last executing test programs: 6.481688561s ago: executing program 3 (id=1168): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00010000850000000d000000b7000000000000009500000000000000496cf2827fb43a431c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000071120a00000000009500000000000000c4ea8e5056426576113e779de333b9f9051ed37f71b92aa8ad2b58b36bc8c08c305723bc260a553758c5dad843513b26b495ac31e64aac3e3c51871a87a64dd7cc5d009da7db32fd9fb5fc108160ff459091f3856cce8832ab2eacb949aa"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92344f242b416ae9eeefc0e9c6f203cb1276bfdbb4ddffffff7f82dc2b938189a7ca02f732e4c2eab72bf40c0682fd0a0c4ac106b29e220dc2880072599456d4c4e6f3fe684ab8373bb4df9d72876ef3834293812e927c01c7da1322da44c7f2ed1084a12f56d1cb39df9858037458a4ca037604007600b6be484e4c9517af216bd8ed42f7dd01008e49f4a94608c9a20819e02fc22e6be45574d4ed88b37ab8d7674c644dca2f1b4d745fd95c41f9dfc1adafd1e5a3e7f2e898961cb43e438c4e41ae43ea118e14ffffffffe4b8a80366ce5401ec61921a1b529cc8b99bffffb1ac006c67767b03b95151aeb89e6d4a43c625aa228504e4afd8c1cc3eb215ba22f43115f4d39dc7beedb130d9f2be90133a4500000058b8c9370634060105baa664953514605fba3973aa021945b985a8a66e0200000057033815717b4fdbe55b37cb8d7f41aacfbd4089ea1bd22440f64909a09b5a759a703e71f358e11ac8e13db15d792e604a4f279b3bd6621bdf2c17bc0400001000000000ff8d81006200607a9a76e5d9656a7154c75773902a1bdf399df3925130312d095e9c1f973d091c198c1a11edb6b3cc425fe203d2f2655a76865c2c34e2470fcfb1248c0add5431a7fbcb0ef4f66a09af93a09fab1daae4b518d7a5d95a017864010067d6bab101446ebfe3fdeed7ee7bb0749cacf56cf27409c60fca2e0004000000000000a9cb6f4a78444986f9b1ab61f9dab53038010000004abbfc59d6d1b18fe380df4bf024f120bd755d82033f2fb7d8fc9e0de834f7646c8dd27da1297d0c77b294e097e293db7f002c0024ab2fb4d32972cba6f49051cec1ff5d16231bbb90a2d201a500000000000000007700b06fa191ebd3a0c2ef0058ffebd7cc4cf80f74a7cdac01d998c24f34a5ba9a4a2039d0416e3f8107671141ffffffe0c7d8e94a27a06a4e3d9acee835fd0571e5bbb3e6d2b5eba505000000968983811f832dc5390f83e817c602c4f1f0d0504255c22ee8674053d0e160e5255366139bbe5863e23c3dd42d21f542816edf56a93d0a7e6f08f9ffffff64875fea6ff57ba6ae25c5e8ca4f78d5a01308243b08f1caa46be5244d64f8e875857f083144c642f71cdc8e5634c1360c056430fe77ee7ed7ac1f9743786b2fb8e0fcfcc3d36c93230b7b1da97c971c8c84a427edc3492b97e73d2060acfd8145e4a5851bc4d6fdc5ad939d7795f3879baa88bd194d48e50c84892c97c800d156b059a718f6b10274b077a710f27ab8ee953de70ea860b74a0f3c3dc11177b11cc2e62a95f1ecf607a8dc38e525f415a1bd46b38845ebca04061bacbf627f7975fe599678fee48f83b5989543729e3600000000bc86cd51704f309130f534741377ea7b7bea3c46c0c4c4b7c27c5d057d95ac85a41cdcee8e6fa31f7d2137ed1fb4b21c13b9a2c5e3f7c9ef9e45a35adbf0b9312be929863f000000000000004a82bc080de1f87808d0711dd76f2977ca7f2684bfa5c14a0cd6f1f561e34e4e8e51e81d4a355a7d00d917c16a2bb0cfb2b5f59dfead7ac6e7fa84746e2e425769b9ee2c8ff10e934847604d930f62924d0562ce17f6dadf5053ed8f33092a41bb46e1878c5295fecc27f9c6d1f62da58c0002ea00000000009aa38a05e70591d5cdab1c488ef3c1984c7c0a566cfc2a080000009ec206a54fb49056a555414178ef00d8b8f3c59f01eb5d83415994efcc6ec4b3c275cd6b1b5ff82ef7d7abb1d218e7a1d0afa285706841aac9ccc89df41c39dd58dd70569dde45f8adeaad7d3328fbb6e279f745d2872f0208635e465ca443c3a64c7803760880af23fb3f430a0311fffc96dd13b951642f1433f65b4e170a62a5f7b7d0f9d5cef0d17289c43d4aee0001f7a343899434594cc23e1c864164e130754b337e560f285dc670a31241bf657babf0615b85dc200a10294b7d5885b43ac62fc7f97a85586168483427072a535f2c7481ec261c00f725de74e48d9a86f7d4a5d28da3f099ca3e6472b9d7c86d961f525f799b4517141f018af0673b8296f867eca1ec07be11bc497a6f7d2b752bcf77c2908b64630e7fa0c2261bc2d5de32ab6bbcf296d36807544aa7c3d3301fe227b713a371414c98695e559f9cbf6b046184064a5f24a4cc6f41f21fc24a3ad7d20a89e00a9dc99a40f890869d35fba3ce6f297661d3f8ba21c65badf55d1859581f9e7ef3e2693b46a8fc85be061ce79a08002c04dc04de8b6536123b24be2ef80eb06b2db900fb30596c1574b2a31f81d61ccfd58080d2330b9c7b87b5d17d48c32daffead3414b91603e250eeedc7d601000000037426f643797be3e93da96b5643d3feed0b7c885d06006b830d7cbf3152f27522f5142dcc84a9e48a07518f0142167abf5d6685d09945cbc778bcc3e7dcfaee5d9c1689a3bafc0d3b51b5a3bfd6007954c36d532960964183842601e5364ecb6ad9168040388c7640bfa2f88643de7eebf4da8d1c3e76daace5217761d933d06bbe9609fcf5971aa1e77c3123910e63daaadd8878ad468eabaf78a96012a4ada1a9cd217fb2a0da2d521454ea9e8fcd3b5badfd6f00003a73345b841d04a02bf441955b932c59608a555bc44873272812e0fb874618a0b56b4cf44990f60000000000000000000000b20000da0ca6797590ed13b0bccf71a39e05e877893646d185a77882f866785af6b0149e336c31fb177e3e85f4c60cd4de4ce6ea73a95f434328620fa493937386ad2e2a0d60eb815aa05c33e02c32276dab36d14c63af66a31409ab2a403ec3c7a4e07bd745efa2835a8c932f22aa6da40af9bcdf808b916bc8deb37d5b8c422b65c42d17e61751c561ce775a31b52703d398d52694cfbb7d2b3791b030093b321d9f16b2f06676cf94d75cbba6491ae0b5a16ce92320321314d8d2e88d1cd7e7b1216bdaecba309a38e107103e649d46958cc6ba2d660dd41b78d832beb7206ae01508377273ea96e40760410aeed1866971e04f578e9d856d01000000045aea928f5f669be0636dc3f34f90c34531735f271527412d1ae755a9243da523d713071f9370b509a34eeb46415b2f0d271a7072cbd17e293f20132e6c15756e92776c6a0d7c3a9f512ce17edf3f1ea190853bbf93e220a6ce968b79d504c057000e7d8f8249a8158e68a90bbea8bfab2bd3c067c28e185fe62ce7020f5282cf045b9c790984c6fb65fd3187bd8bfcbe663df6b7770000f58fbad41e6eee5c9595950c4172b9c925403b2f99bbf3cb1981bb0d14bded8eae35e08278020a1ec7f508628056fd3d408a02a1cf8594bcbb21a88f477673442804f714212d000045b9f563b5352fe460a30489b1b6a6d37daead86151492f7fd4b5c64007b68a1b04027eac124478a2ef7f59fe472795785de83578cb96334e0f7c1370dc397d3aa42d937b5718b7610cdcdfe104db7801ec74980b8b111a2748321f81512e4204eb2b024b9fc9e0f257f8c6037b93b2caa236d4354b32434d5a6b01e00000000ee2ea723ea2e1accb97a200609c77e0000000000000000d3a54ccd6e13a966801e9341260d6cbce5fe03999214462cbaa297448677ab659102d0f430fbeae119a7ef2e962d2829d4dd2201c4b30d491269594c88252fbd09aced90609851bd9e5c307e7e0d39e73579c1f3563eff1a6237d3699d61acdc8e36010d76093ddd237df1c4181b0a0c4543b4249e9ff2f5e8b5e0ba2048d542de40f643fda4036124b8feb2dd45d0fa52300518c8052cc09ad73f89734fce82cc627356aa2c651ed2644f34cfbc32e8b29cf29e895e43b473ddb9a43421b4b25f8bbce8e2d7cb8547d156d5972021ae4c9e30f85413276ddebde55999d2ec3c524632b74d703147ba09e0dcb26c4b89636d28428b67e955f53bfd0c9eeb7a9d17000000000096cd8ecf1c511eea07aefa1c5cae1841efa9329d80eafefe00000000000000009111274a44c722ff9f5151aa7cb99ea3e8b2c51eadbd2d0ba1a25b08cc3e67cd186c12ea62a55ff905388bb30d1a63d42593c9aea3a84f5a6fc470d8aaaafeccb373ca26c3685679e6a048af19fca3fc5315a33687"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) 6.427234502s ago: executing program 3 (id=1169): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f00000016c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0x62, 0xfffffffffffffe74, &(0x7f0000000140)="cb74445b7d4c0b24676c6c71ae37efcedaf46242309766deb4e793f90000000000000000dbc856cbc664650634231454ca2d8034c4ca29e0d99c3b6615e91835a600c08f989af45438a54981be310aad92ae545b1c961e5f3762a51fe4c736edec6f", &(0x7f0000000cc0)=""/265, 0xcb95, 0x0, 0xff, 0x194, &(0x7f0000000980)="ffc4438e5c3081d0e133e812196ec0ed923733aa8b5aba32c8650e7a66d6136853773dfbc6226be13039e230d511f1ac50cc7811aac0400e4c833fedf842ae2918e6fddb550729246fcf4c0a01bc64989ea3985fb362751a83991bd56e761379caa64f6148893ff25f38d5cd6dd695bbf9ca709a9960e0e6b054d5e2239bcb7c0fb2ac66dc4c8f534e439ff20ccaf0d48a98c19c92a3b437a699350f49606d21a403f8c112c46fea5486bf367a854b0f6c1e563b656e4794f6793a08bb3656c391643f6df71d0255054368a938d38503d064da82d5dbf395ad47ed3932669168d324ed0f6de8360d499042ddc7d02b6c0772128257702bfe6d0971f00fea85da062cdc", &(0x7f00000007c0)="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", 0x2, 0x0, 0x3ff}, 0x24) r7 = openat$cgroup_procs(r3, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000680), 0x0, 0xc, 0x0, 0x27, 0x0, &(0x7f0000000740)="63b96b1faa73d55df9a776bf16b982a3108eb83a0419f12545ab4981dad4e9c43fd9c182b50911", 0x0, 0x2, 0x0, 0x7f}, 0x50) write$cgroup_pid(r7, &(0x7f0000000880), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB="00000000ffffffff00"/24], 0x48) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'\x00', 0x202}) ioctl$TUNSETPERSIST(r8, 0x400454c9, 0x1) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x0) r9 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_DELETE_ELEM(0x4, &(0x7f0000000080)={r9}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) 5.115551859s ago: executing program 3 (id=1178): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000001140), &(0x7f00000001c0)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'pimreg\x00', 0x2}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x14, 0xc, &(0x7f0000001000)=ANY=[@ANYRES64=0x0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=ANY=[@ANYRESOCT=r0, @ANYRESDEC=0x0, @ANYRESOCT=r5], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000200)=ANY=[], 0xfdef) r7 = bpf$TOKEN_CREATE(0x24, &(0x7f00000010c0), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000001180)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="cd0458e439dbc2a2aa3a300f06243fb1905be7bc19c3790d421b52bc5b410a92c2f9f995dd77f23148756a06d27d31ece7c9ea3b2e93f30dc6446b16a6334d88b0f51e095e1db7d7b3d454f3ea31bb9e07f5de7f4fa01850ad6c587e235b8bf12ccd644e132e1ad0b68dfed896bd31d6c3af044ce7e87381720afa6a4d8732142e162acf6b384cd2c5079ea2f314173a6f4c11bdf8904f99a0e9195ad965a761cec3a3a14ab68c74e9f5ca3f48c1c6dc7b6aa600ac5f33184653f19f3ceb5212ab2fdbdedd73f90dde9f939f0c7e69b949e937a2"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000010850000006d00000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r8}, 0xc) r9 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x2}, 0x0, 0x6, 0x7, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0x81}, 0x100c, 0x0, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffd0c, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x3f02, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000, 0x0, 0xff9f}, 0x28) 4.888236533s ago: executing program 4 (id=1182): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008bd6000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=ANY=[@ANYBLOB="850000000000000007000000000000009501"], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x2, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0200000004000000040000000900000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000079c009e485c932f0ccbf5c5aac59839d7a5e7fedfe34d5fcfb0d3c57ed20f9fc8e6182ba074a12c3ef18eef078644900fb8fed", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0xa, 0x4, 0x1, 0x0, r4, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x8, 0x1, 0x40, 0x42, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r6}, 0x38) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001b00)={r5, &(0x7f0000001a40), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0x45, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000000000000000000001811f7ff", @ANYRESDEC=r3, @ANYRESDEC=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @tracing=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="620ac4ff0000000071102b00000000009500000000000000d4eec21f20d72163fb31eee8d11609128c13f7db4b65b634d426821523ef53cd0443283aebbae76879f4dd49999a005187edf4ec5f74aa749059ccc9b7b0f7bf7232bbc7254452c467314bc5980f6d16d1c9c42c95bcf90173121009eee6087a7bf65dcb3058ce59100047194b1c6c0089b8fa4da1b2b8488d121b249f70913243e2336d3041e44f72c99fa622c80d1c01751fe7d846c7d517f2a8c14313c53fb748"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r8}, 0x10) 4.684241865s ago: executing program 3 (id=1184): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x2, 0x10, 0x4, 0x0, 0x0, 0x3, 0x174c54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xc}, 0x4001, 0xc8, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8948, &(0x7f0000000000)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x00 \'Y\x17]\x15c\xcaR\xdd\x98OGK\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\x06\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf1\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000"], 0xfdef) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) 4.607619027s ago: executing program 3 (id=1185): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000001140), &(0x7f00000001c0)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'pimreg\x00', 0x2}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x14, 0xc, &(0x7f0000001000)=ANY=[@ANYRES64=0x0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=ANY=[@ANYRESOCT=r0, @ANYRESDEC=0x0, @ANYRESOCT=r5], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000200)=ANY=[], 0xfdef) r7 = bpf$TOKEN_CREATE(0x24, &(0x7f00000010c0), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000001180)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="cd0458e439dbc2a2aa3a300f06243fb1905be7bc19c3790d421b52bc5b410a92c2f9f995dd77f23148756a06d27d31ece7c9ea3b2e93f30dc6446b16a6334d88b0f51e095e1db7d7b3d454f3ea31bb9e07f5de7f4fa01850ad6c587e235b8bf12ccd644e132e1ad0b68dfed896bd31d6c3af044ce7e87381720afa6a4d8732142e162acf6b384cd2c5079ea2f314173a6f4c11bdf8904f99a0e9195ad965a761cec3a3a14ab68c74e9f5ca3f48c1c6dc7b6aa600ac5f33184653f19f3ceb5212ab2fdbdedd73f90dde9f939f0c7e69b949e937a2"], 0x50) r8 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x2}, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0x81}, 0x100c, 0x0, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffd0c, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x3f02, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000, 0x0, 0xff9f}, 0x28) (fail_nth: 8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 4.37725753s ago: executing program 3 (id=1187): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext={0x9ae0067}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x100, 0xfd, 0x9, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x100, 0xfd, 0x9, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0xcff5, r0}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='cachefiles_prep_read\x00', r3, 0x0, 0xffffffff80000000}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='cachefiles_prep_read\x00', r3, 0x0, 0xffffffff80000000}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f00000100000012"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0xfffffed8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='task_newtask\x00', r6}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f00000005c0)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r8}, 0x8) (async) r9 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r8}, 0x8) close(r9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r9}, &(0x7f0000000180), &(0x7f0000000200)=r5}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r9}, &(0x7f0000000180), &(0x7f0000000200)=r5}, 0x20) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x10, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff53c, 0x0, 0x0, 0x0, 0x0, 0x8}, r9, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r6, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xe5, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xd7, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)={0x1b, 0x0, 0x0, 0x3, 0x0, r9, 0x59861a0b, '\x00', r10, r9, 0x4, 0x3, 0x1, 0x0, @void, @value, @void, @value}, 0x50) 3.688279719s ago: executing program 4 (id=1189): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = openat$cgroup(r2, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) close(r3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00'], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1f, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4004080}, 0x0) sendmsg$tipc(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1e, 0x5, 0x100, &(0x7f0000000340)) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x9, 0x84, 0x144, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r6}, &(0x7f0000000a00), &(0x7f0000000a40)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r6}, &(0x7f0000000880), &(0x7f00000008c0)=r2}, 0x20) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x31) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r8, 0x0, 0x0, 0xfffffffffffffdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.91760374s ago: executing program 4 (id=1199): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r0}, 0x10) unlink(&(0x7f00000008c0)='./file0\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x2d, 0x54, &(0x7f0000000680)="88fddda0becfbf5ec8c3fb9e3138c70d09b9772a67a8a0f42cec1da7b96a4ca20b5281b79e4999816d5e72ab32", &(0x7f00000006c0)=""/84, 0x0, 0x0, 0x10a, 0x33, &(0x7f00000009c0)="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", &(0x7f0000000800)="a0e426dad599c429266337da8e093e1f15884f840b69171c10ce7a8de1322969ea1d51b78679cdf783d6e47be24e9d6c1efa81", 0x4, 0x0, 0x8}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x90000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x5, 0x49, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x9, 0xfffffffffffffff6}, 0x0, 0x0, 0x0, 0x0, 0x2000000010000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1428437b3c8026bdfeb6db4ee9bcb25b1811d40a203bf40b3a7da5a8a64db04ed6dd26eea2a37229c339b1f91", 0x39}], 0x1, 0x0, 0x0, 0x84000}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r4 = syz_clone(0x100600, &(0x7f0000000300)="bb1f0cf290815bda0147c6d20884124f6a5520d77d791fe363e83e624c79cabb170f05fdab01a81d44608f6fcdcf4d4f9793c2a2792008ba9992bf8d3fa6cb107ef809402a0d39d4735abf", 0x4b, &(0x7f0000000380), &(0x7f0000000540), &(0x7f0000000280)="4c7a8a5fc7e1c28c1bab6d") r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x410000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x3, 0xf0, 0x6, 0x5, 0x0, 0x4e5, 0x64ca8, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x41, 0x4, 0x6, 0x9, 0x8000000000000001, 0xd, 0x2, 0x0, 0x0, 0x0, 0x4}, r4, 0x9, r5, 0x9) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="4b09479d7bf65d8f21d91a22c70508881aef43705f359d532dc6cedf040e7b5b98a027c6b430683c431005a7e292e5bdc92aedd1bd181db3a50efa93ed35259761f4de3cca825ec5bdbe2588d2c0154cee6ea07cbd5cae220272f68ef70a0e9e92c59de9a84369e78a9e9353db8afbca8af52cbc8d6fa5bbf0eba8", @ANYRESOCT=r1], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000e61000000006cc"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 2.710339743s ago: executing program 1 (id=1203): openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0xffffffffffffff5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x121, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x2}, 0x80, 0x200, 0x82, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x400000000000002}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x8cff, 0x0, 0x0, 0xe60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 2.105361001s ago: executing program 0 (id=1210): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0e00000004000000080000000b00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000496bcdbb623e0e43d20000000000000000000000004800"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='contention_end\x00', r2}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1902"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32=r3, @ANYBLOB="000000000000000000000000000081c3c0000097", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x26, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='rxrpc_rx_ack\x00', r6, 