.1082[4413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.993963][ T4419] device ip6_vti0 entered promiscuous mode [ 178.221980][ T4495] device wg2 entered promiscuous mode [ 178.541126][ T4501] device syzkaller0 entered promiscuous mode [ 180.463259][ T28] audit: type=1400 audit(1744446558.083:158): avc: denied { create } for pid=4579 comm="syz.3.1131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 181.285840][ T4615] syz.1.1139[4615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.306706][ T4615] syz.1.1139[4615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.523851][ T28] audit: type=1400 audit(1744446561.143:159): avc: denied { create } for pid=4688 comm="syz.3.1162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 188.809705][ T4818] syz.2.1201[4818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.811365][ T4818] syz.2.1201[4818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.596366][ T4883] device sit0 left promiscuous mode [ 193.391098][ T4933] device pim6reg1 entered promiscuous mode [ 196.483507][ T5043] ip6_vti0: mtu greater than device maximum [ 197.874778][ T28] audit: type=1400 audit(1744446575.493:160): avc: denied { create } for pid=5077 comm="syz.3.1275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 200.855697][ T5189] device pim6reg1 entered promiscuous mode [ 201.983058][ T5219] syzkaller0: tun_chr_ioctl cmd 35108 [ 206.242648][ T5328] device pim6reg1 entered promiscuous mode [ 206.645062][ T28] audit: type=1400 audit(1744446584.263:161): avc: denied { attach_queue } for pid=5342 comm="syz.4.1345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 207.874916][ T5376] device sit0 left promiscuous mode [ 208.129480][ T5384] device sit0 entered promiscuous mode [ 209.886893][ T5440] device sit0 entered promiscuous mode [ 210.421757][ T5450] device syzkaller0 entered promiscuous mode [ 214.240995][ T5544] device pim6reg1 entered promiscuous mode [ 214.696764][ T5556] device sit0 left promiscuous mode [ 214.815890][ T5560] device sit0 entered promiscuous mode [ 217.328143][ T5641] device sit0 left promiscuous mode [ 217.595260][ T5647] device sit0 entered promiscuous mode [ 217.949167][ T5662] device syzkaller0 entered promiscuous mode [ 217.982368][ T5666] Â: renamed from pim6reg1 [ 219.788990][ T5711] device pim6reg1 entered promiscuous mode [ 223.089291][ T5802] device sit0 entered promiscuous mode [ 224.140925][ T5815] device veth0_vlan left promiscuous mode [ 224.162560][ T5815] device veth0_vlan entered promiscuous mode [ 224.502776][ T2245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.513645][ T2245] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.521039][ T2245] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.663824][ T5834] Ÿë: port 1(veth1_to_team) entered blocking state [ 224.673132][ T5834] Ÿë: port 1(veth1_to_team) entered disabled state [ 224.692472][ T5834] device veth1_to_team entered promiscuous mode [ 224.981797][ T5841] device syzkaller0 entered promiscuous mode [ 226.168161][ T28] audit: type=1400 audit(1744446603.783:162): avc: denied { create } for pid=5901 comm="syz.0.1504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 228.622197][ T5967] device pim6reg1 entered promiscuous mode [ 232.411713][ T6059] tun0: tun_chr_ioctl cmd 1074025675 [ 232.417073][ T6059] tun0: persist enabled [ 232.954741][ T6076] device veth1_macvtap left promiscuous mode [ 233.001590][ T6076] device macsec0 left promiscuous mode [ 233.119460][ T6081] device veth1_macvtap entered promiscuous mode [ 233.163204][ T6081] device macsec0 entered promiscuous mode [ 234.914001][ T6118] device sit0 left promiscuous mode [ 235.077706][ T6123] device sit0 entered promiscuous mode [ 237.060165][ T6184] device sit0 left promiscuous mode [ 237.235633][ T6191] device sit0 entered promiscuous mode [ 241.747798][ T6328] device sit0 left promiscuous mode [ 241.834632][ T6333] device sit0 entered promiscuous mode [ 245.497528][ T6411] device veth0_vlan left promiscuous mode [ 245.510109][ T6411] device veth0_vlan entered promiscuous mode [ 245.580417][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 245.596366][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 245.624027][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.385953][ T28] audit: type=1400 audit(1744446624.003:163): avc: denied { create } for pid=6443 comm="syz.1.1666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 250.893171][ T6556] device sit0 left promiscuous mode [ 251.555909][ T6562] device sit0 entered promiscuous mode [ 253.889902][ T28] audit: type=1400 audit(1744446631.513:164): avc: denied { create } for pid=6642 comm="syz.2.1728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 259.309152][ T6814] device pim6reg1 entered promiscuous mode [ 261.357479][ T28] audit: type=1400 audit(1744446638.973:165): avc: denied { write } for pid=6915 comm="syz.2.1820" name="net" dev="proc" ino=35406 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 261.397788][ T28] audit: type=1400 audit(1744446638.973:166): avc: denied { add_name } for pid=6915 comm="syz.2.1820" name="blkio.throttle.io_service_bytes_recursive" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 261.421610][ T28] audit: type=1400 audit(1744446638.973:167): avc: denied { create } for pid=6915 comm="syz.2.1820" name="blkio.throttle.io_service_bytes_recursive" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 261.448134][ T28] audit: type=1400 audit(1744446638.983:168): avc: denied { associate } for pid=6915 comm="syz.2.1820" name="blkio.throttle.io_service_bytes_recursive" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 262.547679][ T6935] device veth0_vlan left promiscuous mode [ 262.564521][ T6935] device veth0_vlan entered promiscuous mode [ 262.641372][ T6937] device veth1_macvtap left promiscuous mode [ 262.667955][ T6937] device veth1_macvtap entered promiscuous mode [ 262.706327][ T6937] device macsec0 entered promiscuous mode [ 264.281656][ T6994] syz.3.1845[6994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.435373][ T7057] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 266.557224][ T7057] device pim6reg1 entered promiscuous mode [ 269.393392][ T7191] device wg2 left promiscuous mode [ 271.158532][ T28] audit: type=1400 audit(1744446648.773:169): avc: denied { create } for pid=7251 comm="syz.0.1928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 274.650913][ T7363] device pim6reg1 entered promiscuous mode [ 275.066329][ T7384] device syzkaller0 entered promiscuous mode [ 276.482559][ T7455] device sit0 left promiscuous mode [ 276.569011][ T7455] device sit0 entered promiscuous mode [ 277.189614][ T7476] FAULT_INJECTION: forcing a failure. [ 277.189614][ T7476] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 277.228753][ T7479] device pim6reg1 entered promiscuous mode [ 277.263730][ T7476] CPU: 1 PID: 7476 Comm: syz.4.1994 Not tainted 6.1.129-syzkaller-00002-g777d8313618b #0 [ 277.273456][ T7476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 277.283353][ T7476] Call Trace: [ 277.286476][ T7476] [ 277.289269][ T7476] dump_stack_lvl+0x151/0x1b7 [ 277.293774][ T7476] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 277.299068][ T7476] dump_stack+0x15/0x18 [ 277.303053][ T7476] should_fail_ex+0x3d0/0x520 [ 277.307567][ T7476] should_fail+0xb/0x10 [ 277.311563][ T7476] should_fail_usercopy+0x1a/0x20 [ 277.316421][ T7476] _copy_from_user+0x1e/0xc0 [ 277.320843][ T7476] copy_msghdr_from_user+0xaa/0x670 [ 277.325883][ T7476] ? sendmsg_copy_msghdr+0x70/0x70 [ 277.330830][ T7476] __sys_sendmsg+0x236/0x390 [ 277.335255][ T7476] ? ____sys_sendmsg+0x9a0/0x9a0 [ 277.340031][ T7476] ? kvm_sched_clock_read+0x18/0x40 [ 277.345058][ T7476] ? sched_clock+0x9/0x10 [ 277.349226][ T7476] ? sched_clock_cpu+0x71/0x2b0 [ 277.353919][ T7476] ? debug_smp_processor_id+0x17/0x20 [ 277.359123][ T7476] __x64_sys_sendmsg+0x7f/0x90 [ 277.363722][ T7476] x64_sys_call+0x16a/0x9a0 [ 277.368057][ T7476] do_syscall_64+0x3b/0xb0 [ 277.372310][ T7476] ? clear_bhb_loop+0x55/0xb0 [ 277.376830][ T7476] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 277.382555][ T7476] RIP: 0033:0x7fe90798d169 [ 277.386809][ T7476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 277.406254][ T7476] RSP: 002b:00007fe9088d0038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 277.414495][ T7476] RAX: ffffffffffffffda RBX: 00007fe907ba5fa0 RCX: 00007fe90798d169 [ 277.422307][ T7476] RDX: 0000000000000003 RSI: 0000200000000980 RDI: 0000000000000006 [ 277.430118][ T7476] RBP: 00007fe9088d0090 R08: 0000000000000000 R09: 0000000000000000 [ 277.437927][ T7476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 277.445740][ T7476] R13: 0000000000000000 R14: 00007fe907ba5fa0 R15: 00007ffd3d4893f8 [ 277.453560][ T7476] [ 277.932989][ T7517] FAULT_INJECTION: forcing a failure. [ 277.932989][ T7517] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 278.093988][ T7517] CPU: 0 PID: 7517 Comm: syz.4.2008 Not tainted 6.1.129-syzkaller-00002-g777d8313618b #0 [ 278.103642][ T7517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 278.113544][ T7517] Call Trace: [ 278.116661][ T7517] [ 278.119439][ T7517] dump_stack_lvl+0x151/0x1b7 [ 278.123948][ T7517] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 278.129243][ T7517] ? perf_event_output_forward+0x14e/0x1b0 [ 278.134889][ T7517] ? _parse_integer+0x2a/0x40 [ 278.139412][ T7517] dump_stack+0x15/0x18 [ 278.143393][ T7517] should_fail_ex+0x3d0/0x520 [ 278.147912][ T7517] should_fail+0xb/0x10 [ 278.151902][ T7517] should_fail_usercopy+0x1a/0x20 [ 278.156762][ T7517] _copy_from_user+0x1e/0xc0 [ 278.161186][ T7517] iovec_from_user+0xc7/0x320 [ 278.165701][ T7517] __import_iovec+0x70/0x430 [ 278.170124][ T7517] ? perf_swevent_hrtimer+0x449/0x4f0 [ 278.175337][ T7517] import_iovec+0xe5/0x120 [ 278.179587][ T7517] copy_msghdr_from_user+0x527/0x670 [ 278.184706][ T7517] ? sendmsg_copy_msghdr+0x70/0x70 [ 278.189658][ T7517] __sys_sendmsg+0x236/0x390 [ 278.194078][ T7517] ? ____sys_sendmsg+0x9a0/0x9a0 [ 278.198861][ T7517] ? kvm_sched_clock_read+0x18/0x40 [ 278.203885][ T7517] ? sched_clock+0x9/0x10 [ 278.208058][ T7517] __x64_sys_sendmsg+0x7f/0x90 [ 278.212656][ T7517] x64_sys_call+0x16a/0x9a0 [ 278.217005][ T7517] do_syscall_64+0x3b/0xb0 [ 278.221240][ T7517] ? clear_bhb_loop+0x55/0xb0 [ 278.225764][ T7517] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 278.231484][ T7517] RIP: 0033:0x7fe90798d169 [ 278.235738][ T7517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 278.255182][ T7517] RSP: 002b:00007fe9088d0038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 278.263424][ T7517] RAX: ffffffffffffffda RBX: 00007fe907ba5fa0 RCX: 00007fe90798d169 [ 278.271232][ T7517] RDX: 0000000000000003 RSI: 0000200000000980 RDI: 0000000000000006 [ 278.279047][ T7517] RBP: 00007fe9088d0090 R08: 0000000000000000 R09: 0000000000000000 [ 278.286858][ T7517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 278.294669][ T7517] R13: 0000000000000000 R14: 00007fe907ba5fa0 R15: 00007ffd3d4893f8 [ 278.302486][ T7517] [ 278.907446][ T7535] syz.0.2013[7535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.908010][ T7535] syz.0.2013[7535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.171664][ T7560] device sit0 left promiscuous mode [ 279.239742][ T7566] device sit0 left promiscuous mode [ 279.267815][ T7561] device sit0 entered promiscuous mode [ 279.318598][ T7569] FAULT_INJECTION: forcing a failure. [ 279.318598][ T7569] name failslab, interval 1, probability 0, space 0, times 0 [ 279.426653][ T7569] CPU: 0 PID: 7569 Comm: syz.2.2024 Not tainted 6.1.129-syzkaller-00002-g777d8313618b #0 [ 279.436308][ T7569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 279.446200][ T7569] Call Trace: [ 279.449318][ T7569] [ 279.452094][ T7569] dump_stack_lvl+0x151/0x1b7 [ 279.456612][ T7569] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 279.461906][ T7569] dump_stack+0x15/0x18 [ 279.465898][ T7569] should_fail_ex+0x3d0/0x520 [ 279.470410][ T7569] __should_failslab+0xaf/0xf0 [ 279.475015][ T7569] should_failslab+0x9/0x20 [ 279.479347][ T7569] kmem_cache_alloc_node+0x42/0x330 [ 279.484380][ T7569] ? __alloc_skb+0xcc/0x2d0 [ 279.488722][ T7569] __alloc_skb+0xcc/0x2d0 [ 279.492887][ T7569] ? get_perf_callchain+0x5cb/0x810 [ 279.497921][ T7569] alloc_skb_with_frags+0xa6/0x680 [ 279.502868][ T7569] ? avc_has_perm_noaudit+0x348/0x430 [ 279.508076][ T7569] sock_alloc_send_pskb+0x915/0xa50 [ 279.513118][ T7569] ? sock_kzfree_s+0x60/0x60 [ 279.517533][ T7569] ? avc_has_perm+0x16f/0x260 [ 279.522049][ T7569] ? security_socket_getpeersec_dgram+0xaa/0xc0 [ 279.528123][ T7569] unix_stream_sendmsg+0x4b4/0x1070 [ 279.533161][ T7569] ? unix_show_fdinfo+0x2f0/0x2f0 [ 279.538027][ T7569] ? security_socket_sendmsg+0x82/0xb0 [ 279.543311][ T7569] ? unix_show_fdinfo+0x2f0/0x2f0 [ 279.548172][ T7569] ____sys_sendmsg+0x5d3/0x9a0 [ 279.552773][ T7569] ? __sys_sendmsg_sock+0x40/0x40 [ 279.557637][ T7569] __sys_sendmsg+0x2a9/0x390 [ 279.562062][ T7569] ? ____sys_sendmsg+0x9a0/0x9a0 [ 279.566842][ T7569] ? __kasan_check_write+0x14/0x20 [ 279.571783][ T7569] ? __ia32_sys_read+0x90/0x90 [ 279.576383][ T7569] ? debug_smp_processor_id+0x17/0x20 [ 279.581586][ T7569] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 279.587488][ T7569] __x64_sys_sendmsg+0x7f/0x90 [ 279.592089][ T7569] x64_sys_call+0x16a/0x9a0 [ 279.596430][ T7569] do_syscall_64+0x3b/0xb0 [ 279.600680][ T7569] ? clear_bhb_loop+0x55/0xb0 [ 279.605191][ T7569] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 279.611007][ T7569] RIP: 0033:0x7f486018d169 [ 279.615259][ T7569] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 279.634704][ T7569] RSP: 002b:00007f48610d7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 279.642948][ T7569] RAX: ffffffffffffffda RBX: 00007f48603a5fa0 RCX: 00007f486018d169 [ 279.650757][ T7569] RDX: 0000000000000003 RSI: 0000200000000980 RDI: 0000000000000006 [ 279.658569][ T7569] RBP: 00007f48610d7090 R08: 0000000000000000 R09: 0000000000000000 [ 279.666380][ T7569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 279.674189][ T7569] R13: 0000000000000000 R14: 00007f48603a5fa0 R15: 00007ffce1881948 [ 279.682093][ T7569] [ 279.688714][ T7566] device sit0 entered promiscuous mode [ 279.898746][ T7574] device veth1_macvtap left promiscuous mode [ 279.904564][ T7574] device macsec0 left promiscuous mode [ 279.980285][ T7572] device veth1_macvtap entered promiscuous mode [ 280.036498][ T7572] device macsec0 entered promiscuous mode [ 280.118276][ T7225] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 