last executing test programs: 17.336747586s ago: executing program 1 (id=929): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xde) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000001c0)='cpu&\"0\t&&') r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) r7 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.max\x00', 0x2, 0x0) socketpair(0x3, 0x6, 0x9, &(0x7f0000001a00)) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1a003}) ioctl$TUNSETLINK(r8, 0x400454cd, 0x6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @link_local}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @dev}) write$cgroup_int(r7, &(0x7f00000001c0)=0x6, 0x12) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x10, 0x11, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x6e59, 0x1000, &(0x7f0000000a00)=""/4096, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x2, 0x3, 0x607dfe5a, 0x4}, 0x10, 0x0, r1, 0x3, &(0x7f0000000380)=[r0, r0, r0, r0, r0], &(0x7f00000003c0)=[{0x0, 0x1, 0xb, 0x2}, {0x1, 0x2, 0x9}, {0x3, 0x3, 0x8, 0x7}], 0x10, 0xffff, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0xe, 0x1, 0x9, &(0x7f0000000400)=[0x0], 0x1, 0x0, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000740)={@cgroup, r11, 0x5, 0x43, r5, @void, @value=r6, @void, @void, r12}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) 14.101358075s ago: executing program 1 (id=929): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xde) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000001c0)='cpu&\"0\t&&') r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) r7 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.max\x00', 0x2, 0x0) socketpair(0x3, 0x6, 0x9, &(0x7f0000001a00)) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1a003}) ioctl$TUNSETLINK(r8, 0x400454cd, 0x6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @link_local}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @dev}) write$cgroup_int(r7, &(0x7f00000001c0)=0x6, 0x12) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x10, 0x11, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x6e59, 0x1000, &(0x7f0000000a00)=""/4096, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x2, 0x3, 0x607dfe5a, 0x4}, 0x10, 0x0, r1, 0x3, &(0x7f0000000380)=[r0, r0, r0, r0, r0], &(0x7f00000003c0)=[{0x0, 0x1, 0xb, 0x2}, {0x1, 0x2, 0x9}, {0x3, 0x3, 0x8, 0x7}], 0x10, 0xffff, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0xe, 0x1, 0x9, &(0x7f0000000400)=[0x0], 0x1, 0x0, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000740)={@cgroup, r11, 0x5, 0x43, r5, @void, @value=r6, @void, @void, r12}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) 9.560448354s ago: executing program 1 (id=929): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xde) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000001c0)='cpu&\"0\t&&') r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) r7 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.max\x00', 0x2, 0x0) socketpair(0x3, 0x6, 0x9, &(0x7f0000001a00)) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1a003}) ioctl$TUNSETLINK(r8, 0x400454cd, 0x6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @link_local}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @dev}) write$cgroup_int(r7, &(0x7f00000001c0)=0x6, 0x12) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x10, 0x11, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x6e59, 0x1000, &(0x7f0000000a00)=""/4096, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x2, 0x3, 0x607dfe5a, 0x4}, 0x10, 0x0, r1, 0x3, &(0x7f0000000380)=[r0, r0, r0, r0, r0], &(0x7f00000003c0)=[{0x0, 0x1, 0xb, 0x2}, {0x1, 0x2, 0x9}, {0x3, 0x3, 0x8, 0x7}], 0x10, 0xffff, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0xe, 0x1, 0x9, &(0x7f0000000400)=[0x0], 0x1, 0x0, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000740)={@cgroup, r11, 0x5, 0x43, r5, @void, @value=r6, @void, @void, r12}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) 6.899159455s ago: executing program 1 (id=929): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xde) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000001c0)='cpu&\"0\t&&') r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) r7 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.max\x00', 0x2, 0x0) socketpair(0x3, 0x6, 0x9, &(0x7f0000001a00)) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1a003}) ioctl$TUNSETLINK(r8, 0x400454cd, 0x6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @link_local}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @dev}) write$cgroup_int(r7, &(0x7f00000001c0)=0x6, 0x12) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x10, 0x11, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x6e59, 0x1000, &(0x7f0000000a00)=""/4096, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x2, 0x3, 0x607dfe5a, 0x4}, 0x10, 0x0, r1, 0x3, &(0x7f0000000380)=[r0, r0, r0, r0, r0], &(0x7f00000003c0)=[{0x0, 0x1, 0xb, 0x2}, {0x1, 0x2, 0x9}, {0x3, 0x3, 0x8, 0x7}], 0x10, 0xffff, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0xe, 0x1, 0x9, &(0x7f0000000400)=[0x0], 0x1, 0x0, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000740)={@cgroup, r11, 0x5, 0x43, r5, @void, @value=r6, @void, @void, r12}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) 3.888562941s ago: executing program 0 (id=1202): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000b00000000000000", @ANYRES32, @ANYBLOB="0096000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000005000000850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x16, 0x0, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r3, 0x0, 0x0}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000040)={r4, &(0x7f0000000000), 0x20000000, 0x3}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) unlink(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d00)={r8, 0xf, 0x0, 0x0, 0x0, 0x0, 0xc00d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000040000000000000eead0a00", @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 3.776083272s ago: executing program 0 (id=1204): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000009000800", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000000007fe3f6b07fd7c8000500000000000000107cd0a8d1222ace2ba19941ef623c2506689154afbd279607057f6e72d2120b5fce9a2ad0e3ee7a47f073c70323ae094eb292e5ccddc3b32bf6", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x12000, 0x0, 0xfffffffc, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000010000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000001000000700000000000000", @ANYRES32, @ANYBLOB="0000000000000045539962fc311b503f00000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000008000800000f5e20000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) recvmsg$unix(r0, &(0x7f0000000240)={&(0x7f0000000940), 0x6e, &(0x7f0000001040)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000e80)=""/72, 0x48}, {&(0x7f0000000f00)=""/113, 0x71}, {&(0x7f0000000f80)=""/191, 0xbf}], 0x6, &(0x7f00000010c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x140) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000b40)}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x18, 0xc, &(0x7f00000014c0)=ANY=[@ANYRES64=r3, @ANYRES64=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082", @ANYBLOB="71f6b2f48b8cb1e8e6bbc25b84d5f3e44a374937579f500c3fae9b61ae53e30656a514a7e4fab010f99e29232f430c4c3a57bd2668150d2000d3a97a6f94f7567bad5c78cf86b39f7dcd09e0a661875d3d33241bd6f4a36747cdab6f57c701c00c15a7031c26fe66e1b5080e2f3cac4a8a16b3f12d8bef3f5ee0654d17cc1e31e15b20acb4dd43a92c0cedd28bb82abbd64e6599c49fd88a340d0baf8203b72fcf214fd7655b00bfda221787fd6e20d5925ceeefeb5041e64bedd7d8f156bc74bc1e9c9c7b7caf3f32051f63743d0b51534ea99d313fe57d7c00ec7549652a974289536f6e", @ANYRES64=r0, @ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r6, 0x2000000, 0x11, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(r5, 0xb701, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0xf, &(0x7f0000000840)=ANY=[@ANYBLOB="05803000010000001800000007000000000000000100000018620000090000000000"], 0x0, 0x8, 0xb9, &(0x7f00000004c0)=""/185, 0x41000, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x0, 0x6, 0x0, 0x9062d06}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={r7, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000900)=[0x0], 0x0, 0x69, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), 0x8, 0x75, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.775248343s ago: executing program 2 (id=1205): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000400000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800"/15, @ANYRES8=r0, @ANYRES64], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/23], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0000000000000000000000000104000000000000", @ANYRES32, @ANYBLOB="ff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x31) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x2108000, &(0x7f0000000540)="03a179a24b19c1812a68c127ba20979d022216d5018d5bb01d50836e22f7edee636cf98562e5afc9fa049152978569756af3b7a01aca19e76f09ebafb4ab2867801e311c2f6b8ff3db74def31991e4fe96303e2394cfc5fbd4b8f8283ff5939315edcdd9ed501c1c3e08cb235e84caaf64170b2e981d0fd08d6d12fb38fe1b03b929034a02da79f9ebea78e99994cbf87ab1a484667e7751201e085f185563bcb40f08867fbc5ed82ef53e76c48ba73361d60dec36f60b", 0xb7, 0x0, &(0x7f0000000380), 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000061101000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r6 = perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x80, 0x76, 0x2, 0xc5, 0x2, 0x0, 0x80, 0x12, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffa, 0x4, @perf_config_ext={0x6, 0x8}, 0x1, 0x2, 0xffffffff, 0x6, 0xb85c, 0x3, 0x0, 0x0, 0x400, 0x0, 0xffffffffffff8001}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r6, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x7, 0xa, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x2000000}, 0x0, 0xc, 0xffffffffffffffff, 0x0) 3.359336069s ago: executing program 2 (id=1207): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f0000000080)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x2, &(0x7f00000008c0)=@raw=[@call={0x85, 0x0, 0x0, 0x6c}, @exit, @call, @printk={@s}, @kfunc, @map_idx, @cb_func, @cb_func], &(0x7f0000000180)='GPL\x00', 0x2, 0xe9, &(0x7f0000000240)=""/233, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x83) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000009000000dfa2bff372df8cdbeb318ab2bec8fc36903c0ec359caa1af3c914019395cc154010c693709800000000000000016a85adef34bf78c76e6222337923e1bea6ef682cc4375f594425d408ccc58187feb0e3d43347f989007a7c63f6dae2acb4af936461f34a8a32a50bbbb69ec85168947b86df9f2609bf93f7a1be259621818c3c75da31290bce645451b851111dd98ac4d8da9317c2c082020e0b2d634086785f3fe41a3053645cc413790faf7e229c782845b5bb774f7f154263178151ea93ff2cac4b181332c9c9a1c7d85616c8100000000000000d8300d19d585000000fc005774b56a7142047326f940e95b8489e1c5650f5c61299a295f39c88456391cffdef93e29f10f4a11f0cfbfc0ff976b20fef6033495b9b94777db9bb9b678ffc1130000009faa798226a080c01e47151268a02dc1a557cfdcf76305fbf6643df66b1b4d2d5e7bf698fc5a18d984ecb91e6683a5f522d536e2f3c43b89823659d1945258fc668950e5aacfffffffffffffff7f7a266c90e64efc8d8f730867202a9ee94e6a00"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0xf5010000, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x6d) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1a00070037a8e60f3f9242cf234aed13ef741585489f00", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00'/28], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000240)='rss_stat\x00', r5}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000600)='kmem_cache_free\x00', r9}, 0x18) r10 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000073113f000000000016000000000000009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)=@generic={0x0, r10}, 0x18) bpf$MAP_CREATE(0x8000000000000, &(0x7f0000000300)=@base={0x14, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000400)='io_uring_poll_arm\x00', r3, 0x0, 0xa6}, 0x18) 3.137202032s ago: executing program 1 (id=929): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xde) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000001c0)='cpu&\"0\t&&') r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) r7 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.max\x00', 0x2, 0x0) socketpair(0x3, 0x6, 0x9, &(0x7f0000001a00)) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1a003}) ioctl$TUNSETLINK(r8, 0x400454cd, 0x6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @link_local}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @dev}) write$cgroup_int(r7, &(0x7f00000001c0)=0x6, 0x12) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x10, 0x11, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x6e59, 0x1000, &(0x7f0000000a00)=""/4096, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x2, 0x3, 0x607dfe5a, 0x4}, 0x10, 0x0, r1, 0x3, &(0x7f0000000380)=[r0, r0, r0, r0, r0], &(0x7f00000003c0)=[{0x0, 0x1, 0xb, 0x2}, {0x1, 0x2, 0x9}, {0x3, 0x3, 0x8, 0x7}], 0x10, 0xffff, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0xe, 0x1, 0x9, &(0x7f0000000400)=[0x0], 0x1, 0x0, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000740)={@cgroup, r11, 0x5, 0x43, r5, @void, @value=r6, @void, @void, r12}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) 1.913723451s ago: executing program 0 (id=1209): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x275a, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1e00000004fe00000a0000000900000300000000", @ANYRES32, @ANYBLOB="802800"/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="0300000003000000040000000d00"/28], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB="00000000003f369c4f00000000000000000000f201000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0)={0x0, r1}, 0x8) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1802000080000000809500"/25], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x5, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000200)=ANY=[@ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="0500"/12, @ANYRES32, @ANYBLOB="331925f98098b4fc91746fc65c425d65cc596ef649fdc1dd826f3f01fa629d134fbf7d7f6dc44a3bcfe9d025ada4595b75eaa4af55e1d323ff6127b69d9e251bccb4d19d209745cde457181c15dc67e2bec79fe280b092ef7f5bfd4ec21e8c4dacc180aea9e58c2fb543331a46d3f9c85b4ef2902ff469641d4ed640b8baf8093987ee26b9dffc185ecddb37ae4fdd0111826312a224287906a51843439c4cee6d1f39c51a2a03e9dba578e3c598bee4d80d0659ba3a7e76294f7479", @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) 1.912707631s ago: executing program 2 (id=1210): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x13, &(0x7f0000000540)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_fd={0x18, 0x3, 0x1, 0x0, r0}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xa, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xb, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r2, @ANYRES32=r2, @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000008040000cd00000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r4}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f00000001c0)='cgroup.threads\x00', 0x2, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffe13}], 0x1}, 0x0) 1.906838991s ago: executing program 4 (id=1212): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f00000006c0), 0x10}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, r1, 0xb) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001480)=[{0x0}, {0xfffffffffffffffd}], 0x2}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="000000000400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000a80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095000000000000006a9651db6577440ecc77eea52864c956857c077cc81baaf414dfde7d2b70e8d414caddfb479c9ef725f8962309fa50f36b2da9"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0xf, 0xd, &(0x7f0000000b40)=ANY=[@ANYBLOB="181100009bf5fb41516af4a9305d552e6fb6277395b4ecdd355ea940c3cf5b0d05d01bc9cbc0358f4cda8aee2a1f74327814db1d6f5b7884974c80ae733ed2a75d28bc1f259c8cab1f2a5dac01f5872910d4b73186bb19fda407673f8aa0be69b22ec369fea6299f2bfc3b14a18107609d63711443e0437dd7a4dc95ce31f67cb3a4a8213300a596fa892adcaf452e414a530d001d49f85b78cc6787f8a4a6a85f300f764f4ca89b559bfb2d4cd69399be33eea7df7b55e8029784c94d435c48dea861e14638fd75a6d3370ef329b602f9ff29aee5c908ac7311be5894a47e06158461369e1af5ad37c7c21666f3d62d9bcfef2523b40d", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018310000050000000000000000000000183700000200"/96], &(0x7f00000008c0)='GPL\x00', 0x51a, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x6, r1, 0x8, &(0x7f0000000900)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000940)={0x5, 0xc, 0x7, 0x7}, 0x10, 0x0, r0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x40001) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2d, 'memory'}, {0x2b, 'blkio'}, {0x2d, 'cpu'}]}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000001cb07d23bb6e9918d239696da8e2b3a903e390dcb20184ece9832a388cbc20ce76670103ff8a8cd54a09f7019f08c5442262cb82ce90bac1e79442a4a6c48c8683bc0b984aecccc5f3f8f5ca75ca5ab9fad19ac3a43071d60f0922960db832bc2fdb1ad9412b20835d0c11c15b9b9d8a5609e8920cd950f48678191c3f2be40a222b40038d0c3c6e0bbaf32b6d0a6fc3c0bcf4a8848e0e836fe0ea4e1b59ec61857501d7b9e45cb5c52f6512643aacbbd4a6ee7ece44401e558c2d60eadec9fb1d598063bbd631c3fd908928", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000e49400000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x14, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1.534027416s ago: executing program 4 (id=1213): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x40, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110c230000) (async) ioctl$TUNSETOFFLOAD(r0, 0x40047451, 0xf0ff1f00000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000010c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 32) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) (rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001300)=ANY=[@ANYBLOB="3e2f9769ab199c4202000000bdfdd6153ab5e836570ad3671c7ac8cbb05574fbc50c53c90f04cb831a553dcca75e71ab9fc5278c83c40ca39b515328c54261225501000000ad5bd872aa18bf350f9c3f5b8cfed5234054a783fe0f9f28c8a603049dd25c52f940bcff30334b3624098642e2fc5411fea6ea70b204db4b65542039eea16e48763590bb6d7fe29b47dc116f00"/158, @ANYBLOB="2f9d65b473df58f55fbc4071f4dcb0db06e106416d3589827c0c81b4f290951efec3e17f9bba0efbad57100fb313fafc4125a6eeae6eb15bc9c6d33b76b4bb2219466e6bff32344008a44281152cd506a2e171685ce78623ed4e861c684225ff22195d705596057743a046b8df3e83f4ba", @ANYRESDEC=r2, @ANYRESHEX=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 32) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x114000, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r6}, 0x10) (async, rerun: 32) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r7}, 0x10) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 1.241869551s ago: executing program 3 (id=1214): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffd}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0x5, 0xeb, &(0x7f00000002c0)="0394418d94", &(0x7f0000000300)=""/235, 0x7, 0x0, 0x0, 0xa9, &(0x7f0000000400), &(0x7f0000000540)="2daee1d4e77447aea803bb4f1801eb331ea85dd8b780c4a286917f887f7bdf036653b758cc4519cb3ec1f6d548767075df1ac0d7ffc63ebfb051ec9f9f5ae9bc14f1aaba2ab4f2637e9f994a2f759647b90bcc1a22582e470e86565e2e61b7fa88e07b3fd4322e05b6ae0d70d6c56e0a65c4ca32ae32b5cef5cdf8f537655e830a3d5459f51c6f58d995c90bd3cd81520ed1e60320eb0eb0e109ca8752f2fa79d94cec83a6803bc8bb", 0x4, 0x0, 0x5}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x17, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x2}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x690541, 0x0) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000080)) 1.239534841s ago: executing program 4 (id=1215): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd"], 0xfdef) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='kmem_cache_free\x00', r1}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'nr0\x00', 0x6132}) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfe3a) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f00000004c0)='memory.stat\x00', 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000500)={'nr0\x00'}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r3, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x4a, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f0000000300), 0x8, 0x55, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000600)={r6}, 