0x0, 0x9}, 0x18) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.sectors\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1d00000005000000150000000700000010000000", @ANYRES32, @ANYBLOB='\t\x00'/14, @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="01000000040000000100"/28], 0x50) write$cgroup_subtree(r7, &(0x7f00000001c0)=ANY=[@ANYBLOB='+\x00\x00ua\x00ct '], 0x9) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00, 0x0, 0xffffffffffffffff, 0xffffffffffffff20, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYRES64=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r9 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000600000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001010000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r10}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000bb00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) 1.928241904s ago: executing program 1 (id=1212): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x3}, 0x100960, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000001140), &(0x7f00000001c0)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'pimreg\x00', 0x2}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x14, 0xc, &(0x7f0000001000)=ANY=[@ANYRES64=0x0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=ANY=[@ANYRESOCT=r0, @ANYRESDEC=0x0, @ANYRESOCT=r5], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000200)=ANY=[], 0xfdef) r7 = bpf$TOKEN_CREATE(0x24, &(0x7f00000010c0), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000001180)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="cd0458e439dbc2a2aa3a300f06243fb1905be7bc19c3790d421b52bc5b410a92c2f9f995dd77f23148756a06d27d31ece7c9ea3b2e93f30dc6446b16a6334d88b0f51e095e1db7d7b3d454f3ea31bb9e07f5de7f4fa01850ad6c587e235b8bf12ccd644e132e1ad0b68dfed896bd31d6c3af044ce7e87381720afa6a4d8732142e162acf6b384cd2c5079ea2f314173a6f4c11bdf8904f99a0e9195ad965a761cec3a3a14ab68c74e9f5ca3f48c1c6dc7b6aa600ac5f33184653f19f3ceb5212ab2fdbdedd73f90dde9f939f0c7e69b949e937a2"], 0x50) r8 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x2}, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001040), 0x1}, 0x100c, 0xffffffffffffffff, 0x4, 0x9, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffd0c, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x3f02, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000, 0x0, 0xff9f}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.927584933s ago: executing program 4 (id=1213): socketpair(0xf, 0x3, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000710000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.639148527s ago: executing program 4 (id=1215): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x2, 0x4, 0x8, 0xd, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) close(0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000040)="3cdab00900000000000000278b", 0x33fe0}], 0x215, 0x0, 0x3e80}, 0x240c1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r2, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000240)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x0, 0xdc, &(0x7f0000000540)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x71, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000780), 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x17, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7fff}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0x9, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x80}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @func], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='GPL\x00', 0x5, 0xac, &(0x7f00000003c0)=""/172, 0x40f00, 0x8, '\x00', r4, 0x25, r5, 0x8, &(0x7f00000007c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000800)={0x3, 0xf, 0x8, 0x7fffffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r0, r2, r0, r2], &(0x7f0000000880), 0x10, 0x8, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) 1.565828689s ago: executing program 0 (id=1216): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001340)={&(0x7f00000003c0)='sched_switch\x00', r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0, 0xffd0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 1.565447649s ago: executing program 1 (id=1217): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000200000002000000008000000060000000000000700000000000100000100000d0100000000000000e1ffffff00000000000061"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 1.528044729s ago: executing program 0 (id=1218): socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r2}, 0x0, 0x0}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) socketpair(0x18, 0x0, 0x2, &(0x7f0000004080)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, 0x0, 0x48) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1000}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) 1.522035529s ago: executing program 4 (id=1219): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r2, 0x5, 0x0, 0x0, @void, @value}, 0x10) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0xaac, 0xffffffff, 0x2, 0x1, r3, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x5, 0x9, @void, @value, @void, @value}, 0x50) r4 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000640)={[{0x2d, 'cpu'}]}, 0x5) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000280), 0x44) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480, 0x4, @perf_config_ext={0xfd, 0x8}, 0x0, 0x5}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x0, 0xf9, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_config_ext={0x0, 0x10001}, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xf) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r8}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.44465521s ago: executing program 1 (id=1220): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x2, 0x10, 0x4, 0x0, 0x0, 0x3, 0x174c54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xc}, 0x4001, 0xc8, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8948, &(0x7f0000000000)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x00 \'Y\x17]\x15c\xcaR\xdd\x98OGK\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\x06\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf1\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000"], 0xfdef) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) 1.313420932s ago: executing program 0 (id=1222): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x4, 0x0, 0x0, 0x504}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x840, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'veth0_to_hsr\x00', 0x4000}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={r6, 0xf, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0xa4400, 0x0) 1.274528303s ago: executing program 1 (id=1223): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r1}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0), 0x200000, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0), 0x200000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_fc_commit_stop\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) 904.497337ms ago: executing program 2 (id=1225): socketpair(0xf, 0x3, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000710000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 838.805128ms ago: executing program 2 (id=1226): perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x80, 0xff, 0x8, 0x6, 0x30, 0x0, 0x9, 0x2000, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000200), 0x1}, 0x108, 0x5, 0x40, 0x2, 0x572, 0xc2, 0x2, 0x0, 0x4, 0x0, 0x100000000}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x498dde7bc5ee1ac3) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x105043, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0xe211}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x6}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x11, 0xa, 0x300, &(0x7f0000000000)) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (rerun: 64) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fec0000000000000110880febb0028aafe8000000020000027bfa7b09303960e2f80af"], 0xfdef) (async, rerun: 64) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000), 0xfdef) 673.62446ms ago: executing program 2 (id=1227): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x0, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18024801532197af65bee191ce4558434b59f034e536c25c979e7a6182bfd1c2726c99e2631884059ff497041d8c98f71d394bb88409fcb4e6e3662eef3613e65d5260f9005c7d291d64b935590d942171797f30d98c7d32b8de7d4d36dda3300a74c69f18f3650c836dc023977538d105022bdc499f95177820d9ea62a5f1ed50c899168fab99d770c9f10dfbd6a538e5f841c168167fa933b80ed000f777000000007f17f500000000000000000000258001eb3e6c0400c835a6b53630bd099d6835c931ed"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000e5850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$MAP_LOOKUP_ELEM(0x15, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r5) 672.857111ms ago: executing program 0 (id=1228): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000001140), &(0x7f00000001c0)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'pimreg\x00', 0x2}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x14, 0xc, &(0x7f0000001000)=ANY=[@ANYRES64=0x0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=ANY=[@ANYRESOCT=r0, @ANYRESDEC=0x0, @ANYRESOCT=r5], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000200)=ANY=[], 0xfdef) r8 = bpf$TOKEN_CREATE(0x24, &(0x7f0000001040)={0x0, r6}, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000001180)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="cd0458e439dbc2a2aa3a300f06243fb1905be7bc19c3790d421b52bc5b410a92c2f9f995dd77f23148756a06d27d31ece7c9ea3b2e93f30dc6446b16a6334d88b0f51e095e1db7d7b3d454f3ea31bb9e07f5de7f4fa01850ad6c587e235b8bf12ccd644e132e1ad0b68dfed896bd31d6c3af044ce7e87381720afa6a4d8732142e162acf6b384cd2c5079ea2f314173a6f4c11bdf8904f99a0e9195ad965a761cec3a3a14ab68c74e9f5ca3f48c1c6dc7b6aa600ac5f33184653f19f3ceb5212ab2fdbdedd73f90dde9f939f0c7e69b949e937a2"], 0x50) r9 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x2}, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0x81}, 0x101a48, 0x0, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffd0c, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x3f02, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000, 0x0, 0xff9f}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 181.119508ms ago: executing program 2 (id=1229): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001340)={&(0x7f00000003c0)='sched_switch\x00', r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0, 0xfff8}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 98.918478ms ago: executing program 0 (id=1230): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000020000008500000086000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ioctl$TUNSETIFF(r4, 0xb701, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000001000000", @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x13, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r6}, 0x10) close(r5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) (async) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) (async) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000100)='THAWED\x00', 0x7) 95.533269ms ago: executing program 2 (id=1231): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000200000002000000008000000060000000000000700000000000600000100000d0100000000000000e1ffffff00000000000061"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 542.71µs ago: executing program 1 (id=1232): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000040095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x0, r0}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffc001, 0x1, r1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xf00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000010c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000280)={r3, r1}, 0xc) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffe}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @call={0x85, 0x0, 0x0, 0x23}]}, 0x0, 0xfffffffe, 0x4e, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0500000003f01f00660000007f00000001"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b703000000000000850000007200000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000240)='kfree\x00', r9}, 0x10) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r8, &(0x7f0000001600), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r7}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r11) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) write$cgroup_subtree(r6, 0x0, 0xfdef) 0s ago: executing program 2 (id=1233): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x2, 0x10, 0x4, 0x0, 0x0, 0x3, 0x174c54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xc}, 0x4001, 0xc8, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8948, &(0x7f0000000000)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x00 \'Y\x17]\x15c\xcaR\xdd\x98OGK\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\x06\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf1\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000"], 0xfdef) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.80' (ED25519) to the list of known hosts. [ 26.266131][ T30] audit: type=1400 audit(1746868211.723:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.267523][ T273] cgroup: Unknown subsys name 'net' [ 26.288863][ T30] audit: type=1400 audit(1746868211.723:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.316433][ T30] audit: type=1400 audit(1746868211.743:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.316832][ T273] cgroup: Unknown subsys name 'devices' [ 26.517871][ T273] cgroup: Unknown subsys name 'hugetlb' [ 26.523539][ T273] cgroup: Unknown subsys name 'rlimit' [ 26.664298][ T30] audit: type=1400 audit(1746868212.113:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.687465][ T30] audit: type=1400 audit(1746868212.113:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.712373][ T30] audit: type=1400 audit(1746868212.113:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.719576][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 26.744668][ T30] audit: type=1400 audit(1746868212.193:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.770345][ T30] audit: type=1400 audit(1746868212.193:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.804918][ T30] audit: type=1400 audit(1746868212.253:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.830686][ T30] audit: type=1400 audit(1746868212.253:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.830883][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 27.429890][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.437127][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.444679][ T281] device bridge_slave_0 entered promiscuous mode [ 27.451942][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.459129][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.466613][ T281] device bridge_slave_1 entered promiscuous mode [ 27.476413][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.483456][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.490950][ T282] device bridge_slave_0 entered promiscuous mode [ 27.499334][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.506491][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.513878][ T282] device bridge_slave_1 entered promiscuous mode [ 27.591508][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.598596][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.606218][ T283] device bridge_slave_0 entered promiscuous mode [ 27.622535][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.629621][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.637142][ T283] device bridge_slave_1 entered promiscuous mode [ 27.680007][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.687263][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.694612][ T284] device bridge_slave_0 entered promiscuous mode [ 27.705100][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.712249][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.719762][ T285] device bridge_slave_0 entered promiscuous mode [ 27.726711][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.733748][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.741306][ T285] device bridge_slave_1 entered promiscuous mode [ 27.747856][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.754884][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.762339][ T284] device bridge_slave_1 entered promiscuous mode [ 