298.824087][ T8098] device sit0 entered promiscuous mode [ 302.641907][ T8205] device sit0 left promiscuous mode [ 302.666329][ T8201] device sit0 entered promiscuous mode [ 305.476557][ T8279] gretap0: refused to change device tx_queue_len [ 309.916443][ T8430] device sit0 left promiscuous mode [ 310.611592][ T8464] device veth0_vlan left promiscuous mode [ 310.617365][ T8464] device veth0_vlan entered promiscuous mode [ 310.795025][ T7224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 310.815829][ T7224] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 310.839886][ T7224] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 314.832004][ T8598] device syzkaller0 entered promiscuous mode [ 315.392796][ T8616] device veth1_macvtap left promiscuous mode [ 315.800384][ T8627] device syzkaller0 entered promiscuous mode [ 317.504018][ T28] audit: type=1400 audit(1744446695.123:170): avc: denied { create } for pid=8688 comm="syz.1.2357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 317.691334][ T8695] device pim6reg1 entered promiscuous mode [ 320.499983][ T8786] FAULT_INJECTION: forcing a failure. [ 320.499983][ T8786] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 320.601714][ T8786] CPU: 0 PID: 8786 Comm: syz.0.2387 Not tainted 6.1.129-syzkaller-00002-g777d8313618b #0 [ 320.611475][ T8786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 320.621369][ T8786] Call Trace: [ 320.624494][ T8786] [ 320.627285][ T8786] dump_stack_lvl+0x151/0x1b7 [ 320.631786][ T8786] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 320.637086][ T8786] ? vfs_write+0x952/0xed0 [ 320.641331][ T8786] ? __kasan_slab_free+0x11/0x20 [ 320.646117][ T8786] dump_stack+0x15/0x18 [ 320.650102][ T8786] should_fail_ex+0x3d0/0x520 [ 320.654616][ T8786] should_fail+0xb/0x10 [ 320.658607][ T8786] should_fail_usercopy+0x1a/0x20 [ 320.663465][ T8786] _copy_from_user+0x1e/0xc0 [ 320.667889][ T8786] __sys_bpf+0x23b/0x7f0 [ 320.671968][ T8786] ? bpf_link_show_fdinfo+0x300/0x300 [ 320.677182][ T8786] ? __ia32_sys_read+0x90/0x90 [ 320.681780][ T8786] ? debug_smp_processor_id+0x17/0x20 [ 320.686987][ T8786] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 320.692891][ T8786] __x64_sys_bpf+0x7c/0x90 [ 320.697145][ T8786] x64_sys_call+0x87f/0x9a0 [ 320.701476][ T8786] do_syscall_64+0x3b/0xb0 [ 320.705731][ T8786] ? clear_bhb_loop+0x55/0xb0 [ 320.710242][ T8786] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 320.715974][ T8786] RIP: 0033:0x7f012698d169 [ 320.720225][ T8786] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 320.739668][ T8786] RSP: 002b:00007f01278b5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 320.747908][ T8786] RAX: ffffffffffffffda RBX: 00007f0126ba5fa0 RCX: 00007f012698d169 [ 320.755724][ T8786] RDX: 0000000000000048 RSI: 0000200000000340 RDI: 000000000000000a [ 320.763530][ T8786] RBP: 00007f01278b5090 R08: 0000000000000000 R09: 0000000000000000 [ 320.771342][ T8786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 320.779159][ T8786] R13: 0000000000000000 R14: 00007f0126ba5fa0 R15: 00007ffe91024708 [ 320.786975][ T8786] [ 322.061660][ T8846] FAULT_INJECTION: forcing a failure. [ 322.061660][ T8846] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 322.114719][ T8846] CPU: 1 PID: 8846 Comm: syz.2.2406 Not tainted 6.1.129-syzkaller-00002-g777d8313618b #0 [ 322.124361][ T8846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 322.134265][ T8846] Call Trace: [ 322.137382][ T8846] [ 322.140166][ T8846] dump_stack_lvl+0x151/0x1b7 [ 322.144671][ T8846] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 322.149969][ T8846] ? migrate_enable+0x1cb/0x2b0 [ 322.154661][ T8846] dump_stack+0x15/0x18 [ 322.158650][ T8846] should_fail_ex+0x3d0/0x520 [ 322.163161][ T8846] should_fail+0xb/0x10 [ 322.167151][ T8846] should_fail_usercopy+0x1a/0x20 [ 322.172010][ T8846] _copy_to_user+0x1e/0x90 [ 322.176277][ T8846] bpf_prog_test_run_syscall+0x36b/0x510 [ 322.181733][ T8846] ? sock_gen_cookie+0x60/0x60 [ 322.186335][ T8846] ? __kasan_check_write+0x14/0x20 [ 322.191277][ T8846] ? fput+0x15b/0x1b0 [ 322.195108][ T8846] ? sock_gen_cookie+0x60/0x60 [ 322.199697][ T8846] bpf_prog_test_run+0x3b0/0x630 [ 322.204473][ T8846] ? bpf_prog_query+0x260/0x260 [ 322.209156][ T8846] ? selinux_bpf+0xd2/0x100 [ 322.213499][ T8846] ? security_bpf+0x82/0xb0 [ 322.217846][ T8846] __sys_bpf+0x59f/0x7f0 [ 322.221919][ T8846] ? bpf_link_show_fdinfo+0x300/0x300 [ 322.227128][ T8846] ? __ia32_sys_read+0x90/0x90 [ 322.231756][ T8846] ? debug_smp_processor_id+0x17/0x20 [ 322.236934][ T8846] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 322.242856][ T8846] __x64_sys_bpf+0x7c/0x90 [ 322.247101][ T8846] x64_sys_call+0x87f/0x9a0 [ 322.251429][ T8846] do_syscall_64+0x3b/0xb0 [ 322.255680][ T8846] ? clear_bhb_loop+0x55/0xb0 [ 322.260193][ T8846] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 322.266009][ T8846] RIP: 0033:0x7f486018d169 [ 322.270269][ T8846] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 322.289705][ T8846] RSP: 002b:00007f48610d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 322.297948][ T8846] RAX: ffffffffffffffda RBX: 00007f48603a5fa0 RCX: 00007f486018d169 [ 322.305755][ T8846] RDX: 0000000000000048 RSI: 0000200000000340 RDI: 000000000000000a [ 322.313569][ T8846] RBP: 00007f48610d7090 R08: 0000000000000000 R09: 0000000000000000 [ 322.321383][ T8846] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 322.329191][ T8846] R13: 0000000000000000 R14: 00007f48603a5fa0 R15: 00007ffce1881948 [ 322.337465][ T8846] [ 322.548820][ T8859] syz.2.2409[8859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.548913][ T8859] syz.2.2409[8859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.154910][ T8996] device veth0_vlan left promiscuous mode [ 326.256030][ T8996] device veth0_vlan entered promiscuous mode [ 326.446104][ T7220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 326.491380][ T7220] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 326.519023][ T7220] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 328.919826][ T9065] syz.3.2473[9065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.919894][ T9065] syz.3.2473[9065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.059530][ T9065] syz.3.2473[9065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.134889][ T9065] syz.3.2473[9065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.346877][ T9121] device syzkaller0 entered promiscuous mode [ 331.988839][ T9196] device pim6reg1 entered promiscuous mode [ 332.985961][ T9229] FAULT_INJECTION: forcing a failure. [ 332.985961][ T9229] name failslab, interval 1, probability 0, space 0, times 0 [ 333.002405][ T9229] CPU: 1 PID: 9229 Comm: syz.3.2528 Not tainted 6.1.129-syzkaller-00002-g777d8313618b #0 [ 333.012030][ T9229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 333.021926][ T9229] Call Trace: [ 333.025049][ T9229] [ 333.027827][ T9229] dump_stack_lvl+0x151/0x1b7 [ 333.032342][ T9229] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 333.037637][ T9229] dump_stack+0x15/0x18 [ 333.041623][ T9229] should_fail_ex+0x3d0/0x520 [ 333.046147][ T9229] __should_failslab+0xaf/0xf0 [ 333.050740][ T9229] ? sk_prot_alloc+0xf9/0x330 [ 333.055258][ T9229] should_failslab+0x9/0x20 [ 333.059601][ T9229] __kmem_cache_alloc_node+0x3d/0x2a0 [ 333.064802][ T9229] ? sk_prot_alloc+0xf9/0x330 [ 333.069312][ T9229] __kmalloc+0xa3/0x1e0 [ 333.073309][ T9229] sk_prot_alloc+0xf9/0x330 [ 333.077643][ T9229] sk_alloc+0x38/0x440 [ 333.081553][ T9229] ? bpf_test_init+0x169/0x190 [ 333.086156][ T9229] bpf_prog_test_run_skb+0x384/0x13a0 [ 333.091362][ T9229] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 333.097087][ T9229] ? __kasan_check_write+0x14/0x20 [ 333.102036][ T9229] ? fput+0x15b/0x1b0 [ 333.105855][ T9229] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 333.111581][ T9229] bpf_prog_test_run+0x3b0/0x630 [ 333.116360][ T9229] ? bpf_prog_query+0x260/0x260 [ 333.121039][ T9229] ? selinux_bpf+0xd2/0x100 [ 333.125382][ T9229] ? security_bpf+0x82/0xb0 [ 333.129722][ T9229] __sys_bpf+0x59f/0x7f0 [ 333.133803][ T9229] ? bpf_link_show_fdinfo+0x300/0x300 [ 333.139012][ T9229] ? __ia32_sys_read+0x90/0x90 [ 333.143610][ T9229] ? debug_smp_processor_id+0x17/0x20 [ 333.148819][ T9229] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 333.154721][ T9229] __x64_sys_bpf+0x7c/0x90 [ 333.159058][ T9229] x64_sys_call+0x87f/0x9a0 [ 333.163396][ T9229] do_syscall_64+0x3b/0xb0 [ 333.167649][ T9229] ? clear_bhb_loop+0x55/0xb0 [ 333.172181][ T9229] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 333.177895][ T9229] RIP: 0033:0x7f6ac358d169 [ 333.182140][ T9229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 333.201586][ T9229] RSP: 002b:00007f6ac4329038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 333.209827][ T9229] RAX: ffffffffffffffda RBX: 00007f6ac37a5fa0 RCX: 00007f6ac358d169 [ 333.217637][ T9229] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 333.225449][ T9229] RBP: 00007f6ac4329090 R08: 0000000000000000 R09: 0000000000000000 [ 333.233265][ T9229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 333.241071][ T9229] R13: 0000000000000000 R14: 00007f6ac37a5fa0 R15: 00007ffdf0c42a48 [ 333.248894][ T9229] [ 334.736207][ T9284] device sit0 left promiscuous mode [ 334.739597][ T9287] FAULT_INJECTION: forcing a failure. [ 334.739597][ T9287] name failslab, interval 1, probability 0, space 0, times 0 [ 334.755476][ T9287] CPU: 0 PID: 9287 Comm: syz.1.2546 Not tainted 6.1.129-syzkaller-00002-g777d8313618b #0 [ 334.765190][ T9287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 334.775082][ T9287] Call Trace: [ 334.778203][ T9287] [ 334.780981][ T9287] dump_stack_lvl+0x151/0x1b7 [ 334.785500][ T9287] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 334.790881][ T9287] dump_stack+0x15/0x18 [ 334.794867][ T9287] should_fail_ex+0x3d0/0x520 [ 334.799384][ T9287] __should_failslab+0xaf/0xf0 [ 334.803994][ T9287] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 334.809538][ T9287] should_failslab+0x9/0x20 [ 334.813879][ T9287] __kmem_cache_alloc_node+0x3d/0x2a0 [ 334.819087][ T9287] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 334.824639][ T9287] kmalloc_trace+0x2a/0xa0 [ 334.828894][ T9287] selinux_sk_alloc_security+0x7d/0x1a0 [ 334.834274][ T9287] security_sk_alloc+0x72/0xb0 [ 334.838887][ T9287] sk_prot_alloc+0x114/0x330 [ 334.843298][ T9287] sk_alloc+0x38/0x440 [ 334.847201][ T9287] ? bpf_test_init+0x169/0x190 [ 334.851806][ T9287] bpf_prog_test_run_skb+0x384/0x13a0 [ 334.857032][ T9287] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 334.862744][ T9287] ? __kasan_check_write+0x14/0x20 [ 334.867688][ T9287] ? fput+0x15b/0x1b0 [ 334.871522][ T9287] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 334.877239][ T9287] bpf_prog_test_run+0x3b0/0x630 [ 334.882009][ T9287] ? bpf_prog_query+0x260/0x260 [ 334.886699][ T9287] ? selinux_bpf+0xd2/0x100 [ 334.891042][ T9287] ? security_bpf+0x82/0xb0 [ 334.895379][ T9287] __sys_bpf+0x59f/0x7f0 [ 334.899509][ T9287] ? bpf_link_show_fdinfo+0x300/0x300 [ 334.904665][ T9287] ? __ia32_sys_read+0x90/0x90 [ 334.909262][ T9287] ? debug_smp_processor_id+0x17/0x20 [ 334.914465][ T9287] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 334.920371][ T9287] __x64_sys_bpf+0x7c/0x90 [ 334.924624][ T9287] x64_sys_call+0x87f/0x9a0 [ 334.928962][ T9287] do_syscall_64+0x3b/0xb0 [ 334.933221][ T9287] ? clear_bhb_loop+0x55/0xb0 [ 334.937731][ T9287] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 334.943456][ T9287] RIP: 0033:0x7fb87198d169 [ 334.947714][ T9287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 334.967151][ T9287] RSP: 002b:00007fb872863038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 334.975397][ T9287] RAX: ffffffffffffffda RBX: 00007fb871ba5fa0 RCX: 00007fb87198d169 [ 334.983206][ T9287] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 334.991017][ T9287] RBP: 00007fb872863090 R08: 0000000000000000 R09: 0000000000000000 [ 334.998826][ T9287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 335.006644][ T9287] R13: 0000000000000000 R14: 00007fb871ba5fa0 R15: 00007fff3ce03f28 [ 335.014456][ T9287] [ 335.109688][ T9291] device pim6reg1 entered promiscuous mode [ 335.642068][ T9325] FAULT_INJECTION: forcing a failure. [ 335.642068][ T9325] name failslab, interval 1, probability 0, space 0, times 0 [ 335.708110][ T9325] CPU: 0 PID: 9325 Comm: syz.2.2559 Not tainted 6.1.129-syzkaller-00002-g777d8313618b #0 [ 335.717755][ T9325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 335.727652][ T9325] Call Trace: [ 335.730774][ T9325] [ 335.733553][ T9325] dump_stack_lvl+0x151/0x1b7 [ 335.738066][ T9325] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 335.743358][ T9325] ? kasan_save_alloc_info+0x1f/0x30 [ 335.748481][ T9325] dump_stack+0x15/0x18 [ 335.752477][ T9325] should_fail_ex+0x3d0/0x520 [ 335.756987][ T9325] ? build_skb+0x2c/0x220 [ 335.761148][ T9325] __should_failslab+0xaf/0xf0 [ 335.765749][ T9325] should_failslab+0x9/0x20 [ 335.770084][ T9325] kmem_cache_alloc+0x3b/0x320 [ 335.774689][ T9325] build_skb+0x2c/0x220 [ 335.778681][ T9325] bpf_prog_test_run_skb+0x3ad/0x13a0 [ 335.783894][ T9325] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 335.789618][ T9325] ? __kasan_check_write+0x14/0x20 [ 335.794567][ T9325] ? fput+0x15b/0x1b0 [ 335.798383][ T9325] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 335.804110][ T9325] bpf_prog_test_run+0x3b0/0x630 [ 335.808884][ T9325] ? bpf_prog_query+0x260/0x260 [ 335.813575][ T9325] ? selinux_bpf+0xd2/0x100 [ 335.817912][ T9325] ? security_bpf+0x82/0xb0 [ 335.822248][ T9325] __sys_bpf+0x59f/0x7f0 [ 335.826328][ T9325] ? bpf_link_show_fdinfo+0x300/0x300 [ 335.831539][ T9325] ? __ia32_sys_read+0x90/0x90 [ 335.836139][ T9325] ? debug_smp_processor_id+0x17/0x20 [ 335.841343][ T9325] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 335.847244][ T9325] __x64_sys_bpf+0x7c/0x90 [ 335.851496][ T9325] x64_sys_call+0x87f/0x9a0 [ 335.855854][ T9325] do_syscall_64+0x3b/0xb0 [ 335.860093][ T9325] ? clear_bhb_loop+0x55/0xb0 [ 335.864602][ T9325] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 335.870421][ T9325] RIP: 0033:0x7f486018d169 [ 335.874669][ T9325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 335.894222][ T9325] RSP: 002b:00007f48610d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 335.902471][ T9325] RAX: ffffffffffffffda RBX: 00007f48603a5fa0 RCX: 00007f486018d169 [ 335.910281][ T9325] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 335.918091][ T9325] RBP: 00007f48610d7090 