0x4) 1.137935743s ago: executing program 4 (id=1216): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x20702, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x18, 0x5, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x0, 0x1}, @ldst={0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffe0}]}, &(0x7f0000000100)='GPL\x00', 0x4, 0xc4, &(0x7f00000002c0)=""/196, 0x0, 0x0, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) close(r0) 1.045303224s ago: executing program 0 (id=1217): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYRES32, @ANYBLOB="0000000000000000000002000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0xc, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xc2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @exit], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="0600000004000000001000000700000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000f6a4dc16d1fd01caf51c479769f0804a438a95ffbfa3ddd45288fbdcb33ace073fba3d4625bd71f71ca2b104204f38754c4a163e767e7c9ce093c00254ae0ef372a13f849c0fbeb0996db6df1c653856dbfe344f6347d313b0ead594460610", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000400000080000058080000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) recvmsg$unix(r0, &(0x7f0000000240)={&(0x7f0000000940), 0x6e, &(0x7f0000001040)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000e80)=""/72, 0x48}, {&(0x7f0000000f00)=""/113, 0x71}, {&(0x7f0000000f80)=""/191, 0xbf}], 0x6, &(0x7f0000000300)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x140) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000b40)}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r4, @ANYRES16=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x2000000, 0x11, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(r3, 0xb701, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0xf, &(0x7f0000000840)=ANY=[@ANYBLOB="05803000010000001800000007000000000000000100000018620000090000000000"], 0x0, 0x8, 0xb9, &(0x7f00000004c0)=""/185, 0x41000, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x0, 0x6, 0x0, 0x9062d06}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={r6, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000900)=[0x0], 0x0, 0xe2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), 0x8, 0x75, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETVNETHDRSZ(r7, 0x400454d8, &(0x7f0000000180)=0x8) 973.843055ms ago: executing program 3 (id=1218): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1, 0x0, 0x0, @void, @value}, 0x20) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="180013000000000000b8aa49eb04716910000000", @ANYRES32, @ANYBLOB="000000000000000095000000000000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x0, 0xed00}, 0xfdeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{0x1}, &(0x7f00000001c0), &(0x7f0000000200)=r1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x200, 0x300000, 0xffffffc0, 0x2200, 0xffffffffffffffff, 0x3732, '\x00', 0x0, r0, 0x2, 0x2, 0x3, 0xc, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r1, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa, &(0x7f0000000740)=[0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd0, &(0x7f00000007c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0xa1, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000"], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000003c0)='fib6_table_lookup\x00'}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x79}}, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r6}, 0x10) 956.885045ms ago: executing program 2 (id=1219): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x5460, 0x20000000) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xa3500, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000500000018110000", @ANYRES32=r2, @ANYBLOB="0000009600000000b7083200000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b7040000000000008500000033000000950000000000000072d9caa86e7085afbd3e58bf5587733dd21e68587a7c3eda67c950a0397db4369f92a8e03bb27470e430b64541f4a4f248c2d7249f357237ef1b6dad4ca04d654c232599e483e217e441"], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r3}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000860629c98500000015000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x9) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000029c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0x2d1, 0xfffffffffffffd85, &(0x7f00000000c0)="b9ff0303000d698cb89e40f008006000000e00001100630277", 0x0, 0x100, 0x2000000, 0x0, 0x0, &(0x7f0000000440)}, 0x28) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r9}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 720.841049ms ago: executing program 3 (id=1220): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000f00000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000400)=ANY=[@ANYRES64], &(0x7f0000000200)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x1, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)=0x1, 0x12) 653.79516ms ago: executing program 0 (id=1221): bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB="00000011000000000000010000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2b, 'net'}, {0x2b, 'net'}]}, 0xa) r2 = openat$cgroup_int(r1, &(0x7f00000004c0)='hugetlb.2MB.rsvd.limit_in_bytes\x00', 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) mkdir(0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, r1, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x8000, 0x0, 0xffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x80000000, 0x9, 0x1, 0x40028, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x8000002, 0x2, 0x6, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000900000001000000000018110040", @ANYRES32=r4, @ANYRES32=r2, @ANYRES16=0x0], &(0x7f0000000180)='GPL\x00', 0xf, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r5}, 0x57) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa06"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xd, 0x4, &(0x7f0000001340)=ANY=[@ANYBLOB="180000000000000000000000000000006112340000000000950000000000000039ff66a8d35b9a8db8662385249d0e49954967c507d58613b9cc81cf32a20736c39c4ec489febab6f4eebbb6a520f2b2b1ddd2c2b104b77f795899e4aa4ef67ae7ac3e9f008b21b487f6cdeaacfc21d8e0621793d01d6df377589b0a70b271c1"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xb, &(0x7f0000000400)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x1f, 0x0, 0xc, 0xc, 0x2, [@fwd={0x5}]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1c2b850a7d531f02, 0x23, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000000d40)={0x0, 0x7000000, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000012003007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000007000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f9001cffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r10, 0x3, 0xe, 0x0, &(0x7f0000000500)="0000001afa3cb651ce2f2f009ec3", 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)=@o_path={&(0x7f0000000440)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@map=r11, 0x15, 0x1, 0xfffff000, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0]}, 0x40) close(r6) 651.01381ms ago: executing program 4 (id=1222): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffff21b701"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@map=r0, 0x20, 0x1, 0x80000000, &(0x7f0000000000)=[0x0], 0x1, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0]}, 0x40) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) syz_clone(0x2000, 0x0, 0x0, 0x0, 0x0, 0x0) 572.433671ms ago: executing program 4 (id=1223): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="68acc01640dbd4548b5ae8b9d1c7123b95d1a03cd9507c8193641c4ee971deafeb885e2760181cc87adaeca3ba3d8971dee3cff4499f5da4ebf1cef15a4bb444196441a1f0f4f4eb00eb4c819bd583fc0d5d2a5e44ee23d5845baedc02", @ANYRESHEX=0x0, @ANYBLOB="2cf179abd5f4d80f93bd2b577e8764bc4e9de2c71f062ce8a05430efd9cceeab068398a0c6233274ebed30f792b89e145a4ae76a70b30de7fba8b1548158351123b5a11fdcefabf9dd1d5d56a4a1dd61bb3d", @ANYBLOB="79a676c90d1f4f5d688615e5c991383adc8f09a4", @ANYRES32=r0, @ANYRESDEC], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='sched_switch\x00', r1, 0x0, 0xd6a9}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0xfffffdb9, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000001080)={0x0, 0x80, 0xf6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffff00, 0x2}, 0x1882a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) socketpair(0x1, 0x5, 0x54, &(0x7f0000000440)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x4, 0x5}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xd, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f008", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_subtree(r6, &(0x7f0000000100)=ANY=[], 0x30) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000080)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300bc08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0081000000000000000020000000000000000000000000f200000000"], 0x48) 506.720502ms ago: executing program 3 (id=1224): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_clone(0x0, &(0x7f0000000040)="5989dc80ec04e184eebedb0154ee8a28ba8b26aae202feda50a2e7ca9004c750e72131ca91bdea10a30df186fb838a6bd1f0c95052468542b80a6071660c57dddf9539011e70bbadd29612a5dea2a9193ab43cdd76529b5279edbc3412896f64829d5e57d48f18cd112cce70f427b5ccc7f58c6789d6cb52809b8328a64d5a18cb986483a39c37f3c3a4183d1c6b3a47097f09b59a16c69eae4ad3fa8d91e6800c624e895ff3a4b08274c3a688f89f4bd589c1d9b65eea369edcd1d446", 0xbd, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="9ab28762f300fdf888c3fc2b7abe7f7fcfbbd5778e6c3036b9ff032323d41a6f2fc00afeaa09b19d728d58bbaad955b617c0b27ab2bba8700df96ca0ded501977aec4f482da684d7a3bcac6e42d4a49aeefd2f4109273ba3d08525eb11cdccd85b6906dae58f5a68e6b3c41ec33cc249602a4aa03a9519a5096d7f17a4dcd22d") r2 = syz_open_procfs$namespace(r1, &(0x7f0000000200)='ns/time_for_children\x00') r3 = perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x20000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x80, 0x1}, 0x400, 0x17, 0x6, 0x9, 0x6, 0x1c5a5e15, 0x800, 0x0, 0x5, 0x0, 0xfff}, r0, 0x8, 0xffffffffffffffff, 0xd) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x2) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x15, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @call={0x85, 0x0, 0x0, 0xbd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000003c0)='GPL\x00', 0x101, 0x0, 0x0, 0x40f00, 0x16, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x1, 0x2, 0x200, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, r2, 0x1, 0x1, 0x1, 0xffffffffffffffff], 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='svcrdma_decode_rseg\x00', r4, 0x0, 0x8001}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='mm_page_pcpu_drain\x00', r4, 0x0, 0xcf8}, 0x18) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup/syz0\x00', 0x200002, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.net/syz0\x00', 0x200002, 0x0) socketpair(0x11, 0x802, 0x5, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r4, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000006c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0], 0x0, 0x81, &(0x7f0000000780)=[{}, {}], 0x10, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x33, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) recvmsg(r7, &(0x7f0000001fc0)={&(0x7f00000009c0)=@nfc, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/176, 0xb0}, {&(0x7f0000001b00)=""/34, 0x22}, {&(0x7f0000001b40)=""/254, 0xfe}, {&(0x7f0000001c40)=""/211, 0xd3}, {&(0x7f0000001d40)=""/76, 0x4c}, {&(0x7f0000001dc0)=""/84, 0x54}, {&(0x7f0000001e40)=""/88, 0x58}], 0x8, &(0x7f0000001f40)=""/78, 0x4e}, 0x40010060) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000020c0)={&(0x7f0000002000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@typedef={0x0, 0x0, 0x0, 0x8, 0x2}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x10, 0x0, 0x3e}]}, {0x0, [0x61, 0x0, 0x5f]}}, &(0x7f0000002040)=""/107, 0x39, 0x6b, 0x1, 0x5, 0x10000, @value}, 0x28) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000002100)=@bloom_filter={0x1e, 0xb7, 0xffffffff, 0x9, 0x2, r5, 0x14, '\x00', r8, r10, 0x0, 0x5, 0x1, 0x7, @void, @value, @void, @value}, 0x50) r12 = openat$cgroup_subtree(r6, &(0x7f0000002180), 0x2, 0x0) close(r12) socketpair(0x6, 0x800, 0x0, &(0x7f00000021c0)) perf_event_open(&(0x7f0000002240)={0x6, 0x80, 0xf, 0x4b, 0x0, 0xaf, 0x0, 0x5, 0x4840, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000002200), 0x1}, 0x0, 0x7, 0x9, 0x7, 0x1, 0x59, 0x1, 0x0, 0x3, 0x0, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000022c0), 0x2, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000002300)={0x9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000024c0)={0xf, 0x2, &(0x7f0000002340)=@raw=[@map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa}], &(0x7f0000002380)='GPL\x00', 0x9, 0x34, &(0x7f00000023c0)=""/52, 0x40f00, 0x0, '\x00', r8, @fallback=0x38, r10, 0x8, &(0x7f0000002400)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000002440)={0x5, 0x0, 0x8, 0x6}, 0x10, 0x0, r4, 0x1, 0x0, &(0x7f0000002480)=[{0x4, 0x3, 0x0, 0x9}], 0x10, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000002580)) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000025c0)={0x2, 0x4, 0x8, 0x1, 0x80, r11, 0xf0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x4, 0x0, @void, @value, @void, @value}, 0x50) r14 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002940)=@o_path={&(0x7f0000002900)='./file0\x00', 0x0, 0x4000, r12}, 0x18) r15 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002a00)={0x6, 0x1d, &(0x7f0000002640)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@btf_id={0x18, 0xb, 0x3, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x400}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}}}, &(0x7f0000002740)='GPL\x00', 0x9, 0xe4, &(0x7f0000002780)=""/228, 0x1f00, 0x40, '\x00', r8, 0x25, r10, 0x8, &(0x7f0000002880)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000028c0)={0x1, 0x6, 0x8, 0x8}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002980)=[r11, r13, r13, r5, r13, r13, r14, 0x1], &(0x7f00000029c0)=[{0x4, 0x5, 0x4, 0x6}, {0x2, 0x1, 0x10, 0xc}, {0x2, 0x3, 0x3, 0x9}, {0x4, 0x2, 0x8, 0x5}], 0x10, 0x4, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000003bc0)={0x17, 0x0, 0xfffffffffffffffe, &(0x7f0000002ac0)='syzkaller\x00', 0xf, 0x1000, &(0x7f0000002b00)=""/4096, 0x40f00, 0x30, '\x00', r8, @cgroup_sysctl, r10, 0x8, &(0x7f0000003b00)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000003b40)={0x5, 0x9, 0x2, 0xfffffffa}, 0x10, r9, r15, 0x0, &(0x7f0000003b80)=[r6, r13, r13], 0x0, 0x10, 0x4, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003c80)) openat$cgroup_ro(r3, &(0x7f0000003cc0)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000003d00), 0x24800, 0x0) 375.418674ms ago: executing program 2 (id=1225): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async, rerun: 64) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x6f, 0x6f]}}, 0x0, 0x1d, 0x0, 0x0, 0x4, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f5a8e1b656b738700000000000000000be3f5f625aa0b543e76651896133fd79cb3476b749d09b0b3c26f4001a94357eea945ea75c2d63c1a3759dc0093291aa89", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='signal_generate\x00', r3}, 0x10) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000005c0)='signal_generate\x00', r4}, 0x10) 374.462504ms ago: executing program 0 (id=1226): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000008040000cd00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xaf) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = getpid() perf_event_open(&(0x7f0000000640)={0x0, 0x80, 0x9, 0x6c, 0x5, 0x8, 0x0, 0x7, 0x2780, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1df, 0x2, @perf_config_ext={0x4, 0x100}, 0x84, 0x10000000000000, 0x9, 0x2, 0xffffffffffffd4ec, 0x2, 0x2, 0x0, 0x1a, 0x0, 0x100000001}, r4, 0x3, r2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r6 = syz_clone(0x1128100, &(0x7f0000000540)="0f64a3da61d7a07332bdf6cb4bcfe4c293596acca0d82219b500cc2d8daba3f4356112e278abd7f758e57443f6230217a008dccf7108eb49edc974861f951160b515cfc2139964986d2748bc4a3406cc5e42008c1797766738e407f0d6c91f19d2fb0401ce8d6dec23941f049337de170b6cb5de6567a723bd202ee3eff2fe0aac4884f7c2088e745c2a4b5154b62447d46ed5522770d8632fb4a0fecb7fce1d4158379d14eca4468d2008865fad6e64d24b1273981826edb296fcfbce597ae4d11e81d893fddd105256f13292", 0xcd, &(0x7f00000002c0), &(0x7f0000000380), &(0x7f00000003c0)="ea8089d94da4808fcc2d2f644a5c16bddb5390d42652434d4eb3555726c3047b938581c8757211f28e641c7bc67ffac9998e8cb2ae8ce5b6ff35a8e165b964a768d3ce0a62178737a3b1d9cf77f5ddc6bfe484705ebee8598f7cea549d72e1b863165e5830e52f0546f3e96d344d") bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r9}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r7}, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) syz_open_procfs$namespace(r6, &(0x7f0000000480)='ns/net\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r5, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000000)="b9ff0300600d698dff062cf008004de7f9c7643600000002007af5f3da11ee93aa1a014409a65ca947348c5352c0c05cb77a502055b8874590de801045d4d4d34aa2", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 372.122654ms ago: executing program 3 (id=1227): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000280)={0x6, &(0x7f0000000180)=[{0x8, 0x10, 0x7, 0x1}, {0xfffa, 0xc4, 0x0, 0x984a}, {0x4, 0x2, 0x9, 0x3}, {0x6, 0xc, 0x6, 0x5}, {0x4, 0x5, 0x0, 0x8}, {0x801, 0x4, 0x2, 0x3}]}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x10, &(0x7f00000003c0)=@framed={{0x18, 0x5, 0x0, 0x0, 0xfffffffd}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x35, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c40)={{r4}, &(0x7f0000000bc0), &(0x7f0000000c00)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) socketpair(0x28, 0x2, 0x0, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x8, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x45e, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) recvmsg(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000500)=""/92, 0x5c}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r10 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r11}, 0x10) write$cgroup_subtree(r10, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000a00000061121008000000001000000020000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 370.268624ms ago: executing program 2 (id=1228): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='blkio.bfq.time_recursive\x00', 0x26e1, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000ad98585da454320316acc1e8649ac9a09668c9ba6c47ed2bf7aec87af226da32e6a19a16cf2098d4ad05d2c38e21d86b1a977c3b69ecac3f8d01e3b6a296d29cb96f0a49a2f0d2a6486e6d2674b7838847be0920320000b76a6043b4c4acb8bf1ce99d4b2273121fef63897d21e8d4c23831518b041c3a3e3756dc832db246460a524632a5b74125681d71d3fdec7d1a849ca981fd8829b7029d1bb1a9ca6cc0aad2cccc9f85592a26b61711c38c52a862052e3f8515fa0df015b0f6abb45711e49e58ab7a718a9d36ea65474ca3abe12d2401ab659832be7a825c44f36dfc8e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) close(r3) (async, rerun: 64) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c"], 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) (async) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(r0, &(0x7f0000000300)=ANY=[], 0xfdef) (async, rerun: 32) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='..