27.901627][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.908711][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.916007][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.923033][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.964723][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.971812][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.979111][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.986147][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.003069][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.010155][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.017447][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.024474][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.042542][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.049625][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.057064][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.064225][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.080235][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.087750][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.095001][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.102778][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.110265][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.117603][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.125331][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.132869][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.140818][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.148400][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.170516][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.178741][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.185788][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.193256][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.201541][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.208703][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.230401][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.247598][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.256789][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.264360][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.278724][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.286387][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.294516][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.301561][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.318293][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.326577][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.334729][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.341802][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.349543][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.357872][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.364890][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.372330][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.380518][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.387578][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.394949][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.403298][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.410329][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.429344][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.437909][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.446398][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.453462][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.461037][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.470262][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.478821][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.486886][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.509743][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.518314][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.526687][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.534614][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.542897][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.551115][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.559386][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.567445][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.576066][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.584148][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.592669][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.601098][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.612710][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.621201][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.637821][ T282] device veth0_vlan entered promiscuous mode [ 28.646195][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.654520][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.662211][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.669968][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.678272][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.689998][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.697622][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.713674][ T282] device veth1_macvtap entered promiscuous mode [ 28.721606][ T285] device veth0_vlan entered promiscuous mode [ 28.729288][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.737787][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.746291][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.754014][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.761570][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.778659][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.787194][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.795612][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.802643][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.810139][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.818583][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.827530][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.834558][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.842056][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.850381][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.858827][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.867257][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.875769][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.883806][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.891819][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.899489][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.907862][ T283] device veth0_vlan entered promiscuous mode [ 28.917597][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.925784][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.938770][ T285] device veth1_macvtap entered promiscuous mode [ 28.951339][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.959800][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.968027][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.979796][ T283] device veth1_macvtap entered promiscuous mode [ 28.993332][ T281] device veth0_vlan entered promiscuous mode [ 29.000445][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.008977][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 29.017659][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.026239][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.034394][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.042679][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.050279][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.072205][ T282] request_module fs-gadgetfs succeeded, but still no fs? [ 29.079672][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.088225][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.097505][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.105884][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.114250][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.122790][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.131429][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.139679][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.148363][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.156615][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.168613][ T281] device veth1_macvtap entered promiscuous mode [ 29.194355][ T284] device veth0_vlan entered promiscuous mode [ 29.204499][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.213467][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 29.223220][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.231693][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.239964][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.245451][ C0] hrtimer: interrupt took 38280 ns [ 29.248367][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.260546][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.284275][ T284] device veth1_macvtap entered promiscuous mode [ 29.294674][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.303298][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.312220][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.321203][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.330067][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.398138][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.406558][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.414986][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.428995][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.400247][ T325] device syzkaller0 entered promiscuous mode [ 30.489500][ T336] syz.3.9[336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.489993][ T336] syz.3.9[336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.381056][ T30] kauditd_printk_skb: 33 callbacks suppressed [ 31.381072][ T30] audit: type=1400 audit(1746868216.833:107): avc: denied { create } for pid=357 comm="syz.1.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 31.535520][ T30] audit: type=1400 audit(1746868216.963:108): avc: denied { read } for pid=359 comm="syz.4.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.681888][ T30] audit: type=1400 audit(1746868217.013:109): avc: denied { write } for pid=359 comm="syz.4.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 35.516253][ T30] audit: type=1400 audit(1746868220.963:110): avc: denied { read } for pid=427 comm="syz.0.39" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 35.635935][ T30] audit: type=1400 audit(1746868221.033:111): avc: denied { open } for pid=427 comm="syz.0.39" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 35.686735][ T30] audit: type=1400 audit(1746868221.143:112): avc: denied { ioctl } for pid=427 comm="syz.0.39" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.049059][ T30] audit: type=1400 audit(1746868221.503:113): avc: denied { create } for pid=443 comm="syz.2.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 36.197595][ T30] audit: type=1400 audit(1746868221.533:114): avc: denied { write } for pid=441 comm="syz.0.45" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 40.724876][ T558] syz.2.85[558] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.725179][ T558] syz.2.85[558] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.993538][ T584] FAULT_INJECTION: forcing a failure. [ 41.993538][ T584] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 42.085708][ T584] CPU: 1 PID: 584 Comm: syz.2.94 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 42.095399][ T584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 42.105484][ T584] Call Trace: [ 42.108789][ T584] [ 42.111727][ T584] __dump_stack+0x21/0x30 [ 42.116083][ T584] dump_stack_lvl+0xee/0x150 [ 42.120692][ T584] ? show_regs_print_info+0x20/0x20 [ 42.125909][ T584] dump_stack+0x15/0x20 [ 42.130076][ T584] should_fail+0x3c1/0x510 [ 42.134507][ T584] should_fail_usercopy+0x1a/0x20 [ 42.139538][ T584] _copy_to_user+0x20/0x90 [ 42.143966][ T584] generic_map_lookup_batch+0x707/0xa70 [ 42.149536][ T584] ? bpf_map_update_value+0x3e0/0x3e0 [ 42.154928][ T584] ? __fdget+0x1a1/0x230 [ 42.159186][ T584] ? bpf_map_update_value+0x3e0/0x3e0 [ 42.164576][ T584] bpf_map_do_batch+0x2d4/0x5f0 [ 42.169443][ T584] ? security_bpf+0x82/0xa0 [ 42.173959][ T584] __sys_bpf+0x5e3/0x730 [ 42.178215][ T584] ? bpf_link_show_fdinfo+0x310/0x310 [ 42.183608][ T584] ? debug_smp_processor_id+0x17/0x20 [ 42.188996][ T584] __x64_sys_bpf+0x7c/0x90 [ 42.193422][ T584] x64_sys_call+0x4b9/0x9a0 [ 42.197934][ T584] do_syscall_64+0x4c/0xa0 [ 42.202362][ T584] ? clear_bhb_loop+0x35/0x90 [ 42.207045][ T584] ? clear_bhb_loop+0x35/0x90 [ 42.211733][ T584] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 42.217645][ T584] RIP: 0033:0x7fc1ed4ef969 [ 42.222187][ T584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.241816][ T584] RSP: 002b:00007fc1ebb58038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 42.250256][ T584] RAX: ffffffffffffffda RBX: 00007fc1ed716fa0 RCX: 00007fc1ed4ef969 [ 42.258243][ T584] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 42.266226][ T584] RBP: 00007fc1ebb58090 R08: 0000000000000000 R09: 0000000000000000 [ 42.274212][ T584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 42.282200][ T584] R13: 0000000000000000 R14: 00007fc1ed716fa0 R15: 00007ffcbf88de68 [ 42.290193][ T584] [ 42.538089][ T591] FAULT_INJECTION: forcing a failure. [ 42.538089][ T591] name failslab, interval 1, probability 0, space 0, times 1 [ 42.613354][ T591] CPU: 0 PID: 591 Comm: syz.2.97 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 42.623034][ T591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 42.633100][ T591] Call Trace: [ 42.636391][ T591] [ 42.639328][ T591] __dump_stack+0x21/0x30 [ 42.643681][ T591] dump_stack_lvl+0xee/0x150 [ 42.648290][ T591] ? show_regs_print_info+0x20/0x20 [ 42.653515][ T591] dump_stack+0x15/0x20 [ 42.657699][ T591] should_fail+0x3c1/0x510 [ 42.662132][ T591] __should_failslab+0xa4/0xe0 [ 42.666921][ T591] should_failslab+0x9/0x20 [ 42.671441][ T591] slab_pre_alloc_hook+0x3b/0xe0 [ 42.676404][ T591] __kmalloc+0x6d/0x2c0 [ 42.680574][ T591] ? kvmalloc_node+0x242/0x330 [ 42.685388][ T591] kvmalloc_node+0x242/0x330 [ 42.689992][ T591] ? vm_mmap+0xb0/0xb0 [ 42.694076][ T591] generic_map_lookup_batch+0x457/0xa70 [ 42.699635][ T591] ? security_file_permission+0x79/0xa0 [ 42.705203][ T591] ? bpf_map_update_value+0x3e0/0x3e0 [ 42.710604][ T591] ? __fdget+0x1a1/0x230 [ 42.715145][ T591] ? bpf_map_update_value+0x3e0/0x3e0 [ 42.720540][ T591] bpf_map_do_batch+0x2d4/0x5f0 [ 42.725412][ T591] ? security_bpf+0x82/0xa0 [ 42.729980][ T591] __sys_bpf+0x5e3/0x730 [ 42.734241][ T591] ? bpf_link_show_fdinfo+0x310/0x310 [ 42.739636][ T591] ? debug_smp_processor_id+0x17/0x20 [ 42.745023][ T591] __x64_sys_bpf+0x7c/0x90 [ 42.749449][ T591] x64_sys_call+0x4b9/0x9a0 [ 42.753961][ T591] do_syscall_64+0x4c/0xa0 [ 42.758401][ T591] ? clear_bhb_loop+0x35/0x90 [ 42.763089][ T591] ? clear_bhb_loop+0x35/0x90 [ 42.767775][ T591] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 42.773683][ T591] RIP: 0033:0x7fc1ed4ef969 [ 42.778111][ T591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.797731][ T591] RSP: 002b:00007fc1ebb58038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 42.806159][ T591] RAX: ffffffffffffffda RBX: 00007fc1ed716fa0 RCX: 00007fc1ed4ef969 [ 42.814144][ T591] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 42.822125][ T591] RBP: 00007fc1ebb58090 R08: 0000000000000000 R09: 0000000000000000 [ 42.830102][ T591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 42.838105][ T591] R13: 0000000000000000 R14: 00007fc1ed716fa0 R15: 00007ffcbf88de68 [ 42.846089][ T591] [ 42.953809][ T592] device syzkaller0 entered promiscuous mode [ 43.259682][ T30] audit: type=1400 audit(1746868228.713:115): avc: denied { cpu } for pid=611 comm="syz.2.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 45.082186][ T614] sched: RT throttling activated [ 47.281520][ T625] FAULT_INJECTION: forcing a failure. [ 47.281520][ T625] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 47.518022][ T625] CPU: 0 PID: 625 Comm: syz.2.107 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 47.527793][ T625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 47.537852][ T625] Call Trace: [ 47.541246][ T625] [ 47.544173][ T625] __dump_stack+0x21/0x30 [ 47.548507][ T625] dump_stack_lvl+0xee/0x150 [ 47.553100][ T625] ? show_regs_print_info+0x20/0x20 [ 47.558295][ T625] ? migrate_enable+0x192/0x260 [ 47.563138][ T625] ? migrate_disable+0x180/0x180 [ 47.568070][ T625] dump_stack+0x15/0x20 [ 47.572223][ T625] should_fail+0x3c1/0x510 [ 47.576636][ T625] should_fail_usercopy+0x1a/0x20 [ 47.581654][ T625] _copy_to_user+0x20/0x90 [ 47.586071][ T625] generic_map_lookup_batch+0x6a9/0xa70 [ 47.591613][ T625] ? security_file_permission+0x79/0xa0 [ 47.597156][ T625] ? bpf_map_update_value+0x3e0/0x3e0 [ 47.602538][ T625] ? bpf_map_update_value+0x3e0/0x3e0 [ 47.607906][ T625] bpf_map_do_batch+0x2d4/0x5f0 [ 47.612752][ T625] ? security_bpf+0x82/0xa0 [ 47.617246][ T625] __sys_bpf+0x5e3/0x730 [ 47.621479][ T625] ? bpf_link_show_fdinfo+0x310/0x310 [ 47.626866][ T625] ? debug_smp_processor_id+0x17/0x20 [ 47.632234][ T625] __x64_sys_bpf+0x7c/0x90 [ 47.636648][ T625] x64_sys_call+0x4b9/0x9a0 [ 47.641150][ T625] do_syscall_64+0x4c/0xa0 [ 47.645564][ T625] ? clear_bhb_loop+0x35/0x90 [ 47.650240][ T625] ? clear_bhb_loop+0x35/0x90 [ 47.654995][ T625] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 47.660895][ T625] RIP: 0033:0x7fc1ed4ef969 [ 47.665304][ T625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.685005][ T625] RSP: 002b:00007fc1ebb58038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 47.693412][ T625] RAX: ffffffffffffffda RBX: 00007fc1ed716fa0 RCX: 00007fc1ed4ef969 [ 47.701482][ T625] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 47.709456][ T625] RBP: 00007fc1ebb58090 R08: 0000000000000000 R09: 0000000000000000 [ 47.717429][ T625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 47.725409][ T625] R13: 0000000000000000 R14: 00007fc1ed716fa0 R15: 00007ffcbf88de68 [ 47.733385][ T625] [ 47.771383][ T30] audit: type=1400 audit(1746868233.223:116): avc: denied { create } for pid=629 comm="syz.3.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 47.882725][ T30] audit: type=1400 audit(1746868233.263:117): avc: denied { create } for pid=631 comm="syz.1.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 48.107893][ T652] FAULT_INJECTION: forcing a failure. [ 48.107893][ T652] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 48.133731][ T652] CPU: 0 PID: 652 Comm: syz.1.115 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 48.143500][ T652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 48.153569][ T652] Call Trace: [ 48.156859][ T652] [ 48.159797][ T652] __dump_stack+0x21/0x30 [ 48.164139][ T652] dump_stack_lvl+0xee/0x150 [ 48.168746][ T652] ? show_regs_print_info+0x20/0x20 [ 48.173951][ T652] ? migrate_enable+0x192/0x260 [ 48.178815][ T652] ? migrate_disable+0x180/0x180 [ 48.183765][ T652] dump_stack+0x15/0x20 [ 48.187934][ T652] should_fail+0x3c1/0x510 [ 48.192361][ T652] should_fail_usercopy+0x1a/0x20 [ 48.197390][ T652] _copy_to_user+0x20/0x90 [ 48.201948][ T652] generic_map_lookup_batch+0x6a9/0xa70 [ 48.207503][ T652] ? security_file_permission+0x79/0xa0 [ 48.213061][ T652] ? bpf_map_update_value+0x3e0/0x3e0 [ 48.218443][ T652] ? __fdget+0x1a1/0x230 [ 48.222695][ T652] ? bpf_map_update_value+0x3e0/0x3e0 [ 48.228078][ T652] bpf_map_do_batch+0x2d4/0x5f0 [ 48.232946][ T652] ? security_bpf+0x82/0xa0 [ 48.237457][ T652] __sys_bpf+0x5e3/0x730 [ 48.241706][ T652] ? bpf_link_show_fdinfo+0x310/0x310 [ 48.247090][ T652] ? debug_smp_processor_id+0x17/0x20 [ 48.252479][ T652] __x64_sys_bpf+0x7c/0x90 [ 48.256903][ T652] x64_sys_call+0x4b9/0x9a0 [ 48.261410][ T652] do_syscall_64+0x4c/0xa0 [ 48.265833][ T652] ? clear_bhb_loop+0x35/0x90 [ 48.270518][ T652] ? clear_bhb_loop+0x35/0x90 [ 48.275201][ T652] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 48.281192][ T652] RIP: 0033:0x7fc8c01a7969 [ 48.285616][ T652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 48.305238][ T652] RSP: 002b:00007fc8be7ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 48.313665][ T652] RAX: ffffffffffffffda RBX: 00007fc8c03cf080 RCX: 00007fc8c01a7969 [ 48.321671][ T652] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 48.329655][ T652] RBP: 00007fc8be7ef090 R08: 0000000000000000 R09: 0000000000000000 [ 48.337630][ T652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 48.345699][ T652] R13: 0000000000000000 R14: 00007fc8c03cf080 R15: 00007ffd06ebd2b8 [ 48.353769][ T652] [ 48.523279][ T30] audit: type=1400 audit(1746868233.973:118): avc: denied { create } for pid=667 comm="syz.0.