R08: 0000000000000000 R09: 0000000000000000 [ 335.925901][ T9325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 335.933719][ T9325] R13: 0000000000000000 R14: 00007f48603a5fa0 R15: 00007ffce1881948 [ 335.941528][ T9325] [ 336.953621][ T9362] FAULT_INJECTION: forcing a failure. [ 336.953621][ T9362] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 336.998091][ T9362] CPU: 0 PID: 9362 Comm: syz.0.2574 Not tainted 6.1.129-syzkaller-00002-g777d8313618b #0 [ 337.007734][ T9362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 337.017627][ T9362] Call Trace: [ 337.020752][ T9362] [ 337.023528][ T9362] dump_stack_lvl+0x151/0x1b7 [ 337.028042][ T9362] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 337.033339][ T9362] ? bpf_test_run+0x912/0xa40 [ 337.037849][ T9362] dump_stack+0x15/0x18 [ 337.041844][ T9362] should_fail_ex+0x3d0/0x520 [ 337.046359][ T9362] should_fail+0xb/0x10 [ 337.050544][ T9362] should_fail_usercopy+0x1a/0x20 [ 337.055327][ T9362] _copy_to_user+0x1e/0x90 [ 337.059580][ T9362] bpf_test_finish+0x22c/0x950 [ 337.064182][ T9362] ? convert_skb_to___skb+0x4f0/0x4f0 [ 337.069384][ T9362] ? convert_skb_to___skb+0x2da/0x4f0 [ 337.074591][ T9362] bpf_prog_test_run_skb+0xcfd/0x13a0 [ 337.079809][ T9362] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 337.085530][ T9362] ? __kasan_check_write+0x14/0x20 [ 337.090475][ T9362] ? fput+0x15b/0x1b0 [ 337.094380][ T9362] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 337.100111][ T9362] bpf_prog_test_run+0x3b0/0x630 [ 337.104882][ T9362] ? bpf_prog_query+0x260/0x260 [ 337.109569][ T9362] ? selinux_bpf+0xd2/0x100 [ 337.113923][ T9362] ? security_bpf+0x82/0xb0 [ 337.118248][ T9362] __sys_bpf+0x59f/0x7f0 [ 337.122328][ T9362] ? bpf_link_show_fdinfo+0x300/0x300 [ 337.127538][ T9362] ? __ia32_sys_read+0x90/0x90 [ 337.132573][ T9362] ? debug_smp_processor_id+0x17/0x20 [ 337.137776][ T9362] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 337.143679][ T9362] __x64_sys_bpf+0x7c/0x90 [ 337.147933][ T9362] x64_sys_call+0x87f/0x9a0 [ 337.152272][ T9362] do_syscall_64+0x3b/0xb0 [ 337.156609][ T9362] ? clear_bhb_loop+0x55/0xb0 [ 337.161123][ T9362] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 337.166850][ T9362] RIP: 0033:0x7f012698d169 [ 337.171104][ T9362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 337.190542][ T9362] RSP: 002b:00007f01278b5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 337.198788][ T9362] RAX: ffffffffffffffda RBX: 00007f0126ba5fa0 RCX: 00007f012698d169 [ 337.206597][ T9362] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 337.214410][ T9362] RBP: 00007f01278b5090 R08: 0000000000000000 R09: 0000000000000000 [ 337.222221][ T9362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 337.230031][ T9362] R13: 0000000000000000 R14: 00007f0126ba5fa0 R15: 00007ffe91024708 [ 337.237847][ T9362] [ 338.558504][ T9397] device veth1_macvtap left promiscuous mode [ 340.985390][ T9484] FAULT_INJECTION: forcing a failure. [ 340.985390][ T9484] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 341.038092][ T9484] CPU: 0 PID: 9484 Comm: syz.4.2612 Not tainted 6.1.129-syzkaller-00002-g777d8313618b #0 [ 341.047727][ T9484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 341.057619][ T9484] Call Trace: [ 341.060742][ T9484] [ 341.063525][ T9484] dump_stack_lvl+0x151/0x1b7 [ 341.068035][ T9484] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 341.073341][ T9484] ? bpf_test_run+0x912/0xa40 [ 341.077842][ T9484] dump_stack+0x15/0x18 [ 341.081833][ T9484] should_fail_ex+0x3d0/0x520 [ 341.086354][ T9484] should_fail+0xb/0x10 [ 341.090340][ T9484] should_fail_usercopy+0x1a/0x20 [ 341.095201][ T9484] _copy_to_user+0x1e/0x90 [ 341.099453][ T9484] bpf_test_finish+0x56f/0x950 [ 341.104062][ T9484] ? convert_skb_to___skb+0x4f0/0x4f0 [ 341.109259][ T9484] ? convert_skb_to___skb+0x2da/0x4f0 [ 341.114469][ T9484] bpf_prog_test_run_skb+0xcfd/0x13a0 [ 341.119681][ T9484] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 341.125403][ T9484] ? __kasan_check_write+0x14/0x20 [ 341.130353][ T9484] ? fput+0x15b/0x1b0 [ 341.134169][ T9484] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 341.139900][ T9484] bpf_prog_test_run+0x3b0/0x630 [ 341.144672][ T9484] ? bpf_prog_query+0x260/0x260 [ 341.149443][ T9484] ? selinux_bpf+0xd2/0x100 [ 341.153784][ T9484] ? security_bpf+0x82/0xb0 [ 341.158124][ T9484] __sys_bpf+0x59f/0x7f0 [ 341.162204][ T9484] ? bpf_link_show_fdinfo+0x300/0x300 [ 341.167412][ T9484] ? __ia32_sys_read+0x90/0x90 [ 341.172020][ T9484] ? debug_smp_processor_id+0x17/0x20 [ 341.177215][ T9484] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 341.183123][ T9484] __x64_sys_bpf+0x7c/0x90 [ 341.187371][ T9484] x64_sys_call+0x87f/0x9a0 [ 341.191709][ T9484] do_syscall_64+0x3b/0xb0 [ 341.195966][ T9484] ? clear_bhb_loop+0x55/0xb0 [ 341.200483][ T9484] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 341.206206][ T9484] RIP: 0033:0x7fe90798d169 [ 341.210459][ T9484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 341.229898][ T9484] RSP: 002b:00007fe9088d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 341.238142][ T9484] RAX: ffffffffffffffda RBX: 00007fe907ba5fa0 RCX: 00007fe90798d169 [ 341.245960][ T9484] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 341.253767][ T9484] RBP: 00007fe9088d0090 R08: 0000000000000000 R09: 0000000000000000 [ 341.261576][ T9484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 341.269392][ T9484] R13: 0000000000000000 R14: 00007fe907ba5fa0 R15: 00007ffd3d4893f8 [ 341.277204][ T9484] [ 341.549668][ T9495] syz.0.2616 uses obsolete (PF_INET,SOCK_PACKET) [ 342.034360][ T9511] FAULT_INJECTION: forcing a failure. [ 342.034360][ T9511] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 342.208918][ T9511] CPU: 1 PID: 9511 Comm: syz.4.2620 Not tainted 6.1.129-syzkaller-00002-g777d8313618b #0 [ 342.218653][ T9511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 342.228546][ T9511] Call Trace: [ 342.231669][ T9511] [ 342.234451][ T9511] dump_stack_lvl+0x151/0x1b7 [ 342.238962][ T9511] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 342.244255][ T9511] ? vfs_write+0x952/0xed0 [ 342.248507][ T9511] ? __kasan_slab_free+0x11/0x20 [ 342.253282][ T9511] dump_stack+0x15/0x18 [ 342.257272][ T9511] should_fail_ex+0x3d0/0x520 [ 342.261788][ T9511] should_fail+0xb/0x10 [ 342.265780][ T9511] should_fail_usercopy+0x1a/0x20 [ 342.270642][ T9511] _copy_from_user+0x1e/0xc0 [ 342.275066][ T9511] __sys_bpf+0x23b/0x7f0 [ 342.279144][ T9511] ? bpf_link_show_fdinfo+0x300/0x300 [ 342.284359][ T9511] ? __ia32_sys_read+0x90/0x90 [ 342.288956][ T9511] ? debug_smp_processor_id+0x17/0x20 [ 342.294161][ T9511] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 342.300062][ T9511] __x64_sys_bpf+0x7c/0x90 [ 342.304411][ T9511] x64_sys_call+0x87f/0x9a0 [ 342.308748][ T9511] do_syscall_64+0x3b/0xb0 [ 342.313001][ T9511] ? clear_bhb_loop+0x55/0xb0 [ 342.317515][ T9511] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 342.323243][ T9511] RIP: 0033:0x7fe90798d169 [ 342.327671][ T9511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 342.347111][ T9511] RSP: 002b:00007fe9088af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 342.355358][ T9511] RAX: ffffffffffffffda RBX: 00007fe907ba6080 RCX: 00007fe90798d169 [ 