\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000000)) (async) write$cgroup_pid(r8, &(0x7f0000000980), 0x20000992) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f00000021c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0xfffffffffffffeb7, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, r7, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040)={0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r9, 0x0, 0xe, 0x0, &(0x7f0000000300)="14fd54ab72df97e6256c00000000", 0x0, 0xfeff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x5, &(0x7f0000000bc0)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 902.11µs ago: executing program 3 (id=1229): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) (async) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="1802000002000000000000000000000085000000870000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b0000009500000000000000150511203fb0882e4d2daf4d63c71dd50a282e707847831514b53142a30e4ed5c31d601563438e1c516544fc658f1244f1567b811985d944c76ca91fea9db4ea826b053069a291b3f309e74aba82192ea57289673ca6453a02ea143410c30a3236daf9a64df983b280d79f3d32a937764789ae7c14901a8b390f816d39ab47983ac9e5437639f1"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x88) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x31, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x449}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed85"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r3, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 0s ago: executing program 1 (id=929): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xde) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000001c0)='cpu&\"0\t&&') r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) r7 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.max\x00', 0x2, 0x0) socketpair(0x3, 0x6, 0x9, &(0x7f0000001a00)) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1a003}) ioctl$TUNSETLINK(r8, 0x400454cd, 0x6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @link_local}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @dev}) write$cgroup_int(r7, &(0x7f00000001c0)=0x6, 0x12) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x10, 0x11, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x6e59, 0x1000, &(0x7f0000000a00)=""/4096, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x2, 0x3, 0x607dfe5a, 0x4}, 0x10, 0x0, r1, 0x3, &(0x7f0000000380)=[r0, r0, r0, r0, r0], &(0x7f00000003c0)=[{0x0, 0x1, 0xb, 0x2}, {0x1, 0x2, 0x9}, {0x3, 0x3, 0x8, 0x7}], 0x10, 0xffff, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex, 0xe, 0x1, 0x9, &(0x7f0000000400)=[0x0], 0x1, 0x0, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000740)={@cgroup, r11, 0x5, 0x43, r5, @void, @value=r6, @void, @void, r12}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) kernel console output (not intermixed with test programs): T3193] dump_stack+0x15/0x20 [ 106.844723][ T3193] should_fail+0x3c6/0x510 [ 106.848978][ T3193] should_fail_alloc_page+0x5a/0x80 [ 106.854009][ T3193] prepare_alloc_pages+0x15c/0x700 [ 106.858953][ T3193] ? __alloc_pages+0x8f0/0x8f0 [ 106.863555][ T3193] ? __alloc_pages_bulk+0xd80/0xd80 [ 106.868592][ T3193] __alloc_pages+0x18c/0x8f0 [ 106.873015][ T3193] ? prep_new_page+0x110/0x110 [ 106.877617][ T3193] ? __mod_node_page_state+0xac/0xf0 [ 106.882737][ T3193] pte_alloc_one+0x73/0x1b0 [ 106.887076][ T3193] ? pfn_modify_allowed+0x2f0/0x2f0 [ 106.892114][ T3193] __pte_alloc+0x86/0x350 [ 106.896275][ T3193] ? free_pgtables+0x280/0x280 [ 106.900874][ T3193] ? _raw_spin_lock+0xa4/0x1b0 [ 106.905477][ T3193] ? __kasan_check_write+0x14/0x20 [ 106.910426][ T3193] copy_page_range+0x2743/0x2e20 [ 106.915193][ T3193] ? __kasan_slab_alloc+0xb1/0xe0 [ 106.920078][ T3193] ? pfn_valid+0x1e0/0x1e0 [ 106.924308][ T3193] ? rwsem_write_trylock+0x153/0x340 [ 106.929430][ T3193] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 106.935676][ T3193] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 106.941233][ T3193] ? __rb_insert_augmented+0x5de/0x610 [ 106.946532][ T3193] copy_mm+0xc7e/0x13e0 [ 106.950526][ T3193] ? copy_signal+0x610/0x610 [ 106.954946][ T3193] ? __init_rwsem+0xfe/0x1d0 [ 106.959374][ T3193] ? copy_signal+0x4e3/0x610 [ 106.963797][ T3193] copy_process+0x1149/0x3290 [ 106.968312][ T3193] ? __kasan_check_write+0x14/0x20 [ 106.973263][ T3193] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 106.978208][ T3193] ? vfs_write+0x94d/0x1110 [ 106.982549][ T3193] kernel_clone+0x21e/0x9e0 [ 106.986885][ T3193] ? __kasan_check_write+0x14/0x20 [ 106.991833][ T3193] ? create_io_thread+0x1e0/0x1e0 [ 106.996696][ T3193] __x64_sys_clone+0x23f/0x290 [ 107.001294][ T3193] ? __do_sys_vfork+0x130/0x130 [ 107.005982][ T3193] ? debug_smp_processor_id+0x17/0x20 [ 107.011185][ T3193] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 107.017091][ T3193] ? exit_to_user_mode_prepare+0x39/0xa0 [ 107.022556][ T3193] x64_sys_call+0x1b0/0x9a0 [ 107.026902][ T3193] do_syscall_64+0x3b/0xb0 [ 107.031156][ T3193] ? clear_bhb_loop+0x35/0x90 [ 107.035670][ T3193] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 107.041396][ T3193] RIP: 0033:0x7fd8cd8f1169 [ 107.045648][ T3193] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 107.065088][ T3193] RSP: 002b:00007fd8cbf5afe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 107.073348][ T3193] RAX: ffffffffffffffda RBX: 00007fd8cdb09fa0 RCX: 00007fd8cd8f1169 [ 107.081142][ T3193] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 107.088948][ T3193] RBP: 00007fd8cbf5b090 R08: 0000000000000000 R09: 0000000000000000 [ 107.096764][ T3193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 107.104579][ T3193] R13: 0000000000000000 R14: 00007fd8cdb09fa0 R15: 00007ffdb43fb398 [ 107.112399][ T3193] [ 107.647593][ T3244] device lo entered promiscuous mode [ 107.723062][ T3253] device sit0 left promiscuous mode [ 107.754459][ T3253] device sit0 entered promiscuous mode [ 107.755305][ T3251] FAULT_INJECTION: forcing a failure. [ 107.755305][ T3251] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 107.802439][ T3251] CPU: 0 PID: 3251 Comm: syz.4.831 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 107.812096][ T3251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 107.821985][ T3251] Call Trace: [ 107.825107][ T3251] [ 107.827888][ T3251] dump_stack_lvl+0x151/0x1c0 [ 107.832402][ T3251] ? io_uring_drop_tctx_refs+0x190/0x190 [ 107.837867][ T3251] ? __alloc_pages+0x27e/0x8f0 [ 107.842464][ T3251] dump_stack+0x15/0x20 [ 107.846455][ T3251] should_fail+0x3c6/0x510 [ 107.850709][ T3251] should_fail_alloc_page+0x5a/0x80 [ 107.855742][ T3251] prepare_alloc_pages+0x15c/0x700 [ 107.860779][ T3251] ? __alloc_pages_bulk+0xd80/0xd80 [ 107.865818][ T3251] __alloc_pages+0x18c/0x8f0 [ 107.870237][ T3251] ? prep_new_page+0x110/0x110 [ 107.874839][ T3251] ? stack_trace_save+0x1c0/0x1c0 [ 107.879698][ T3251] ? __kernel_text_address+0x9b/0x110 [ 107.884908][ T3251] pte_alloc_one+0x73/0x1b0 [ 107.889247][ T3251] ? pfn_modify_allowed+0x2f0/0x2f0 [ 107.894280][ T3251] __pte_alloc+0x86/0x350 [ 107.898444][ T3251] ? free_pgtables+0x280/0x280 [ 107.903047][ T3251] ? __stack_depot_save+0x34/0x470 [ 107.907991][ T3251] ? anon_vma_clone+0x9a/0x500 [ 107.912595][ T3251] copy_page_range+0x2743/0x2e20 [ 107.917363][ T3251] ? __kasan_slab_alloc+0xb1/0xe0 [ 107.922315][ T3251] ? x64_sys_call+0x1b0/0x9a0 [ 107.926823][ T3251] ? do_syscall_64+0x3b/0xb0 [ 107.931264][ T3251] ? pfn_valid+0x1e0/0x1e0 [ 107.935506][ T3251] ? rwsem_write_trylock+0x153/0x340 [ 107.940627][ T3251] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 107.946876][ T3251] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 107.952434][ T3251] ? __rb_insert_augmented+0x5de/0x610 [ 107.957726][ T3251] copy_mm+0xc7e/0x13e0 [ 107.961721][ T3251] ? copy_signal+0x610/0x610 [ 107.966143][ T3251] ? __init_rwsem+0xfe/0x1d0 [ 107.970568][ T3251] ? copy_signal+0x4e3/0x610 [ 107.974994][ T3251] copy_process+0x1149/0x3290 [ 107.979507][ T3251] ? __kasan_check_write+0x14/0x20 [ 107.984456][ T3251] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 107.989398][ T3251] ? vfs_write+0x94d/0x1110 [ 107.993744][ T3251] kernel_clone+0x21e/0x9e0 [ 107.998081][ T3251] ? __kasan_check_write+0x14/0x20 [ 108.003027][ T3251] ? create_io_thread+0x1e0/0x1e0 [ 108.007892][ T3251] __x64_sys_clone+0x23f/0x290 [ 108.012502][ T3251] ? __do_sys_vfork+0x130/0x130 [ 108.017182][ T3251] ? debug_smp_processor_id+0x17/0x20 [ 108.022382][ T3251] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 108.028290][ T3251] ? exit_to_user_mode_prepare+0x39/0xa0 [ 108.033839][ T3251] x64_sys_call+0x1b0/0x9a0 [ 108.038178][ T3251] do_syscall_64+0x3b/0xb0 [ 108.042429][ T3251] ? clear_bhb_loop+0x35/0x90 [ 108.046942][ T3251] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 108.052670][ T3251] RIP: 0033:0x7f088b222169 [ 108.056931][ T3251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 108.076370][ T3251] RSP: 002b:00007f088988bfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 108.084608][ T3251] RAX: ffffffffffffffda RBX: 00007f088b43afa0 RCX: 00007f088b222169 [ 108.092421][ T3251] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 108.100233][ T3251] RBP: 00007f088988c090 R08: 0000000000000000 R09: 0000000000000000 [ 108.108047][ T3251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 108.115853][ T3251] R13: 0000000000000000 R14: 00007f088b43afa0 R15: 00007ffcdf4d2218 [ 108.123686][ T3251] [ 108.290639][ T3259] device syzkaller0 entered promiscuous mode [ 109.626714][ T3273] device syzkaller0 entered promiscuous mode [ 110.181810][ T3290] device wg2 entered promiscuous mode [ 110.359022][ T3295] FAULT_INJECTION: forcing a failure. [ 110.359022][ T3295] name failslab, interval 1, probability 0, space 0, times 0 [ 110.466668][ T3295] CPU: 0 PID: 3295 Comm: syz.3.847 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 110.476337][ T3295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 110.486233][ T3295] Call Trace: [ 110.489352][ T3295] [ 110.492130][ T3295] dump_stack_lvl+0x151/0x1c0 [ 110.496651][ T3295] ? io_uring_drop_tctx_refs+0x190/0x190 [ 110.502115][ T3295] dump_stack+0x15/0x20 [ 110.506105][ T3295] should_fail+0x3c6/0x510 [ 110.510360][ T3295] __should_failslab+0xa4/0xe0 [ 110.515155][ T3295] ? vm_area_dup+0x26/0x230 [ 110.519495][ T3295] should_failslab+0x9/0x20 [ 110.523832][ T3295] slab_pre_alloc_hook+0x37/0xd0 [ 110.528610][ T3295] ? vm_area_dup+0x26/0x230 [ 110.532945][ T3295] kmem_cache_alloc+0x44/0x250 [ 110.537551][ T3295] vm_area_dup+0x26/0x230 [ 110.541714][ T3295] copy_mm+0x9a1/0x13e0 [ 110.545718][ T3295] ? copy_signal+0x610/0x610 [ 110.550132][ T3295] ? __init_rwsem+0xfe/0x1d0 [ 110.554560][ T3295] ? copy_signal+0x4e3/0x610 [ 110.558986][ T3295] copy_process+0x1149/0x3290 [ 110.563512][ T3295] ? __kasan_check_write+0x14/0x20 [ 110.568448][ T3295] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 110.573403][ T3295] ? migrate_enable+0x1c1/0x2a0 [ 110.578082][ T3295] kernel_clone+0x21e/0x9e0 [ 110.582424][ T3295] ? create_io_thread+0x1e0/0x1e0 [ 110.587277][ T3295] ? trace_call_bpf+0x3f8/0x470 [ 110.591975][ T3295] __x64_sys_clone+0x23f/0x290 [ 110.596582][ T3295] ? __do_sys_vfork+0x130/0x130 [ 110.601261][ T3295] ? perf_trace_sys_enter+0x129/0x140 [ 110.606466][ T3295] x64_sys_call+0x1b0/0x9a0 [ 110.610802][ T3295] do_syscall_64+0x3b/0xb0 [ 110.615048][ T3295] ? clear_bhb_loop+0x35/0x90 [ 110.619567][ T3295] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 110.625289][ T3295] RIP: 0033:0x7f8ef8b7c169 [ 110.629545][ T3295] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.648990][ T3295] RSP: 002b:00007f8ef71e5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 110.657235][ T3295] RAX: ffffffffffffffda RBX: 00007f8ef8d94fa0 RCX: 00007f8ef8b7c169 [ 110.665042][ T3295] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 110.672851][ T3295] RBP: 00007f8ef71e6090 R08: 0000000000000000 R09: 0000000000000000 [ 110.680681][ T3295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 110.688478][ T3295] R13: 0000000000000000 R14: 00007f8ef8d94fa0 R15: 00007ffea26c1728 [ 110.696405][ T3295] [ 112.038534][ T3319] device pim6reg1 entered promiscuous mode [ 112.322257][ T3342] FAULT_INJECTION: forcing a failure. [ 112.322257][ T3342] name failslab, interval 1, probability 0, space 0, times 0 [ 112.382456][ T3342] CPU: 1 PID: 3342 Comm: syz.1.860 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 112.392100][ T3342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 112.402512][ T3342] Call Trace: [ 112.405636][ T3342] [ 112.408514][ T3342] dump_stack_lvl+0x151/0x1c0 [ 112.413018][ T3342] ? io_uring_drop_tctx_refs+0x190/0x190 [ 112.418484][ T3342] dump_stack+0x15/0x20 [ 112.422473][ T3342] should_fail+0x3c6/0x510 [ 112.426742][ T3342] __should_failslab+0xa4/0xe0 [ 112.431325][ T3342] ? vm_area_dup+0x26/0x230 [ 112.435668][ T3342] should_failslab+0x9/0x20 [ 112.440010][ T3342] slab_pre_alloc_hook+0x37/0xd0 [ 112.444782][ T3342] ? vm_area_dup+0x26/0x230 [ 112.449117][ T3342] kmem_cache_alloc+0x44/0x250 [ 112.453722][ T3342] vm_area_dup+0x26/0x230 [ 112.457885][ T3342] copy_mm+0x9a1/0x13e0 [ 112.461881][ T3342] ? copy_signal+0x610/0x610 [ 112.466303][ T3342] ? __init_rwsem+0xfe/0x1d0 [ 112.470729][ T3342] ? copy_signal+0x4e3/0x610 [ 112.475156][ T3342] copy_process+0x1149/0x3290 [ 112.479671][ T3342] ? __kasan_check_write+0x14/0x20 [ 112.484623][ T3342] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 112.489563][ T3342] ? vfs_write+0x94d/0x1110 [ 112.493908][ T3342] kernel_clone+0x21e/0x9e0 [ 112.498243][ T3342] ? __kasan_check_write+0x14/0x20 [ 112.503189][ T3342] ? create_io_thread+0x1e0/0x1e0 [ 112.508056][ T3342] __x64_sys_clone+0x23f/0x290 [ 112.512652][ T3342] ? __do_sys_vfork+0x130/0x130 [ 112.517341][ T3342] ? debug_smp_processor_id+0x17/0x20 [ 112.522542][ T3342] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 112.528456][ T3342] ? exit_to_user_mode_prepare+0x39/0xa0 [ 112.533913][ T3342] x64_sys_call+0x1b0/0x9a0 [ 112.538253][ T3342] do_syscall_64+0x3b/0xb0 [ 112.542504][ T3342] ? clear_bhb_loop+0x35/0x90 [ 112.547050][ T3342] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 112.552833][ T3342] RIP: 0033:0x7fd8cd8f1169 [ 112.557087][ T3342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 112.576530][ T3342] RSP: 002b:00007fd8cbf5afe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 112.584775][ T3342] RAX: ffffffffffffffda RBX: 00007fd8cdb09fa0 RCX: 00007fd8cd8f1169 [ 112.592583][ T3342] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 112.600395][ T3342] RBP: 00007fd8cbf5b090 R08: 0000000000000000 R09: 0000000000000000 [ 112.608204][ T3342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 112.616017][ T3342] R13: 0000000000000000 R14: 00007fd8cdb09fa0 R15: 00007ffdb43fb398 [ 112.623835][ T3342] [ 112.919106][ T3366] device syzkaller0 entered promiscuous mode [ 113.645184][ T3392] FAULT_INJECTION: forcing a failure. [ 113.645184][ T3392] name failslab, interval 1, probability 0, space 0, times 0 [ 113.687807][ T3392] CPU: 1 PID: 3392 Comm: syz.4.873 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 113.697457][ T3392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 113.707359][ T3392] Call Trace: [ 113.710475][ T3392] [ 113.713250][ T3392] dump_stack_lvl+0x151/0x1c0 [ 113.717764][ T3392] ? io_uring_drop_tctx_refs+0x190/0x190 [ 113.723234][ T3392] dump_stack+0x15/0x20 [ 113.727222][ T3392] should_fail+0x3c6/0x510 [ 113.731486][ T3392] __should_failslab+0xa4/0xe0 [ 113.736077][ T3392] ? anon_vma_clone+0x9a/0x500 [ 113.740766][ T3392] should_failslab+0x9/0x20 [ 113.745100][ T3392] slab_pre_alloc_hook+0x37/0xd0 [ 113.749880][ T3392] ? anon_vma_clone+0x9a/0x500 [ 113.754476][ T3392] kmem_cache_alloc+0x44/0x250 [ 113.759076][ T3392] anon_vma_clone+0x9a/0x500 [ 113.763505][ T3392] anon_vma_fork+0x91/0x4e0 [ 113.767842][ T3392] ? anon_vma_name+0x43/0x70 [ 113.772268][ T3392] ? vm_area_dup+0x17a/0x230 [ 113.776694][ T3392] copy_mm+0xa3a/0x13e0 [ 113.780693][ T3392] ? copy_signal+0x610/0x610 [ 113.785112][ T3392] ? __init_rwsem+0xfe/0x1d0 [ 113.789536][ T3392] ? copy_signal+0x4e3/0x610 [ 113.793964][ T3392] copy_process+0x1149/0x3290 [ 113.798482][ T3392] ? __kasan_check_write+0x14/0x20 [ 113.803432][ T3392] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 113.808375][ T3392] ? vfs_write+0x94d/0x1110 [ 113.812714][ T3392] kernel_clone+0x21e/0x9e0 [ 113.817052][ T3392] ? __kasan_check_write+0x14/0x20 [ 113.822001][ T3392] ? create_io_thread+0x1e0/0x1e0 [ 113.826862][ T3392] __x64_sys_clone+0x23f/0x290 [ 113.831464][ T3392] ? __do_sys_vfork+0x130/0x130 [ 113.836238][ T3392] ? debug_smp_processor_id+0x17/0x20 [ 113.841439][ T3392] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 113.847343][ T3392] ? exit_to_user_mode_prepare+0x39/0xa0 [ 113.852815][ T3392] x64_sys_call+0x1b0/0x9a0 [ 113.857146][ T3392] do_syscall_64+0x3b/0xb0 [ 113.861403][ T3392] ? clear_bhb_loop+0x35/0x90 [ 113.865914][ T3392] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 113.871645][ T3392] RIP: 0033:0x7f088b222169 [ 113.875904][ T3392] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 113.895343][ T3392] RSP: 002b:00007f088988bfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 113.903583][ T3392] RAX: ffffffffffffffda RBX: 00007f088b43afa0 RCX: 00007f088b222169 [ 113.911393][ T3392] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 113.919205][ T3392] RBP: 00007f088988c090 R08: 0000000000000000 R09: 0000000000000000 [ 113.927128][ T3392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 113.934941][ T3392] R13: 0000000000000000 R14: 00007f088b43afa0 R15: 00007ffcdf4d2218 [ 113.942766][ T3392] [ 114.069423][ T3394] ip6_vti0: mtu greater than device maximum [ 117.068902][ T3435] FAULT_INJECTION: forcing a failure. [ 117.068902][ T3435] name failslab, interval 1, probability 0, space 0, times 0 [ 117.142875][ T3435] CPU: 0 PID: 3435 Comm: syz.1.886 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 117.152543][ T3435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 117.162421][ T3435] Call Trace: [ 117.165543][ T3435] [ 117.168325][ T3435] dump_stack_lvl+0x151/0x1c0 [ 117.172838][ T3435] ? io_uring_drop_tctx_refs+0x190/0x190 [ 117.178309][ T3435] dump_stack+0x15/0x20 [ 117.182297][ T3435] should_fail+0x3c6/0x510 [ 117.186555][ T3435] __should_failslab+0xa4/0xe0 [ 117.191149][ T3435] ? anon_vma_fork+0xf7/0x4e0 [ 117.195673][ T3435] should_failslab+0x9/0x20 [ 117.200003][ T3435] slab_pre_alloc_hook+0x37/0xd0 [ 117.204778][ T3435] ? anon_vma_fork+0xf7/0x4e0 [ 117.209394][ T3435] kmem_cache_alloc+0x44/0x250 [ 117.214003][ T3435] anon_vma_fork+0xf7/0x4e0 [ 117.218329][ T3435] ? anon_vma_name+0x43/0x70 [ 117.222759][ T3435] ? vm_area_dup+0x17a/0x230 [ 117.227188][ T3435] copy_mm+0xa3a/0x13e0 [ 117.231184][ T3435] ? copy_signal+0x610/0x610 [ 117.235602][ T3435] ? __init_rwsem+0xfe/0x1d0 [ 117.240024][ T3435] ? copy_signal+0x4e3/0x610 [ 117.244455][ T3435] copy_process+0x1149/0x3290 [ 117.248969][ T3435] ? __kasan_check_write+0x14/0x20 [ 117.253916][ T3435] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 117.258857][ T3435] ? vfs_write+0x94d/0x1110 [ 117.263202][ T3435] kernel_clone+0x21e/0x9e0 [ 117.267538][ T3435] ? __kasan_check_write+0x14/0x20 [ 117.272498][ T3435] ? create_io_thread+0x1e0/0x1e0 [ 117.277477][ T3435] __x64_sys_clone+0x23f/0x290 [ 117.282065][ T3435] ? __do_sys_vfork+0x130/0x130 [ 117.286845][ T3435] ? debug_smp_processor_id+0x17/0x20 [ 117.292050][ T3435] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 117.297951][ T3435] ? exit_to_user_mode_prepare+0x39/0xa0 [ 117.303418][ T3435] x64_sys_call+0x1b0/0x9a0 [ 117.307757][ T3435] do_syscall_64+0x3b/0xb0 [ 117.312009][ T3435] ? clear_bhb_loop+0x35/0x90 [ 117.316528][ T3435] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 117.322250][ T3435] RIP: 0033:0x7fd8cd8f1169 [ 117.326521][ T3435] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 117.346029][ T3435] RSP: 002b:00007fd8cbf5afe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 117.354274][ T3435] RAX: ffffffffffffffda RBX: 00007fd8cdb09fa0 RCX: 00007fd8cd8f1169 [ 117.362087][ T3435] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 117.369896][ T3435] RBP: 00007fd8cbf5b090 R08: 0000000000000000 R09: 0000000000000000 [ 117.377708][ T3435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 117.385519][ T3435] R13: 0000000000000000 R14: 00007fd8cdb09fa0 R15: 00007ffdb43fb398 [ 117.393339][ T3435] [ 117.563535][ T3440] device pim6reg1 entered promiscuous mode [ 118.118597][ T3482] FAULT_INJECTION: forcing a failure. [ 118.118597][ T3482] name failslab, interval 1, probability 0, space 0, times 0 [ 118.177600][ T3482] CPU: 1 PID: 3482 Comm: syz.1.899 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 118.187264][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 118.197155][ T3482] Call Trace: [ 118.200277][ T3482] [ 118.203057][ T3482] dump_stack_lvl+0x151/0x1c0 [ 118.207573][ T3482] ? io_uring_drop_tctx_refs+0x190/0x190 [ 118.213051][ T3482] dump_stack+0x15/0x20 [ 118.217155][ T3482] should_fail+0x3c6/0x510 [ 118.221409][ T3482] __should_failslab+0xa4/0xe0 [ 118.226012][ T3482] ? vm_area_dup+0x26/0x230 [ 118.230350][ T3482] should_failslab+0x9/0x20 [ 118.234796][ T3482] slab_pre_alloc_hook+0x37/0xd0 [ 118.239574][ T3482] ? vm_area_dup+0x26/0x230 [ 118.243899][ T3482] kmem_cache_alloc+0x44/0x250 [ 118.248510][ T3482] vm_area_dup+0x26/0x230 [ 118.252665][ T3482] copy_mm+0x9a1/0x13e0 [ 118.256661][ T3482] ? copy_signal+0x610/0x610 [ 118.261083][ T3482] ? __init_rwsem+0xfe/0x1d0 [ 118.265507][ T3482] ? copy_signal+0x4e3/0x610 [ 118.269937][ T3482] copy_process+0x1149/0x3290 [ 118.274448][ T3482] ? __kasan_check_write+0x14/0x20 [ 118.279401][ T3482] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 118.284343][ T3482] ? vfs_write+0x94d/0x1110 [ 118.288685][ T3482] kernel_clone+0x21e/0x9e0 [ 118.293019][ T3482] ? __kasan_check_write+0x14/0x20 [ 118.297971][ T3482] ? create_io_thread+0x1e0/0x1e0 [ 118.302843][ T3482] __x64_sys_clone+0x23f/0x290 [ 118.307429][ T3482] ? __do_sys_vfork+0x130/0x130 [ 118.312122][ T3482] ? debug_smp_processor_id+0x17/0x20 [ 118.317334][ T3482] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 118.323236][ T3482] ? exit_to_user_mode_prepare+0x39/0xa0 [ 118.328696][ T3482] x64_sys_call+0x1b0/0x9a0 [ 118.333033][ T3482] do_syscall_64+0x3b/0xb0 [ 118.338077][ T3482] ? clear_bhb_loop+0x35/0x90 [ 118.342582][ T3482] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 118.348310][ T3482] RIP: 0033:0x7fd8cd8f1169 [ 118.352562][ T3482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 118.372002][ T3482] RSP: 002b:00007fd8cbf5afe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 118.380244][ T3482] RAX: ffffffffffffffda RBX: 00007fd8cdb09fa0 RCX: 00007fd8cd8f1169 [ 118.388057][ T3482] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 118.395870][ T3482] RBP: 00007fd8cbf5b090 R08: 0000000000000000 R09: 0000000000000000 [ 118.403676][ T3482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 118.411494][ T3482] R13: 0000000000000000 R14: 00007fd8cdb09fa0 R15: 00007ffdb43fb398 [ 118.419308][ T3482] [ 119.590046][ T3531] FAULT_INJECTION: forcing a failure. [ 119.590046][ T3531] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 119.824249][ T3531] CPU: 1 PID: 3531 Comm: syz.3.912 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 119.833992][ T3531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 119.843876][ T3531] Call Trace: [ 119.847005][ T3531] [ 119.849781][ T3531] dump_stack_lvl+0x151/0x1c0 [ 119.854297][ T3531] ? io_uring_drop_tctx_refs+0x190/0x190 [ 119.859764][ T3531] ? unwind_get_return_address+0x4d/0x90 [ 119.865229][ T3531] ? arch_stack_walk+0xf3/0x140 [ 119.869919][ T3531] dump_stack+0x15/0x20 [ 119.873910][ T3531] should_fail+0x3c6/0x510 [ 119.878170][ T3531] should_fail_alloc_page+0x5a/0x80 [ 119.883199][ T3531] prepare_alloc_pages+0x15c/0x700 [ 119.888144][ T3531] ? stack_trace_snprint+0xf0/0xf0 [ 119.893097][ T3531] ? __alloc_pages_bulk+0xd80/0xd80 [ 119.898125][ T3531] ? copy_page_range+0x2b43/0x2e20 [ 119.903084][ T3531] __alloc_pages+0x18c/0x8f0 [ 119.907498][ T3531] ? prep_new_page+0x110/0x110 [ 119.912105][ T3531] new_slab+0x9a/0x4e0 [ 119.916006][ T3531] ___slab_alloc+0x39e/0x830 [ 119.920443][ T3531] ? vm_area_dup+0x26/0x230 [ 119.924772][ T3531] ? vm_area_dup+0x26/0x230 [ 119.929109][ T3531] __slab_alloc+0x4a/0x90 [ 119.933275][ T3531] ? vm_area_dup+0x26/0x230 [ 119.937614][ T3531] kmem_cache_alloc+0x139/0x250 [ 119.942302][ T3531] vm_area_dup+0x26/0x230 [ 119.946470][ T3531] copy_mm+0x9a1/0x13e0 [ 119.950468][ T3531] ? copy_signal+0x610/0x610 [ 119.954884][ T3531] ? __init_rwsem+0xfe/0x1d0 [ 119.959309][ T3531] ? copy_signal+0x4e3/0x610 [ 119.963743][ T3531] copy_process+0x1149/0x3290 [ 119.968260][ T3531] ? __kasan_check_write+0x14/0x20 [ 119.973206][ T3531] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 119.978142][ T3531] ? vfs_write+0x94d/0x1110 [ 119.982488][ T3531] kernel_clone+0x21e/0x9e0 [ 119.986829][ T3531] ? __kasan_check_write+0x14/0x20 [ 119.991773][ T3531] ? create_io_thread+0x1e0/0x1e0 [ 119.996639][ T3531] __x64_sys_clone+0x23f/0x290 [ 120.001233][ T3531] ? __do_sys_vfork+0x130/0x130 [ 120.005934][ T3531] ? debug_smp_processor_id+0x17/0x20 [ 120.011125][ T3531] ? perf_trace_sys_enter+0x30/0x140 [ 120.016377][ T3531] x64_sys_call+0x1b0/0x9a0 [ 120.020701][ T3531] do_syscall_64+0x3b/0xb0 [ 120.024954][ T3531] ? clear_bhb_loop+0x35/0x90 [ 120.029469][ T3531] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 120.035191][ T3531] RIP: 0033:0x7f8ef8b7c169 [ 120.039450][ T3531] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 120.058891][ T3531] RSP: 002b:00007f8ef71e5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 120.067133][ T3531] RAX: ffffffffffffffda RBX: 00007f8ef8d94fa0 RCX: 00007f8ef8b7c169 [ 120.074945][ T3531] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 120.082753][ T3531] RBP: 00007f8ef71e6090 R08: 0000000000000000 R09: 0000000000000000 [ 120.090573][ T3531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 120.098381][ T3531] R13: 0000000000000000 R14: 00007f8ef8d94fa0 R15: 00007ffea26c1728 [ 120.106199][ T3531] [ 120.135411][ T3534] Â: renamed from pim6reg1 [ 120.305389][ T3557] device pim6reg1 entered promiscuous mode [ 122.846603][ T3576] FAULT_INJECTION: forcing a failure. [ 122.846603][ T3576] name failslab, interval 1, probability 0, space 0, times 0 [ 122.862349][ T3576] CPU: 1 PID: 3576 Comm: syz.2.927 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 122.871998][ T3576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 122.881898][ T3576] Call Trace: [ 122.885096][ T3576] [ 122.887871][ T3576] dump_stack_lvl+0x151/0x1c0 [ 122.892386][ T3576] ? io_uring_drop_tctx_refs+0x190/0x190 [ 122.897858][ T3576] dump_stack+0x15/0x20 [ 122.901846][ T3576] should_fail+0x3c6/0x510 [ 122.906101][ T3576] __should_failslab+0xa4/0xe0 [ 122.910699][ T3576] ? anon_vma_clone+0x9a/0x500 [ 122.915298][ T3576] should_failslab+0x9/0x20 [ 122.919641][ T3576] slab_pre_alloc_hook+0x37/0xd0 [ 122.924413][ T3576] ? anon_vma_clone+0x9a/0x500 [ 122.929013][ T3576] kmem_cache_alloc+0x44/0x250 [ 122.933610][ T3576] anon_vma_clone+0x9a/0x500 [ 122.938042][ T3576] anon_vma_fork+0x91/0x4e0 [ 122.942497][ T3576] ? anon_vma_name+0x4c/0x70 [ 122.946925][ T3576] ? vm_area_dup+0x17a/0x230 [ 122.951354][ T3576] copy_mm+0xa3a/0x13e0 [ 122.955346][ T3576] ? copy_signal+0x610/0x610 [ 122.959761][ T3576] ? __init_rwsem+0xfe/0x1d0 [ 122.964187][ T3576] ? copy_signal+0x4e3/0x610 [ 122.968704][ T3576] copy_process+0x1149/0x3290 [ 122.973220][ T3576] ? __kasan_check_write+0x14/0x20 [ 122.978168][ T3576] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 122.983109][ T3576] ? vfs_write+0x94d/0x1110 [ 122.987457][ T3576] kernel_clone+0x21e/0x9e0 [ 122.991800][ T3576] ? __kasan_check_write+0x14/0x20 [ 122.996736][ T3576] ? create_io_thread+0x1e0/0x1e0 [ 123.001602][ T3576] __x64_sys_clone+0x23f/0x290 [ 123.006285][ T3576] ? __do_sys_vfork+0x130/0x130 [ 123.010976][ T3576] ? debug_smp_processor_id+0x17/0x20 [ 123.016266][ T3576] ? perf_trace_sys_enter+0x30/0x140 [ 123.021387][ T3576] x64_sys_call+0x1b0/0x9a0 [ 123.025727][ T3576] do_syscall_64+0x3b/0xb0 [ 123.029978][ T3576] ? clear_bhb_loop+0x35/0x90 [ 123.034497][ T3576] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 123.040231][ T3576] RIP: 0033:0x7f5a89bb0169 [ 123.044471][ T3576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 123.063911][ T3576] RSP: 002b:00007f5a88219fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 123.072245][ T3576] RAX: ffffffffffffffda RBX: 00007f5a89dc8fa0 RCX: 00007f5a89bb0169 [ 123.080053][ T3576] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 123.087864][ T3576] RBP: 00007f5a8821a090 R08: 0000000000000000 R09: 0000000000000000 [ 123.096057][ T3576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 123.103866][ T3576] R13: 0000000000000000 R14: 00007f5a89dc8fa0 R15: 00007fffeeccb1b8 [ 123.111684][ T3576] [ 123.115025][ T289] syz-executor (289) used greatest stack depth: 20512 bytes left [ 123.595843][ T3591] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.602728][ T3591] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.646110][ T3591] device bridge_slave_0 entered promiscuous mode [ 123.653808][ T3591] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.660890][ T3591] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.668767][ T3591] device bridge_slave_1 entered promiscuous mode [ 123.838656][ T3615] device syzkaller0 entered promiscuous mode [ 124.080908][ T30] audit: type=1400 audit(1742858072.305:166): avc: denied { create } for pid=3591 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 124.087956][ T3591] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.108308][ T3591] bridge0: port 2(bridge_slave_1) entered forwarding state [ 124.115421][ T3591] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.122226][ T3591] bridge0: port 1(bridge_slave_0) entered forwarding state [ 124.149647][ T30] audit: type=1400 audit(1742858072.305:167): avc: denied { write } for pid=3591 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 124.200270][ T30] audit: type=1400 audit(1742858072.305:168): avc: denied { read } for pid=3591 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 124.287560][ T3629] FAULT_INJECTION: forcing a failure. [ 124.287560][ T3629] name failslab, interval 1, probability 0, space 0, times 0 [ 124.300258][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.312041][ T3629] CPU: 1 PID: 3629 Comm: syz.3.942 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 124.321821][ T3629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 124.331714][ T3629] Call Trace: [ 124.334836][ T3629] [ 124.337621][ T3629] dump_stack_lvl+0x151/0x1c0 [ 124.342130][ T3629] ? io_uring_drop_tctx_refs+0x190/0x190 [ 124.347601][ T3629] dump_stack+0x15/0x20 [ 124.351591][ T3629] should_fail+0x3c6/0x510 [ 124.355854][ T3629] __should_failslab+0xa4/0xe0 [ 124.360441][ T3629] ? anon_vma_clone+0x9a/0x500 [ 124.365042][ T3629] should_failslab+0x9/0x20 [ 124.369380][ T3629] slab_pre_alloc_hook+0x37/0xd0 [ 124.374154][ T3629] ? anon_vma_clone+0x9a/0x500 [ 124.378757][ T3629] kmem_cache_alloc+0x44/0x250 [ 124.383358][ T3629] anon_vma_clone+0x9a/0x500 [ 124.387783][ T3629] anon_vma_fork+0x91/0x4e0 [ 124.392122][ T3629] ? anon_vma_name+0x43/0x70 [ 124.396547][ T3629] ? vm_area_dup+0x17a/0x230 [ 124.400978][ T3629] copy_mm+0xa3a/0x13e0 [ 124.404975][ T3629] ? copy_signal+0x610/0x610 [ 124.409394][ T3629] ? __init_rwsem+0xfe/0x1d0 [ 124.413829][ T3629] ? copy_signal+0x4e3/0x610 [ 124.418245][ T3629] copy_process+0x1149/0x3290 [ 124.422760][ T3629] ? __kasan_check_write+0x14/0x20 [ 124.427707][ T3629] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 124.432646][ T3629] ? vfs_write+0x94d/0x1110 [ 124.436998][ T3629] kernel_clone+0x21e/0x9e0 [ 124.441327][ T3629] ? __kasan_check_write+0x14/0x20 [ 124.446282][ T3629] ? create_io_thread+0x1e0/0x1e0 [ 124.451141][ T3629] __x64_sys_clone+0x23f/0x290 [ 124.455740][ T3629] ? __do_sys_vfork+0x130/0x130 [ 124.460426][ T3629] ? debug_smp_processor_id+0x17/0x20 [ 124.465646][ T3629] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 124.471536][ T3629] ? exit_to_user_mode_prepare+0x39/0xa0 [ 124.477004][ T3629] x64_sys_call+0x1b0/0x9a0 [ 124.481339][ T3629] do_syscall_64+0x3b/0xb0 [ 124.485608][ T3629] ? clear_bhb_loop+0x35/0x90 [ 124.490102][ T3629] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 124.495837][ T3629] RIP: 0033:0x7f8ef8b7c169 [ 124.500088][ T3629] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 124.519526][ T3629] RSP: 002b:00007f8ef71e5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 124.527771][ T3629] RAX: ffffffffffffffda RBX: 00007f8ef8d94fa0 RCX: 00007f8ef8b7c169 [ 124.535592][ T3629] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 124.543394][ T3629] RBP: 00007f8ef71e6090 R08: 0000000000000000 R09: 0000000000000000 [ 124.551208][ T3629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 124.559015][ T3629] R13: 0000000000000000 R14: 00007f8ef8d94fa0 R15: 00007ffea26c1728 [ 124.566833][ T3629] [ 124.569991][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.579124][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 124.586689][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 124.617075][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 124.636251][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.643113][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 124.655871][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 124.675974][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.682829][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 124.710868][ T3635] device sit0 left promiscuous mode [ 124.754450][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 124.771954][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 124.780594][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 124.788818][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 124.797572][ T3641] device sit0 entered promiscuous mode [ 124.830495][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 124.849244][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 124.901011][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 124.909259][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 124.927685][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 124.936597][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 124.946007][ T3591] device veth0_vlan entered promiscuous mode [ 124.966185][ T3656] device sit0 left promiscuous mode [ 125.060352][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 125.083295][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 125.165575][ T3591] device veth1_macvtap entered promiscuous mode [ 125.227861][ T3660] device syzkaller0 entered promiscuous mode [ 125.249277][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 125.278101][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 125.297839][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 125.352511][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 125.360984][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 125.470346][ T30] audit: type=1400 audit(1742858073.695:169): avc: denied { mounton } for pid=3591 comm="syz-executor" path="/root/syzkaller.vlNZi6/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 125.600775][ T30] audit: type=1400 audit(1742858073.695:170): avc: denied { mount } for pid=3591 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 125.645306][ T3673] device syzkaller0 entered promiscuous mode [ 125.675803][ T30] audit: type=1400 audit(1742858073.725:171): avc: denied { mounton } for pid=3591 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 125.836103][ T3683] FAULT_INJECTION: forcing a failure. [ 125.836103][ T3683] name failslab, interval 1, probability 0, space 0, times 0 [ 125.861984][ T3686] syz.3.957[3686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.862131][ T3686] syz.3.957[3686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.881212][ T3683] CPU: 1 PID: 3683 Comm: syz.4.956 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 125.901877][ T3683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 125.911776][ T3683] Call Trace: [ 125.914889][ T3683] [ 125.917683][ T3683] dump_stack_lvl+0x151/0x1c0 [ 125.922185][ T3683] ? io_uring_drop_tctx_refs+0x190/0x190 [ 125.927654][ T3683] dump_stack+0x15/0x20 [ 125.931642][ T3683] should_fail+0x3c6/0x510 [ 125.935901][ T3683] __should_failslab+0xa4/0xe0 [ 125.940494][ T3683] ? anon_vma_clone+0x9a/0x500 [ 125.945093][ T3683] should_failslab+0x9/0x20 [ 125.949433][ T3683] slab_pre_alloc_hook+0x37/0xd0 [ 125.954210][ T3683] ? anon_vma_clone+0x9a/0x500 [ 125.958806][ T3683] kmem_cache_alloc+0x44/0x250 [ 125.963409][ T3683] anon_vma_clone+0x9a/0x500 [ 125.967836][ T3683] anon_vma_fork+0x91/0x4e0 [ 125.972173][ T3683] ? anon_vma_name+0x4c/0x70 [ 125.976601][ T3683] ? vm_area_dup+0x17a/0x230 [ 125.981028][ T3683] copy_mm+0xa3a/0x13e0 [ 125.985028][ T3683] ? copy_signal+0x610/0x610 [ 125.989445][ T3683] ? __init_rwsem+0xfe/0x1d0 [ 125.993872][ T3683] ? copy_signal+0x4e3/0x610 [ 125.998297][ T3683] copy_process+0x1149/0x3290 [ 126.002814][ T3683] ? __kasan_check_write+0x14/0x20 [ 126.007763][ T3683] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 126.012735][ T3683] ? vfs_write+0x94d/0x1110 [ 126.017047][ T3683] kernel_clone+0x21e/0x9e0 [ 126.021384][ T3683] ? __kasan_check_write+0x14/0x20 [ 126.026331][ T3683] ? create_io_thread+0x1e0/0x1e0 [ 126.031208][ T3683] __x64_sys_clone+0x23f/0x290 [ 126.035797][ T3683] ? __do_sys_vfork+0x130/0x130 [ 126.040482][ T3683] ? debug_smp_processor_id+0x17/0x20 [ 126.045690][ T3683] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 126.051588][ T3683] ? exit_to_user_mode_prepare+0x39/0xa0 [ 126.057068][ T3683] x64_sys_call+0x1b0/0x9a0 [ 126.061395][ T3683] do_syscall_64+0x3b/0xb0 [ 126.065648][ T3683] ? clear_bhb_loop+0x35/0x90 [ 126.070161][ T3683] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 126.075890][ T3683] RIP: 0033:0x7f088b222169 [ 126.080143][ T3683] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.099584][ T3683] RSP: 002b:00007f088988bfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 126.107837][ T3683] RAX: ffffffffffffffda RBX: 00007f088b43afa0 RCX: 00007f088b222169 [ 126.115643][ T3683] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 126.123453][ T3683] RBP: 00007f088988c090 R08: 0000000000000000 R09: 0000000000000000 [ 126.131263][ T3683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 126.139072][ T3683] R13: 0000000000000000 R14: 00007f088b43afa0 R15: 00007ffcdf4d2218 [ 126.146895][ T3683] [ 126.230608][ T3684] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.252123][ T3684] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.268688][ T3684] device bridge_slave_0 entered promiscuous mode [ 126.289921][ T3699] device sit0 left promiscuous mode [ 126.326816][ T3699] device sit0 entered promiscuous mode [ 126.358235][ T3684] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.384118][ T3684] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.416056][ T3684] device bridge_slave_1 entered promiscuous mode [ 126.657785][ T3737] FAULT_INJECTION: forcing a failure. [ 126.657785][ T3737] name failslab, interval 1, probability 0, space 0, times 0 [ 126.676939][ T3737] CPU: 1 PID: 3737 Comm: syz.0.972 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 126.686583][ T3737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 126.696474][ T3737] Call Trace: [ 126.699597][ T3737] [ 126.702374][ T3737] dump_stack_lvl+0x151/0x1c0 [ 126.706888][ T3737] ? io_uring_drop_tctx_refs+0x190/0x190 [ 126.712362][ T3737] dump_stack+0x15/0x20 [ 126.716351][ T3737] should_fail+0x3c6/0x510 [ 126.720603][ T3737] __should_failslab+0xa4/0xe0 [ 126.725201][ T3737] ? anon_vma_fork+0xf7/0x4e0 [ 126.729711][ T3737] should_failslab+0x9/0x20 [ 126.734068][ T3737] slab_pre_alloc_hook+0x37/0xd0 [ 126.738833][ T3737] ? anon_vma_fork+0xf7/0x4e0 [ 126.743339][ T3737] kmem_cache_alloc+0x44/0x250 [ 126.747941][ T3737] anon_vma_fork+0xf7/0x4e0 [ 126.752280][ T3737] ? anon_vma_name+0x43/0x70 [ 126.756708][ T3737] ? vm_area_dup+0x17a/0x230 [ 126.761135][ T3737] copy_mm+0xa3a/0x13e0 [ 126.765134][ T3737] ? copy_signal+0x610/0x610 [ 126.769551][ T3737] ? __init_rwsem+0xfe/0x1d0 [ 126.773978][ T3737] ? copy_signal+0x4e3/0x610 [ 126.778405][ T3737] copy_process+0x1149/0x3290 [ 126.782917][ T3737] ? __kasan_check_write+0x14/0x20 [ 126.787869][ T3737] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 126.792812][ T3737] ? vfs_write+0x94d/0x1110 [ 126.797159][ T3737] kernel_clone+0x21e/0x9e0 [ 126.801493][ T3737] ? __kasan_check_write+0x14/0x20 [ 126.806439][ T3737] ? create_io_thread+0x1e0/0x1e0 [ 126.811304][ T3737] __x64_sys_clone+0x23f/0x290 [ 126.815904][ T3737] ? __do_sys_vfork+0x130/0x130 [ 126.820587][ T3737] ? debug_smp_processor_id+0x17/0x20 [ 126.825795][ T3737] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 126.831693][ T3737] ? exit_to_user_mode_prepare+0x39/0xa0 [ 126.837163][ T3737] x64_sys_call+0x1b0/0x9a0 [ 126.841502][ T3737] do_syscall_64+0x3b/0xb0 [ 126.845755][ T3737] ? clear_bhb_loop+0x35/0x90 [ 126.850269][ T3737] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 126.855996][ T3737] RIP: 0033:0x7f16c88a9169 [ 126.860257][ T3737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.879691][ T3737] RSP: 002b:00007f16c6f12fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 126.887931][ T3737] RAX: ffffffffffffffda RBX: 00007f16c8ac1fa0 RCX: 00007f16c88a9169 [ 126.895748][ T3737] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 126.903554][ T3737] RBP: 00007f16c6f13090 R08: 0000000000000000 R09: 0000000000000000 [ 126.911374][ T3737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 