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 48.687195][ T675] FAULT_INJECTION: forcing a failure. [ 48.687195][ T675] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 48.754279][ T675] CPU: 0 PID: 675 Comm: syz.2.124 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 48.764054][ T675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 48.774134][ T675] Call Trace: [ 48.777430][ T675] [ 48.780369][ T675] __dump_stack+0x21/0x30 [ 48.784723][ T675] dump_stack_lvl+0xee/0x150 [ 48.789338][ T675] ? show_regs_print_info+0x20/0x20 [ 48.794554][ T675] dump_stack+0x15/0x20 [ 48.798734][ T675] should_fail+0x3c1/0x510 [ 48.803275][ T675] should_fail_usercopy+0x1a/0x20 [ 48.808324][ T675] _copy_to_user+0x20/0x90 [ 48.812769][ T675] generic_map_lookup_batch+0x707/0xa70 [ 48.818344][ T675] ? bpf_map_update_value+0x3e0/0x3e0 [ 48.823738][ T675] ? bpf_map_update_value+0x3e0/0x3e0 [ 48.829126][ T675] bpf_map_do_batch+0x2d4/0x5f0 [ 48.833999][ T675] ? security_bpf+0x82/0xa0 [ 48.838518][ T675] __sys_bpf+0x5e3/0x730 [ 48.842775][ T675] ? bpf_link_show_fdinfo+0x310/0x310 [ 48.848159][ T675] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 48.854337][ T675] __x64_sys_bpf+0x7c/0x90 [ 48.858787][ T675] x64_sys_call+0x4b9/0x9a0 [ 48.863314][ T675] do_syscall_64+0x4c/0xa0 [ 48.867760][ T675] ? clear_bhb_loop+0x35/0x90 [ 48.872451][ T675] ? clear_bhb_loop+0x35/0x90 [ 48.877138][ T675] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 48.883047][ T675] RIP: 0033:0x7fc1ed4ef969 [ 48.887474][ T675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 48.907094][ T675] RSP: 002b:00007fc1ebb58038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 48.915529][ T675] RAX: ffffffffffffffda RBX: 00007fc1ed716fa0 RCX: 00007fc1ed4ef969 [ 48.923520][ T675] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 48.931501][ T675] RBP: 00007fc1ebb58090 R08: 0000000000000000 R09: 0000000000000000 [ 48.939490][ T675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 48.947472][ T675] R13: 0000000000000000 R14: 00007fc1ed716fa0 R15: 00007ffcbf88de68 [ 48.955459][ T675] [ 48.982886][ T691] FAULT_INJECTION: forcing a failure. [ 48.982886][ T691] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 49.006456][ T691] CPU: 0 PID: 691 Comm: syz.4.128 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 49.016224][ T691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 49.026299][ T691] Call Trace: [ 49.029577][ T691] [ 49.032499][ T691] __dump_stack+0x21/0x30 [ 49.036831][ T691] dump_stack_lvl+0xee/0x150 [ 49.041413][ T691] ? show_regs_print_info+0x20/0x20 [ 49.046607][ T691] ? migrate_enable+0x192/0x260 [ 49.051453][ T691] ? migrate_disable+0x180/0x180 [ 49.056383][ T691] dump_stack+0x15/0x20 [ 49.060536][ T691] should_fail+0x3c1/0x510 [ 49.064946][ T691] should_fail_usercopy+0x1a/0x20 [ 49.069961][ T691] _copy_to_user+0x20/0x90 [ 49.074376][ T691] generic_map_lookup_batch+0x707/0xa70 [ 49.079926][ T691] ? security_file_permission+0x79/0xa0 [ 49.085484][ T691] ? bpf_map_update_value+0x3e0/0x3e0 [ 49.090851][ T691] ? __fdget+0x1a1/0x230 [ 49.095089][ T691] ? bpf_map_update_value+0x3e0/0x3e0 [ 49.100458][ T691] bpf_map_do_batch+0x2d4/0x5f0 [ 49.105313][ T691] ? security_bpf+0x82/0xa0 [ 49.109833][ T691] __sys_bpf+0x5e3/0x730 [ 49.114078][ T691] ? bpf_link_show_fdinfo+0x310/0x310 [ 49.119454][ T691] ? debug_smp_processor_id+0x17/0x20 [ 49.124838][ T691] __x64_sys_bpf+0x7c/0x90 [ 49.129295][ T691] x64_sys_call+0x4b9/0x9a0 [ 49.133795][ T691] do_syscall_64+0x4c/0xa0 [ 49.138220][ T691] ? clear_bhb_loop+0x35/0x90 [ 49.142911][ T691] ? clear_bhb_loop+0x35/0x90 [ 49.147702][ T691] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 49.153616][ T691] RIP: 0033:0x7feba2e22969 [ 49.158035][ T691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.177637][ T691] RSP: 002b:00007feba148b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 49.186059][ T691] RAX: ffffffffffffffda RBX: 00007feba3049fa0 RCX: 00007feba2e22969 [ 49.194034][ T691] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 49.201996][ T691] RBP: 00007feba148b090 R08: 0000000000000000 R09: 0000000000000000 [ 49.209956][ T691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 49.217917][ T691] R13: 0000000000000000 R14: 00007feba3049fa0 R15: 00007ffd53934408 [ 49.225885][ T691] [ 50.209209][ T30] audit: type=1400 audit(1746868235.663:119): avc: denied { ioctl } for pid=700 comm="syz.4.132" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 50.262706][ T718] FAULT_INJECTION: forcing a failure. [ 50.262706][ T718] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 50.456287][ T718] CPU: 0 PID: 718 Comm: syz.3.139 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 50.466056][ T718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 50.476124][ T718] Call Trace: [ 50.479415][ T718] [ 50.482357][ T718] __dump_stack+0x21/0x30 [ 50.486709][ T718] dump_stack_lvl+0xee/0x150 [ 50.491320][ T718] ? show_regs_print_info+0x20/0x20 [ 50.496535][ T718] ? migrate_enable+0x192/0x260 [ 50.501401][ T718] ? migrate_disable+0x180/0x180 [ 50.506355][ T718] dump_stack+0x15/0x20 [ 50.510528][ T718] should_fail+0x3c1/0x510 [ 50.514959][ T718] should_fail_usercopy+0x1a/0x20 [ 50.519997][ T718] _copy_to_user+0x20/0x90 [ 50.524431][ T718] generic_map_lookup_batch+0x6a9/0xa70 [ 50.529999][ T718] ? bpf_map_update_value+0x3e0/0x3e0 [ 50.535389][ T718] ? __fdget+0x1a1/0x230 [ 50.539647][ T718] ? bpf_map_update_value+0x3e0/0x3e0 [ 50.545044][ T718] bpf_map_do_batch+0x2d4/0x5f0 [ 50.549915][ T718] ? security_bpf+0x82/0xa0 [ 50.554444][ T718] __sys_bpf+0x5e3/0x730 [ 50.558713][ T718] ? bpf_link_show_fdinfo+0x310/0x310 [ 50.564155][ T718] __x64_sys_bpf+0x7c/0x90 [ 50.568590][ T718] x64_sys_call+0x4b9/0x9a0 [ 50.573123][ T718] do_syscall_64+0x4c/0xa0 [ 50.577563][ T718] ? clear_bhb_loop+0x35/0x90 [ 50.582262][ T718] ? clear_bhb_loop+0x35/0x90 [ 50.587057][ T718] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 50.592973][ T718] RIP: 0033:0x7f1344dd8969 [ 50.597405][ T718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 50.617021][ T718] RSP: 002b:00007f1343441038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 50.625436][ T718] RAX: ffffffffffffffda RBX: 00007f1344ffffa0 RCX: 00007f1344dd8969 [ 50.633400][ T718] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 50.641365][ T718] RBP: 00007f1343441090 R08: 0000000000000000 R09: 0000000000000000 [ 50.649328][ T718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 50.657291][ T718] R13: 0000000000000000 R14: 00007f1344ffffa0 R15: 00007ffed966bef8 [ 50.665347][ T718] [ 50.760654][ T733] FAULT_INJECTION: forcing a failure. [ 50.760654][ T733] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 50.808668][ T734] device sit0 entered promiscuous mode [ 50.902724][ T733] CPU: 1 PID: 733 Comm: syz.0.145 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 50.912489][ T733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 50.922558][ T733] Call Trace: [ 50.925838][ T733] [ 50.928765][ T733] __dump_stack+0x21/0x30 [ 50.933097][ T733] dump_stack_lvl+0xee/0x150 [ 50.937681][ T733] ? show_regs_print_info+0x20/0x20 [ 50.942877][ T733] ? migrate_enable+0x192/0x260 [ 50.947723][ T733] ? migrate_disable+0x180/0x180 [ 50.952660][ T733] dump_stack+0x15/0x20 [ 50.956810][ T733] should_fail+0x3c1/0x510 [ 50.961218][ T733] should_fail_usercopy+0x1a/0x20 [ 50.966389][ T733] _copy_to_user+0x20/0x90 [ 50.970819][ T733] generic_map_lookup_batch+0x6a9/0xa70 [ 50.976366][ T733] ? security_file_permission+0x79/0xa0 [ 50.981915][ T733] ? bpf_map_update_value+0x3e0/0x3e0 [ 50.987289][ T733] ? __fdget+0x1a1/0x230 [ 50.991533][ T733] ? bpf_map_update_value+0x3e0/0x3e0 [ 50.996900][ T733] bpf_map_do_batch+0x2d4/0x5f0 [ 51.001746][ T733] ? security_bpf+0x82/0xa0 [ 51.006244][ T733] __sys_bpf+0x5e3/0x730 [ 51.010480][ T733] ? bpf_link_show_fdinfo+0x310/0x310 [ 51.015846][ T733] ? debug_smp_processor_id+0x17/0x20 [ 51.021214][ T733] __x64_sys_bpf+0x7c/0x90 [ 51.025623][ T733] x64_sys_call+0x4b9/0x9a0 [ 51.030122][ T733] do_syscall_64+0x4c/0xa0 [ 51.034535][ T733] ? clear_bhb_loop+0x35/0x90 [ 51.039205][ T733] ? clear_bhb_loop+0x35/0x90 [ 51.043896][ T733] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 51.049785][ T733] RIP: 0033:0x7f8401225969 [ 51.054195][ T733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.073796][ T733] RSP: 002b:00007f83ff88e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 51.082209][ T733] RAX: ffffffffffffffda RBX: 00007f840144cfa0 RCX: 00007f8401225969 [ 51.090173][ T733] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 51.098138][ T733] RBP: 00007f83ff88e090 R08: 0000000000000000 R09: 0000000000000000 [ 51.106100][ T733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 51.114071][ T733] R13: 0000000000000000 R14: 00007f840144cfa0 R15: 00007ffc036da3e8 [ 51.122036][ T733] [ 51.569047][ T757] FAULT_INJECTION: forcing a failure. [ 51.569047][ T757] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 51.643157][ T757] CPU: 1 PID: 757 Comm: syz.3.152 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 51.652922][ T757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 51.663154][ T757] Call Trace: [ 51.666423][ T757] [ 51.669347][ T757] __dump_stack+0x21/0x30 [ 51.673679][ T757] dump_stack_lvl+0xee/0x150 [ 51.678292][ T757] ? show_regs_print_info+0x20/0x20 [ 51.683488][ T757] ? migrate_enable+0x192/0x260 [ 51.688344][ T757] ? migrate_disable+0x180/0x180 [ 51.693273][ T757] dump_stack+0x15/0x20 [ 51.697441][ T757] should_fail+0x3c1/0x510 [ 51.701853][ T757] should_fail_usercopy+0x1a/0x20 [ 51.706864][ T757] _copy_to_user+0x20/0x90 [ 51.711273][ T757] generic_map_lookup_batch+0x707/0xa70 [ 51.716823][ T757] ? security_file_permission+0x79/0xa0 [ 51.722368][ T757] ? bpf_map_update_value+0x3e0/0x3e0 [ 51.727735][ T757] ? __fdget+0x1a1/0x230 [ 51.731971][ T757] ? bpf_map_update_value+0x3e0/0x3e0 [ 51.737335][ T757] bpf_map_do_batch+0x2d4/0x5f0 [ 51.742175][ T757] ? security_bpf+0x82/0xa0 [ 51.746675][ T757] __sys_bpf+0x5e3/0x730 [ 51.750911][ T757] ? bpf_link_show_fdinfo+0x310/0x310 [ 51.756277][ T757] ? debug_smp_processor_id+0x17/0x20 [ 51.761639][ T757] __x64_sys_bpf+0x7c/0x90 [ 51.766046][ T757] x64_sys_call+0x4b9/0x9a0 [ 51.770541][ T757] do_syscall_64+0x4c/0xa0 [ 51.774951][ T757] ? clear_bhb_loop+0x35/0x90 [ 51.779615][ T757] ? clear_bhb_loop+0x35/0x90 [ 51.784284][ T757] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 51.790182][ T757] RIP: 0033:0x7f1344dd8969 [ 51.794591][ T757] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.814188][ T757] RSP: 002b:00007f1343441038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 51.822591][ T757] RAX: ffffffffffffffda RBX: 00007f1344ffffa0 RCX: 00007f1344dd8969 [ 51.830557][ T757] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 51.838518][ T757] RBP: 00007f1343441090 R08: 0000000000000000 R09: 0000000000000000 [ 51.846490][ T757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 51.854464][ T757] R13: 0000000000000000 R14: 00007f1344ffffa0 R15: 00007ffed966bef8 [ 51.862559][ T757] [ 52.768316][ T786] device pim6reg1 entered promiscuous mode [ 52.998287][ T30] audit: type=1400 audit(1746868238.453:120): avc: denied { create } for pid=795 comm="syz.4.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 53.187214][ T800] FAULT_INJECTION: forcing a failure. [ 53.187214][ T800] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 53.245815][ T800] CPU: 1 PID: 800 Comm: syz.2.168 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 53.255577][ T800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 53.265648][ T800] Call Trace: [ 53.268940][ T800] [ 53.271878][ T800] __dump_stack+0x21/0x30 [ 53.276231][ T800] dump_stack_lvl+0xee/0x150 [ 53.280850][ T800] ? show_regs_print_info+0x20/0x20 [ 53.286074][ T800] ? migrate_enable+0x192/0x260 [ 53.290939][ T800] ? migrate_disable+0x180/0x180 [ 53.295893][ T800] dump_stack+0x15/0x20 [ 53.300065][ T800] should_fail+0x3c1/0x510 [ 53.304503][ T800] should_fail_usercopy+0x1a/0x20 [ 53.309548][ T800] _copy_to_user+0x20/0x90 [ 53.313985][ T800] generic_map_lookup_batch+0x707/0xa70 [ 53.319554][ T800] ? security_file_permission+0x79/0xa0 [ 53.325120][ T800] ? bpf_map_update_value+0x3e0/0x3e0 [ 53.330514][ T800] ? __fdget+0x1a1/0x230 [ 53.334778][ T800] ? bpf_map_update_value+0x3e0/0x3e0 [ 53.340174][ T800] bpf_map_do_batch+0x2d4/0x5f0 [ 53.345035][ T800] ? security_bpf+0x82/0xa0 [ 53.349553][ T800] __sys_bpf+0x5e3/0x730 [ 53.353816][ T800] ? bpf_link_show_fdinfo+0x310/0x310 [ 53.359201][ T800] ? debug_smp_processor_id+0x17/0x20 [ 53.364586][ T800] __x64_sys_bpf+0x7c/0x90 [ 53.369014][ T800] x64_sys_call+0x4b9/0x9a0 [ 53.373532][ T800] do_syscall_64+0x4c/0xa0 [ 53.377963][ T800] ? clear_bhb_loop+0x35/0x90 [ 53.382650][ T800] ? clear_bhb_loop+0x35/0x90 [ 53.387338][ T800] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 53.393247][ T800] RIP: 0033:0x7fc1ed4ef969 [ 53.397677][ T800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 53.417294][ T800] RSP: 002b:00007fc1ebb58038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 53.425728][ T800] RAX: ffffffffffffffda RBX: 00007fc1ed716fa0 RCX: 00007fc1ed4ef969 [ 53.433710][ T800] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 53.441698][ T800] RBP: 00007fc1ebb58090 R08: 0000000000000000 R09: 0000000000000000 [ 53.449677][ T800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 53.457659][ T800] R13: 0000000000000000 R14: 00007fc1ed716fa0 R15: 00007ffcbf88de68 [ 53.465666][ T800] [ 53.680160][ T806] FAULT_INJECTION: forcing a failure. [ 53.680160][ T806] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 53.705568][ T806] CPU: 1 PID: 806 Comm: syz.0.170 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 53.715464][ T806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 53.725543][ T806] Call Trace: [ 53.728836][ T806] [ 53.731863][ T806] __dump_stack+0x21/0x30 [ 53.736214][ T806] dump_stack_lvl+0xee/0x150 [ 53.740832][ T806] ? show_regs_print_info+0x20/0x20 [ 53.746049][ T806] dump_stack+0x15/0x20 [ 53.750219][ T806] should_fail+0x3c1/0x510 [ 53.754647][ T806] should_fail_usercopy+0x1a/0x20 [ 53.759679][ T806] _copy_to_user+0x20/0x90 [ 53.764109][ T806] generic_map_lookup_batch+0x6a9/0xa70 [ 53.769666][ T806] ? security_file_permission+0x79/0xa0 [ 53.775232][ T806] ? bpf_map_update_value+0x3e0/0x3e0 [ 53.780627][ T806] ? __fdget+0x1a1/0x230 [ 53.784885][ T806] ? bpf_map_update_value+0x3e0/0x3e0 [ 53.790275][ T806] bpf_map_do_batch+0x2d4/0x5f0 [ 53.795141][ T806] ? security_bpf+0x82/0xa0 [ 53.799660][ T806] __sys_bpf+0x5e3/0x730 [ 53.803910][ T806] ? bpf_link_show_fdinfo+0x310/0x310 [ 53.809299][ T806] ? debug_smp_processor_id+0x17/0x20 [ 53.814681][ T806] __x64_sys_bpf+0x7c/0x90 [ 53.819105][ T806] x64_sys_call+0x4b9/0x9a0 [ 53.823621][ T806] do_syscall_64+0x4c/0xa0 [ 53.828146][ T806] ? clear_bhb_loop+0x35/0x90 [ 53.832829][ T806] ? clear_bhb_loop+0x35/0x90 [ 53.837549][ T806] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 53.843460][ T806] RIP: 0033:0x7f8401225969 [ 53.847882][ T806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 53.867492][ T806] RSP: 002b:00007f83ff88e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 53.875909][ T806] RAX: ffffffffffffffda RBX: 00007f840144cfa0 RCX: 00007f8401225969 [ 53.883880][ T806] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 53.891843][ T806] RBP: 00007f83ff88e090 R08: 0000000000000000 R09: 0000000000000000 [ 53.899808][ T806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 53.907773][ T806] R13: 0000000000000000 R14: 00007f840144cfa0 R15: 00007ffc036da3e8 [ 53.915876][ T806] [ 54.216926][ T808] device sit0 entered promiscuous mode [ 54.339265][ T810] device pim6reg1 entered promiscuous mode [ 54.666127][ T844] FAULT_INJECTION: forcing a failure. [ 54.666127][ T844] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 54.740302][ T844] CPU: 0 PID: 844 Comm: syz.2.183 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 54.750079][ T844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 54.760148][ T844] Call Trace: [ 54.763439][ T844] [ 54.766384][ T844] __dump_stack+0x21/0x30 [ 54.770733][ T844] dump_stack_lvl+0xee/0x150 [ 54.775338][ T844] ? show_regs_print_info+0x20/0x20 [ 54.780538][ T844] ? migrate_enable+0x192/0x260 [ 54.785387][ T844] ? migrate_disable+0x180/0x180 [ 54.790325][ T844] dump_stack+0x15/0x20 [ 54.794481][ T844] should_fail+0x3c1/0x510 [ 54.798896][ T844] should_fail_usercopy+0x1a/0x20 [ 54.803917][ T844] _copy_to_user+0x20/0x90 [ 54.808335][ T844] generic_map_lookup_batch+0x6a9/0xa70 [ 54.813882][ T844] ? security_file_permission+0x79/0xa0 [ 54.819427][ T844] ? bpf_map_update_value+0x3e0/0x3e0 [ 54.824799][ T844] ? __fdget+0x1a1/0x230 [ 54.829059][ T844] ? bpf_map_update_value+0x3e0/0x3e0 [ 54.834424][ T844] bpf_map_do_batch+0x2d4/0x5f0 [ 54.839274][ T844] ? security_bpf+0x82/0xa0 [ 54.843768][ T844] __sys_bpf+0x5e3/0x730 [ 54.847999][ T844] ? bpf_link_show_fdinfo+0x310/0x310 [ 54.853372][ T844] ? debug_smp_processor_id+0x17/0x20 [ 54.858736][ T844] __x64_sys_bpf+0x7c/0x90 [ 54.863147][ T844] x64_sys_call+0x4b9/0x9a0 [ 54.867649][ T844] do_syscall_64+0x4c/0xa0 [ 54.872170][ T844] ? clear_bhb_loop+0x35/0x90 [ 54.876875][ T844] ? clear_bhb_loop+0x35/0x90 [ 54.881547][ T844] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 54.887445][ T844] RIP: 0033:0x7fc1ed4ef969 [ 54.891864][ T844] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 54.911551][ T844] RSP: 002b:00007fc1ebb58038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 54.919968][ T844] RAX: ffffffffffffffda RBX: 00007fc1ed716fa0 RCX: 00007fc1ed4ef969 [ 54.927942][ T844] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 54.935922][ T844] RBP: 00007fc1ebb58090 R08: 0000000000000000 R09: 0000000000000000 [ 54.943886][ T844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 54.951851][ T844] R13: 0000000000000000 R14: 00007fc1ed716fa0 R15: 00007ffcbf88de68 [ 54.959817][ T844] [ 55.191111][ T857] FAULT_INJECTION: forcing a failure. [ 55.191111][ T857] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 55.366965][ T857] CPU: 0 PID: 857 Comm: syz.0.187 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 55.376725][ T857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 55.386794][ T857] Call Trace: [ 55.390080][ T857] [ 55.393017][ T857] __dump_stack+0x21/0x30 [ 55.397362][ T857] dump_stack_lvl+0xee/0x150 [ 55.402051][ T857] ? show_regs_print_info+0x20/0x20 [ 55.407265][ T857] ? migrate_enable+0x192/0x260 [ 55.412126][ T857] ? migrate_disable+0x180/0x180 [ 55.417066][ T857] dump_stack+0x15/0x20 [ 55.421233][ T857] should_fail+0x3c1/0x510 [ 55.425659][ T857] should_fail_usercopy+0x1a/0x20 [ 55.430690][ T857] _copy_to_user+0x20/0x90 [ 55.435116][ T857] generic_map_lookup_batch+0x707/0xa70 [ 55.440676][ T857] ? bpf_map_update_value+0x3e0/0x3e0 [ 55.446056][ T857] ? __fdget+0x1a1/0x230 [ 55.450310][ T857] ? bpf_map_update_value+0x3e0/0x3e0 [ 55.455692][ T857] bpf_map_do_batch+0x2d4/0x5f0 [ 55.460543][ T857] ? security_bpf+0x82/0xa0 [ 55.465050][ T857] __sys_bpf+0x5e3/0x730 [ 55.469301][ T857] ? bpf_link_show_fdinfo+0x310/0x310 [ 55.474678][ T857] __x64_sys_bpf+0x7c/0x90 [ 55.479103][ T857] x64_sys_call+0x4b9/0x9a0 [ 55.483616][ T857] do_syscall_64+0x4c/0xa0 [ 55.488042][ T857] ? clear_bhb_loop+0x35/0x90 [ 55.492718][ T857] ? clear_bhb_loop+0x35/0x90 [ 55.497398][ T857] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 55.503387][ T857] RIP: 0033:0x7f8401225969 [ 55.507804][ T857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 55.527455][ T857] RSP: 002b:00007f83ff88e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 55.535898][ T857] RAX: ffffffffffffffda RBX: 00007f840144cfa0 RCX: 00007f8401225969 [ 55.543873][ T857] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 55.551849][ T857] RBP: 00007f83ff88e090 R08: 0000000000000000 R09: 0000000000000000 [ 55.559826][ T857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 55.567799][ T857] R13: 0000000000000000 R14: 00007f840144cfa0 R15: 00007ffc036da3e8 [ 55.575782][ T857] [ 55.751989][ T30] audit: type=1400 audit(1746868241.203:121): avc: denied { create } for pid=874 comm="syz.4.