342.363167][ T9511] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 342.370977][ T9511] RBP: 00007fe9088af090 R08: 0000000000000000 R09: 0000000000000000 [ 342.378788][ T9511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 342.386601][ T9511] R13: 0000000000000000 R14: 00007fe907ba6080 R15: 00007ffd3d4893f8 [ 342.394505][ T9511] [ 345.335871][ T9602] device sit0 left promiscuous mode [ 345.594489][ T9610] device syzkaller0 entered promiscuous mode [ 349.000282][ T9722] device veth0_vlan left promiscuous mode [ 349.017582][ T9722] device veth0_vlan entered promiscuous mode [ 352.427138][ T9795] FAULT_INJECTION: forcing a failure. [ 352.427138][ T9795] name failslab, interval 1, probability 0, space 0, times 0 [ 352.481363][ T9795] CPU: 1 PID: 9795 Comm: syz.4.2703 Not tainted 6.1.129-syzkaller-00002-g777d8313618b #0 [ 352.491002][ T9795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 352.500902][ T9795] Call Trace: [ 352.504017][ T9795] [ 352.506797][ T9795] dump_stack_lvl+0x151/0x1b7 [ 352.511310][ T9795] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 352.516609][ T9795] ? kasan_save_alloc_info+0x1f/0x30 [ 352.521729][ T9795] dump_stack+0x15/0x18 [ 352.525714][ T9795] should_fail_ex+0x3d0/0x520 [ 352.530232][ T9795] ? build_skb+0x2c/0x220 [ 352.534395][ T9795] __should_failslab+0xaf/0xf0 [ 352.539085][ T9795] should_failslab+0x9/0x20 [ 352.543418][ T9795] kmem_cache_alloc+0x3b/0x320 [ 352.548024][ T9795] build_skb+0x2c/0x220 [ 352.552019][ T9795] bpf_prog_test_run_skb+0x3ad/0x13a0 [ 352.557226][ T9795] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 352.562951][ T9795] ? __kasan_check_write+0x14/0x20 [ 352.567893][ T9795] ? fput+0x15b/0x1b0 [ 352.571714][ T9795] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 352.577442][ T9795] bpf_prog_test_run+0x3b0/0x630 [ 352.582234][ T9795] ? bpf_prog_query+0x260/0x260 [ 352.587006][ T9795] ? selinux_bpf+0xd2/0x100 [ 352.591345][ T9795] ? security_bpf+0x82/0xb0 [ 352.595681][ T9795] __sys_bpf+0x59f/0x7f0 [ 352.599760][ T9795] ? strscpy+0x9c/0x260 [ 352.603752][ T9795] ? bpf_link_show_fdinfo+0x300/0x300 [ 352.608964][ T9795] ? bpf_trace_run1+0x240/0x240 [ 352.613648][ T9795] ? __ia32_sys_read+0x90/0x90 [ 352.618275][ T9795] __x64_sys_bpf+0x7c/0x90 [ 352.622502][ T9795] x64_sys_call+0x87f/0x9a0 [ 352.626843][ T9795] do_syscall_64+0x3b/0xb0 [ 352.631098][ T9795] ? clear_bhb_loop+0x55/0xb0 [ 352.635605][ T9795] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 352.641338][ T9795] RIP: 0033:0x7fe90798d169 [ 352.645589][ T9795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 352.665029][ T9795] RSP: 002b:00007fe9088d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 352.673271][ T9795] RAX: ffffffffffffffda RBX: 00007fe907ba5fa0 RCX: 00007fe90798d169 [ 352.681084][ T9795] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 352.688895][ T9795] RBP: 00007fe9088d0090 R08: 0000000000000000 R09: 0000000000000000 [ 352.696712][ T9795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 352.704520][ T9795] R13: 0000000000000000 R14: 00007fe907ba5fa0 R15: 00007ffd3d4893f8 [ 352.712336][ T9795] [ 352.855788][ T9817] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.865945][ T9817] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.943497][ T9817] device bridge_slave_1 left promiscuous mode [ 353.006096][ T9817] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.114049][ T9817] device bridge_slave_0 left promiscuous mode [ 353.123441][ T9817] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.046278][ T9850] device sit0 left promiscuous mode [ 354.276814][ T9856] FAULT_INJECTION: forcing a failure. [ 354.276814][ T9856] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 354.294492][ T9856] CPU: 0 PID: 9856 Comm: syz.1.2721 Not tainted 6.1.129-syzkaller-00002-g777d8313618b #0 [ 354.304123][ T9856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 354.314018][ T9856] Call Trace: [ 354.317142][ T9856] [ 354.319931][ T9856] dump_stack_lvl+0x151/0x1b7 [ 354.324432][ T9856] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 354.329731][ T9856] ? bpf_test_run+0x912/0xa40 [ 354.334237][ T9856] dump_stack+0x15/0x18 [ 354.338230][ T9856] should_fail_ex+0x3d0/0x520 [ 354.342752][ T9856] should_fail+0xb/0x10 [ 354.346738][ T9856] should_fail_usercopy+0x1a/0x20 [ 354.351603][ T9856] _copy_to_user+0x1e/0x90 [ 354.355854][ T9856] bpf_test_finish+0x22c/0x950 [ 354.360455][ T9856] ? convert_skb_to___skb+0x4f0/0x4f0 [ 354.365662][ T9856] ? convert_skb_to___skb+0x2da/0x4f0 [ 354.370871][ T9856] bpf_prog_test_run_skb+0xcfd/0x13a0 [ 354.376084][ T9856] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 354.381802][ T9856] ? __kasan_check_write+0x14/0x20 [ 354.386748][ T9856] ? fput+0x15b/0x1b0 [ 354.390567][ T9856] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 354.396297][ T9856] bpf_prog_test_run+0x3b0/0x630 [ 354.401073][ T9856] ? bpf_prog_query+0x260/0x260 [ 354.405758][ T9856] ? selinux_bpf+0xd2/0x100 [ 354.410100][ T9856] ? security_bpf+0x82/0xb0 [ 354.414436][ T9856] __sys_bpf+0x59f/0x7f0 [ 354.418511][ T9856] ? bpf_link_show_fdinfo+0x300/0x300 [ 354.423722][ T9856] ? __ia32_sys_read+0x90/0x90 [ 354.428320][ T9856] ? debug_smp_processor_id+0x17/0x20 [ 354.433528][ T9856] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 354.439429][ T9856] __x64_sys_bpf+0x7c/0x90 [ 354.443688][ T9856] x64_sys_call+0x87f/0x9a0 [ 354.448025][ T9856] do_syscall_64+0x3b/0xb0 [ 354.452399][ T9856] ? clear_bhb_loop+0x55/0xb0 [ 354.457014][ T9856] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 354.462722][ T9856] RIP: 0033:0x7fb87198d169 [ 354.466982][ T9856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 354.486417][ T9856] RSP: 002b:00007fb872863038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 354.494659][ T9856] RAX: ffffffffffffffda RBX: 00007fb871ba5fa0 RCX: 00007fb87198d169 [ 354.502468][ T9856] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 354.510278][ T9856] RBP: 00007fb872863090 R08: 0000000000000000 R09: 0000000000000000 [ 354.518090][ T9856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 354.525904][ T9856] R13: 0000000000000000 R14: 00007fb871ba5fa0 R15: 00007fff3ce03f28 [ 354.531655][ T9866] device sit0 entered promiscuous mode [ 354.533720][ T9856] [ 355.173366][ T9911] device sit0 entered promiscuous mode [ 356.534943][ T9955] device sit0 entered promiscuous mode [ 357.588078][T10003] device pim6reg1 entered promiscuous mode [ 357.602968][T10003] device sit0 entered promiscuous mode [ 358.460605][T10028] ================================================================== [ 358.468640][T10028] BUG: KASAN: use-after-free in dev_map_enqueue+0x40/0x340 [ 358.475835][T10028] Read of size 8 at addr ffff888114f4ab00 by task syz.0.2775/10028 [ 358.483563][T10028] [ 358.485733][T10028] CPU: 1 PID: 10028 Comm: syz.0.2775 Not tainted 6.1.129-syzkaller-00002-g777d8313618b #0 [ 358.495453][T10028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 358.505348][T10028] Call Trace: [ 358.508472][T10028] [ 358.511248][T10028] dump_stack_lvl+0x151/0x1b7 [ 358.515759][T10028] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 358.521055][T10028] ? _printk+0xd1/0x111 [ 358.525046][T10028] ? __virt_addr_valid+0x242/0x2f0 [ 358.529995][T10028] print_report+0x158/0x4e0 [ 358.534335][T10028] ? __virt_addr_valid+0x242/0x2f0 [ 358.539283][T10028] ? kasan_complete_mode_report_info+0x90/0x1b0 [ 358.545362][T10028] ? dev_map_enqueue+0x40/0x340 [ 358.550043][T10028] kasan_report+0x13c/0x170 [ 358.554388][T10028] ? dev_map_enqueue+0x40/0x340 [ 358.559069][T10028] ? __page_pool_alloc_pages_slow+0x81f/0x9f0 [ 358.564971][T10028] __asan_report_load8_noabort+0x14/0x20 [ 358.570441][T10028] dev_map_enqueue+0x40/0x340 [ 358.574954][T10028] xdp_do_redirect_frame+0x2b5/0x800 [ 358.580082][T10028] bpf_test_run_xdp_live+0xc30/0x1f70 [ 358.585285][T10028] ? bpf_test_run_xdp_live+0x7ae/0x1f70 [ 358.590664][T10028] ? xdp_convert_md_to_buff+0x360/0x360 [ 358.596042][T10028] ? bpf_dispatcher_change_prog+0xd86/0xf10 [ 358.601788][T10028] ? 