126.919181][ T3737] R13: 0000000000000000 R14: 00007f16c8ac1fa0 R15: 00007ffdba0881c8 [ 126.926997][ T3737] [ 127.157804][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 127.167177][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 127.191352][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 127.209152][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 127.224882][ T1595] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.231806][ T1595] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.251682][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 127.267988][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.284094][ T1595] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.291006][ T1595] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.351322][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 127.368286][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 127.380640][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 127.429019][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 127.446595][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 127.457858][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 127.466310][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 127.474699][ T3684] device veth0_vlan entered promiscuous mode [ 127.557511][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 127.619642][ T3684] device veth1_macvtap entered promiscuous mode [ 127.642163][ T320] device bridge_slave_1 left promiscuous mode [ 127.659152][ T320] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.680027][ T320] device bridge_slave_0 left promiscuous mode [ 127.696308][ T320] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.704814][ T320] device veth1_macvtap left promiscuous mode [ 127.723572][ T320] device veth0_vlan left promiscuous mode [ 128.105003][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 128.127650][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 128.136562][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 128.274623][ T3785] FAULT_INJECTION: forcing a failure. [ 128.274623][ T3785] name failslab, interval 1, probability 0, space 0, times 0 [ 128.287529][ T3785] CPU: 1 PID: 3785 Comm: syz.2.984 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 128.297159][ T3785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 128.307053][ T3785] Call Trace: [ 128.310178][ T3785] [ 128.312963][ T3785] dump_stack_lvl+0x151/0x1c0 [ 128.317472][ T3785] ? io_uring_drop_tctx_refs+0x190/0x190 [ 128.322937][ T3785] ? kmem_cache_free+0x115/0x330 [ 128.327710][ T3785] dump_stack+0x15/0x20 [ 128.331702][ T3785] should_fail+0x3c6/0x510 [ 128.335958][ T3785] __should_failslab+0xa4/0xe0 [ 128.340558][ T3785] ? dup_task_struct+0x53/0xc60 [ 128.345241][ T3785] should_failslab+0x9/0x20 [ 128.349600][ T3785] slab_pre_alloc_hook+0x37/0xd0 [ 128.354355][ T3785] ? dup_task_struct+0x53/0xc60 [ 128.359051][ T3785] kmem_cache_alloc+0x44/0x250 [ 128.363641][ T3785] dup_task_struct+0x53/0xc60 [ 128.368151][ T3785] ? __kasan_check_write+0x14/0x20 [ 128.373101][ T3785] copy_process+0x5c4/0x3290 [ 128.377525][ T3785] ? __kasan_check_write+0x14/0x20 [ 128.382470][ T3785] ? selinux_file_permission+0x2c4/0x570 [ 128.387942][ T3785] ? proc_fail_nth_read+0x210/0x210 [ 128.392973][ T3785] ? fsnotify_perm+0x6a/0x5b0 [ 128.397488][ T3785] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 128.402433][ T3785] ? vfs_write+0x94d/0x1110 [ 128.406783][ T3785] kernel_clone+0x21e/0x9e0 [ 128.411113][ T3785] ? __kasan_check_write+0x14/0x20 [ 128.416059][ T3785] ? create_io_thread+0x1e0/0x1e0 [ 128.420923][ T3785] __x64_sys_clone+0x23f/0x290 [ 128.425528][ T3785] ? __do_sys_vfork+0x130/0x130 [ 128.430209][ T3785] ? debug_smp_processor_id+0x17/0x20 [ 128.435416][ T3785] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 128.441314][ T3785] ? exit_to_user_mode_prepare+0x39/0xa0 [ 128.446796][ T3785] x64_sys_call+0x1b0/0x9a0 [ 128.451124][ T3785] do_syscall_64+0x3b/0xb0 [ 128.455374][ T3785] ? clear_bhb_loop+0x35/0x90 [ 128.459891][ T3785] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 128.465620][ T3785] RIP: 0033:0x7f5a89bb0169 [ 128.469870][ T3785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 128.489308][ T3785] RSP: 002b:00007f5a88219fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 128.497559][ T3785] RAX: ffffffffffffffda RBX: 00007f5a89dc8fa0 RCX: 00007f5a89bb0169 [ 128.505366][ T3785] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000002000 [ 128.513191][ T3785] RBP: 00007f5a8821a090 R08: 0000000000000000 R09: 0000000000000000 [ 128.520988][ T3785] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 128.528800][ T3785] R13: 0000000000000000 R14: 00007f5a89dc8fa0 R15: 00007fffeeccb1b8 [ 128.536621][ T3785] [ 128.711229][ T3799] FAULT_INJECTION: forcing a failure. [ 128.711229][ T3799] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 128.733480][ T3799] CPU: 1 PID: 3799 Comm: syz.3.987 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 128.743123][ T3799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 128.753018][ T3799] Call Trace: [ 128.756145][ T3799] [ 128.758919][ T3799] dump_stack_lvl+0x151/0x1c0 [ 128.763431][ T3799] ? io_uring_drop_tctx_refs+0x190/0x190 [ 128.768908][ T3799] dump_stack+0x15/0x20 [ 128.772895][ T3799] should_fail+0x3c6/0x510 [ 128.777148][ T3799] should_fail_alloc_page+0x5a/0x80 [ 128.782180][ T3799] prepare_alloc_pages+0x15c/0x700 [ 128.787133][ T3799] ? __alloc_pages_bulk+0xd80/0xd80 [ 128.792167][ T3799] __alloc_pages+0x18c/0x8f0 [ 128.796585][ T3799] ? prep_new_page+0x110/0x110 [ 128.801187][ T3799] ? stack_trace_save+0x1c0/0x1c0 [ 128.806044][ T3799] ? __kernel_text_address+0x9b/0x110 [ 128.811254][ T3799] pte_alloc_one+0x73/0x1b0 [ 128.815602][ T3799] ? pfn_modify_allowed+0x2f0/0x2f0 [ 128.820628][ T3799] __pte_alloc+0x86/0x350 [ 128.824791][ T3799] ? free_pgtables+0x280/0x280 [ 128.829392][ T3799] ? __stack_depot_save+0x34/0x470 [ 128.834335][ T3799] ? anon_vma_clone+0x9a/0x500 [ 128.838940][ T3799] copy_page_range+0x2743/0x2e20 [ 128.843709][ T3799] ? __kasan_slab_alloc+0xb1/0xe0 [ 128.848574][ T3799] ? x64_sys_call+0x1b0/0x9a0 [ 128.853086][ T3799] ? do_syscall_64+0x3b/0xb0 [ 128.857521][ T3799] ? pfn_valid+0x1e0/0x1e0 [ 128.861764][ T3799] ? rwsem_write_trylock+0x153/0x340 [ 128.866883][ T3799] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 128.873136][ T3799] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 128.878690][ T3799] ? __rb_insert_augmented+0x5de/0x610 [ 128.883987][ T3799] copy_mm+0xc7e/0x13e0 [ 128.887981][ T3799] ? copy_signal+0x610/0x610 [ 128.892401][ T3799] ? __init_rwsem+0xfe/0x1d0 [ 128.896829][ T3799] ? copy_signal+0x4e3/0x610 [ 128.901256][ T3799] copy_process+0x1149/0x3290 [ 128.905769][ T3799] ? __kasan_check_write+0x14/0x20 [ 128.910726][ T3799] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 128.915659][ T3799] ? vfs_write+0x94d/0x1110 [ 128.920006][ T3799] kernel_clone+0x21e/0x9e0 [ 128.924344][ T3799] ? __kasan_check_write+0x14/0x20 [ 128.929289][ T3799] ? create_io_thread+0x1e0/0x1e0 [ 128.934154][ T3799] __x64_sys_clone+0x23f/0x290 [ 128.938752][ T3799] ? __do_sys_vfork+0x130/0x130 [ 128.943436][ T3799] ? debug_smp_processor_id+0x17/0x20 [ 128.948643][ T3799] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 128.954542][ T3799] ? exit_to_user_mode_prepare+0x39/0xa0 [ 128.960011][ T3799] x64_sys_call+0x1b0/0x9a0 [ 128.964351][ T3799] do_syscall_64+0x3b/0xb0 [ 128.968605][ T3799] ? clear_bhb_loop+0x35/0x90 [ 128.973115][ T3799] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 128.978844][ T3799] RIP: 0033:0x7f8ef8b7c169 [ 128.983099][ T3799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 129.002660][ T3799] RSP: 002b:00007f8ef71e5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 129.010907][ T3799] RAX: ffffffffffffffda RBX: 00007f8ef8d94fa0 RCX: 00007f8ef8b7c169 [ 129.018718][ T3799] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 129.026526][ T3799] RBP: 00007f8ef71e6090 R08: 0000000000000000 R09: 0000000000000000 [ 129.034338][ T3799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 129.042149][ T3799] R13: 0000000000000000 R14: 00007f8ef8d94fa0 R15: 00007ffea26c1728 [ 129.049972][ T3799] [ 129.094183][ T3803] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.102736][ T3803] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.111576][ T3803] device bridge_slave_0 entered promiscuous mode [ 129.120025][ T3803] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.127085][ T3803] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.134836][ T3803] device bridge_slave_1 entered promiscuous mode [ 129.726911][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 129.746406][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.830577][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 129.867496][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.875570][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.882459][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.890929][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 129.941259][ T3838] FAULT_INJECTION: forcing a failure. [ 129.941259][ T3838] name failslab, interval 1, probability 0, space 0, times 0 [ 129.956933][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.957378][ T3838] CPU: 0 PID: 3838 Comm: syz.3.997 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 129.974384][ T3838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 129.984276][ T3838] Call Trace: [ 129.987399][ T3838] [ 129.990181][ T3838] dump_stack_lvl+0x151/0x1c0 [ 129.994700][ T3838] ? io_uring_drop_tctx_refs+0x190/0x190 [ 130.000160][ T3838] ? __kasan_slab_alloc+0xc3/0xe0 [ 130.005017][ T3838] ? __kasan_slab_alloc+0xb1/0xe0 [ 130.009880][ T3838] ? slab_post_alloc_hook+0x53/0x2c0 [ 130.015085][ T3838] ? dup_task_struct+0x53/0xc60 [ 130.019774][ T3838] ? copy_process+0x5c4/0x3290 [ 130.024369][ T3838] ? kernel_clone+0x21e/0x9e0 [ 130.028886][ T3838] dump_stack+0x15/0x20 [ 130.032877][ T3838] should_fail+0x3c6/0x510 [ 130.037133][ T3838] __should_failslab+0xa4/0xe0 [ 130.041730][ T3838] should_failslab+0x9/0x20 [ 130.046080][ T3838] slab_pre_alloc_hook+0x37/0xd0 [ 130.050849][ T3838] kmem_cache_alloc_trace+0x48/0x270 [ 130.055963][ T3838] ? __get_vm_area_node+0x117/0x360 [ 130.061002][ T3838] __get_vm_area_node+0x117/0x360 [ 130.065864][ T3838] __vmalloc_node_range+0xe2/0x8d0 [ 130.070805][ T3838] ? copy_process+0x5c4/0x3290 [ 130.075405][ T3838] ? slab_post_alloc_hook+0x72/0x2c0 [ 130.080532][ T3838] ? dup_task_struct+0x53/0xc60 [ 130.085227][ T3838] dup_task_struct+0x416/0xc60 [ 130.089812][ T3838] ? copy_process+0x5c4/0x3290 [ 130.094414][ T3838] ? __kasan_check_write+0x14/0x20 [ 130.099364][ T3838] copy_process+0x5c4/0x3290 [ 130.103790][ T3838] ? __kasan_check_write+0x14/0x20 [ 130.108732][ T3838] ? selinux_file_permission+0x2c4/0x570 [ 130.114203][ T3838] ? proc_fail_nth_read+0x210/0x210 [ 130.119234][ T3838] ? fsnotify_perm+0x6a/0x5b0 [ 130.123774][ T3838] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 130.128695][ T3838] ? vfs_write+0x94d/0x1110 [ 130.133040][ T3838] kernel_clone+0x21e/0x9e0 [ 130.137376][ T3838] ? __kasan_check_write+0x14/0x20 [ 130.142320][ T3838] ? create_io_thread+0x1e0/0x1e0 [ 130.147188][ T3838] __x64_sys_clone+0x23f/0x290 [ 130.151785][ T3838] ? __do_sys_vfork+0x130/0x130 [ 130.156474][ T3838] ? debug_smp_processor_id+0x17/0x20 [ 130.161675][ T3838] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 130.167590][ T3838] ? exit_to_user_mode_prepare+0x39/0xa0 [ 130.173049][ T3838] x64_sys_call+0x1b0/0x9a0 [ 130.177388][ T3838] do_syscall_64+0x3b/0xb0 [ 130.181645][ T3838] ? clear_bhb_loop+0x35/0x90 [ 130.186155][ T3838] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 130.191878][ T3838] RIP: 0033:0x7f8ef8b7c169 [ 130.196133][ T3838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 130.215580][ T3838] RSP: 002b:00007f8ef71e5fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 130.223820][ T3838] RAX: ffffffffffffffda RBX: 00007f8ef8d94fa0 RCX: 00007f8ef8b7c169 [ 130.231630][ T3838] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000002000 [ 130.239439][ T3838] RBP: 00007f8ef71e6090 R08: 0000000000000000 R09: 0000000000000000 [ 130.247271][ T3838] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 130.255081][ T3838] R13: 0000000000000000 R14: 00007f8ef8d94fa0 R15: 00007ffea26c1728 [ 130.262995][ T3838] [ 130.269008][ T30] audit: type=1400 audit(1742858078.495:172): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 130.294225][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.295109][ T30] audit: type=1400 audit(1742858078.495:173): avc: denied { unlink } for pid=83 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 130.301113][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.320387][ T3838] syz.3.997: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 130.324189][ T30] audit: type=1400 audit(1742858078.495:174): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 130.330846][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.383861][ T3838] ,cpuset=syz3,mems_allowed=0 [ 130.388504][ T3838] CPU: 0 PID: 3838 Comm: syz.3.997 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 130.398036][ T3838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 130.407931][ T3838] Call Trace: [ 130.411052][ T3838] [ 130.413832][ T3838] dump_stack_lvl+0x151/0x1c0 [ 130.418345][ T3838] ? io_uring_drop_tctx_refs+0x190/0x190 [ 130.423814][ T3838] ? pr_cont_kernfs_name+0xf0/0x100 [ 130.428851][ T3838] dump_stack+0x15/0x20 [ 130.432838][ T3838] warn_alloc+0x21a/0x390 [ 130.437006][ T3838] ? should_failslab+0x9/0x20 [ 130.441519][ T3838] ? zone_watermark_ok_safe+0x270/0x270 [ 130.446902][ T3838] ? __get_vm_area_node+0x347/0x360 [ 130.451935][ T3838] __vmalloc_node_range+0x2c1/0x8d0 [ 130.456967][ T3838] ? slab_post_alloc_hook+0x72/0x2c0 [ 130.462089][ T3838] ? dup_task_struct+0x53/0xc60 [ 130.466777][ T3838] dup_task_struct+0x416/0xc60 [ 130.471375][ T3838] ? copy_process+0x5c4/0x3290 [ 130.475975][ T3838] ? __kasan_check_write+0x14/0x20 [ 130.480923][ T3838] copy_process+0x5c4/0x3290 [ 130.485348][ T3838] ? __kasan_check_write+0x14/0x20 [ 130.490293][ T3838] ? selinux_file_permission+0x2c4/0x570 [ 130.495764][ T3838] ? proc_fail_nth_read+0x210/0x210 [ 130.500793][ T3838] ? fsnotify_perm+0x6a/0x5b0 [ 130.505312][ T3838] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 130.510256][ T3838] ? vfs_write+0x94d/0x1110 [ 130.514600][ T3838] kernel_clone+0x21e/0x9e0 [ 130.518940][ T3838] ? __kasan_check_write+0x14/0x20 [ 130.523889][ T3838] ? create_io_thread+0x1e0/0x1e0 [ 130.528751][ T3838] __x64_sys_clone+0x23f/0x290 [ 130.533345][ T3838] ? __do_sys_vfork+0x130/0x130 [ 130.538036][ T3838] ? debug_smp_processor_id+0x17/0x20 [ 130.543237][ T3838] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 130.549138][ T3838] ? exit_to_user_mode_prepare+0x39/0xa0 [ 130.554610][ T3838] x64_sys_call+0x1b0/0x9a0 [ 130.558947][ T3838] do_syscall_64+0x3b/0xb0 [ 130.563196][ T3838] ? clear_bhb_loop+0x35/0x90 [ 130.567712][ T3838] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 130.573437][ T3838] RIP: 0033:0x7f8ef8b7c169 [ 130.577694][ T3838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 130.597132][ T3838] RSP: 002b:00007f8ef71e5fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 130.605377][ T3838] RAX: ffffffffffffffda RBX: 00007f8ef8d94fa0 RCX: 00007f8ef8b7c169 [ 130.613188][ T3838] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000002000 [ 130.621009][ T3838] RBP: 00007f8ef71e6090 R08: 0000000000000000 R09: 0000000000000000 [ 130.628818][ T3838] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 130.636627][ T3838] R13: 0000000000000000 R14: 00007f8ef8d94fa0 R15: 00007ffea26c1728 [ 130.644447][ T3838] [ 130.651621][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.718347][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 130.733838][ T3845] FAULT_INJECTION: forcing a failure. [ 130.733838][ T3845] name failslab, interval 1, probability 0, space 0, times 0 [ 130.746564][ T3838] Mem-Info: [ 130.750421][ T3838] active_anon:109 inactive_anon:12114 isolated_anon:0 [ 130.750421][ T3838] active_file:19926 inactive_file:4770 isolated_file:0 [ 130.750421][ T3838] unevictable:0 dirty:213 writeback:0 [ 130.750421][ T3838] slab_reclaimable:7865 slab_unreclaimable:74227 [ 130.750421][ T3838] mapped:28655 shmem:235 pagetables:606 bounce:0 [ 130.750421][ T3838] kernel_misc_reclaimable:0 [ 130.750421][ T3838] free:1531103 free_pcp:29949 free_cma:0 [ 130.792426][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 130.811903][ T3803] device veth0_vlan entered promiscuous mode [ 130.819705][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 130.823246][ T3845] CPU: 1 PID: 3845 Comm: syz.2.999 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 130.830570][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.836807][ T3845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 130.836821][ T3845] Call Trace: [ 130.836827][ T3845] [ 130.836835][ T3845] dump_stack_lvl+0x151/0x1c0 [ 130.845750][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.854274][ T3845] ? io_uring_drop_tctx_refs+0x190/0x190 [ 130.857848][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.860169][ T3845] ? avc_denied+0x1b0/0x1b0 [ 130.888555][ T3845] dump_stack+0x15/0x20 [ 130.892538][ T3845] should_fail+0x3c6/0x510 [ 130.896798][ T3845] __should_failslab+0xa4/0xe0 [ 130.901392][ T3845] ? vm_area_dup+0x26/0x230 [ 130.905733][ T3845] should_failslab+0x9/0x20 [ 130.910073][ T3845] slab_pre_alloc_hook+0x37/0xd0 [ 130.914850][ T3845] ? vm_area_dup+0x26/0x230 [ 130.915721][ T3838] Node 0 active_anon:436kB inactive_anon:48456kB active_file:79704kB inactive_file:19080kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:114620kB dirty:852kB writeback:0kB shmem:940kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4432kB pagetables:2324kB all_unreclaimable? no [ 130.919184][ T3845] kmem_cache_alloc+0x44/0x250 [ 130.952367][ T3838] DMA32 free:2948336kB min:62568kB low:78208kB high:93848kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2978944kB mlocked:0kB bounce:0kB free_pcp:25104kB local_pcp:23300kB free_cma:0kB [ 130.954183][ T3845] vm_area_dup+0x26/0x230 [ 130.981791][ T3838] lowmem_reserve[]: [ 130.985604][ T3845] copy_mm+0x9a1/0x13e0 [ 130.985635][ T3845] ? copy_signal+0x610/0x610 [ 130.989564][ T3838] 0 [ 130.993218][ T3845] ? __init_rwsem+0xfe/0x1d0 [ 130.997840][ T3838] 3941 [ 130.999990][ T3845] ? copy_signal+0x4e3/0x610 [ 131.004411][ T3838] 3941 [ 131.007017][ T3845] copy_process+0x1149/0x3290 [ 131.007041][ T3845] ? __kasan_check_write+0x14/0x20 [ 131.007066][ T3845] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 131.007083][ T3845] ? vfs_write+0x94d/0x1110 [ 131.007103][ T3845] kernel_clone+0x21e/0x9e0 [ 131.020960][ T3838] Normal free:3175836kB min:84884kB low:106104kB high:127324kB reserved_highatomic:0KB active_anon:432kB inactive_anon:48456kB active_file:79704kB inactive_file:19080kB unevictable:0kB writepending:852kB present:5242880kB managed:4035584kB mlocked:0kB bounce:0kB free_pcp:95176kB local_pcp:43272kB free_cma:0kB [ 131.023514][ T3845] ? __kasan_check_write+0x14/0x20 [ 131.028734][ T3838] lowmem_reserve[]: [ 131.032803][ T3845] ? create_io_thread+0x1e0/0x1e0 [ 131.032841][ T3845] __x64_sys_clone+0x23f/0x290 [ 131.037537][ T3838] 0 [ 131.066042][ T3845] ? __do_sys_vfork+0x130/0x130 [ 131.066082][ T3845] ? debug_smp_processor_id+0x17/0x20 [ 131.071356][ T3838] 0 [ 131.074631][ T3845] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 131.079963][ T3838] 0 [ 131.084099][ T3845] ? exit_to_user_mode_prepare+0x39/0xa0 [ 131.084128][ T3845] x64_sys_call+0x1b0/0x9a0 [ 131.086719][ T3838] [ 131.091117][ T3845] do_syscall_64+0x3b/0xb0 [ 131.096674][ T3838] DMA32: [ 131.098675][ T3845] ? clear_bhb_loop+0x35/0x90 [ 131.104616][ T3838] 0*4kB [ 131.107099][ T3845] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 131.107126][ T3845] RIP: 0033:0x7f5a89bb0169 [ 131.113081][ T3838] 2*8kB [ 131.116896][ T3845] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 131.116916][ T3845] RSP: 002b:00007f5a88219fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 131.119381][ T3838] (UM) [ 131.123326][ T3845] RAX: ffffffffffffffda RBX: 00007f5a89dc8fa0 RCX: 00007f5a89bb0169 [ 131.123344][ T3845] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 131.135865][ T3838] 2*16kB [ 131.139037][ T3845] RBP: 