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 56.039991][ T30] audit: type=1400 audit(1746868241.493:122): avc: denied { tracepoint } for pid=894 comm="syz.0.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 56.085842][ T898] device sit0 entered promiscuous mode [ 56.277841][ T30] audit: type=1400 audit(1746868241.733:123): avc: denied { create } for pid=903 comm="syz.2.205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 56.579472][ T916] FAULT_INJECTION: forcing a failure. [ 56.579472][ T916] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 56.612593][ T916] CPU: 1 PID: 916 Comm: syz.2.208 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 56.622353][ T916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 56.632421][ T916] Call Trace: [ 56.635706][ T916] [ 56.638641][ T916] __dump_stack+0x21/0x30 [ 56.642990][ T916] dump_stack_lvl+0xee/0x150 [ 56.647592][ T916] ? show_regs_print_info+0x20/0x20 [ 56.652802][ T916] ? migrate_enable+0x192/0x260 [ 56.657664][ T916] ? migrate_disable+0x180/0x180 [ 56.662610][ T916] dump_stack+0x15/0x20 [ 56.666764][ T916] should_fail+0x3c1/0x510 [ 56.671178][ T916] should_fail_usercopy+0x1a/0x20 [ 56.676191][ T916] _copy_to_user+0x20/0x90 [ 56.680691][ T916] generic_map_lookup_batch+0x6a9/0xa70 [ 56.686235][ T916] ? bpf_map_update_value+0x3e0/0x3e0 [ 56.691602][ T916] ? __fdget+0x1a1/0x230 [ 56.695839][ T916] ? bpf_map_update_value+0x3e0/0x3e0 [ 56.701204][ T916] bpf_map_do_batch+0x2d4/0x5f0 [ 56.706050][ T916] ? security_bpf+0x82/0xa0 [ 56.710566][ T916] __sys_bpf+0x5e3/0x730 [ 56.714802][ T916] ? bpf_link_show_fdinfo+0x310/0x310 [ 56.720176][ T916] __x64_sys_bpf+0x7c/0x90 [ 56.724597][ T916] x64_sys_call+0x4b9/0x9a0 [ 56.729107][ T916] do_syscall_64+0x4c/0xa0 [ 56.733535][ T916] ? clear_bhb_loop+0x35/0x90 [ 56.738212][ T916] ? clear_bhb_loop+0x35/0x90 [ 56.742986][ T916] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 56.748881][ T916] RIP: 0033:0x7fc1ed4ef969 [ 56.753289][ T916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 56.772887][ T916] RSP: 002b:00007fc1ebb58038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 56.781296][ T916] RAX: ffffffffffffffda RBX: 00007fc1ed716fa0 RCX: 00007fc1ed4ef969 [ 56.789361][ T916] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 56.797410][ T916] RBP: 00007fc1ebb58090 R08: 0000000000000000 R09: 0000000000000000 [ 56.805458][ T916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 56.813421][ T916] R13: 0000000000000000 R14: 00007fc1ed716fa0 R15: 00007ffcbf88de68 [ 56.821388][ T916] [ 56.846936][ T30] audit: type=1400 audit(1746868242.283:124): avc: denied { create } for pid=913 comm="syz.0.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 57.304457][ T949] FAULT_INJECTION: forcing a failure. [ 57.304457][ T949] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 57.398326][ T949] CPU: 0 PID: 949 Comm: syz.0.221 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 57.408090][ T949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 57.418145][ T949] Call Trace: [ 57.421419][ T949] [ 57.424451][ T949] __dump_stack+0x21/0x30 [ 57.428782][ T949] dump_stack_lvl+0xee/0x150 [ 57.433373][ T949] ? show_regs_print_info+0x20/0x20 [ 57.438670][ T949] ? migrate_enable+0x192/0x260 [ 57.443514][ T949] ? migrate_disable+0x180/0x180 [ 57.448467][ T949] dump_stack+0x15/0x20 [ 57.452618][ T949] should_fail+0x3c1/0x510 [ 57.457028][ T949] should_fail_usercopy+0x1a/0x20 [ 57.462046][ T949] _copy_to_user+0x20/0x90 [ 57.466463][ T949] generic_map_lookup_batch+0x707/0xa70 [ 57.472097][ T949] ? bpf_map_update_value+0x3e0/0x3e0 [ 57.477464][ T949] ? bpf_map_update_value+0x3e0/0x3e0 [ 57.482828][ T949] bpf_map_do_batch+0x2d4/0x5f0 [ 57.487670][ T949] ? security_bpf+0x82/0xa0 [ 57.492179][ T949] __sys_bpf+0x5e3/0x730 [ 57.496415][ T949] ? bpf_link_show_fdinfo+0x310/0x310 [ 57.501783][ T949] __x64_sys_bpf+0x7c/0x90 [ 57.506312][ T949] x64_sys_call+0x4b9/0x9a0 [ 57.510809][ T949] do_syscall_64+0x4c/0xa0 [ 57.515219][ T949] ? clear_bhb_loop+0x35/0x90 [ 57.519915][ T949] ? clear_bhb_loop+0x35/0x90 [ 57.524589][ T949] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 57.530500][ T949] RIP: 0033:0x7f8401225969 [ 57.534919][ T949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 57.554516][ T949] RSP: 002b:00007f83ff88e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 57.562953][ T949] RAX: ffffffffffffffda RBX: 00007f840144cfa0 RCX: 00007f8401225969 [ 57.571016][ T949] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 57.579020][ T949] RBP: 00007f83ff88e090 R08: 0000000000000000 R09: 0000000000000000 [ 57.587027][ T949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 57.595001][ T949] R13: 0000000000000000 R14: 00007f840144cfa0 R15: 00007ffc036da3e8 [ 57.602979][ T949] [ 57.858658][ T973] device syzkaller0 entered promiscuous mode [ 57.957833][ T30] audit: type=1400 audit(1746868243.413:125): avc: denied { relabelfrom } for pid=974 comm="syz.0.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 57.986468][ T30] audit: type=1400 audit(1746868243.433:126): avc: denied { relabelto } for pid=974 comm="syz.0.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 58.611074][ T1037] device sit0 left promiscuous mode [ 58.693500][ T1037] device sit0 entered promiscuous mode [ 59.015754][ T30] audit: type=1400 audit(1746868244.473:127): avc: denied { create } for pid=1043 comm="syz.4.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 59.076860][ T30] audit: type=1400 audit(1746868244.493:128): avc: denied { create } for pid=1043 comm="syz.4.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 59.204425][ T1058] device sit0 left promiscuous mode [ 59.243519][ T1058] device sit0 entered promiscuous mode [ 59.774688][ T1091] FAULT_INJECTION: forcing a failure. [ 59.774688][ T1091] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 59.834419][ T1091] CPU: 0 PID: 1091 Comm: syz.1.267 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 59.844272][ T1091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 59.854352][ T1091] Call Trace: [ 59.857647][ T1091] [ 59.860590][ T1091] __dump_stack+0x21/0x30 [ 59.864950][ T1091] dump_stack_lvl+0xee/0x150 [ 59.869573][ T1091] ? show_regs_print_info+0x20/0x20 [ 59.874801][ T1091] ? migrate_enable+0x192/0x260 [ 59.879687][ T1091] ? migrate_disable+0x180/0x180 [ 59.884646][ T1091] dump_stack+0x15/0x20 [ 59.888931][ T1091] should_fail+0x3c1/0x510 [ 59.893368][ T1091] should_fail_usercopy+0x1a/0x20 [ 59.898407][ T1091] _copy_to_user+0x20/0x90 [ 59.902919][ T1091] generic_map_lookup_batch+0x707/0xa70 [ 59.908494][ T1091] ? bpf_map_update_value+0x3e0/0x3e0 [ 59.913889][ T1091] ? __fdget+0x1a1/0x230 [ 59.918150][ T1091] ? bpf_map_update_value+0x3e0/0x3e0 [ 59.923538][ T1091] bpf_map_do_batch+0x2d4/0x5f0 [ 59.928406][ T1091] ? security_bpf+0x82/0xa0 [ 59.932929][ T1091] __sys_bpf+0x5e3/0x730 [ 59.937191][ T1091] ? bpf_link_show_fdinfo+0x310/0x310 [ 59.942584][ T1091] __x64_sys_bpf+0x7c/0x90 [ 59.947007][ T1091] x64_sys_call+0x4b9/0x9a0 [ 59.951522][ T1091] do_syscall_64+0x4c/0xa0 [ 59.955951][ T1091] ? clear_bhb_loop+0x35/0x90 [ 59.960635][ T1091] ? clear_bhb_loop+0x35/0x90 [ 59.965334][ T1091] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 59.971328][ T1091] RIP: 0033:0x7fc8c01a7969 [ 59.975749][ T1091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 59.995452][ T1091] RSP: 002b:00007fc8be810038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 60.003909][ T1091] RAX: ffffffffffffffda RBX: 00007fc8c03cefa0 RCX: 00007fc8c01a7969 [ 60.011894][ T1091] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 60.019879][ T1091] RBP: 00007fc8be810090 R08: 0000000000000000 R09: 0000000000000000 [ 60.027855][ T1091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 60.035842][ T1091] R13: 0000000000000000 R14: 00007fc8c03cefa0 R15: 00007ffd06ebd2b8 [ 60.043836][ T1091] [ 60.168310][ T1097] device sit0 left promiscuous mode [ 60.232573][ T1097] device sit0 entered promiscuous mode [ 60.629302][ T30] audit: type=1400 audit(1746868246.083:129): avc: denied { create } for pid=1106 comm="syz.3.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 61.233554][ T1122] FAULT_INJECTION: forcing a failure. [ 61.233554][ T1122] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 61.261310][ T1122] CPU: 1 PID: 1122 Comm: syz.4.280 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 61.271165][ T1122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 61.281238][ T1122] Call Trace: [ 61.284521][ T1122] [ 61.287458][ T1122] __dump_stack+0x21/0x30 [ 61.291812][ T1122] dump_stack_lvl+0xee/0x150 [ 61.296415][ T1122] ? show_regs_print_info+0x20/0x20 [ 61.301631][ T1122] ? migrate_enable+0x192/0x260 [ 61.306497][ T1122] ? migrate_disable+0x180/0x180 [ 61.311455][ T1122] dump_stack+0x15/0x20 [ 61.315629][ T1122] should_fail+0x3c1/0x510 [ 61.320060][ T1122] should_fail_usercopy+0x1a/0x20 [ 61.325110][ T1122] _copy_to_user+0x20/0x90 [ 61.329548][ T1122] generic_map_lookup_batch+0x6a9/0xa70 [ 61.335152][ T1122] ? bpf_map_update_value+0x3e0/0x3e0 [ 61.340569][ T1122] ? __fdget+0x1a1/0x230 [ 61.344823][ T1122] ? bpf_map_update_value+0x3e0/0x3e0 [ 61.350201][ T1122] bpf_map_do_batch+0x2d4/0x5f0 [ 61.355057][ T1122] ? security_bpf+0x82/0xa0 [ 61.359560][ T1122] __sys_bpf+0x5e3/0x730 [ 61.363804][ T1122] ? bpf_link_show_fdinfo+0x310/0x310 [ 61.369215][ T1122] __x64_sys_bpf+0x7c/0x90 [ 61.373631][ T1122] x64_sys_call+0x4b9/0x9a0 [ 61.378130][ T1122] do_syscall_64+0x4c/0xa0 [ 61.382545][ T1122] ? clear_bhb_loop+0x35/0x90 [ 61.387215][ T1122] ? clear_bhb_loop+0x35/0x90 [ 61.391885][ T1122] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 61.397786][ T1122] RIP: 0033:0x7feba2e22969 [ 61.402199][ T1122] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 61.421800][ T1122] RSP: 002b:00007feba148b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 61.430219][ T1122] RAX: ffffffffffffffda RBX: 00007feba3049fa0 RCX: 00007feba2e22969 [ 61.438282][ T1122] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 61.446342][ T1122] RBP: 00007feba148b090 R08: 0000000000000000 R09: 0000000000000000 [ 61.454476][ T1122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 61.462439][ T1122] R13: 0000000000000000 R14: 00007feba3049fa0 R15: 00007ffd53934408 [ 61.470407][ T1122] [ 62.591242][ T1166] FAULT_INJECTION: forcing a failure. [ 62.591242][ T1166] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 62.664056][ T1166] CPU: 1 PID: 1166 Comm: syz.0.296 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 62.673913][ T1166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 62.683998][ T1166] Call Trace: [ 62.687294][ T1166] [ 62.690235][ T1166] __dump_stack+0x21/0x30 [ 62.694589][ T1166] dump_stack_lvl+0xee/0x150 [ 62.699376][ T1166] ? show_regs_print_info+0x20/0x20 [ 62.704594][ T1166] ? dump_stack+0x9/0x20 [ 62.708863][ T1166] dump_stack+0x15/0x20 [ 62.713041][ T1166] should_fail+0x3c1/0x510 [ 62.717472][ T1166] should_fail_usercopy+0x1a/0x20 [ 62.722510][ T1166] _copy_to_user+0x20/0x90 [ 62.726947][ T1166] generic_map_lookup_batch+0x707/0xa70 [ 62.733127][ T1166] ? bpf_map_update_value+0x3e0/0x3e0 [ 62.738552][ T1166] ? __fdget+0x1a1/0x230 [ 62.742799][ T1166] ? bpf_map_update_value+0x3e0/0x3e0 [ 62.748168][ T1166] bpf_map_do_batch+0x2d4/0x5f0 [ 62.753018][ T1166] ? security_bpf+0x82/0xa0 [ 62.757513][ T1166] __sys_bpf+0x5e3/0x730 [ 62.761750][ T1166] ? bpf_link_show_fdinfo+0x310/0x310 [ 62.767126][ T1166] __x64_sys_bpf+0x7c/0x90 [ 62.771534][ T1166] x64_sys_call+0x4b9/0x9a0 [ 62.776031][ T1166] do_syscall_64+0x4c/0xa0 [ 62.780442][ T1166] ? clear_bhb_loop+0x35/0x90 [ 62.785108][ T1166] ? clear_bhb_loop+0x35/0x90 [ 62.789782][ T1166] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 62.795680][ T1166] RIP: 0033:0x7f8401225969 [ 62.800086][ T1166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 62.819705][ T1166] RSP: 002b:00007f83ff88e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 62.828123][ T1166] RAX: ffffffffffffffda RBX: 00007f840144cfa0 RCX: 00007f8401225969 [ 62.836278][ T1166] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 62.844244][ T1166] RBP: 00007f83ff88e090 R08: 0000000000000000 R09: 0000000000000000 [ 62.852235][ T1166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 62.860299][ T1166] R13: 0000000000000000 R14: 00007f840144cfa0 R15: 00007ffc036da3e8 [ 62.868487][ T1166] [ 65.811936][ T1202] FAULT_INJECTION: forcing a failure. [ 65.811936][ T1202] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 65.825364][ T1202] CPU: 0 PID: 1202 Comm: syz.1.309 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 65.835201][ T1202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 65.845261][ T1202] Call Trace: [ 65.848538][ T1202] [ 65.851469][ T1202] __dump_stack+0x21/0x30 [ 65.855803][ T1202] dump_stack_lvl+0xee/0x150 [ 65.860389][ T1202] ? show_regs_print_info+0x20/0x20 [ 65.865588][ T1202] ? migrate_enable+0x192/0x260 [ 65.870432][ T1202] ? migrate_disable+0x180/0x180 [ 65.875364][ T1202] dump_stack+0x15/0x20 [ 65.879628][ T1202] should_fail+0x3c1/0x510 [ 65.884064][ T1202] should_fail_usercopy+0x1a/0x20 [ 65.889089][ T1202] _copy_to_user+0x20/0x90 [ 65.893507][ T1202] generic_map_lookup_batch+0x6a9/0xa70 [ 65.899053][ T1202] ? security_file_permission+0x79/0xa0 [ 65.904601][ T1202] ? bpf_map_update_value+0x3e0/0x3e0 [ 65.909967][ T1202] ? __fdget+0x1a1/0x230 [ 65.914208][ T1202] ? bpf_map_update_value+0x3e0/0x3e0 [ 65.919572][ T1202] bpf_map_do_batch+0x2d4/0x5f0 [ 65.924415][ T1202] ? security_bpf+0x82/0xa0 [ 65.928911][ T1202] __sys_bpf+0x5e3/0x730 [ 65.933144][ T1202] ? bpf_link_show_fdinfo+0x310/0x310 [ 65.938513][ T1202] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 65.944662][ T1202] __x64_sys_bpf+0x7c/0x90 [ 65.949075][ T1202] x64_sys_call+0x4b9/0x9a0 [ 65.953569][ T1202] do_syscall_64+0x4c/0xa0 [ 65.957978][ T1202] ? clear_bhb_loop+0x35/0x90 [ 65.962677][ T1202] ? clear_bhb_loop+0x35/0x90 [ 65.967343][ T1202] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 65.973232][ T1202] RIP: 0033:0x7fc8c01a7969 [ 65.977642][ T1202] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 65.997241][ T1202] RSP: 002b:00007fc8be810038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 66.005651][ T1202] RAX: ffffffffffffffda RBX: 00007fc8c03cefa0 RCX: 00007fc8c01a7969 [ 66.013615][ T1202] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 66.021578][ T1202] RBP: 00007fc8be810090 R08: 0000000000000000 R09: 0000000000000000 [ 66.029539][ T1202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 66.037505][ T1202] R13: 0000000000000000 R14: 00007fc8c03cefa0 R15: 00007ffd06ebd2b8 [ 66.045479][ T1202] [ 66.601314][ T1233] FAULT_INJECTION: forcing a failure. [ 66.601314][ T1233] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 66.645592][ T1233] CPU: 1 PID: 1233 Comm: syz.1.320 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 66.655451][ T1233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 66.665525][ T1233] Call Trace: [ 66.668816][ T1233] [ 66.671760][ T1233] __dump_stack+0x21/0x30 [ 66.676122][ T1233] dump_stack_lvl+0xee/0x150 [ 66.680737][ T1233] ? show_regs_print_info+0x20/0x20 [ 66.685962][ T1233] ? migrate_enable+0x192/0x260 [ 66.690834][ T1233] ? migrate_disable+0x180/0x180 [ 66.695791][ T1233] dump_stack+0x15/0x20 [ 66.699963][ T1233] should_fail+0x3c1/0x510 [ 66.704394][ T1233] should_fail_usercopy+0x1a/0x20 [ 66.709602][ T1233] _copy_to_user+0x20/0x90 [ 66.714047][ T1233] generic_map_lookup_batch+0x707/0xa70 [ 66.719618][ T1233] ? security_file_permission+0x79/0xa0 [ 66.725197][ T1233] ? bpf_map_update_value+0x3e0/0x3e0 [ 66.730599][ T1233] ? __fdget+0x1a1/0x230 [ 66.734861][ T1233] ? bpf_map_update_value+0x3e0/0x3e0 [ 66.740256][ T1233] bpf_map_do_batch+0x2d4/0x5f0 [ 66.745129][ T1233] ? security_bpf+0x82/0xa0 [ 66.749649][ T1233] __sys_bpf+0x5e3/0x730 [ 66.753915][ T1233] ? bpf_link_show_fdinfo+0x310/0x310 [ 66.759310][ T1233] ? debug_smp_processor_id+0x17/0x20 [ 66.764710][ T1233] __x64_sys_bpf+0x7c/0x90 [ 66.769141][ T1233] x64_sys_call+0x4b9/0x9a0 [ 66.773652][ T1233] do_syscall_64+0x4c/0xa0 [ 66.778078][ T1233] ? clear_bhb_loop+0x35/0x90 [ 66.782764][ T1233] ? clear_bhb_loop+0x35/0x90 [ 66.787447][ T1233] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 66.793350][ T1233] RIP: 0033:0x7fc8c01a7969 [ 66.797773][ T1233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 66.817385][ T1233] RSP: 002b:00007fc8be810038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 66.825807][ T1233] RAX: ffffffffffffffda RBX: 00007fc8c03cefa0 RCX: 00007fc8c01a7969 [ 66.833786][ T1233] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 66.841857][ T1233] RBP: 00007fc8be810090 R08: 0000000000000000 R09: 0000000000000000 [ 66.849846][ T1233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 66.857827][ T1233] R13: 0000000000000000 R14: 00007fc8c03cefa0 R15: 00007ffd06ebd2b8 [ 66.865902][ T1233] [ 67.355923][ T1257] bridge0: port 3(dummy0) entered blocking state [ 67.367902][ T1257] bridge0: port 3(dummy0) entered disabled state [ 67.391561][ T1257] device dummy0 entered promiscuous mode [ 67.459044][ T1257] bridge0: port 3(dummy0) entered blocking state [ 67.465467][ T1257] bridge0: port 3(dummy0) entered forwarding state [ 67.563428][ T30] audit: type=1400 audit(1746868253.013:130): avc: denied { create } for pid=1270 comm="syz.1.332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 68.410567][ T1287] FAULT_INJECTION: forcing a failure. [ 68.410567][ T1287] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 68.435362][ T1287] CPU: 1 PID: 1287 Comm: syz.2.337 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 68.445219][ T1287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 68.455296][ T1287] Call Trace: [ 68.458586][ T1287] [ 68.461528][ T1287] __dump_stack+0x21/0x30 [ 68.465880][ T1287] dump_stack_lvl+0xee/0x150 [ 68.470483][ T1287] ? show_regs_print_info+0x20/0x20 [ 68.475697][ T1287] ? migrate_enable+0x192/0x260 [ 68.480566][ T1287] ? migrate_disable+0x180/0x180 [ 68.485518][ T1287] dump_stack+0x15/0x20 [ 68.489690][ T1287] should_fail+0x3c1/0x510 [ 68.494122][ T1287] should_fail_usercopy+0x1a/0x20 [ 68.499172][ T1287] _copy_to_user+0x20/0x90 [ 68.503660][ T1287] generic_map_lookup_batch+0x6a9/0xa70 [ 68.509224][ T1287] ? security_file_permission+0x79/0xa0 [ 68.514794][ T1287] ? bpf_map_update_value+0x3e0/0x3e0 [ 68.520197][ T1287] ? __fdget+0x1a1/0x230 [ 68.524461][ T1287] ? bpf_map_update_value+0x3e0/0x3e0 [ 68.529852][ T1287] bpf_map_do_batch+0x2d4/0x5f0 [ 68.534717][ T1287] ? security_bpf+0x82/0xa0 [ 68.539230][ T1287] __sys_bpf+0x5e3/0x730 [ 68.543749][ T1287] ? bpf_link_show_fdinfo+0x310/0x310 [ 68.549123][ T1287] __x64_sys_bpf+0x7c/0x90 [ 68.553532][ T1287] x64_sys_call+0x4b9/0x9a0 [ 68.558030][ T1287] do_syscall_64+0x4c/0xa0 [ 68.562443][ T1287] ? clear_bhb_loop+0x35/0x90 [ 68.567122][ T1287] ? clear_bhb_loop+0x35/0x90 [ 68.571794][ T1287] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 68.577685][ T1287] RIP: 0033:0x7fc1ed4ef969 [ 68.582119][ T1287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 68.601716][ T1287] RSP: 002b:00007fc1ebb58038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 68.610125][ T1287] RAX: ffffffffffffffda RBX: 00007fc1ed716fa0 RCX: 00007fc1ed4ef969 [ 68.618276][ T1287] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 68.626253][ T1287] RBP: 00007fc1ebb58090 R08: 0000000000000000 R09: 0000000000000000 [ 68.634219][ T1287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 68.642268][ T1287] R13: 0000000000000000 R14: 00007fc1ed716fa0 R15: 00007ffcbf88de68 [ 68.650242][ T1287] [ 68.874918][ T1304] cgroup: fork rejected by pids controller in /syz3 [ 69.211284][ T1425] FAULT_INJECTION: forcing a failure. [ 69.211284][ T1425] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 69.361120][ T1425] CPU: 0 PID: 1425 Comm: syz.1.352 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 69.370983][ T1425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 69.381058][ T1425] Call Trace: [ 69.384352][ T1425] [ 69.387301][ T1425] __dump_stack+0x21/0x30 [ 69.391649][ T1425] dump_stack_lvl+0xee/0x150 [ 69.396261][ T1425] ? show_regs_print_info+0x20/0x20 [ 69.401473][ T1425] ? vfs_write+0xc17/0xf70 [ 69.405901][ T1425] dump_stack+0x15/0x20 [ 69.410071][ T1425] should_fail+0x3c1/0x510 [ 69.414502][ T1425] should_fail_usercopy+0x1a/0x20 [ 69.419544][ T1425] _copy_from_user+0x20/0xd0 [ 69.424154][ T1425] __sys_bpf+0x233/0x730 [ 69.428428][ T1425] ? bpf_link_show_fdinfo+0x310/0x310 [ 69.433819][ T1425] ? debug_smp_processor_id+0x17/0x20 [ 69.439201][ T1425] __x64_sys_bpf+0x7c/0x90 [ 69.443625][ T1425] x64_sys_call+0x4b9/0x9a0 [ 69.448134][ T1425] do_syscall_64+0x4c/0xa0 [ 69.452558][ T1425] ? clear_bhb_loop+0x35/0x90 [ 69.457241][ T1425] ? clear_bhb_loop+0x35/0x90 [ 69.461923][ T1425] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 69.467922][ T1425] RIP: 0033:0x7fc8c01a7969 [ 69.472344][ T1425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 69.491960][ T1425] RSP: 002b:00007fc8be810038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 69.500392][ T1425] RAX: ffffffffffffffda RBX: 00007fc8c03cefa0 RCX: 00007fc8c01a7969 [ 69.508485][ T1425] RDX: 0000000000000028 RSI: 0000200000001300 RDI: 0000000000000012 [ 69.516469][ T1425] RBP: 00007fc8be810090 R08: 0000000000000000 R09: 0000000000000000 [ 69.524455][ T1425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 69.532442][ T1425] R13: 0000000000000001 R14: 00007fc8c03cefa0 R15: 00007ffd06ebd2b8 [ 69.540445][ T1425] [ 69.756961][ T282] syz-executor (282) used greatest stack depth: 20928 bytes left [ 70.451032][ T1448] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.458249][ T1448] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.465863][ T1448] device bridge_slave_0 entered promiscuous mode [ 70.569962][ T1448] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.577115][ T1448] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.584514][ T1448] device bridge_slave_1 entered promiscuous mode [ 70.805027][ T30] audit: type=1400 audit(1746868256.253:131): avc: denied { create } for pid=1448 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 70.839777][ T30] audit: type=1400 audit(1746868256.293:132): avc: denied { write } for pid=1448 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 70.949914][ T30] audit: type=1400 audit(1746868256.293:133): avc: denied { read } for pid=1448 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 71.111522][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.130209][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.185859][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.215047][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.223614][ T303] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.230695][ T303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.271383][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.281884][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.294748][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.303573][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.310660][ T303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.345038][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.362516][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.439612][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.447991][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.741874][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 71.750601][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 71.763860][ T1448] device veth0_vlan entered promiscuous mode [ 71.770763][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.779649][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 71.802038][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.863801][ T10] device dummy0 left promiscuous mode [ 71.875651][ T10] bridge0: port 3(dummy0) entered disabled state [ 71.965780][ T10] device bridge_slave_1 left promiscuous mode [ 71.972040][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.979827][ T10] device bridge_slave_0 left promiscuous mode [ 72.007207][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.021635][ T10] device veth1_macvtap left promiscuous mode [ 72.027793][ T10] device veth0_vlan left promiscuous mode [ 72.120395][ T1504] FAULT_INJECTION: forcing a failure. [ 72.120395][ T1504] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 72.144558][ T1504] CPU: 1 PID: 1504 Comm: syz.0.376 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 72.154415][ T1504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 72.164493][ T1504] Call Trace: [ 72.167782][ T1504] [ 72.170724][ T1504] __dump_stack+0x21/0x30 [ 72.175082][ T1504] dump_stack_lvl+0xee/0x150 [ 72.179780][ T1504] ? show_regs_print_info+0x20/0x20 [ 72.184996][ T1504] ? migrate_enable+0x192/0x260 [ 72.189876][ T1504] ? migrate_disable+0x180/0x180 [ 72.194893][ T1504] dump_stack+0x15/0x20 [ 72.199069][ T1504] should_fail+0x3c1/0x510 [ 72.203501][ T1504] should_fail_usercopy+0x1a/0x20 [ 72.208542][ T1504] _copy_to_user+0x20/0x90 [ 72.212989][ T1504] generic_map_lookup_batch+0x6a9/0xa70 [ 72.218558][ T1504] ? bpf_map_update_value+0x3e0/0x3e0 [ 72.223955][ T1504] ? __fdget+0x1a1/0x230 [ 72.228218][ T1504] ? bpf_map_update_value+0x3e0/0x3e0 [ 72.233602][ T1504] bpf_map_do_batch+0x2d4/0x5f0 [ 72.238469][ T1504] ? security_bpf+0x82/0xa0 [ 72.242987][ T1504] __sys_bpf+0x5e3/0x730 [ 72.247252][ T1504] ? bpf_link_show_fdinfo+0x310/0x310 [ 72.252649][ T1504] __x64_sys_bpf+0x7c/0x90 [ 72.257079][ T1504] x64_sys_call+0x4b9/0x9a0 [ 72.261600][ T1504] do_syscall_64+0x4c/0xa0 [ 72.266037][ T1504] ? clear_bhb_loop+0x35/0x90 [ 72.270715][ T1504] ? clear_bhb_loop+0x35/0x90 [ 72.275384][ T1504] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 72.281366][ T1504] RIP: 0033:0x7f8401225969 [ 72.285777][ T1504] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 72.305380][ T1504] RSP: 002b:00007f83ff88e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 72.313796][ T1504] RAX: ffffffffffffffda RBX: 00007f840144cfa0 RCX: 00007f8401225969 [ 72.321762][ T1504] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 72.329730][ T1504] RBP: 00007f83ff88e090 R08: 0000000000000000 R09: 0000000000000000 [ 72.337693][ T1504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 72.345655][ T1504] R13: 0000000000000000 R14: 00007f840144cfa0 R15: 00007ffc036da3e8 [ 72.353626][ T1504] [ 72.532314][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 72.541111][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 72.554512][ T1448] device veth1_macvtap entered promiscuous mode [ 72.640504][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 72.666021][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 72.732814][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 73.075729][ T1525] FAULT_INJECTION: forcing a failure. [ 73.075729][ T1525] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 73.105884][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 73.110879][ T1525] CPU: 1 PID: 1525 Comm: syz.2.384 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 73.123793][ T1525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 73.126180][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 73.133869][ T1525] Call Trace: [ 73.133876][ T1525] [ 73.148175][ T1525] __dump_stack+0x21/0x30 [ 73.152519][ T1525] dump_stack_lvl+0xee/0x150 [ 73.157112][ T1525] ? show_regs_print_info+0x20/0x20 [ 73.162314][ T1525] dump_stack+0x15/0x20 [ 73.166470][ T1525] should_fail+0x3c1/0x510 [ 73.170884][ T1525] should_fail_usercopy+0x1a/0x20 [ 73.175908][ T1525] strncpy_from_user+0x24/0x2e0 [ 73.180760][ T1525] bpf_prog_load+0x1b8/0x1550 [ 73.185432][ T1525] ? __kasan_check_write+0x14/0x20 [ 73.190547][ T1525] ? proc_fail_nth_write+0x17a/0x1f0 [ 73.195830][ T1525] ? map_freeze+0x360/0x360 [ 73.200333][ T1525] ? selinux_bpf+0xc7/0xf0 [ 73.204747][ T1525] ? security_bpf+0x82/0xa0 [ 73.209261][ T1525] __sys_bpf+0x4c3/0x730 [ 73.213494][ T1525] ? bpf_link_show_fdinfo+0x310/0x310 [ 73.218860][ T1525] ? debug_smp_processor_id+0x17/0x20 [ 73.224227][ T1525] __x64_sys_bpf+0x7c/0x90 [ 73.228639][ T1525] x64_sys_call+0x4b9/0x9a0 [ 73.233134][ T1525] do_syscall_64+0x4c/0xa0 [ 73.237546][ T1525] ? clear_bhb_loop+0x35/0x90 [ 73.242215][ T1525] ? clear_bhb_loop+0x35/0x90 [ 73.246882][ T1525] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 73.252771][ T1525] RIP: 0033:0x7fc1ed4ef969 [ 73.257185][ T1525] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 73.276801][ T1525] RSP: 002b:00007fc1ebb58038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 73.285210][ T1525] RAX: ffffffffffffffda RBX: 00007fc1ed716fa0 RCX: 00007fc1ed4ef969 [ 73.293181][ T1525] RDX: 0000000000000078 RSI: 0000200000000440 RDI: 0000000000000005 [ 73.301147][ T1525] RBP: 00007fc1ebb58090 R08: 0000000000000000 R09: 0000000000000000 [ 73.309132][ T1525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 73.317099][ T1525] R13: 0000000000000000 R14: 00007fc1ed716fa0 R15: 00007ffcbf88de68 [ 73.325073][ T1525] [ 76.052132][ T1628] tun0: tun_chr_ioctl cmd 1074025675 [ 76.085521][ T1628] tun0: persist enabled [ 76.167216][ T1628] tun0: tun_chr_ioctl cmd 1074025675 [ 76.172613][ T1628] tun0: persist disabled [ 76.471258][ T1650] FAULT_INJECTION: forcing a failure. [ 76.471258][ T1650] name failslab, interval 1, probability 0, space 0, times 0 [ 76.495829][ T1650] CPU: 0 PID: 1650 Comm: syz.3.425 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 76.505688][ T1650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 76.515766][ T1650] Call Trace: [ 76.519058][ T1650] [ 76.522002][ T1650] __dump_stack+0x21/0x30 [ 76.526354][ T1650] dump_stack_lvl+0xee/0x150 [ 76.530963][ T1650] ? show_regs_print_info+0x20/0x20 [ 76.536181][ T1650] ? stack_trace_save+0x98/0xe0 [ 76.541050][ T1650] dump_stack+0x15/0x20 [ 76.545228][ T1650] should_fail+0x3c1/0x510 [ 76.549671][ T1650] __should_failslab+0xa4/0xe0 [ 76.554459][ T1650] should_failslab+0x9/0x20 [ 76.558987][ T1650] slab_pre_alloc_hook+0x3b/0xe0 [ 76.564025][ T1650] __kmalloc+0x6d/0x2c0 [ 76.568192][ T1650] ? kvmalloc_node+0x242/0x330 [ 76.572967][ T1650] ? sort_r+0xe04/0xe20 [ 76.577234][ T1650] kvmalloc_node+0x242/0x330 [ 76.581832][ T1650] ? vm_mmap+0xb0/0xb0 [ 76.585909][ T1650] btf_check_all_metas+0x4bd/0xa70 [ 76.591026][ T1650] btf_parse_type_sec+0xf5/0x1b70 [ 76.596050][ T1650] ? kvmalloc_node+0x242/0x330 [ 76.600808][ T1650] ? btf_verifier_log+0x2a0/0x2a0 [ 76.605839][ T1650] ? kvmalloc_node+0x26d/0x330 [ 76.610597][ T1650] ? memcpy+0x56/0x70 [ 76.614591][ T1650] ? btf_parse_hdr+0x60e/0x7f0 [ 76.619350][ T1650] ? btf_parse_str_sec+0x224/0x2c0 [ 76.624455][ T1650] btf_new_fd+0x4c5/0x920 [ 76.628791][ T1650] bpf_btf_load+0x6f/0x90 [ 76.633131][ T1650] __sys_bpf+0x515/0x730 [ 76.637395][ T1650] ? bpf_link_show_fdinfo+0x310/0x310 [ 76.642776][ T1650] ? debug_smp_processor_id+0x17/0x20 [ 76.648149][ T1650] __x64_sys_bpf+0x7c/0x90 [ 76.652569][ T1650] x64_sys_call+0x4b9/0x9a0 [ 76.657071][ T1650] do_syscall_64+0x4c/0xa0 [ 76.661574][ T1650] ? clear_bhb_loop+0x35/0x90 [ 76.666336][ T1650] ? clear_bhb_loop+0x35/0x90 [ 76.671026][ T1650] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 76.676918][ T1650] RIP: 0033:0x7fbc5124c969 [ 76.681343][ T1650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 76.701469][ T1650] RSP: 002b:00007fbc4f8b5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 76.709902][ T1650] RAX: ffffffffffffffda RBX: 00007fbc51473fa0 RCX: 00007fbc5124c969 [ 76.717881][ T1650] RDX: 0000000000000028 RSI: 0000200000001300 RDI: 0000000000000012 [ 76.725854][ T1650] RBP: 00007fbc4f8b5090 R08: 0000000000000000 R09: 0000000000000000 [ 76.733834][ T1650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 76.741926][ T1650] R13: 0000000000000001 R14: 00007fbc51473fa0 R15: 00007ffc4121b758 [ 76.749914][ T1650] [ 77.313386][ T1671] FAULT_INJECTION: forcing a failure. [ 77.313386][ T1671] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 77.365541][ T1671] CPU: 0 PID: 1671 Comm: syz.0.431 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 77.375391][ T1671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 77.385457][ T1671] Call Trace: [ 77.388748][ T1671] [ 77.391691][ T1671] __dump_stack+0x21/0x30 [ 77.396042][ T1671] dump_stack_lvl+0xee/0x150 [ 77.400653][ T1671] ? show_regs_print_info+0x20/0x20 [ 77.405874][ T1671] dump_stack+0x15/0x20 [ 77.410050][ T1671] should_fail+0x3c1/0x510 [ 77.414476][ T1671] should_fail_usercopy+0x1a/0x20 [ 77.419509][ T1671] _copy_to_user+0x20/0x90 [ 77.423952][ T1671] generic_map_lookup_batch+0x707/0xa70 [ 77.429515][ T1671] ? security_file_permission+0x79/0xa0 [ 77.435082][ T1671] ? bpf_map_update_value+0x3e0/0x3e0 [ 77.440476][ T1671] ? __fdget+0x1a1/0x230 [ 77.444740][ T1671] ? bpf_map_update_value+0x3e0/0x3e0 [ 77.450132][ T1671] bpf_map_do_batch+0x2d4/0x5f0 [ 77.455003][ T1671] ? security_bpf+0x82/0xa0 [ 77.459742][ T1671] __sys_bpf+0x5e3/0x730 [ 77.463994][ T1671] ? bpf_link_show_fdinfo+0x310/0x310 [ 77.469373][ T1671] ? bpf_trace_run2+0xb5/0x1b0 [ 77.474156][ T1671] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 77.480324][ T1671] __x64_sys_bpf+0x7c/0x90 [ 77.484762][ T1671] x64_sys_call+0x4b9/0x9a0 [ 77.489267][ T1671] do_syscall_64+0x4c/0xa0 [ 77.493685][ T1671] ? clear_bhb_loop+0x35/0x90 [ 77.498463][ T1671] ? clear_bhb_loop+0x35/0x90 [ 77.503138][ T1671] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 77.509071][ T1671] RIP: 0033:0x7f8401225969 [ 77.513510][ T1671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 77.533289][ T1671] RSP: 002b:00007f83ff88e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 77.541705][ T1671] RAX: ffffffffffffffda RBX: 00007f840144cfa0 RCX: 00007f8401225969 [ 77.549670][ T1671] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 77.557753][ T1671] RBP: 00007f83ff88e090 R08: 0000000000000000 R09: 0000000000000000 [ 77.565719][ T1671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 77.573713][ T1671] R13: 0000000000000000 R14: 00007f840144cfa0 R15: 00007ffc036da3e8 [ 77.581686][ T1671] [ 78.085868][ T1688] FAULT_INJECTION: forcing a failure. [ 78.085868][ T1688] name failslab, interval 1, probability 0, space 0, times 0 [ 78.180637][ T1688] CPU: 1 PID: 1688 Comm: syz.0.436 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 78.190494][ T1688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 78.200563][ T1688] Call Trace: [ 78.203850][ T1688] [ 78.206788][ T1688] __dump_stack+0x21/0x30 [ 78.211143][ T1688] dump_stack_lvl+0xee/0x150 [ 78.215747][ T1688] ? show_regs_print_info+0x20/0x20 [ 78.220972][ T1688] dump_stack+0x15/0x20 [ 78.225138][ T1688] should_fail+0x3c1/0x510 [ 78.229564][ T1688] __should_failslab+0xa4/0xe0 [ 78.234330][ T1688] should_failslab+0x9/0x20 [ 78.238827][ T1688] slab_pre_alloc_hook+0x3b/0xe0 [ 78.243854][ T1688] __kmalloc+0x6d/0x2c0 [ 78.248019][ T1688] ? kvmalloc_node+0x242/0x330 [ 78.252778][ T1688] kvmalloc_node+0x242/0x330 [ 78.257381][ T1688] ? vm_mmap+0xb0/0xb0 [ 78.261445][ T1688] btf_parse_type_sec+0x174/0x1b70 [ 78.266568][ T1688] ? kvmalloc_node+0x242/0x330 [ 78.271325][ T1688] ? btf_verifier_log+0x2a0/0x2a0 [ 78.276364][ T1688] ? kvmalloc_node+0x26d/0x330 [ 78.281123][ T1688] ? btf_parse_hdr+0x60e/0x7f0 [ 78.285881][ T1688] btf_new_fd+0x4c5/0x920 [ 78.290206][ T1688] bpf_btf_load+0x6f/0x90 [ 78.294525][ T1688] __sys_bpf+0x515/0x730 [ 78.298758][ T1688] ? bpf_link_show_fdinfo+0x310/0x310 [ 78.304121][ T1688] ? bpf_trace_run2+0xb5/0x1b0 [ 78.308900][ T1688] ? __bpf_trace_sys_enter+0x62/0x70 [ 78.314177][ T1688] __x64_sys_bpf+0x7c/0x90 [ 78.318587][ T1688] x64_sys_call+0x4b9/0x9a0 [ 78.323082][ T1688] do_syscall_64+0x4c/0xa0 [ 78.327492][ T1688] ? clear_bhb_loop+0x35/0x90 [ 78.332158][ T1688] ? clear_bhb_loop+0x35/0x90 [ 78.336856][ T1688] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 78.342746][ T1688] RIP: 0033:0x7f8401225969 [ 78.347158][ T1688] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.366756][ T1688] RSP: 002b:00007f83ff88e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 78.375185][ T1688] RAX: ffffffffffffffda RBX: 00007f840144cfa0 RCX: 00007f8401225969 [ 78.383153][ T1688] RDX: 0000000000000028 RSI: 0000200000001300 RDI: 0000000000000012 [ 78.391116][ T1688] RBP: 00007f83ff88e090 R08: 0000000000000000 R09: 0000000000000000 [ 78.399185][ T1688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 78.407146][ T1688] R13: 0000000000000001 R14: 00007f840144cfa0 R15: 00007ffc036da3e8 [ 78.415115][ T1688] [ 78.982247][ T1708] FAULT_INJECTION: forcing a failure. [ 78.982247][ T1708] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 79.003702][ T1708] CPU: 0 PID: 1708 Comm: syz.4.444 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 79.013549][ T1708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 79.023624][ T1708] Call Trace: [ 79.026912][ T1708] [ 79.029850][ T1708] __dump_stack+0x21/0x30 [ 79.034203][ T1708] dump_stack_lvl+0xee/0x150 [ 79.038820][ T1708] ? show_regs_print_info+0x20/0x20 [ 79.044037][ T1708] ? migrate_enable+0x192/0x260 [ 79.048902][ T1708] ? migrate_disable+0x180/0x180 [ 79.053856][ T1708] dump_stack+0x15/0x20 [ 79.058036][ T1708] should_fail+0x3c1/0x510 [ 79.062467][ T1708] should_fail_usercopy+0x1a/0x20 [ 79.067503][ T1708] _copy_to_user+0x20/0x90 [ 79.071941][ T1708] generic_map_lookup_batch+0x6a9/0xa70 [ 79.077500][ T1708] ? security_file_permission+0x79/0xa0 [ 79.083067][ T1708] ? bpf_map_update_value+0x3e0/0x3e0 [ 79.088460][ T1708] ? __fdget+0x1a1/0x230 [ 79.092716][ T1708] ? bpf_map_update_value+0x3e0/0x3e0 [ 79.098106][ T1708] bpf_map_do_batch+0x2d4/0x5f0 [ 79.102970][ T1708] ? security_bpf+0x82/0xa0 [ 79.107491][ T1708] __sys_bpf+0x5e3/0x730 [ 79.111750][ T1708] ? bpf_link_show_fdinfo+0x310/0x310 [ 79.117144][ T1708] ? debug_smp_processor_id+0x17/0x20 [ 79.122532][ T1708] __x64_sys_bpf+0x7c/0x90 [ 79.126969][ T1708] x64_sys_call+0x4b9/0x9a0 [ 79.131488][ T1708] do_syscall_64+0x4c/0xa0 [ 79.135920][ T1708] ? clear_bhb_loop+0x35/0x90 [ 79.140602][ T1708] ? clear_bhb_loop+0x35/0x90 [ 79.145287][ T1708] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 79.151181][ T1708] RIP: 0033:0x7feba2e22969 [ 79.155598][ T1708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 79.175204][ T1708] RSP: 002b:00007feba148b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 79.183625][ T1708] RAX: ffffffffffffffda RBX: 00007feba3049fa0 RCX: 00007feba2e22969 [ 79.191595][ T1708] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 79.199562][ T1708] RBP: 00007feba148b090 R08: 0000000000000000 R09: 0000000000000000 [ 79.207525][ T1708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 79.215487][ T1708] R13: 0000000000000000 R14: 00007feba3049fa0 R15: 00007ffd53934408 [ 79.223456][ T1708] [ 79.573488][ T1729] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 79.649984][ T1752] FAULT_INJECTION: forcing a failure. [ 79.649984][ T1752] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 79.675493][ T1752] CPU: 1 PID: 1752 Comm: syz.2.458 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 79.685342][ T1752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 79.695394][ T1752] Call Trace: [ 79.698695][ T1752] [ 79.701631][ T1752] __dump_stack+0x21/0x30 [ 79.705972][ T1752] dump_stack_lvl+0xee/0x150 [ 79.710568][ T1752] ? show_regs_print_info+0x20/0x20 [ 79.715764][ T1752] ? migrate_enable+0x192/0x260 [ 79.720613][ T1752] ? migrate_disable+0x180/0x180 [ 79.725544][ T1752] dump_stack+0x15/0x20 [ 79.729699][ T1752] should_fail+0x3c1/0x510 [ 79.734108][ T1752] should_fail_usercopy+0x1a/0x20 [ 79.739126][ T1752] _copy_to_user+0x20/0x90 [ 79.743540][ T1752] generic_map_lookup_batch+0x707/0xa70 [ 79.749167][ T1752] ? security_file_permission+0x79/0xa0 [ 79.754713][ T1752] ? bpf_map_update_value+0x3e0/0x3e0 [ 79.760082][ T1752] ? __fdget+0x1a1/0x230 [ 79.764317][ T1752] ? bpf_map_update_value+0x3e0/0x3e0 [ 79.769694][ T1752] bpf_map_do_batch+0x2d4/0x5f0 [ 79.774551][ T1752] ? security_bpf+0x82/0xa0 [ 79.779052][ T1752] __sys_bpf+0x5e3/0x730 [ 79.783291][ T1752] ? bpf_link_show_fdinfo+0x310/0x310 [ 79.788683][ T1752] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 79.794832][ T1752] __x64_sys_bpf+0x7c/0x90 [ 79.799243][ T1752] x64_sys_call+0x4b9/0x9a0 [ 79.803741][ T1752] do_syscall_64+0x4c/0xa0 [ 79.808169][ T1752] ? clear_bhb_loop+0x35/0x90 [ 79.812850][ T1752] ? clear_bhb_loop+0x35/0x90 [ 79.817532][ T1752] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 79.823682][ T1752] RIP: 0033:0x7fc1ed4ef969 [ 79.828194][ T1752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 79.847807][ T1752] RSP: 002b:00007fc1ebb58038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 79.856223][ T1752] RAX: ffffffffffffffda RBX: 00007fc1ed716fa0 RCX: 00007fc1ed4ef969 [ 79.864191][ T1752] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 79.872153][ T1752] RBP: 00007fc1ebb58090 R08: 0000000000000000 R09: 0000000000000000 [ 79.880119][ T1752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 79.888085][ T1752] R13: 0000000000000000 R14: 00007fc1ed716fa0 R15: 00007ffcbf88de68 [ 79.896174][ T1752] [ 82.101044][ T1786] device syzkaller0 entered promiscuous mode [ 83.553579][ T30] audit: type=1400 audit(1746868268.993:134): avc: denied { create } for pid=1848 comm="syz.1.485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 88.296315][ T1876] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.304161][ T1876] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.425740][ T1886] device veth1_macvtap left promiscuous mode [ 88.467858][ T1886] device macsec0 entered promiscuous mode [ 89.574625][ T1925] device pim6reg1 entered promiscuous mode [ 89.973021][ T1955] syz.3.518[1955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.973128][ T1955] syz.3.518[1955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.109831][ T1984] device pim6reg1 entered promiscuous mode [ 91.337699][ T1994] device pim6reg1 entered promiscuous mode [ 93.432287][ T2093] bond_slave_1: mtu less than device minimum [ 97.187050][ T2113] ÿÿÿÿÿÿ: renamed from vlan1 [ 103.171658][ T2166] device syzkaller0 entered promiscuous mode [ 104.208681][ T2196] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 104.286199][ T2195] syzkaller0: mtu greater than device maximum [ 104.458140][ T2202] device sit0 left promiscuous mode [ 104.565543][ T2202] device sit0 entered promiscuous mode [ 105.145968][ T2217] device pim6reg1 entered promiscuous mode [ 105.660922][ T2227] device pim6reg1 entered promiscuous mode [ 105.926790][ T2242] FAULT_INJECTION: forcing a failure. [ 105.926790][ T2242] name failslab, interval 1, probability 0, space 0, times 0 [ 105.939854][ T2242] CPU: 0 PID: 2242 Comm: syz.1.611 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 105.949683][ T2242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 105.959762][ T2242] Call Trace: [ 105.963055][ T2242] [ 105.965988][ T2242] __dump_stack+0x21/0x30 [ 105.970331][ T2242] dump_stack_lvl+0xee/0x150 [ 105.974931][ T2242] ? show_regs_print_info+0x20/0x20 [ 105.980143][ T2242] ? avc_has_perm_noaudit+0x2f4/0x460 [ 105.985550][ T2242] dump_stack+0x15/0x20 [ 105.989805][ T2242] should_fail+0x3c1/0x510 [ 105.994230][ T2242] __should_failslab+0xa4/0xe0 [ 105.999002][ T2242] should_failslab+0x9/0x20 [ 106.003520][ T2242] slab_pre_alloc_hook+0x3b/0xe0 [ 106.008468][ T2242] ? __alloc_skb+0xe0/0x740 [ 106.012986][ T2242] kmem_cache_alloc+0x44/0x260 [ 106.017762][ T2242] __alloc_skb+0xe0/0x740 [ 106.022098][ T2242] alloc_skb_with_frags+0xa8/0x620 [ 106.027215][ T2242] sock_alloc_send_pskb+0x853/0x980 [ 106.032419][ T2242] ? is_bpf_text_address+0x177/0x190 [ 106.037709][ T2242] ? __kernel_text_address+0xa0/0x100 [ 106.043089][ T2242] ? sock_kzfree_s+0x60/0x60 [ 106.047685][ T2242] ? irqentry_exit+0x37/0x40 [ 106.052305][ T2242] ? sysvec_irq_work+0x61/0xc0 [ 106.057072][ T2242] ? asm_sysvec_irq_work+0x1b/0x20 [ 106.062187][ T2242] tun_get_user+0x4e6/0x33c0 [ 106.066791][ T2242] ? tun_do_read+0x1c40/0x1c40 [ 106.071561][ T2242] ? kstrtouint_from_user+0x1a0/0x200 [ 106.076940][ T2242] ? kstrtol_from_user+0x260/0x260 [ 106.082053][ T2242] ? putname+0x111/0x160 [ 106.086300][ T2242] ? bpf_get_current_pid_tgid+0x32/0xc0 [ 106.091860][ T2242] ? avc_policy_seqno+0x1b/0x70 [ 106.096716][ T2242] ? selinux_file_permission+0x2aa/0x510 [ 106.102356][ T2242] tun_chr_write_iter+0x1eb/0x2e0 [ 106.107388][ T2242] vfs_write+0x802/0xf70 [ 106.111634][ T2242] ? file_end_write+0x1b0/0x1b0 [ 106.116488][ T2242] ? __fget_files+0x2c4/0x320 [ 106.121191][ T2242] ? __fdget_pos+0x1f7/0x380 [ 106.125787][ T2242] ? ksys_write+0x71/0x240 [ 106.130221][ T2242] ksys_write+0x140/0x240 [ 106.134556][ T2242] ? __ia32_sys_read+0x90/0x90 [ 106.139329][ T2242] ? debug_smp_processor_id+0x17/0x20 [ 106.144706][ T2242] __x64_sys_write+0x7b/0x90 [ 106.149301][ T2242] x64_sys_call+0x8ef/0x9a0 [ 106.153824][ T2242] do_syscall_64+0x4c/0xa0 [ 106.158249][ T2242] ? clear_bhb_loop+0x35/0x90 [ 106.162934][ T2242] ? clear_bhb_loop+0x35/0x90 [ 106.167614][ T2242] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 106.173521][ T2242] RIP: 0033:0x7fc8c01a7969 [ 106.177941][ T2242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 106.197554][ T2242] RSP: 002b:00007fc8be810038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 106.205979][ T2242] RAX: ffffffffffffffda RBX: 00007fc8c03cefa0 RCX: 00007fc8c01a7969 [ 106.214058][ T2242] RDX: 000000000000fdef RSI: 00002000000004c0 RDI: 00000000000000c8 [ 106.222035][ T2242] RBP: 00007fc8be810090 R08: 0000000000000000 R09: 0000000000000000 [ 106.230100][ T2242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 106.238075][ T2242] R13: 0000000000000000 R14: 00007fc8c03cefa0 R15: 00007ffd06ebd2b8 [ 106.246062][ T2242] [ 107.171259][ T30] audit: type=1400 audit(1746868292.623:135): avc: denied { create } for pid=2267 comm="syz.3.619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 107.293679][ T2276] device sit0 entered promiscuous mode [ 107.420792][ T2277] device pim6reg1 entered promiscuous mode [ 107.607902][ T2290] FAULT_INJECTION: forcing a failure. [ 107.607902][ T2290] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 107.746128][ T2290] CPU: 0 PID: 2290 Comm: syz.4.625 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 107.755977][ T2290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 107.766047][ T2290] Call Trace: [ 107.769334][ T2290] [ 107.772276][ T2290] __dump_stack+0x21/0x30 [ 107.776625][ T2290] dump_stack_lvl+0xee/0x150 [ 107.781237][ T2290] ? show_regs_print_info+0x20/0x20 [ 107.786454][ T2290] ? stack_trace_save+0x98/0xe0 [ 107.791305][ T2290] dump_stack+0x15/0x20 [ 107.795456][ T2290] should_fail+0x3c1/0x510 [ 107.799865][ T2290] should_fail_alloc_page+0x55/0x80 [ 107.805055][ T2290] prepare_alloc_pages+0x156/0x600 [ 107.810161][ T2290] ? __alloc_pages_bulk+0xab0/0xab0 [ 107.815368][ T2290] __alloc_pages+0x10a/0x440 [ 107.819960][ T2290] ? prep_new_page+0x110/0x110 [ 107.824716][ T2290] kmalloc_order+0x4c/0x160 [ 107.829210][ T2290] ? alloc_skb_with_frags+0xa8/0x620 [ 107.834490][ T2290] kmalloc_order_trace+0x18/0xb0 [ 107.839422][ T2290] __kmalloc_track_caller+0x198/0x2c0 [ 107.844787][ T2290] ? kmem_cache_alloc+0xf7/0x260 [ 107.849715][ T2290] ? alloc_skb_with_frags+0xa8/0x620 [ 107.855017][ T2290] __alloc_skb+0x21a/0x740 [ 107.859438][ T2290] alloc_skb_with_frags+0xa8/0x620 [ 107.864566][ T2290] sock_alloc_send_pskb+0x853/0x980 [ 107.869769][ T2290] ? is_bpf_text_address+0x177/0x190 [ 107.875066][ T2290] ? __kernel_text_address+0xa0/0x100 [ 107.880442][ T2290] ? sock_kzfree_s+0x60/0x60 [ 107.885037][ T2290] ? stack_trace_save+0x98/0xe0 [ 107.889908][ T2290] tun_get_user+0x4e6/0x33c0 [ 107.894500][ T2290] ? __kasan_poison_slab+0x20/0x70 [ 107.899601][ T2290] ? kmem_cache_free+0x100/0x320 [ 107.904531][ T2290] ? __x64_sys_openat+0x136/0x160 [ 107.909551][ T2290] ? x64_sys_call+0x219/0x9a0 [ 107.914222][ T2290] ? tun_do_read+0x1c40/0x1c40 [ 107.918981][ T2290] ? kstrtouint_from_user+0x1a0/0x200 [ 107.924348][ T2290] ? kstrtol_from_user+0x260/0x260 [ 107.929451][ T2290] ? avc_policy_seqno+0x1b/0x70 [ 107.934297][ T2290] ? selinux_file_permission+0x2aa/0x510 [ 107.939922][ T2290] tun_chr_write_iter+0x1eb/0x2e0 [ 107.944944][ T2290] vfs_write+0x802/0xf70 [ 107.949180][ T2290] ? file_end_write+0x1b0/0x1b0 [ 107.954025][ T2290] ? __fget_files+0x2c4/0x320 [ 107.958697][ T2290] ? __fdget_pos+0x1f7/0x380 [ 107.963283][ T2290] ? ksys_write+0x71/0x240 [ 107.967690][ T2290] ksys_write+0x140/0x240 [ 107.972011][ T2290] ? __ia32_sys_read+0x90/0x90 [ 107.976764][ T2290] ? debug_smp_processor_id+0x17/0x20 [ 107.982129][ T2290] __x64_sys_write+0x7b/0x90 [ 107.986713][ T2290] x64_sys_call+0x8ef/0x9a0 [ 107.991206][ T2290] do_syscall_64+0x4c/0xa0 [ 107.995613][ T2290] ? clear_bhb_loop+0x35/0x90 [ 108.000278][ T2290] ? clear_bhb_loop+0x35/0x90 [ 108.004947][ T2290] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 108.010833][ T2290] RIP: 0033:0x7feba2e22969 [ 108.015240][ T2290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 108.034851][ T2290] RSP: 002b:00007feba148b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 108.043260][ T2290] RAX: ffffffffffffffda RBX: 00007feba3049fa0 RCX: 00007feba2e22969 [ 108.051227][ T2290] RDX: 000000000000fdef RSI: 00002000000004c0 RDI: 00000000000000c8 [ 108.059191][ T2290] RBP: 00007feba148b090 R08: 0000000000000000 R09: 0000000000000000 [ 108.067157][ T2290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 108.075119][ T2290] R13: 0000000000000000 R14: 00007feba3049fa0 R15: 00007ffd53934408 [ 108.083097][ T2290] [ 108.393306][ T30] audit: type=1400 audit(1746868293.843:136): avc: denied { ioctl } for pid=2314 comm="syz.3.631" path="socket:[23040]" dev="sockfs" ino=23040 ioctlcmd=0x54d3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 109.144553][ T2338] device sit0 left promiscuous mode [ 109.256153][ T2341] device sit0 entered promiscuous mode [ 109.273879][ T2343] FAULT_INJECTION: forcing a failure. [ 109.273879][ T2343] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 109.367839][ T2343] CPU: 0 PID: 2343 Comm: syz.4.641 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 109.377697][ T2343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 109.387763][ T2343] Call Trace: [ 109.391046][ T2343] [ 109.393980][ T2343] __dump_stack+0x21/0x30 [ 109.398382][ T2343] dump_stack_lvl+0xee/0x150 [ 109.402997][ T2343] ? show_regs_print_info+0x20/0x20 [ 109.408217][ T2343] dump_stack+0x15/0x20 [ 109.412389][ T2343] should_fail+0x3c1/0x510 [ 109.416826][ T2343] should_fail_usercopy+0x1a/0x20 [ 109.421869][ T2343] _copy_from_iter+0x21a/0x1050 [ 109.426731][ T2343] ? __kasan_check_write+0x14/0x20 [ 109.431861][ T2343] ? skb_set_owner_w+0x24d/0x370 [ 109.436818][ T2343] ? copy_mc_pipe_to_iter+0x770/0x770 [ 109.442200][ T2343] ? __kernel_text_address+0xa0/0x100 [ 109.447595][ T2343] ? check_stack_object+0x81/0x140 [ 109.452722][ T2343] ? __kasan_check_read+0x11/0x20 [ 109.457759][ T2343] ? __check_object_size+0x2f4/0x3c0 [ 109.463054][ T2343] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 109.468778][ T2343] ? skb_put+0x10e/0x1f0 [ 109.473014][ T2343] tun_get_user+0xc3c/0x33c0 [ 109.477600][ T2343] ? __kasan_poison_slab+0x20/0x70 [ 109.482702][ T2343] ? kmem_cache_free+0x100/0x320 [ 109.487674][ T2343] ? __x64_sys_openat+0x136/0x160 [ 109.492781][ T2343] ? x64_sys_call+0x219/0x9a0 [ 109.497454][ T2343] ? tun_do_read+0x1c40/0x1c40 [ 109.502212][ T2343] ? kstrtouint_from_user+0x1a0/0x200 [ 109.507578][ T2343] ? kstrtol_from_user+0x260/0x260 [ 109.512681][ T2343] ? avc_policy_seqno+0x1b/0x70 [ 109.517525][ T2343] ? selinux_file_permission+0x2aa/0x510 [ 109.523155][ T2343] tun_chr_write_iter+0x1eb/0x2e0 [ 109.528177][ T2343] vfs_write+0x802/0xf70 [ 109.532431][ T2343] ? file_end_write+0x1b0/0x1b0 [ 109.537303][ T2343] ? __fget_files+0x2c4/0x320 [ 109.541980][ T2343] ? __fdget_pos+0x1f7/0x380 [ 109.546579][ T2343] ? ksys_write+0x71/0x240 [ 109.551006][ T2343] ksys_write+0x140/0x240 [ 109.555328][ T2343] ? __ia32_sys_read+0x90/0x90 [ 109.560086][ T2343] ? __bpf_trace_sys_enter+0x62/0x70 [ 109.565364][ T2343] __x64_sys_write+0x7b/0x90 [ 109.569949][ T2343] x64_sys_call+0x8ef/0x9a0 [ 109.574445][ T2343] do_syscall_64+0x4c/0xa0 [ 109.578874][ T2343] ? clear_bhb_loop+0x35/0x90 [ 109.583544][ T2343] ? clear_bhb_loop+0x35/0x90 [ 109.588251][ T2343] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 109.594141][ T2343] RIP: 0033:0x7feba2e22969 [ 109.598547][ T2343] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 109.618144][ T2343] RSP: 002b:00007feba148b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 109.626550][ T2343] RAX: ffffffffffffffda RBX: 00007feba3049fa0 RCX: 00007feba2e22969 [ 109.634516][ T2343] RDX: 000000000000fdef RSI: 00002000000004c0 RDI: 00000000000000c8 [ 109.642484][ T2343] RBP: 00007feba148b090 R08: 0000000000000000 R09: 0000000000000000 [ 109.650571][ T2343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 109.658553][ T2343] R13: 0000000000000000 R14: 00007feba3049fa0 R15: 00007ffd53934408 [ 109.666548][ T2343] [ 109.749506][ T2348] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 110.236731][ T2385] FAULT_INJECTION: forcing a failure. [ 110.236731][ T2385] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 110.249950][ T2385] CPU: 0 PID: 2385 Comm: syz.3.653 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 110.259771][ T2385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 110.269834][ T2385] Call Trace: [ 110.273113][ T2385] [ 110.276051][ T2385] __dump_stack+0x21/0x30 [ 110.280394][ T2385] dump_stack_lvl+0xee/0x150 [ 110.285001][ T2385] ? show_regs_print_info+0x20/0x20 [ 110.290215][ T2385] dump_stack+0x15/0x20 [ 110.294390][ T2385] should_fail+0x3c1/0x510 [ 110.298816][ T2385] should_fail_usercopy+0x1a/0x20 [ 110.303848][ T2385] _copy_to_user+0x20/0x90 [ 110.308273][ T2385] simple_read_from_buffer+0xe9/0x160 [ 110.313658][ T2385] proc_fail_nth_read+0x19a/0x210 [ 110.318694][ T2385] ? proc_fault_inject_write+0x2f0/0x2f0 [ 110.324347][ T2385] ? security_file_permission+0x83/0xa0 [ 110.329901][ T2385] ? proc_fault_inject_write+0x2f0/0x2f0 [ 110.335540][ T2385] vfs_read+0x282/0xbe0 [ 110.339788][ T2385] ? kernel_read+0x1f0/0x1f0 [ 110.344393][ T2385] ? __kasan_check_write+0x14/0x20 [ 110.349524][ T2385] ? mutex_lock+0x95/0x1a0 [ 110.353955][ T2385] ? wait_for_completion_killable_timeout+0x10/0x10 [ 110.360559][ T2385] ? __fget_files+0x2c4/0x320 [ 110.365256][ T2385] ? __fdget_pos+0x2d2/0x380 [ 110.369851][ T2385] ? ksys_read+0x71/0x240 [ 110.374183][ T2385] ksys_read+0x140/0x240 [ 110.378433][ T2385] ? vfs_write+0xf70/0xf70 [ 110.382856][ T2385] ? debug_smp_processor_id+0x17/0x20 [ 110.388231][ T2385] __x64_sys_read+0x7b/0x90 [ 110.392739][ T2385] x64_sys_call+0x96d/0x9a0 [ 110.397335][ T2385] do_syscall_64+0x4c/0xa0 [ 110.401761][ T2385] ? clear_bhb_loop+0x35/0x90 [ 110.406447][ T2385] ? clear_bhb_loop+0x35/0x90 [ 110.411140][ T2385] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 110.417170][ T2385] RIP: 0033:0x7fbc5124b37c [ 110.421701][ T2385] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 110.441318][ T2385] RSP: 002b:00007fbc4f8b5030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 110.449741][ T2385] RAX: ffffffffffffffda RBX: 00007fbc51473fa0 RCX: 00007fbc5124b37c [ 110.457718][ T2385] RDX: 000000000000000f RSI: 00007fbc4f8b50a0 RDI: 0000000000000007 [ 110.465700][ T2385] RBP: 00007fbc4f8b5090 R08: 0000000000000000 R09: 0000000000000000 [ 110.473672][ T2385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.481995][ T2385] R13: 0000000000000000 R14: 00007fbc51473fa0 R15: 00007ffc4121b758 [ 110.490240][ T2385] [ 112.439685][ T2461] syz.0.677[2461] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.439788][ T2461] syz.0.677[2461] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.160241][ T2466] device syzkaller0 entered promiscuous mode [ 115.973263][ T30] audit: type=1400 audit(1746868301.423:137): avc: denied { create } for pid=2588 comm="syz.2.719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 115.989695][ T2587] device macsec0 left promiscuous mode [ 116.051047][ T30] audit: type=1400 