0xffffffffa00038c0 [ 358.605768][T10028] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 358.611841][T10028] ? __kasan_check_write+0x14/0x20 [ 358.616787][T10028] ? _copy_from_user+0x90/0xc0 [ 358.621385][T10028] bpf_prog_test_run_xdp+0x7d1/0x1130 [ 358.626600][T10028] ? dev_put+0x80/0x80 [ 358.630503][T10028] ? __kasan_check_write+0x14/0x20 [ 358.635443][T10028] ? fput+0x15b/0x1b0 [ 358.639263][T10028] ? dev_put+0x80/0x80 [ 358.643169][T10028] bpf_prog_test_run+0x3b0/0x630 [ 358.647943][T10028] ? bpf_prog_query+0x260/0x260 [ 358.652630][T10028] ? selinux_bpf+0xd2/0x100 [ 358.656984][T10028] ? security_bpf+0x82/0xb0 [ 358.661308][T10028] __sys_bpf+0x59f/0x7f0 [ 358.665387][T10028] ? bpf_link_show_fdinfo+0x300/0x300 [ 358.670662][T10028] ? fpregs_restore_userregs+0x130/0x290 [ 358.676069][T10028] __x64_sys_bpf+0x7c/0x90 [ 358.680329][T10028] x64_sys_call+0x87f/0x9a0 [ 358.684659][T10028] do_syscall_64+0x3b/0xb0 [ 358.688916][T10028] ? clear_bhb_loop+0x55/0xb0 [ 358.693441][T10028] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 358.699150][T10028] RIP: 0033:0x7f012698d169 [ 358.703403][T10028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 358.722846][T10028] RSP: 002b:00007f01278b5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 358.731090][T10028] RAX: ffffffffffffffda RBX: 00007f0126ba5fa0 RCX: 00007f012698d169 [ 358.739171][T10028] RDX: 0000000000000050 RSI: 00002000000000c0 RDI: 000000000000000a [ 358.746975][T10028] RBP: 00007f0126a0e990 R08: 0000000000000000 R09: 0000000000000000 [ 358.754783][T10028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 358.762595][T10028] R13: 0000000000000000 R14: 00007f0126ba5fa0 R15: 00007ffe91024708 [ 358.770412][T10028] [ 358.773270][T10028] [ 358.775439][T10028] Allocated by task 9903: [ 358.779606][T10028] kasan_set_track+0x4b/0x70 [ 358.784031][T10028] kasan_save_alloc_info+0x1f/0x30 [ 358.788980][T10028] __kasan_krealloc+0x119/0x160 [ 358.793672][T10028] krealloc+0xc3/0x110 [ 358.797572][T10028] do_check+0x2728/0xe040 [ 358.801846][T10028] do_check_common+0x6ca/0xca0 [ 358.806442][T10028] bpf_check+0x6d12/0x17ed0 [ 358.810781][T10028] bpf_prog_load+0x1304/0x1bf0 [ 358.815378][T10028] __sys_bpf+0x52c/0x7f0 [ 358.819459][T10028] __x64_sys_bpf+0x7c/0x90 [ 358.823709][T10028] x64_sys_call+0x87f/0x9a0 [ 358.828050][T10028] do_syscall_64+0x3b/0xb0 [ 358.832303][T10028] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 358.838030][T10028] [ 358.840198][T10028] Freed by task 9903: [ 358.844029][T10028] kasan_set_track+0x4b/0x70 [ 358.848445][T10028] kasan_save_free_info+0x2b/0x40 [ 358.853310][T10028] ____kasan_slab_free+0x131/0x180 [ 358.858258][T10028] __kasan_slab_free+0x11/0x20 [ 358.862859][T10028] __kmem_cache_free+0x21d/0x410 [ 358.867631][T10028] kfree+0x7a/0xf0 [ 358.871186][T10028] krealloc+0xd8/0x110 [ 358.875091][T10028] do_check+0x2728/0xe040 [ 358.879258][T10028] do_check_common+0x6ca/0xca0 [ 358.883858][T10028] bpf_check+0x6d12/0x17ed0 [ 358.888200][T10028] bpf_prog_load+0x1304/0x1bf0 [ 358.892796][T10028] __sys_bpf+0x52c/0x7f0 [ 358.896878][T10028] __x64_sys_bpf+0x7c/0x90 [ 358.901126][T10028] x64_sys_call+0x87f/0x9a0 [ 358.905475][T10028] do_syscall_64+0x3b/0xb0 [ 358.909721][T10028] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 358.915448][T10028] [ 358.917659][T10028] Last potentially related work creation: [ 358.923173][T10028] kasan_save_stack+0x3b/0x60 [ 358.927686][T10028] __kasan_record_aux_stack+0xb4/0xc0 [ 358.932893][T10028] kasan_record_aux_stack_noalloc+0xb/0x10 [ 358.938538][T10028] kvfree_call_rcu+0x9f/0x800 [ 358.943046][T10028] kernfs_unlink_open_file+0x327/0x3d0 [ 358.948471][T10028] kernfs_fop_release+0x253/0x310 [ 358.953329][T10028] __fput+0x1e5/0x870 [ 358.957149][T10028] ____fput+0x15/0x20 [ 358.960963][T10028] task_work_run+0x24d/0x2e0 [ 358.965391][T10028] exit_to_user_mode_loop+0x94/0xa0 [ 358.970514][T10028] exit_to_user_mode_prepare+0x5a/0xa0 [ 358.975804][T10028] syscall_exit_to_user_mode+0x26/0x130 [ 358.981186][T10028] do_syscall_64+0x47/0xb0 [ 358.985437][T10028] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 358.991256][T10028] [ 358.993423][T10028] Second to last potentially related work creation: [ 358.999845][T10028] kasan_save_stack+0x3b/0x60 [ 359.004376][T10028] __kasan_record_aux_stack+0xb4/0xc0 [ 359.009566][T10028] kasan_record_aux_stack_noalloc+0xb/0x10 [ 359.015207][T10028] kvfree_call_rcu+0x9f/0x800 [ 359.019895][T10028] tipc_nametbl_remove_publ+0x195a/0x1b40 [ 359.025448][T10028] tipc_nametbl_withdraw+0x147/0x390 [ 359.030572][T10028] tipc_release+0x358/0x1310 [ 359.034995][T10028] sock_release+0x7e/0x140 [ 359.039248][T10028] tipc_topsrv_exit_net+0x2b7/0x320 [ 359.044292][T10028] cleanup_net+0x64b/0xbf0 [ 359.048539][T10028] process_one_work+0x73d/0xcb0 [ 359.053221][T10028] worker_thread+0xa60/0x1260 [ 359.057741][T10028] kthread+0x26d/0x300 [ 359.061643][T10028] ret_from_fork+0x1f/0x30 [ 359.065902][T10028] [ 359.068063][T10028] The buggy address belongs to the object at ffff888114f4ab00 [ 359.068063][T10028] which belongs to the cache kmalloc-96 of size 96 [ 359.081776][T10028] The buggy address is located 0 bytes inside of [ 359.081776][T10028] 96-byte region [ffff888114f4ab00, ffff888114f4ab60) [ 359.094624][T10028] [ 359.096792][T10028] The buggy address belongs to the physical page: [ 359.103046][T10028] page:ffffea000453d280 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114f4a [ 359.113108][T10028] flags: 0x4000000000000200(slab|zone=1) [ 359.118587][T10028] raw: 4000000000000200 0000000000000000 dead000000000001 ffff888100042900 [ 359.127007][T10028] raw: 0000000000000000 0000000000200020 00000001ffffffff 0000000000000000 [ 359.135423][T10028] page dumped because: kasan: bad access detected [ 359.141674][T10028] page_owner tracks the page as allocated [ 359.147216][T10028] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 111, tgid 111 (udevadm), ts 4606127513, free_ts 0 [ 359.163795][T10028] post_alloc_hook+0x213/0x220 [ 359.168392][T10028] prep_new_page+0x1b/0x110 [ 359.172942][T10028] get_page_from_freelist+0x3a98/0x3b10 [ 359.178329][T10028] __alloc_pages+0x234/0x610 [ 359.182748][T10028] alloc_slab_page+0x6c/0xf0 [ 359.187190][T10028] new_slab+0x90/0x3e0 [ 359.191087][T10028] ___slab_alloc+0x6f9/0xb80 [ 359.195546][T10028] __slab_alloc+0x5d/0xa0 [ 359.199676][T10028] __kmem_cache_alloc_node+0x207/0x2a0 [ 359.204971][T10028] kmalloc_trace+0x2a/0xa0 [ 359.209222][T10028] kernfs_fop_open+0x70e/0xb10 [ 359.213831][T10028] do_dentry_open+0x891/0x1250 [ 359.218440][T10028] vfs_open+0x73/0x80 [ 359.222241][T10028] path_openat+0x2532/0x2d60 [ 359.226666][T10028] do_filp_open+0x230/0x480 [ 359.231008][T10028] do_sys_openat2+0x151/0x870 [ 359.235609][T10028] page_owner free stack trace missing [ 359.240816][T10028] [ 359.242984][T10028] Memory state around the buggy address: [ 359.248454][T10028] ffff888114f4aa00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 359.256353][T10028] ffff888114f4aa80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 359.264336][T10028] >ffff888114f4ab00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 359.272229][T10028] ^ [ 359.276141][T10028] ffff888114f4ab80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 359.284035][T10028] ffff888114f4ac00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 359.291932][T10028] ================================================================== [ 359.299901][T10028] Disabling lock debugging due to kernel taint [ 359.305934][T10028] BUG: unable to handle page fault for address: fffffff100000210 [ 359.313458][T10028] #PF: supervisor read access in kernel mode [ 359.319272][T10028] #PF: error_code(0x0000) - not-present page [ 359.325086][T10028] PGD 7012067 P4D 7012067 PUD 0 [ 359.329878][T10028] Oops: 0000 [#1] PREEMPT SMP KASAN [ 359.334895][T10028] CPU: 1 PID: 10028 Comm: syz.0.2775 Tainted: G B 6.1.129-syzkaller-00002-g777d8313618b #0 [ 359.346093][T10028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 359.355989][T10028] RIP: 0010:dev_map_enqueue+0xa0/0x340 [ 359.361283][T10028] Code: 00 74 08 4c 89 ef e8 5f a0 25 00 bb 20 02 00 00 49 03 5d 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 40 a0 25 00 <48> 83 3b 00 0f 84 eb 00 00 00 49 8d 7f 08 48 89 f8 48 c1 e8 03 42 [ 359.380723][T10028] RSP: 0018:ffffc900100a75f8 EFLAGS: 00010246 [ 359.386625][T10028] RAX: 1ffffffe20000042 RBX: fffffff100000210 RCX: ffffffff8197a4e1 [ 359.394431][T10028] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff88811fe018d0 [ 359.402243][T10028] RBP: ffffc900100a7638 R08: ffffffff8144b443 R09: fffffbfff0f6e8fd [ 359.410061][T10028] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 359.417866][T10028] R13: ffff88811fe018d0 R14: ffff88811fe01800 R15: ffff88814516c070 [ 359.425677][T10028] FS: 00007f01278b56c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 359.434445][T10028] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 359.440872][T10028] CR2: fffffff100000210 CR3: 0000000140b8b000 CR4: 00000000003506a0 [ 359.448684][T10028] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 359.456582][T10028] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 359.464389][T10028] Call Trace: [ 359.467512][T10028] [ 359.470295][T10028] ? __die_body+0x62/0xb0 [ 359.474557][T10028] ? __die+0x7e/0x90 [ 359.478290][T10028] ? page_fault_oops+0x7f9/0xa90 [ 359.483063][T10028] ? resume_console+0x50/0x50 [ 359.487594][T10028] ? kernelmode_fixup_or_oops+0xd0/0xd0 [ 359.492959][T10028] ? __wake_up_klogd+0xde/0x110 [ 359.497645][T10028] ? is_prefetch+0x47a/0x6d0 [ 359.502070][T10028] ? printk_sprint+0x430/0x430 [ 359.506676][T10028] ? kernelmode_fixup_or_oops+0xb9/0xd0 [ 359.512053][T10028] ? __bad_area_nosemaphore+0xc2/0x610 [ 359.517348][T10028] ? irqentry_exit+0x30/0x40 [ 359.521773][T10028] ? add_taint+0x44/0xe0 [ 359.525859][T10028] ? bad_area_nosemaphore+0x2d/0x40 [ 359.530888][T10028] ? do_kern_addr_fault+0x69/0x80 [ 359.535745][T10028] ? exc_page_fault+0x505/0x6d0 [ 359.540431][T10028] ? __kasan_check_write+0x14/0x20 [ 359.545400][T10028] ? asm_exc_page_fault+0x27/0x30 [ 359.550245][T10028] ? add_taint+0x93/0xe0 [ 359.554320][T10028] ? dev_map_enqueue+0x81/0x340 [ 359.559009][T10028] ? dev_map_enqueue+0xa0/0x340 [ 359.563694][T10028] ? dev_map_enqueue+0x81/0x340 [ 359.568383][T10028] xdp_do_redirect_frame+0x2b5/0x800 [ 359.573502][T10028] bpf_test_run_xdp_live+0xc30/0x1f70 [ 359.578727][T10028] ? bpf_test_run_xdp_live+0x7ae/0x1f70 [ 359.584086][T10028] ? xdp_convert_md_to_buff+0x360/0x360 [ 359.589470][T10028] ? bpf_dispatcher_change_prog+0xd86/0xf10 [ 359.595197][T10028] ? 0xffffffffa00038c0 [ 359.599200][T10028] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 359.605269][T10028] ? __kasan_check_write+0x14/0x20 [ 359.610325][T10028] ? _copy_from_user+0x90/0xc0 [ 359.614902][T10028] bpf_prog_test_run_xdp+0x7d1/0x1130 [ 359.620111][T10028] ? dev_put+0x80/0x80 [ 359.624014][T10028] ? __kasan_check_write+0x14/0x20 [ 359.628959][T10028] ? fput+0x15b/0x1b0 [ 359.632781][T10028] ? dev_put+0x80/0x80 [ 359.636688][T10028] bpf_prog_test_run+0x3b0/0x630 [ 359.641461][T10028] ? bpf_prog_query+0x260/0x260 [ 359.646148][T10028] ? selinux_bpf+0xd2/0x100 [ 359.650485][T10028] ? security_bpf+0x82/0xb0 [ 359.654824][T10028] __sys_bpf+0x59f/0x7f0 [ 359.658906][T10028] ? bpf_link_show_fdinfo+0x300/0x300 [ 359.664117][T10028] ? fpregs_restore_userregs+0x130/0x290 [ 359.669593][T10028] __x64_sys_bpf+0x7c/0x90 [ 359.673834][T10028] x64_sys_call+0x87f/0x9a0 [ 359.678173][T10028] do_syscall_64+0x3b/0xb0 [ 359.682423][T10028] ? clear_bhb_loop+0x55/0xb0 [ 359.686961][T10028] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 359.692665][T10028] RIP: 0033:0x7f012698d169 [ 359.696931][T10028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 359.716370][T10028] RSP: 002b:00007f01278b5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 359.724606][T10028] RAX: ffffffffffffffda RBX: 00007f0126ba5fa0 RCX: 00007f012698d169 [ 359.732416][T10028] RDX: 0000000000000050 RSI: 00002000000000c0 RDI: 000000000000000a [ 359.740228][T10028] RBP: 00007f0126a0e990 R08: 0000000000000000 R09: 0000000000000000 [ 359.748038][T10028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 359.755860][T10028] R13: 0000000000000000 R14: 00007f0126ba5fa0 R15: 00007ffe91024708 [ 359.763665][T10028] [ 359.766527][T10028] Modules linked in: [ 359.770273][T10028] CR2: fffffff100000210 [ 359.774251][T10028] ---[ end trace 0000000000000000 ]--- [ 359.779543][T10028] RIP: 0010:dev_map_enqueue+0xa0/0x340 [ 359.784835][T10028] Code: 00 74 08 4c 89 ef e8 5f a0 25 00 bb 20 02 00 00 49 03 5d 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 40 a0 25 00 <48> 83 3b 00 0f 84 eb 00 00 00 49 8d 7f 08 48 89 f8 48 c1 e8 03 42 [ 359.804280][T10028] RSP: 0018:ffffc900100a75f8 EFLAGS: 00010246 [ 359.810180][T10028] RAX: 1ffffffe20000042 RBX: fffffff100000210 RCX: ffffffff8197a4e1 [ 359.817996][T10028] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff88811fe018d0 [ 359.825804][T10028] RBP: ffffc900100a7638 R08: ffffffff8144b443 R09: fffffbfff0f6e8fd [ 359.833615][T10028] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 359.841426][T10028] R13: ffff88811fe018d0 R14: ffff88811fe01800 R15: ffff88814516c070 [ 359.849240][T10028] FS: 00007f01278b56c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 359.858004][T10028] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 359.864425][T10028] CR2: fffffff100000210 CR3: 0000000140b8b000 CR4: 00000000003506a0 [ 359.872240][T10028] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 359.880049][T10028] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 359.887861][T10028] Kernel panic - not syncing: Fatal exception in interrupt [ 359.895221][T10028] Kernel Offset: disabled [ 359.899344][T10028] Rebooting in 86400 seconds..