00007f5a8821a090 R08: 0000000000000000 R09: 0000000000000000 [ 131.139054][ T3845] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 131.143547][ T3838] (ME) [ 131.145973][ T3845] R13: 0000000000000000 R14: 00007f5a89dc8fa0 R15: 00007fffeeccb1b8 [ 131.145998][ T3845] [ 131.233481][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 131.241332][ T3838] 0*32kB 1*64kB (M) 3*128kB (M) 5*256kB (UME) 5*512kB (UME) 5*1024kB (UME) 3*2048kB (ME) 716*4096kB (M) = 2948336kB [ 131.256571][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 131.268092][ T3803] device veth1_macvtap entered promiscuous mode [ 131.293039][ T3838] Normal: 2713*4kB (UME) 1222*8kB (ME) 889*16kB (UME) 1017*32kB (UME) 978*64kB (UME) 716*128kB (UM) 527*256kB (UME) 401*512kB (UM) 302*1024kB (UM) 139*2048kB (U) 493*4096kB (U) = 3175108kB [ 131.334557][ T3838] 24933 total pagecache pages [ 131.340038][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 131.356458][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 131.362835][ T3838] 0 pages in swap cache [ 131.393847][ T3838] Swap cache stats: add 0, delete 0, find 0/0 [ 131.399844][ T3838] Free swap = 124996kB [ 131.403747][ T3838] Total swap = 124996kB [ 131.407782][ T3838] 2097051 pages RAM [ 131.408188][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.411422][ T3838] 0 pages HighMem/MovableOnly [ 131.429617][ T3838] 343419 pages reserved [ 131.433638][ T3838] 0 pages cma reserved [ 131.456362][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 131.466962][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 131.500140][ T320] device bridge_slave_1 left promiscuous mode [ 131.515026][ T320] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.530522][ T320] device bridge_slave_0 left promiscuous mode [ 131.537450][ T320] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.547338][ T320] device veth1_macvtap left promiscuous mode [ 131.553305][ T320] device veth0_vlan left promiscuous mode [ 132.415260][ T3897] FAULT_INJECTION: forcing a failure. [ 132.415260][ T3897] name failslab, interval 1, probability 0, space 0, times 0 [ 132.453889][ T3897] CPU: 1 PID: 3897 Comm: syz.2.1012 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 132.463645][ T3897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 132.473539][ T3897] Call Trace: [ 132.476659][ T3897] [ 132.479435][ T3897] dump_stack_lvl+0x151/0x1c0 [ 132.483949][ T3897] ? io_uring_drop_tctx_refs+0x190/0x190 [ 132.489436][ T3897] ? avc_denied+0x1b0/0x1b0 [ 132.493755][ T3897] dump_stack+0x15/0x20 [ 132.497745][ T3897] should_fail+0x3c6/0x510 [ 132.501999][ T3897] __should_failslab+0xa4/0xe0 [ 132.506600][ T3897] ? vm_area_dup+0x26/0x230 [ 132.510935][ T3897] should_failslab+0x9/0x20 [ 132.515277][ T3897] slab_pre_alloc_hook+0x37/0xd0 [ 132.520060][ T3897] ? vm_area_dup+0x26/0x230 [ 132.524392][ T3897] kmem_cache_alloc+0x44/0x250 [ 132.528993][ T3897] vm_area_dup+0x26/0x230 [ 132.533160][ T3897] copy_mm+0x9a1/0x13e0 [ 132.537154][ T3897] ? copy_signal+0x610/0x610 [ 132.541579][ T3897] ? __init_rwsem+0xfe/0x1d0 [ 132.546002][ T3897] ? copy_signal+0x4e3/0x610 [ 132.550429][ T3897] copy_process+0x1149/0x3290 [ 132.554940][ T3897] ? __kasan_check_write+0x14/0x20 [ 132.559893][ T3897] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 132.564833][ T3897] ? vfs_write+0x94d/0x1110 [ 132.569177][ T3897] kernel_clone+0x21e/0x9e0 [ 132.573513][ T3897] ? __kasan_check_write+0x14/0x20 [ 132.578461][ T3897] ? create_io_thread+0x1e0/0x1e0 [ 132.583327][ T3897] __x64_sys_clone+0x23f/0x290 [ 132.587922][ T3897] ? __do_sys_vfork+0x130/0x130 [ 132.592610][ T3897] ? debug_smp_processor_id+0x17/0x20 [ 132.597815][ T3897] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 132.603717][ T3897] ? exit_to_user_mode_prepare+0x39/0xa0 [ 132.609187][ T3897] x64_sys_call+0x1b0/0x9a0 [ 132.613524][ T3897] do_syscall_64+0x3b/0xb0 [ 132.617778][ T3897] ? clear_bhb_loop+0x35/0x90 [ 132.622288][ T3897] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 132.628018][ T3897] RIP: 0033:0x7f5a89bb0169 [ 132.632272][ T3897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 132.651711][ T3897] RSP: 002b:00007f5a88219fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 132.659955][ T3897] RAX: ffffffffffffffda RBX: 00007f5a89dc8fa0 RCX: 00007f5a89bb0169 [ 132.667767][ T3897] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 132.675597][ T3897] RBP: 00007f5a8821a090 R08: 0000000000000000 R09: 0000000000000000 [ 132.683391][ T3897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 132.691200][ T3897] R13: 0000000000000000 R14: 00007f5a89dc8fa0 R15: 00007fffeeccb1b8 [ 132.699019][ T3897] [ 132.707308][ T3888] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.740148][ T3888] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.748288][ T3888] device bridge_slave_0 entered promiscuous mode [ 132.761482][ T3888] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.768983][ T3888] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.776519][ T3888] device bridge_slave_1 entered promiscuous mode [ 132.793959][ T3906] device syzkaller0 entered promiscuous mode [ 132.904123][ T30] audit: type=1400 audit(1742858081.125:175): avc: denied { create } for pid=3913 comm="syz.2.1016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 132.938925][ T320] device bridge_slave_1 left promiscuous mode [ 132.945015][ T320] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.953121][ T320] device bridge_slave_0 left promiscuous mode [ 132.967472][ T320] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.983070][ T320] device veth1_macvtap left promiscuous mode [ 133.009172][ T320] device veth0_vlan left promiscuous mode [ 133.453088][ T3928] device syzkaller0 entered promiscuous mode [ 133.804248][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 133.821119][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 133.859881][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 133.872569][ T3942] FAULT_INJECTION: forcing a failure. [ 133.872569][ T3942] name failslab, interval 1, probability 0, space 0, times 0 [ 133.893207][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.911559][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.918466][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.938281][ T3942] CPU: 0 PID: 3942 Comm: syz.2.1024 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 133.948019][ T3942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 133.957911][ T3942] Call Trace: [ 133.961055][ T3942] [ 133.963816][ T3942] dump_stack_lvl+0x151/0x1c0 [ 133.968326][ T3942] ? io_uring_drop_tctx_refs+0x190/0x190 [ 133.973797][ T3942] dump_stack+0x15/0x20 [ 133.977785][ T3942] should_fail+0x3c6/0x510 [ 133.982040][ T3942] __should_failslab+0xa4/0xe0 [ 133.986639][ T3942] ? anon_vma_clone+0x9a/0x500 [ 133.991238][ T3942] should_failslab+0x9/0x20 [ 133.995665][ T3942] slab_pre_alloc_hook+0x37/0xd0 [ 134.000438][ T3942] ? anon_vma_clone+0x9a/0x500 [ 134.005039][ T3942] kmem_cache_alloc+0x44/0x250 [ 134.009640][ T3942] anon_vma_clone+0x9a/0x500 [ 134.014066][ T3942] anon_vma_fork+0x91/0x4e0 [ 134.018404][ T3942] ? anon_vma_name+0x43/0x70 [ 134.022833][ T3942] ? vm_area_dup+0x17a/0x230 [ 134.027260][ T3942] copy_mm+0xa3a/0x13e0 [ 134.031259][ T3942] ? copy_signal+0x610/0x610 [ 134.035676][ T3942] ? __init_rwsem+0xfe/0x1d0 [ 134.040104][ T3942] ? copy_signal+0x4e3/0x610 [ 134.044530][ T3942] copy_process+0x1149/0x3290 [ 134.049043][ T3942] ? __kasan_check_write+0x14/0x20 [ 134.053994][ T3942] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 134.058934][ T3942] ? vfs_write+0x94d/0x1110 [ 134.063282][ T3942] kernel_clone+0x21e/0x9e0 [ 134.067618][ T3942] ? __kasan_check_write+0x14/0x20 [ 134.072562][ T3942] ? create_io_thread+0x1e0/0x1e0 [ 134.077425][ T3942] __x64_sys_clone+0x23f/0x290 [ 134.082022][ T3942] ? __do_sys_vfork+0x130/0x130 [ 134.086712][ T3942] ? debug_smp_processor_id+0x17/0x20 [ 134.091916][ T3942] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 134.097818][ T3942] ? exit_to_user_mode_prepare+0x39/0xa0 [ 134.103287][ T3942] x64_sys_call+0x1b0/0x9a0 [ 134.107627][ T3942] do_syscall_64+0x3b/0xb0 [ 134.111875][ T3942] ? clear_bhb_loop+0x35/0x90 [ 134.116393][ T3942] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 134.122118][ T3942] RIP: 0033:0x7f5a89bb0169 [ 134.126376][ T3942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 134.145812][ T3942] RSP: 002b:00007f5a88219fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 134.154056][ T3942] RAX: ffffffffffffffda RBX: 00007f5a89dc8fa0 RCX: 00007f5a89bb0169 [ 134.161871][ T3942] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 134.169681][ T3942] RBP: 00007f5a8821a090 R08: 0000000000000000 R09: 0000000000000000 [ 134.177496][ T3942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 134.185311][ T3942] R13: 0000000000000000 R14: 00007f5a89dc8fa0 R15: 00007fffeeccb1b8 [ 134.193124][ T3942] [ 134.206142][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.214542][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.222830][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.229696][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.237470][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 134.271112][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 134.279243][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 134.287122][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 134.295161][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 134.314278][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 134.340698][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 134.367353][ T3888] device veth0_vlan entered promiscuous mode [ 134.471961][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 134.482112][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.542984][ T3957] bond_slave_1: mtu less than device minimum [ 134.635929][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.643274][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.713470][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 134.761702][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.801924][ T3888] device veth1_macvtap entered promiscuous mode [ 134.853232][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 134.872713][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 134.915867][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 134.979246][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.008649][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 135.659764][ T3990] FAULT_INJECTION: forcing a failure. [ 135.659764][ T3990] name failslab, interval 1, probability 0, space 0, times 0 [ 135.676421][ T3990] CPU: 1 PID: 3990 Comm: syz.3.1038 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 135.686156][ T3990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 135.696049][ T3990] Call Trace: [ 135.699183][ T3990] [ 135.701946][ T3990] dump_stack_lvl+0x151/0x1c0 [ 135.706547][ T3990] ? io_uring_drop_tctx_refs+0x190/0x190 [ 135.712016][ T3990] dump_stack+0x15/0x20 [ 135.716004][ T3990] should_fail+0x3c6/0x510 [ 135.720257][ T3990] __should_failslab+0xa4/0xe0 [ 135.724858][ T3990] ? anon_vma_clone+0x9a/0x500 [ 135.729467][ T3990] should_failslab+0x9/0x20 [ 135.733796][ T3990] slab_pre_alloc_hook+0x37/0xd0 [ 135.738572][ T3990] ? anon_vma_clone+0x9a/0x500 [ 135.743170][ T3990] kmem_cache_alloc+0x44/0x250 [ 135.747772][ T3990] anon_vma_clone+0x9a/0x500 [ 135.752200][ T3990] anon_vma_fork+0x91/0x4e0 [ 135.756537][ T3990] ? anon_vma_name+0x43/0x70 [ 135.760964][ T3990] ? vm_area_dup+0x17a/0x230 [ 135.765389][ T3990] copy_mm+0xa3a/0x13e0 [ 135.769387][ T3990] ? copy_signal+0x610/0x610 [ 135.773825][ T3990] ? __init_rwsem+0xfe/0x1d0 [ 135.778238][ T3990] ? copy_signal+0x4e3/0x610 [ 135.782661][ T3990] copy_process+0x1149/0x3290 [ 135.787182][ T3990] ? __kasan_check_write+0x14/0x20 [ 135.792124][ T3990] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 135.797071][ T3990] ? vfs_write+0x94d/0x1110 [ 135.801412][ T3990] kernel_clone+0x21e/0x9e0 [ 135.805755][ T3990] ? __kasan_check_write+0x14/0x20 [ 135.810694][ T3990] ? create_io_thread+0x1e0/0x1e0 [ 135.815651][ T3990] __x64_sys_clone+0x23f/0x290 [ 135.820240][ T3990] ? __do_sys_vfork+0x130/0x130 [ 135.824932][ T3990] ? debug_smp_processor_id+0x17/0x20 [ 135.830135][ T3990] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 135.836039][ T3990] ? exit_to_user_mode_prepare+0x39/0xa0 [ 135.841505][ T3990] x64_sys_call+0x1b0/0x9a0 [ 135.845846][ T3990] do_syscall_64+0x3b/0xb0 [ 135.850099][ T3990] ? clear_bhb_loop+0x35/0x90 [ 135.855043][ T3990] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 135.860773][ T3990] RIP: 0033:0x7f8ef8b7c169 [ 135.865028][ T3990] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 135.884464][ T3990] RSP: 002b:00007f8ef71e5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 135.892715][ T3990] RAX: ffffffffffffffda RBX: 00007f8ef8d94fa0 RCX: 00007f8ef8b7c169 [ 135.900525][ T3990] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 135.908333][ T3990] RBP: 00007f8ef71e6090 R08: 0000000000000000 R09: 0000000000000000 [ 135.916144][ T3990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 135.923955][ T3990] R13: 0000000000000000 R14: 00007f8ef8d94fa0 R15: 00007ffea26c1728 [ 135.931774][ T3990] [ 136.064018][ T4001] device veth1_macvtap left promiscuous mode [ 136.076218][ T4001] device macsec0 entered promiscuous mode [ 136.415262][ T3999] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.422276][ T3999] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.429643][ T3999] device bridge_slave_0 entered promiscuous mode [ 136.438647][ T3999] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.445493][ T3999] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.452945][ T3999] device bridge_slave_1 entered promiscuous mode [ 136.476092][ T45] device bridge_slave_1 left promiscuous mode [ 136.491042][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.501179][ T45] device bridge_slave_0 left promiscuous mode [ 136.525752][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.598701][ T30] audit: type=1400 audit(1742858084.825:176): avc: denied { append } for pid=4022 comm="syz.0.1048" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 136.637333][ T45] device veth1_macvtap left promiscuous mode [ 136.643199][ T45] device veth0_vlan left promiscuous mode [ 136.960041][ T4033] FAULT_INJECTION: forcing a failure. [ 136.960041][ T4033] name failslab, interval 1, probability 0, space 0, times 0 [ 136.974123][ T4033] CPU: 0 PID: 4033 Comm: syz.4.1050 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 136.983875][ T4033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 136.993773][ T4033] Call Trace: [ 136.996893][ T4033] [ 136.999669][ T4033] dump_stack_lvl+0x151/0x1c0 [ 137.004805][ T4033] ? io_uring_drop_tctx_refs+0x190/0x190 [ 137.010278][ T4033] dump_stack+0x15/0x20 [ 137.014269][ T4033] should_fail+0x3c6/0x510 [ 137.018521][ T4033] __should_failslab+0xa4/0xe0 [ 137.023116][ T4033] ? anon_vma_clone+0x9a/0x500 [ 137.027717][ T4033] should_failslab+0x9/0x20 [ 137.032057][ T4033] slab_pre_alloc_hook+0x37/0xd0 [ 137.036831][ T4033] ? anon_vma_clone+0x9a/0x500 [ 137.041429][ T4033] kmem_cache_alloc+0x44/0x250 [ 137.046037][ T4033] anon_vma_clone+0x9a/0x500 [ 137.050461][ T4033] anon_vma_fork+0x91/0x4e0 [ 137.054794][ T4033] ? anon_vma_name+0x4c/0x70 [ 137.059269][ T4033] ? vm_area_dup+0x17a/0x230 [ 137.063648][ T4033] copy_mm+0xa3a/0x13e0 [ 137.067651][ T4033] ? copy_signal+0x610/0x610 [ 137.072068][ T4033] ? __init_rwsem+0xfe/0x1d0 [ 137.076495][ T4033] ? copy_signal+0x4e3/0x610 [ 137.080924][ T4033] copy_process+0x1149/0x3290 [ 137.085436][ T4033] ? __kasan_check_write+0x14/0x20 [ 137.090396][ T4033] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 137.095327][ T4033] ? vfs_write+0x94d/0x1110 [ 137.099673][ T4033] kernel_clone+0x21e/0x9e0 [ 137.104008][ T4033] ? __kasan_check_write+0x14/0x20 [ 137.108958][ T4033] ? create_io_thread+0x1e0/0x1e0 [ 137.113820][ T4033] __x64_sys_clone+0x23f/0x290 [ 137.118416][ T4033] ? __do_sys_vfork+0x130/0x130 [ 137.123103][ T4033] ? debug_smp_processor_id+0x17/0x20 [ 137.128307][ T4033] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 137.134209][ T4033] ? exit_to_user_mode_prepare+0x39/0xa0 [ 137.139678][ T4033] x64_sys_call+0x1b0/0x9a0 [ 137.144029][ T4033] do_syscall_64+0x3b/0xb0 [ 137.148271][ T4033] ? clear_bhb_loop+0x35/0x90 [ 137.152782][ T4033] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 137.158508][ T4033] RIP: 0033:0x7f088b222169 [ 137.162767][ T4033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.182209][ T4033] RSP: 002b:00007f088988bfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 137.190451][ T4033] RAX: ffffffffffffffda RBX: 00007f088b43afa0 RCX: 00007f088b222169 [ 137.198260][ T4033] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 137.206073][ T4033] RBP: 00007f088988c090 R08: 0000000000000000 R09: 0000000000000000 [ 137.213899][ T4033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 137.221691][ T4033] R13: 0000000000000000 R14: 00007f088b43afa0 R15: 00007ffcdf4d2218 [ 137.229517][ T4033] [ 137.483912][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.535396][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.566187][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 137.589373][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.619825][ T320] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.626753][ T320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.644196][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 137.664416][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 137.673422][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.699447][ T320] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.706356][ T320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.728942][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 137.744595][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 137.758683][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 137.779994][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 137.832890][ T3999] device veth0_vlan entered promiscuous mode [ 137.839701][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 137.859286][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 137.909107][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 137.916564][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 137.925893][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 137.941256][ T3999] device veth1_macvtap entered promiscuous mode [ 137.948887][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 137.962719][ T4070] FAULT_INJECTION: forcing a failure. [ 137.962719][ T4070] name failslab, interval 1, probability 0, space 0, times 0 [ 137.966516][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 138.028272][ T4070] CPU: 1 PID: 4070 Comm: syz.3.1062 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 138.038014][ T4070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 138.047912][ T4070] Call Trace: [ 138.051029][ T4070] [ 138.051682][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 138.053816][ T4070] dump_stack_lvl+0x151/0x1c0 [ 138.053845][ T4070] ? io_uring_drop_tctx_refs+0x190/0x190 [ 138.071698][ T4070] dump_stack+0x15/0x20 [ 138.075683][ T4070] should_fail+0x3c6/0x510 [ 138.079935][ T4070] __should_failslab+0xa4/0xe0 [ 138.084529][ T4070] ? anon_vma_clone+0x9a/0x500 [ 138.089131][ T4070] should_failslab+0x9/0x20 [ 138.093469][ T4070] slab_pre_alloc_hook+0x37/0xd0 [ 138.098249][ T4070] ? anon_vma_clone+0x9a/0x500 [ 138.102843][ T4070] kmem_cache_alloc+0x44/0x250 [ 138.107448][ T4070] anon_vma_clone+0x9a/0x500 [ 138.111888][ T4070] anon_vma_fork+0x91/0x4e0 [ 138.116212][ T4070] ? anon_vma_name+0x4c/0x70 [ 138.120637][ T4070] ? vm_area_dup+0x17a/0x230 [ 138.125061][ T4070] copy_mm+0xa3a/0x13e0 [ 138.129065][ T4070] ? copy_signal+0x610/0x610 [ 138.133479][ T4070] ? __init_rwsem+0xfe/0x1d0 [ 138.137909][ T4070] ? copy_signal+0x4e3/0x610 [ 138.142338][ T4070] copy_process+0x1149/0x3290 [ 138.146854][ T4070] ? __kasan_check_write+0x14/0x20 [ 138.151800][ T4070] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 138.156740][ T4070] ? vfs_write+0x94d/0x1110 [ 138.161091][ T4070] kernel_clone+0x21e/0x9e0 [ 138.165428][ T4070] ? __kasan_check_write+0x14/0x20 [ 138.170376][ T4070] ? create_io_thread+0x1e0/0x1e0 [ 138.175321][ T4070] __x64_sys_clone+0x23f/0x290 [ 138.179918][ T4070] ? __do_sys_vfork+0x130/0x130 [ 138.184605][ T4070] ? debug_smp_processor_id+0x17/0x20 [ 138.189812][ T4070] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 138.195712][ T4070] ? exit_to_user_mode_prepare+0x39/0xa0 [ 138.201179][ T4070] x64_sys_call+0x1b0/0x9a0 [ 138.205528][ T4070] do_syscall_64+0x3b/0xb0 [ 138.209773][ T4070] ? clear_bhb_loop+0x35/0x90 [ 138.214286][ T4070] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 138.220015][ T4070] RIP: 0033:0x7f8ef8b7c169 [ 138.224268][ T4070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 138.243710][ T4070] RSP: 002b:00007f8ef71e5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 138.251953][ T4070] RAX: ffffffffffffffda RBX: 00007f8ef8d94fa0 RCX: 00007f8ef8b7c169 [ 138.259769][ T4070] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 138.267578][ T4070] RBP: 00007f8ef71e6090 R08: 0000000000000000 R09: 0000000000000000 [ 138.275391][ T4070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 138.283193][ T4070] R13: 0000000000000000 R14: 00007f8ef8d94fa0 R15: 00007ffea26c1728 [ 138.291018][ T4070] [ 138.301294][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 138.321718][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 138.605045][ T4079] device syzkaller0 entered promiscuous mode [ 138.715952][ T4079] device pim6reg1 entered promiscuous mode [ 139.584657][ T30] audit: type=1400 audit(1742858087.805:177): avc: denied { create } for pid=4103 comm="syz.0.1071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 139.653868][ T4099] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.699250][ T4099] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.733246][ T4099] device bridge_slave_0 entered promiscuous mode [ 139.797134][ T4099] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.803999][ T4099] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.869041][ T4099] device bridge_slave_1 entered promiscuous mode [ 140.055691][ T45] device bridge_slave_1 left promiscuous mode [ 140.061716][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.069643][ T45] device bridge_slave_0 left promiscuous mode [ 140.077343][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.096936][ T45] device veth1_macvtap left promiscuous mode [ 140.102855][ T45] device veth0_vlan left promiscuous mode [ 140.158175][ T4124] FAULT_INJECTION: forcing a failure. [ 140.158175][ T4124] name failslab, interval 1, probability 0, space 0, times 0 [ 140.186260][ T4124] CPU: 1 PID: 4124 Comm: syz.3.1077 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 140.196007][ T4124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 140.205902][ T4124] Call Trace: [ 140.209110][ T4124] [ 140.211887][ T4124] dump_stack_lvl+0x151/0x1c0 [ 140.216400][ T4124] ? io_uring_drop_tctx_refs+0x190/0x190 [ 140.221877][ T4124] dump_stack+0x15/0x20 [ 140.225859][ T4124] should_fail+0x3c6/0x510 [ 140.230112][ T4124] __should_failslab+0xa4/0xe0 [ 140.234709][ T4124] ? anon_vma_fork+0x1df/0x4e0 [ 140.239309][ T4124] should_failslab+0x9/0x20 [ 140.243658][ T4124] slab_pre_alloc_hook+0x37/0xd0 [ 140.248584][ T4124] ? anon_vma_fork+0x1df/0x4e0 [ 140.253168][ T4124] kmem_cache_alloc+0x44/0x250 [ 140.257775][ T4124] anon_vma_fork+0x1df/0x4e0 [ 140.262200][ T4124] copy_mm+0xa3a/0x13e0 [ 140.266198][ T4124] ? copy_signal+0x610/0x610 [ 140.270619][ T4124] ? __init_rwsem+0xfe/0x1d0 [ 140.275045][ T4124] ? copy_signal+0x4e3/0x610 [ 140.279468][ T4124] copy_process+0x1149/0x3290 [ 140.283982][ T4124] ? __kasan_check_write+0x14/0x20 [ 140.288935][ T4124] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 140.293874][ T4124] ? vfs_write+0x94d/0x1110 [ 140.298219][ T4124] kernel_clone+0x21e/0x9e0 [ 140.302558][ T4124] ? __kasan_check_write+0x14/0x20 [ 140.307504][ T4124] ? create_io_thread+0x1e0/0x1e0 [ 140.312376][ T4124] __x64_sys_clone+0x23f/0x290 [ 140.316961][ T4124] ? __do_sys_vfork+0x130/0x130 [ 140.321654][ T4124] ? debug_smp_processor_id+0x17/0x20 [ 140.326857][ T4124] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 140.332773][ T4124] ? exit_to_user_mode_prepare+0x39/0xa0 [ 140.338226][ T4124] x64_sys_call+0x1b0/0x9a0 [ 140.342572][ T4124] do_syscall_64+0x3b/0xb0 [ 140.346825][ T4124] ? clear_bhb_loop+0x35/0x90 [ 140.351333][ T4124] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 140.357086][ T4124] RIP: 0033:0x7f8ef8b7c169 [ 140.361315][ T4124] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 140.380755][ T4124] RSP: 002b:00007f8ef71e5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 140.388997][ T4124] RAX: ffffffffffffffda RBX: 00007f8ef8d94fa0 RCX: 00007f8ef8b7c169 [ 140.396807][ T4124] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 140.404627][ T4124] RBP: 00007f8ef71e6090 R08: 0000000000000000 R09: 0000000000000000 [ 140.412430][ T4124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 140.420244][ T4124] R13: 0000000000000000 R14: 00007f8ef8d94fa0 R15: 00007ffea26c1728 [ 140.428068][ T4124] [ 140.893472][ T4137] bond_slave_1: mtu less than device minimum [ 141.310414][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 141.322948][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 141.385873][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 141.394040][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 141.420247][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.427150][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.445930][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 141.454230][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 141.462588][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.469465][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.485731][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 141.493638][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 141.508893][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 141.606091][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 141.617988][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.636340][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.649506][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 141.663454][ T4099] device veth0_vlan entered promiscuous mode [ 141.757426][ T4099] device veth1_macvtap entered promiscuous mode [ 141.774977][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 141.846013][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 141.886127][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 142.694430][ T45] device bridge_slave_1 left promiscuous mode [ 142.700460][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.708126][ T45] device bridge_slave_0 left promiscuous mode [ 142.714112][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.722482][ T45] device veth1_macvtap left promiscuous mode [ 142.728511][ T45] device veth0_vlan left promiscuous mode [ 142.907889][ T4163] FAULT_INJECTION: forcing a failure. [ 142.907889][ T4163] name failslab, interval 1, probability 0, space 0, times 0 [ 142.945756][ T4163] CPU: 0 PID: 4163 Comm: syz.4.1089 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 142.955495][ T4163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 142.965385][ T4163] Call Trace: [ 142.968512][ T4163] [ 142.971296][ T4163] dump_stack_lvl+0x151/0x1c0 [ 142.975803][ T4163] ? io_uring_drop_tctx_refs+0x190/0x190 [ 142.981275][ T4163] ? avc_denied+0x1b0/0x1b0 [ 142.985615][ T4163] dump_stack+0x15/0x20 [ 142.989601][ T4163] should_fail+0x3c6/0x510 [ 142.993856][ T4163] __should_failslab+0xa4/0xe0 [ 142.998456][ T4163] ? vm_area_dup+0x26/0x230 [ 143.002791][ T4163] should_failslab+0x9/0x20 [ 143.007131][ T4163] slab_pre_alloc_hook+0x37/0xd0 [ 143.011908][ T4163] ? vm_area_dup+0x26/0x230 [ 143.016249][ T4163] kmem_cache_alloc+0x44/0x250 [ 143.020854][ T4163] vm_area_dup+0x26/0x230 [ 143.025014][ T4163] copy_mm+0x9a1/0x13e0 [ 143.029012][ T4163] ? copy_signal+0x610/0x610 [ 143.033427][ T4163] ? __init_rwsem+0xfe/0x1d0 [ 143.037861][ T4163] ? copy_signal+0x4e3/0x610 [ 143.042282][ T4163] copy_process+0x1149/0x3290 [ 143.046795][ T4163] ? __kasan_check_write+0x14/0x20 [ 143.051755][ T4163] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 143.056688][ T4163] ? vfs_write+0x94d/0x1110 [ 143.061031][ T4163] kernel_clone+0x21e/0x9e0 [ 143.065376][ T4163] ? __kasan_check_write+0x14/0x20 [ 143.070317][ T4163] ? create_io_thread+0x1e0/0x1e0 [ 143.075177][ T4163] __x64_sys_clone+0x23f/0x290 [ 143.079775][ T4163] ? __do_sys_vfork+0x130/0x130 [ 143.084463][ T4163] ? debug_smp_processor_id+0x17/0x20 [ 143.089668][ T4163] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 143.095591][ T4163] ? exit_to_user_mode_prepare+0x39/0xa0 [ 143.101039][ T4163] x64_sys_call+0x1b0/0x9a0 [ 143.105378][ T4163] do_syscall_64+0x3b/0xb0 [ 143.109629][ T4163] ? clear_bhb_loop+0x35/0x90 [ 143.114142][ T4163] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 143.119870][ T4163] RIP: 0033:0x7f088b222169 [ 143.124127][ T4163] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 143.143563][ T4163] RSP: 002b:00007f088988bfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 143.151808][ T4163] RAX: ffffffffffffffda RBX: 00007f088b43afa0 RCX: 00007f088b222169 [ 143.159623][ T4163] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 143.167431][ T4163] RBP: 00007f088988c090 R08: 0000000000000000 R09: 0000000000000000 [ 143.175242][ T4163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 143.183053][ T4163] R13: 0000000000000000 R14: 00007f088b43afa0 R15: 00007ffcdf4d2218 [ 143.190876][ T4163] [ 143.335642][ T4169] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.342529][ T4169] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.394995][ T4169] device bridge_slave_0 entered promiscuous mode [ 143.428438][ T4200] device wg2 entered promiscuous mode [ 143.437837][ T4169] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.462364][ T4169] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.504822][ T4169] device bridge_slave_1 entered promiscuous mode [ 144.105733][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 144.117573][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.151491][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.176007][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.184177][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.191061][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.198599][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 144.210917][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.221504][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.228400][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.264142][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 144.337184][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 144.346551][ T4224] FAULT_INJECTION: forcing a failure. [ 144.346551][ T4224] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 144.366574][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 144.379447][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 144.405801][ T4224] CPU: 1 PID: 4224 Comm: syz.4.1104 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 144.415545][ T4224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 144.425437][ T4224] Call Trace: [ 144.428561][ T4224] [ 144.431374][ T4224] dump_stack_lvl+0x151/0x1c0 [ 144.431425][ T4169] device veth0_vlan entered promiscuous mode [ 144.435847][ T4224] ? io_uring_drop_tctx_refs+0x190/0x190 [ 144.435868][ T4224] ? __switch_to+0x62a/0x1190 [ 144.445612][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 144.447141][ T4224] dump_stack+0x15/0x20 [ 144.452784][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 144.459543][ T4224] should_fail+0x3c6/0x510 [ 144.459573][ T4224] should_fail_alloc_page+0x5a/0x80 [ 144.464129][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 144.470999][ T4224] prepare_alloc_pages+0x15c/0x700 [ 144.471030][ T4224] ? __alloc_pages_bulk+0xd80/0xd80 [ 144.471054][ T4224] __alloc_pages+0x18c/0x8f0 [ 144.471076][ T4224] ? prep_new_page+0x110/0x110 [ 144.471095][ T4224] ? __alloc_pages+0x27e/0x8f0 [ 144.471118][ T4224] ? __kasan_check_write+0x14/0x20 [ 144.477135][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 144.480285][ T4224] ? _raw_spin_lock+0xa4/0x1b0 [ 144.527504][ T4224] __pmd_alloc+0xb1/0x550 [ 144.531665][ T4224] ? __pud_alloc+0x260/0x260 [ 144.536088][ T4224] ? __pud_alloc+0x213/0x260 [ 144.540516][ T4224] ? do_handle_mm_fault+0x2400/0x2400 [ 144.545725][ T4224] ? __stack_depot_save+0x34/0x470 [ 144.550669][ T4224] ? anon_vma_clone+0x9a/0x500 [ 144.555274][ T4224] copy_page_range+0x29ea/0x2e20 [ 144.560043][ T4224] ? __kasan_slab_alloc+0xb1/0xe0 [ 144.564906][ T4224] ? anon_vma_fork+0x1df/0x4e0 [ 144.569503][ T4224] ? copy_mm+0xa3a/0x13e0 [ 144.573669][ T4224] ? copy_process+0x1149/0x3290 [ 144.578356][ T4224] ? x64_sys_call+0x1b0/0x9a0 [ 144.582869][ T4224] ? do_syscall_64+0x3b/0xb0 [ 144.587307][ T4224] ? pfn_valid+0x1e0/0x1e0 [ 144.591549][ T4224] ? rwsem_write_trylock+0x153/0x340 [ 144.596671][ T4224] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 144.602919][ T4224] ? vma_gap_callbacks_rotate+0x1b7/0x210 [ 144.608476][ T4224] ? __rb_insert_augmented+0x5de/0x610 [ 144.613772][ T4224] copy_mm+0xc7e/0x13e0 [ 144.617764][ T4224] ? copy_signal+0x610/0x610 [ 144.622184][ T4224] ? __init_rwsem+0xfe/0x1d0 [ 144.626615][ T4224] ? copy_signal+0x4e3/0x610 [ 144.631041][ T4224] copy_process+0x1149/0x3290 [ 144.635552][ T4224] ? __kasan_check_write+0x14/0x20 [ 144.640505][ T4224] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 144.645445][ T4224] ? vfs_write+0x94d/0x1110 [ 144.649802][ T4224] kernel_clone+0x21e/0x9e0 [ 144.654129][ T4224] ? __kasan_check_write+0x14/0x20 [ 144.659073][ T4224] ? create_io_thread+0x1e0/0x1e0 [ 144.663935][ T4224] __x64_sys_clone+0x23f/0x290 [ 144.668537][ T4224] ? __do_sys_vfork+0x130/0x130 [ 144.673225][ T4224] ? debug_smp_processor_id+0x17/0x20 [ 144.678431][ T4224] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 144.684329][ T4224] ? exit_to_user_mode_prepare+0x39/0xa0 [ 144.689797][ T4224] x64_sys_call+0x1b0/0x9a0 [ 144.694138][ T4224] do_syscall_64+0x3b/0xb0 [ 144.698387][ T4224] ? clear_bhb_loop+0x35/0x90 [ 144.702902][ T4224] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 144.708634][ T4224] RIP: 0033:0x7f088b222169 [ 144.712885][ T4224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.732325][ T4224] RSP: 002b:00007f088988bfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 144.740570][ T4224] RAX: ffffffffffffffda RBX: 00007f088b43afa0 RCX: 00007f088b222169 [ 144.748379][ T4224] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 144.756190][ T4224] RBP: 00007f088988c090 R08: 0000000000000000 R09: 0000000000000000 [ 144.764002][ T4224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 144.771813][ T4224] R13: 0000000000000000 R14: 00007f088b43afa0 R15: 00007ffcdf4d2218 [ 144.779632][ T4224] [ 144.841321][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 144.861647][ T4169] device veth1_macvtap entered promiscuous mode [ 145.022008][ T4243] ref_ctr_offset mismatch. inode: 0x4f7 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 145.097232][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 145.105501][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 145.113883][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 145.122040][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 146.171139][ T4275] FAULT_INJECTION: forcing a failure. [ 146.171139][ T4275] name failslab, interval 1, probability 0, space 0, times 0 [ 146.210116][ T4275] CPU: 1 PID: 4275 Comm: syz.0.1116 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 146.219872][ T4275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 146.229768][ T4275] Call Trace: [ 146.232891][ T4275] [ 146.235664][ T4275] dump_stack_lvl+0x151/0x1c0 [ 146.240183][ T4275] ? io_uring_drop_tctx_refs+0x190/0x190 [ 146.245658][ T4275] dump_stack+0x15/0x20 [ 146.249637][ T4275] should_fail+0x3c6/0x510 [ 146.253894][ T4275] __should_failslab+0xa4/0xe0 [ 146.258489][ T4275] ? anon_vma_fork+0x1df/0x4e0 [ 146.263097][ T4275] should_failslab+0x9/0x20 [ 146.267429][ T4275] slab_pre_alloc_hook+0x37/0xd0 [ 146.272208][ T4275] ? anon_vma_fork+0x1df/0x4e0 [ 146.276815][ T4275] kmem_cache_alloc+0x44/0x250 [ 146.281401][ T4275] anon_vma_fork+0x1df/0x4e0 [ 146.285830][ T4275] copy_mm+0xa3a/0x13e0 [ 146.289824][ T4275] ? copy_signal+0x610/0x610 [ 146.294247][ T4275] ? __init_rwsem+0xfe/0x1d0 [ 146.298672][ T4275] ? copy_signal+0x4e3/0x610 [ 146.303101][ T4275] copy_process+0x1149/0x3290 [ 146.307616][ T4275] ? __kasan_check_write+0x14/0x20 [ 146.312563][ T4275] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 146.317504][ T4275] ? vfs_write+0x94d/0x1110 [ 146.321847][ T4275] kernel_clone+0x21e/0x9e0 [ 146.326186][ T4275] ? __kasan_check_write+0x14/0x20 [ 146.331131][ T4275] ? create_io_thread+0x1e0/0x1e0 [ 146.335999][ T4275] __x64_sys_clone+0x23f/0x290 [ 146.340591][ T4275] ? __do_sys_vfork+0x130/0x130 [ 146.345280][ T4275] ? debug_smp_processor_id+0x17/0x20 [ 146.350494][ T4275] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 146.356389][ T4275] ? exit_to_user_mode_prepare+0x39/0xa0 [ 146.361857][ T4275] x64_sys_call+0x1b0/0x9a0 [ 146.366194][ T4275] do_syscall_64+0x3b/0xb0 [ 146.370449][ T4275] ? clear_bhb_loop+0x35/0x90 [ 146.374963][ T4275] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 146.380776][ T4275] RIP: 0033:0x7f16c88a9169 [ 146.385033][ T4275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 146.404478][ T4275] RSP: 002b:00007f16c6f12fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 146.412715][ T4275] RAX: ffffffffffffffda RBX: 00007f16c8ac1fa0 RCX: 00007f16c88a9169 [ 146.420529][ T4275] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 146.428340][ T4275] RBP: 00007f16c6f13090 R08: 0000000000000000 R09: 0000000000000000 [ 146.436151][ T4275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 146.443958][ T4275] R13: 0000000000000000 R14: 00007f16c8ac1fa0 R15: 00007ffdba0881c8 [ 146.451780][ T4275] [ 146.477138][ T45] device bridge_slave_1 left promiscuous mode [ 146.486821][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.494832][ T45] device bridge_slave_0 left promiscuous mode [ 146.564502][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.599332][ T45] device veth1_macvtap left promiscuous mode [ 146.605175][ T45] device veth0_vlan left promiscuous mode [ 146.835176][ T4296] device pim6reg1 entered promiscuous mode [ 147.212582][ T4305] device syzkaller0 entered promiscuous mode [ 147.243267][ T4286] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.254557][ T4286] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.262313][ T4286] device bridge_slave_0 entered promiscuous mode [ 147.309763][ T4324] device syzkaller0 entered promiscuous mode [ 147.316355][ T4286] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.323197][ T4286] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.331242][ T4286] device bridge_slave_1 entered promiscuous mode [ 147.365304][ T4328] FAULT_INJECTION: forcing a failure. [ 147.365304][ T4328] name failslab, interval 1, probability 0, space 0, times 0 [ 147.383617][ T4328] CPU: 0 PID: 4328 Comm: syz.0.1131 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 147.393339][ T4328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 147.403233][ T4328] Call Trace: [ 147.406355][ T4328] [ 147.409134][ T4328] dump_stack_lvl+0x151/0x1c0 [ 147.413649][ T4328] ? io_uring_drop_tctx_refs+0x190/0x190 [ 147.419123][ T4328] ? dump_stack+0x9/0x20 [ 147.423207][ T4328] dump_stack+0x15/0x20 [ 147.427191][ T4328] should_fail+0x3c6/0x510 [ 147.431451][ T4328] __should_failslab+0xa4/0xe0 [ 147.436046][ T4328] ? anon_vma_clone+0x9a/0x500 [ 147.440638][ T4328] should_failslab+0x9/0x20 [ 147.444978][ T4328] slab_pre_alloc_hook+0x37/0xd0 [ 147.449752][ T4328] ? anon_vma_clone+0x9a/0x500 [ 147.454351][ T4328] kmem_cache_alloc+0x44/0x250 [ 147.458952][ T4328] anon_vma_clone+0x9a/0x500 [ 147.463390][ T4328] anon_vma_fork+0x91/0x4e0 [ 147.467718][ T4328] ? anon_vma_name+0x4c/0x70 [ 147.472146][ T4328] ? vm_area_dup+0x17a/0x230 [ 147.476570][ T4328] copy_mm+0xa3a/0x13e0 [ 147.480566][ T4328] ? copy_signal+0x610/0x610 [ 147.484990][ T4328] ? __init_rwsem+0xfe/0x1d0 [ 147.489420][ T4328] ? copy_signal+0x4e3/0x610 [ 147.493846][ T4328] copy_process+0x1149/0x3290 [ 147.498359][ T4328] ? __kasan_check_write+0x14/0x20 [ 147.503308][ T4328] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 147.508249][ T4328] ? vfs_write+0x94d/0x1110 [ 147.512602][ T4328] kernel_clone+0x21e/0x9e0 [ 147.516929][ T4328] ? __kasan_check_write+0x14/0x20 [ 147.521875][ T4328] ? create_io_thread+0x1e0/0x1e0 [ 147.526742][ T4328] __x64_sys_clone+0x23f/0x290 [ 147.531336][ T4328] ? __do_sys_vfork+0x130/0x130 [ 147.536028][ T4328] ? debug_smp_processor_id+0x17/0x20 [ 147.541248][ T4328] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 147.547132][ T4328] ? exit_to_user_mode_prepare+0x39/0xa0 [ 147.552599][ T4328] x64_sys_call+0x1b0/0x9a0 [ 147.556937][ T4328] do_syscall_64+0x3b/0xb0 [ 147.561190][ T4328] ? clear_bhb_loop+0x35/0x90 [ 147.565705][ T4328] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 147.571430][ T4328] RIP: 0033:0x7f16c88a9169 [ 147.575686][ T4328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 147.595342][ T4328] RSP: 002b:00007f16c6f12fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 147.603577][ T4328] RAX: ffffffffffffffda RBX: 00007f16c8ac1fa0 RCX: 00007f16c88a9169 [ 147.611388][ T4328] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 147.619200][ T4328] RBP: 00007f16c6f13090 R08: 0000000000000000 R09: 0000000000000000 [ 147.627018][ T4328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 147.634825][ T4328] R13: 0000000000000000 R14: 00007f16c8ac1fa0 R15: 00007ffdba0881c8 [ 147.642646][ T4328] [ 147.704983][ T4332] device pim6reg1 entered promiscuous mode [ 147.873456][ T4336] device wg2 entered promiscuous mode [ 147.909266][ T4339] device wg2 left promiscuous mode [ 147.947718][ T4286] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.954639][ T4286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.961750][ T4286] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.968527][ T4286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.989774][ T30] audit: type=1400 audit(1742858096.215:178): avc: denied { create } for pid=4343 comm="syz.3.1135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 148.029425][ T4341] device pim6reg1 entered promiscuous mode [ 148.076218][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.084655][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.156054][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.163391][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.221542][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.230029][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.238320][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.245199][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.252800][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 148.262202][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.284923][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.291821][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.317076][ T4358] device sit0 left promiscuous mode [ 148.379156][ T4369] device sit0 entered promiscuous mode [ 148.524608][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 148.537416][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 148.581513][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 148.603409][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 148.734678][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 148.763483][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 149.045848][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 149.061228][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 149.230248][ T4286] device veth0_vlan entered promiscuous mode [ 149.316386][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 149.329330][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 149.369396][ T4403] device sit0 left promiscuous mode [ 149.394621][ T4404] device sit0 entered promiscuous mode [ 149.566391][ T4286] device veth1_macvtap entered promiscuous mode [ 149.575773][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 149.586133][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 149.599608][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 149.634772][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 149.654218][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 149.690126][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 149.708485][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 150.516299][ T1595] device bridge_slave_1 left promiscuous mode [ 150.522227][ T1595] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.529604][ T1595] device bridge_slave_0 left promiscuous mode [ 150.535513][ T1595] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.543378][ T1595] device veth1_macvtap left promiscuous mode [ 150.549294][ T1595] device veth0_vlan left promiscuous mode [ 150.867629][ T4437] device pim6reg1 entered promiscuous mode [ 150.913369][ T4444] device pim6reg1 entered promiscuous mode [ 151.170402][ T4458] device sit0 left promiscuous mode [ 151.284440][ T4462] device sit0 entered promiscuous mode [ 151.630023][ T4477] device pim6reg1 entered promiscuous mode [ 151.646699][ T4445] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.653607][ T4445] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.661071][ T4445] device bridge_slave_0 entered promiscuous mode [ 151.698201][ T4445] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.705252][ T4445] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.712508][ T4445] device bridge_slave_1 entered promiscuous mode [ 151.983032][ T4495] device wg2 left promiscuous mode [ 152.017273][ T4495] device wg2 entered promiscuous mode [ 152.061837][ T4445] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.068716][ T4445] bridge0: port 2(bridge_slave_1) entered forwarding state [ 152.075808][ T4445] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.082580][ T4445] bridge0: port 1(bridge_slave_0) entered forwarding state [ 152.107191][ T1595] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.114591][ T1595] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.123466][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 152.130959][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 152.150994][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 152.159395][ T1595] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.166280][ T1595] bridge0: port 1(bridge_slave_0) entered forwarding state [ 152.175230][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 152.184745][ T1595] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.191617][ T1595] bridge0: port 2(bridge_slave_1) entered forwarding state [ 152.210875][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 152.218907][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 152.236584][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 152.244966][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.253085][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 152.260381][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.271030][ T4445] device veth0_vlan entered promiscuous mode [ 152.298833][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 152.308615][ T4445] device veth1_macvtap entered promiscuous mode [ 152.329524][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 152.346555][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 152.543754][ T4503] cgroup: fork rejected by pids controller in /syz2 [ 153.740396][ T4632] device sit0 left promiscuous mode [ 154.059408][ T45] device bridge_slave_1 left promiscuous mode [ 154.066624][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.098416][ T45] device bridge_slave_0 left promiscuous mode [ 154.106925][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.118339][ T45] device veth1_macvtap left promiscuous mode [ 154.124177][ T45] device veth0_vlan left promiscuous mode [ 154.231567][ T4658] cgroup: fork rejected by pids controller in /syz0 [ 154.323141][ T4633] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.333714][ T4633] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.341206][ T4633] device bridge_slave_0 entered promiscuous mode [ 154.356223][ T4639] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.394953][ T4639] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.422673][ T4639] device bridge_slave_0 entered promiscuous mode [ 154.429261][ T4633] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.436263][ T4633] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.443663][ T4633] device bridge_slave_1 entered promiscuous mode [ 154.457242][ T4639] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.466261][ T4639] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.476324][ T4639] device bridge_slave_1 entered promiscuous mode [ 154.742853][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.756020][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.764630][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.783253][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.791562][ T320] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.798456][ T320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.809164][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 154.831482][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 154.840770][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.849662][ T320] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.856542][ T320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.864014][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.872628][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.882256][ T4716] device pim6reg1 entered promiscuous mode [ 154.926561][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.939477][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.952650][ T320] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.959535][ T320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.989705][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 154.997513][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.005423][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.073610][ T4639] device veth0_vlan entered promiscuous mode [ 155.120174][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.147182][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.192555][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.240340][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.272204][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.321571][ T320] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.328471][ T320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.340524][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 155.381277][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 155.396073][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.403928][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.447962][ T4639] device veth1_macvtap entered promiscuous mode [ 155.465516][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 155.476771][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 155.487620][ T1595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 155.505675][ T4739] device pim6reg1 left promiscuous mode [ 155.546606][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 155.554370][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.567810][ T4633] device veth0_vlan entered promiscuous mode [ 155.580112][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.587663][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.646115][ T4633] device veth1_macvtap entered promiscuous mode [ 155.658033][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 155.687053][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 155.736194][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 155.806006][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 155.876547][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 155.923036][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 155.952999][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 156.258994][ T45] device veth1_macvtap left promiscuous mode [ 157.760738][ T45] device bridge_slave_1 left promiscuous mode [ 157.769166][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.804346][ T45] device bridge_slave_0 left promiscuous mode [ 157.831884][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.888183][ T45] device veth1_macvtap left promiscuous mode [ 157.894333][ T45] device veth0_vlan left promiscuous mode [ 158.162865][ T4783] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.169950][ T4783] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.177898][ T4783] device bridge_slave_0 entered promiscuous mode [ 158.184950][ T4783] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.191900][ T4783] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.199650][ T4783] device bridge_slave_1 entered promiscuous mode [ 158.313377][ T4783] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.320363][ T4783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.327491][ T4783] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.334336][ T4783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.572871][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.645417][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.662937][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.720783][ T4783] device veth0_vlan entered promiscuous mode [ 158.731060][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 158.739540][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.747894][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.754607][ T4815] syz.0.1221[4815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.754941][ T4815] syz.0.1221[4815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.767904][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.788701][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.797038][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.803883][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.811566][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.821393][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.828267][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.855775][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.863645][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.907497][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 158.916013][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 158.924790][ T4783] device veth1_macvtap entered promiscuous mode [ 159.165338][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 159.173533][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 159.196184][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 159.217776][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 159.246127][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready Connection to 10.128.0.78 closed by remote host. [ 159.760901][ T4823] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 159.772547][ T4823] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 159.780788][ T4823] CPU: 0 PID: 4823 Comm: syz.3.1224 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 159.790511][ T4823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 159.800399][ T4823] RIP: 0010:__rb_erase_color+0x20b/0xa60 [ 159.805868][ T4823] Code: 49 89 de 49 c1 ee 03 43 80 3c 26 00 74 08 48 89 df e8 49 74 2a ff 4c 8b 3b 4d 89 fc 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 04 00 74 08 4c 89 ff e8 26 74 2a ff 41 f6 07 01 48 89 5d [ 159.825310][ T4823] RSP: 0018:ffffc90000b17580 EFLAGS: 00010246 [ 159.831209][ T4823] RAX: dffffc0000000000 RBX: ffff888112385bf8 RCX: ffff888118a13b40 [ 159.839021][ T4823] RDX: ffffffff81a59790 RSI: ffff888109936c78 RDI: ffff888112385be8 [ 159.846833][ T4823] RBP: ffffc90000b175e0 R08: ffffffff81a57850 R09: ffffed1021326d93 [ 159.854643][ T4823] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 159.862459][ T4823] R13: ffff888112385be8 R14: 1ffff11022470b7f R15: 0000000000000000 [ 159.870267][ T4823] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 159.879034][ T4823] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 159.885453][ T4823] CR2: 0000000000000000 CR3: 0000000006a0f000 CR4: 00000000003506b0 [ 159.893269][ T4823] DR0: 0000000000000000 DR1: 00000000000000fd DR2: 0000000000000000 [ 159.901078][ T4823] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 159.908888][ T4823] Call Trace: [ 159.912011][ T4823] [ 159.914794][ T4823] ? __die_body+0x62/0xb0 [ 159.918958][ T4823] ? die_addr+0x9f/0xd0 [ 159.922949][ T4823] ? exc_general_protection+0x311/0x4b0 [ 159.928335][ T4823] ? asm_exc_general_protection+0x27/0x30 [ 159.933886][ T4823] ? vma_interval_tree_remove+0xae0/0xba0 [ 159.939441][ T4823] ? anon_vma_interval_tree_iter_next+0x390/0x390 [ 159.945692][ T4823] ? __rb_erase_color+0x20b/0xa60 [ 159.950551][ T4823] ? anon_vma_interval_tree_iter_next+0x390/0x390 [ 159.956799][ T4823] ? rwsem_mark_wake+0x770/0x770 [ 159.961573][ T4823] vma_interval_tree_remove+0xb82/0xba0 [ 159.966957][ T4823] unlink_file_vma+0xd9/0xf0 [ 159.971380][ T4823] free_pgtables+0x13f/0x280 [ 159.975807][ T4823] exit_mmap+0x47c/0x990 [ 159.979886][ T4823] ? exit_aio+0x25e/0x3c0 [ 159.984049][ T4823] ? vm_brk+0x30/0x30 [ 159.987868][ T4823] ? mutex_unlock+0xb2/0x260 [ 159.992300][ T4823] ? uprobe_clear_state+0x2cd/0x320 [ 159.997331][ T4823] __mmput+0x95/0x310 [ 160.001149][ T4823] mmput+0x5b/0x170 [ 160.004794][ T4823] do_exit+0xb9c/0x2ca0 [ 160.008785][ T4823] ? simple_acl_create+0x2c0/0x2c0 [ 160.013735][ T4823] ? put_task_struct+0x80/0x80 [ 160.018334][ T4823] ? get_signal+0xd32/0x1630 [ 160.022770][ T4823] ? __traceiter_kmem_cache_free+0x32/0x50 [ 160.028409][ T4823] do_group_exit+0x141/0x310 [ 160.032838][ T4823] get_signal+0x7a3/0x1630 [ 160.037230][ T4823] arch_do_signal_or_restart+0xbd/0x1680 [ 160.042694][ T4823] ? __send_signal+0x96f/0xcb0 [ 160.047292][ T4823] ? get_sigframe_size+0x10/0x10 [ 160.052060][ T4823] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 160.057707][ T4823] ? force_sig_info_to_task+0x31c/0x440 [ 160.063088][ T4823] ? force_sig+0x114/0x1d0 [ 160.067343][ T4823] exit_to_user_mode_loop+0xa0/0xe0 [ 160.072371][ T4823] exit_to_user_mode_prepare+0x5a/0xa0 [ 160.077666][ T4823] irqentry_exit_to_user_mode+0x9/0x10 [ 160.082960][ T4823] irqentry_exit+0x12/0x40 [ 160.087215][ T4823] exc_general_protection+0x327/0x4b0 [ 160.092433][ T4823] asm_exc_general_protection+0x27/0x30 [ 160.097800][ T4823] RIP: 0033:0x7f8ef8b7c171 [ 160.102056][ T4823] Code: Unable to access opcode bytes at RIP 0x7f8ef8b7c147. [ 160.109258][ T4823] RSP: 002b:00002000000000f0 EFLAGS: 00010217 [ 160.115159][ T4823] RAX: 0000000000000000 RBX: 00007f8ef8d94fa0 RCX: 00007f8ef8b7c169 [ 160.122970][ T4823] RDX: 0000200000000100 RSI: 00002000000000f0 RDI: 0000000000000000 [ 160.130779][ T4823] RBP: 00007f8ef8bfd2a0 R08: 0000200000000180 R09: 0000200000000180 [ 160.138591][ T4823] R10: 0000200000000140 R11: 0000000000000246 R12: 0000000000000000 [ 160.146527][ T4823] R13: 0000000000000000 R14: 00007f8ef8d94fa0 R15: 00007ffea26c1728 [ 160.154344][ T4823] [ 160.157202][ T4823] Modules linked in: [ 160.162015][ T4823] ---[ end trace 9d561af15b5fbb8a ]--- [ 160.169202][ T4823] RIP: 0010:__rb_erase_color+0x20b/0xa60 [ 160.175337][ T4823] Code: 49 89 de 49 c1 ee 03 43 80 3c 26 00 74 08 48 89 df e8 49 74 2a ff 4c 8b 3b 4d 89 fc 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 04 00 74 08 4c 89 ff e8 26 74 2a ff 41 f6 07 01 48 89 5d [ 160.194866][ T4823] RSP: 0018:ffffc90000b17580 EFLAGS: 00010246 [ 160.200747][ T4823] RAX: dffffc0000000000 RBX: ffff888112385bf8 RCX: ffff888118a13b40 [ 160.208793][ T4823] RDX: ffffffff81a59790 RSI: ffff888109936c78 RDI: ffff888112385be8 [ 160.216808][ T4823] RBP: ffffc90000b175e0 R08: ffffffff81a57850 R09: ffffed1021326d93 [ 160.224607][ T4823] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 160.232485][ T4823] R13: ffff888112385be8 R14: 1ffff11022470b7f R15: 0000000000000000 [ 160.240793][ T4823] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 160.249582][ T4823] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 160.255993][ T4823] CR2: 0000000000000000 CR3: 000000010d00b000 CR4: 00000000003506b0 [ 160.263780][ T4823] DR0: 0000000000000000 DR1: 00000000000000fd DR2: 0000000000000000 [ 160.271636][ T4823] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 160.279599][ T4823] Kernel panic - not syncing: Fatal exception [ 160.285783][ T4823] Kernel Offset: disabled [ 160.289917][ T4823] Rebooting in 86400 seconds..