audit(1746868301.503:138): avc: denied { create } for pid=2588 comm="syz.2.719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 116.210425][ T2597] device veth0_vlan left promiscuous mode [ 116.222708][ T2597] device veth0_vlan entered promiscuous mode [ 116.299390][ T2601] device veth1_macvtap entered promiscuous mode [ 116.310273][ T2601] device macsec0 entered promiscuous mode [ 116.318932][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 116.465021][ T2609] device syzkaller0 entered promiscuous mode [ 117.185246][ T2697] device veth0_vlan left promiscuous mode [ 117.193025][ T2697] device veth0_vlan entered promiscuous mode [ 117.218050][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 117.240519][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 117.248417][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 118.215015][ T2738] device pim6reg1 entered promiscuous mode [ 121.107217][ T2736] device sit0 entered promiscuous mode [ 121.459356][ T2763] device veth1_macvtap left promiscuous mode [ 122.703625][ T30] audit: type=1400 audit(1746868308.153:139): avc: denied { create } for pid=2826 comm="syz.2.786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 123.481973][ T2843] device veth1_macvtap left promiscuous mode [ 123.899231][ T2862] device syzkaller0 entered promiscuous mode [ 124.584243][ T2883] bond_slave_1: mtu less than device minimum [ 125.523764][ T2937] device veth1_macvtap left promiscuous mode [ 125.683755][ T2937] device veth1_macvtap entered promiscuous mode [ 125.716566][ T2937] device macsec0 entered promiscuous mode [ 125.794193][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 127.384422][ T30] audit: type=1400 audit(1746868312.833:140): avc: denied { create } for pid=2970 comm="syz.2.832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 128.441525][ T30] audit: type=1400 audit(1746868313.893:141): avc: denied { create } for pid=2997 comm="syz.3.839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 131.269976][ T3088] device syzkaller0 entered promiscuous mode [ 131.340589][ T3090] device pim6reg1 entered promiscuous mode [ 131.498082][ T3122] syz.0.876[3122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.498159][ T3122] syz.0.876[3122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.098015][ T3228] device sit0 left promiscuous mode [ 133.689494][ T3291] FAULT_INJECTION: forcing a failure. [ 133.689494][ T3291] name failslab, interval 1, probability 0, space 0, times 0 [ 133.702207][ T3291] CPU: 1 PID: 3291 Comm: syz.2.937 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 133.712062][ T3291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 133.722220][ T3291] Call Trace: [ 133.725515][ T3291] [ 133.728454][ T3291] __dump_stack+0x21/0x30 [ 133.732825][ T3291] dump_stack_lvl+0xee/0x150 [ 133.737426][ T3291] ? show_regs_print_info+0x20/0x20 [ 133.742640][ T3291] dump_stack+0x15/0x20 [ 133.746811][ T3291] should_fail+0x3c1/0x510 [ 133.751234][ T3291] ? __napi_alloc_skb+0x162/0x2e0 [ 133.756270][ T3291] __should_failslab+0xa4/0xe0 [ 133.761049][ T3291] should_failslab+0x9/0x20 [ 133.765594][ T3291] slab_pre_alloc_hook+0x3b/0xe0 [ 133.770548][ T3291] ? __napi_alloc_skb+0x162/0x2e0 [ 133.775625][ T3291] ? __napi_alloc_skb+0x162/0x2e0 [ 133.780675][ T3291] __kmalloc_track_caller+0x6c/0x2c0 [ 133.785983][ T3291] ? __napi_alloc_skb+0x162/0x2e0 [ 133.791036][ T3291] ? __napi_alloc_skb+0x162/0x2e0 [ 133.796074][ T3291] __alloc_skb+0x21a/0x740 [ 133.800507][ T3291] __napi_alloc_skb+0x162/0x2e0 [ 133.805391][ T3291] napi_get_frags+0x6b/0x170 [ 133.810000][ T3291] tun_get_user+0xa9e/0x33c0 [ 133.814615][ T3291] ? tun_do_read+0x1c40/0x1c40 [ 133.819396][ T3291] ? kstrtouint_from_user+0x1a0/0x200 [ 133.824782][ T3291] ? tracing_record_taskinfo+0x7c/0x220 [ 133.830462][ T3291] ? kstrtol_from_user+0x260/0x260 [ 133.835590][ T3291] ? probe_sched_wakeup+0x64/0x80 [ 133.840630][ T3291] ? avc_policy_seqno+0x1b/0x70 [ 133.845490][ T3291] ? selinux_file_permission+0x2aa/0x510 [ 133.851143][ T3291] tun_chr_write_iter+0x1eb/0x2e0 [ 133.856186][ T3291] vfs_write+0x802/0xf70 [ 133.860444][ T3291] ? file_end_write+0x1b0/0x1b0 [ 133.865311][ T3291] ? __fget_files+0x2c4/0x320 [ 133.870001][ T3291] ? __fdget_pos+0x1f7/0x380 [ 133.874603][ T3291] ? ksys_write+0x71/0x240 [ 133.879040][ T3291] ksys_write+0x140/0x240 [ 133.883380][ T3291] ? __ia32_sys_read+0x90/0x90 [ 133.888151][ T3291] ? sched_clock_cpu+0x18/0x3c0 [ 133.893016][ T3291] ? debug_smp_processor_id+0x17/0x20 [ 133.898406][ T3291] __x64_sys_write+0x7b/0x90 [ 133.903014][ T3291] x64_sys_call+0x8ef/0x9a0 [ 133.907528][ T3291] do_syscall_64+0x4c/0xa0 [ 133.911961][ T3291] ? clear_bhb_loop+0x35/0x90 [ 133.916649][ T3291] ? clear_bhb_loop+0x35/0x90 [ 133.921333][ T3291] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 133.927239][ T3291] RIP: 0033:0x7fc1ed4ef969 [ 133.931661][ T3291] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 133.951418][ T3291] RSP: 002b:00007fc1ebb58038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 133.959850][ T3291] RAX: ffffffffffffffda RBX: 00007fc1ed716fa0 RCX: 00007fc1ed4ef969 [ 133.967842][ T3291] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000005 [ 133.975830][ T3291] RBP: 00007fc1ebb58090 R08: 0000000000000000 R09: 0000000000000000 [ 133.983810][ T3291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 133.991805][ T3291] R13: 0000000000000000 R14: 00007fc1ed716fa0 R15: 00007ffcbf88de68 [ 133.999901][ T3291] [ 134.059166][ T3293] device pim6reg1 entered promiscuous mode [ 134.606945][ T3343] FAULT_INJECTION: forcing a failure. [ 134.606945][ T3343] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 134.621486][ T3343] CPU: 0 PID: 3343 Comm: syz.4.954 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 134.631308][ T3343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 134.641364][ T3343] Call Trace: [ 134.644647][ T3343] [ 134.647571][ T3343] __dump_stack+0x21/0x30 [ 134.651910][ T3343] dump_stack_lvl+0xee/0x150 [ 134.656497][ T3343] ? show_regs_print_info+0x20/0x20 [ 134.661693][ T3343] ? format_decode+0x1bb/0x1520 [ 134.666557][ T3343] dump_stack+0x15/0x20 [ 134.670720][ T3343] should_fail+0x3c1/0x510 [ 134.675140][ T3343] should_fail_usercopy+0x1a/0x20 [ 134.680175][ T3343] _copy_from_user+0x20/0xd0 [ 134.684771][ T3343] kstrtouint_from_user+0xbe/0x200 [ 134.689877][ T3343] ? kstrtol_from_user+0x260/0x260 [ 134.695074][ T3343] ? 0xffffffff81000000 [ 134.699223][ T3343] ? _copy_to_user+0x78/0x90 [ 134.703809][ T3343] ? simple_read_from_buffer+0x10f/0x160 [ 134.709441][ T3343] proc_fail_nth_write+0x85/0x1f0 [ 134.714466][ T3343] ? proc_fail_nth_read+0x210/0x210 [ 134.719662][ T3343] ? security_file_permission+0x79/0xa0 [ 134.725204][ T3343] ? security_file_permission+0x83/0xa0 [ 134.730741][ T3343] ? proc_fail_nth_read+0x210/0x210 [ 134.735960][ T3343] vfs_write+0x3ee/0xf70 [ 134.740201][ T3343] ? file_end_write+0x1b0/0x1b0 [ 134.745044][ T3343] ? __kasan_check_write+0x14/0x20 [ 134.750149][ T3343] ? mutex_lock+0x95/0x1a0 [ 134.754558][ T3343] ? wait_for_completion_killable_timeout+0x10/0x10 [ 134.761140][ T3343] ? __fget_files+0x2c4/0x320 [ 134.765921][ T3343] ? __fdget_pos+0x2d2/0x380 [ 134.770506][ T3343] ? ksys_write+0x71/0x240 [ 134.774919][ T3343] ksys_write+0x140/0x240 [ 134.779241][ T3343] ? __ia32_sys_read+0x90/0x90 [ 134.783995][ T3343] ? debug_smp_processor_id+0x17/0x20 [ 134.789359][ T3343] ? perf_trace_sys_enter+0x30/0x150 [ 134.794636][ T3343] __x64_sys_write+0x7b/0x90 [ 134.799219][ T3343] x64_sys_call+0x8ef/0x9a0 [ 134.803807][ T3343] do_syscall_64+0x4c/0xa0 [ 134.808223][ T3343] ? clear_bhb_loop+0x35/0x90 [ 134.812891][ T3343] ? clear_bhb_loop+0x35/0x90 [ 134.817564][ T3343] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 134.823456][ T3343] RIP: 0033:0x7feba2e2141f [ 134.827977][ T3343] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 134.847578][ T3343] RSP: 002b:00007feba146a030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 134.855992][ T3343] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007feba2e2141f [ 134.863968][ T3343] RDX: 0000000000000001 RSI: 00007feba146a0a0 RDI: 0000000000000006 [ 134.871950][ T3343] RBP: 00007feba146a090 R08: 0000000000000000 R09: 0000000000000000 [ 134.879926][ T3343] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 134.887893][ T3343] R13: 0000000000000001 R14: 00007feba304a080 R15: 00007ffd53934408 [ 134.895871][ T3343] [ 135.036590][ T3347] device sit0 entered promiscuous mode [ 136.363741][ T3384] device syzkaller0 entered promiscuous mode [ 140.719282][ T3441] syz.1.988[3441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.719365][ T3441] syz.1.988[3441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.375140][ T3464] device pim6reg1 entered promiscuous mode [ 142.175053][ T3511] bridge0: port 3(veth0) entered blocking state [ 142.206531][ T3511] bridge0: port 3(veth0) entered disabled state [ 142.239229][ T3511] device veth0 entered promiscuous mode [ 142.261459][ T3511] bridge0: port 3(veth0) entered blocking state [ 142.267950][ T3511] bridge0: port 3(veth0) entered forwarding state [ 144.142054][ T3635] syz.2.1050[3635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.142138][ T3635] syz.2.1050[3635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.035898][ T3669] FAULT_INJECTION: forcing a failure. [ 145.035898][ T3669] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 145.091882][ T3669] CPU: 1 PID: 3669 Comm: syz.3.1060 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 145.101829][ T3669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 145.112016][ T3669] Call Trace: [ 145.115313][ T3669] [ 145.118255][ T3669] __dump_stack+0x21/0x30 [ 145.122612][ T3669] dump_stack_lvl+0xee/0x150 [ 145.127225][ T3669] ? show_regs_print_info+0x20/0x20 [ 145.132442][ T3669] ? vfs_write+0xc17/0xf70 [ 145.136873][ T3669] dump_stack+0x15/0x20 [ 145.141052][ T3669] should_fail+0x3c1/0x510 [ 145.145484][ T3669] should_fail_usercopy+0x1a/0x20 [ 145.150634][ T3669] _copy_from_user+0x20/0xd0 [ 145.155252][ T3669] __sys_bpf+0x233/0x730 [ 145.159513][ T3669] ? bpf_link_show_fdinfo+0x310/0x310 [ 145.164904][ T3669] ? __kasan_check_write+0x14/0x20 [ 145.170032][ T3669] ? switch_fpu_return+0x15d/0x2c0 [ 145.175164][ T3669] __x64_sys_bpf+0x7c/0x90 [ 145.179597][ T3669] x64_sys_call+0x4b9/0x9a0 [ 145.184210][ T3669] do_syscall_64+0x4c/0xa0 [ 145.188654][ T3669] ? clear_bhb_loop+0x35/0x90 [ 145.193351][ T3669] ? clear_bhb_loop+0x35/0x90 [ 145.198045][ T3669] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 145.203968][ T3669] RIP: 0033:0x7fbc5124c969 [ 145.208484][ T3669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 145.228105][ T3669] RSP: 002b:00007fbc4f8b5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 145.236524][ T3669] RAX: ffffffffffffffda RBX: 00007fbc51473fa0 RCX: 00007fbc5124c969 [ 145.244494][ T3669] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 145.252462][ T3669] RBP: 00007fbc4f8b5090 R08: 0000000000000000 R09: 0000000000000000 [ 145.260433][ T3669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 145.268403][ T3669] R13: 0000000000000000 R14: 00007fbc51473fa0 R15: 00007ffc4121b758 [ 145.276382][ T3669] [ 146.501282][ T3735] FAULT_INJECTION: forcing a failure. [ 146.501282][ T3735] name failslab, interval 1, probability 0, space 0, times 0 [ 146.521432][ T3735] CPU: 1 PID: 3735 Comm: syz.3.1080 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 146.531370][ T3735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 146.541444][ T3735] Call Trace: [ 146.544740][ T3735] [ 146.547848][ T3735] __dump_stack+0x21/0x30 [ 146.552205][ T3735] dump_stack_lvl+0xee/0x150 [ 146.557016][ T3735] ? show_regs_print_info+0x20/0x20 [ 146.562231][ T3735] dump_stack+0x15/0x20 [ 146.566394][ T3735] should_fail+0x3c1/0x510 [ 146.570896][ T3735] __should_failslab+0xa4/0xe0 [ 146.575656][ T3735] should_failslab+0x9/0x20 [ 146.580241][ T3735] slab_pre_alloc_hook+0x3b/0xe0 [ 146.585175][ T3735] __kmalloc+0x6d/0x2c0 [ 146.589429][ T3735] ? bpf_test_init+0x100/0x1c0 [ 146.594188][ T3735] bpf_test_init+0x100/0x1c0 [ 146.598775][ T3735] bpf_prog_test_run_skb+0x193/0x1150 [ 146.604146][ T3735] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 146.610290][ T3735] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 146.616180][ T3735] ? bpf_prog_test_run+0x3c7/0x620 [ 146.621286][ T3735] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 146.627172][ T3735] bpf_prog_test_run+0x3d5/0x620 [ 146.632102][ T3735] ? bpf_prog_query+0x230/0x230 [ 146.636948][ T3735] ? selinux_bpf+0xce/0xf0 [ 146.641363][ T3735] ? security_bpf+0x82/0xa0 [ 146.645858][ T3735] __sys_bpf+0x52c/0x730 [ 146.650099][ T3735] ? bpf_link_show_fdinfo+0x310/0x310 [ 146.655465][ T3735] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 146.661626][ T3735] __x64_sys_bpf+0x7c/0x90 [ 146.666034][ T3735] x64_sys_call+0x4b9/0x9a0 [ 146.670531][ T3735] do_syscall_64+0x4c/0xa0 [ 146.674945][ T3735] ? clear_bhb_loop+0x35/0x90 [ 146.679633][ T3735] ? clear_bhb_loop+0x35/0x90 [ 146.684303][ T3735] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 146.690190][ T3735] RIP: 0033:0x7fbc5124c969 [ 146.694599][ T3735] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 146.714198][ T3735] RSP: 002b:00007fbc4f8b5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 146.722605][ T3735] RAX: ffffffffffffffda RBX: 00007fbc51473fa0 RCX: 00007fbc5124c969 [ 146.730571][ T3735] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 146.738534][ T3735] RBP: 00007fbc4f8b5090 R08: 0000000000000000 R09: 0000000000000000 [ 146.746500][ T3735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 146.754473][ T3735] R13: 0000000000000000 R14: 00007fbc51473fa0 R15: 00007ffc4121b758 [ 146.762450][ T3735] [ 146.848100][ T3753] device syzkaller0 entered promiscuous mode [ 147.144082][ T3773] device syzkaller0 entered promiscuous mode [ 147.804549][ T3798] FAULT_INJECTION: forcing a failure. [ 147.804549][ T3798] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 147.848197][ T3798] CPU: 1 PID: 3798 Comm: syz.2.1102 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 147.858443][ T3798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 147.868636][ T3798] Call Trace: [ 147.871924][ T3798] [ 147.874856][ T3798] __dump_stack+0x21/0x30 [ 147.879198][ T3798] dump_stack_lvl+0xee/0x150 [ 147.883889][ T3798] ? show_regs_print_info+0x20/0x20 [ 147.889106][ T3798] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 147.894925][ T3798] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 147.901086][ T3798] dump_stack+0x15/0x20 [ 147.905253][ T3798] should_fail+0x3c1/0x510 [ 147.909678][ T3798] should_fail_usercopy+0x1a/0x20 [ 147.914709][ T3798] _copy_from_user+0x20/0xd0 [ 147.919308][ T3798] bpf_test_init+0x13d/0x1c0 [ 147.923907][ T3798] bpf_prog_test_run_skb+0x193/0x1150 [ 147.929289][ T3798] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 147.935456][ T3798] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 147.941367][ T3798] bpf_prog_test_run+0x3d5/0x620 [ 147.946313][ T3798] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 147.952582][ T3798] ? bpf_prog_query+0x230/0x230 [ 147.957455][ T3798] ? __sys_bpf+0x51f/0x730 [ 147.961895][ T3798] __sys_bpf+0x52c/0x730 [ 147.966145][ T3798] ? bpf_link_show_fdinfo+0x310/0x310 [ 147.971526][ T3798] ? __x64_sys_bpf+0x1d/0x90 [ 147.976122][ T3798] __x64_sys_bpf+0x7c/0x90 [ 147.980576][ T3798] x64_sys_call+0x4b9/0x9a0 [ 147.985092][ T3798] do_syscall_64+0x4c/0xa0 [ 147.989536][ T3798] ? clear_bhb_loop+0x35/0x90 [ 147.994229][ T3798] ? clear_bhb_loop+0x35/0x90 [ 147.998919][ T3798] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 148.004827][ T3798] RIP: 0033:0x7fc1ed4ef969 [ 148.009252][ T3798] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 148.028869][ T3798] RSP: 002b:00007fc1ebb58038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 148.037306][ T3798] RAX: ffffffffffffffda RBX: 00007fc1ed716fa0 RCX: 00007fc1ed4ef969 [ 148.045287][ T3798] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 148.053264][ T3798] RBP: 00007fc1ebb58090 R08: 0000000000000000 R09: 0000000000000000 [ 148.061242][ T3798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 148.069305][ T3798] R13: 0000000000000000 R14: 00007fc1ed716fa0 R15: 00007ffcbf88de68 [ 148.077300][ T3798] [ 148.805630][ T30] audit: type=1400 audit(1746868334.253:142): avc: denied { create } for pid=3833 comm="syz.4.1115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 148.992937][ T3847] device syzkaller0 entered promiscuous mode [ 148.996199][ T3844] FAULT_INJECTION: forcing a failure. [ 148.996199][ T3844] name failslab, interval 1, probability 0, space 0, times 0 [ 149.072521][ T3844] CPU: 1 PID: 3844 Comm: syz.0.1118 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 149.082461][ T3844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 149.092533][ T3844] Call Trace: [ 149.095814][ T3844] [ 149.098748][ T3844] __dump_stack+0x21/0x30 [ 149.103093][ T3844] dump_stack_lvl+0xee/0x150 [ 149.107699][ T3844] ? show_regs_print_info+0x20/0x20 [ 149.112911][ T3844] dump_stack+0x15/0x20 [ 149.117079][ T3844] should_fail+0x3c1/0x510 [ 149.121505][ T3844] __should_failslab+0xa4/0xe0 [ 149.126278][ T3844] should_failslab+0x9/0x20 [ 149.130790][ T3844] slab_pre_alloc_hook+0x3b/0xe0 [ 149.135739][ T3844] __kmalloc+0x6d/0x2c0 [ 149.139905][ T3844] ? sk_prot_alloc+0xed/0x320 [ 149.144673][ T3844] ? check_stack_object+0x81/0x140 [ 149.149810][ T3844] sk_prot_alloc+0xed/0x320 [ 149.154322][ T3844] sk_alloc+0x38/0x430 [ 149.158397][ T3844] bpf_prog_test_run_skb+0x24b/0x1150 [ 149.163786][ T3844] ? __kasan_check_write+0x14/0x20 [ 149.168905][ T3844] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 149.174806][ T3844] bpf_prog_test_run+0x3d5/0x620 [ 149.179749][ T3844] ? bpf_prog_query+0x230/0x230 [ 149.184607][ T3844] ? selinux_bpf+0xce/0xf0 [ 149.189032][ T3844] ? security_bpf+0x82/0xa0 [ 149.193540][ T3844] __sys_bpf+0x52c/0x730 [ 149.197796][ T3844] ? bpf_link_show_fdinfo+0x310/0x310 [ 149.203198][ T3844] __x64_sys_bpf+0x7c/0x90 [ 149.207620][ T3844] x64_sys_call+0x4b9/0x9a0 [ 149.212129][ T3844] do_syscall_64+0x4c/0xa0 [ 149.216557][ T3844] ? clear_bhb_loop+0x35/0x90 [ 149.221241][ T3844] ? clear_bhb_loop+0x35/0x90 [ 149.225923][ T3844] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 149.231826][ T3844] RIP: 0033:0x7f8401225969 [ 149.236249][ T3844] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 149.255863][ T3844] RSP: 002b:00007f83ff88e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 149.264292][ T3844] RAX: ffffffffffffffda RBX: 00007f840144cfa0 RCX: 00007f8401225969 [ 149.272284][ T3844] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 149.280268][ T3844] RBP: 00007f83ff88e090 R08: 0000000000000000 R09: 0000000000000000 [ 149.288683][ T3844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 149.296661][ T3844] R13: 0000000000000000 R14: 00007f840144cfa0 R15: 00007ffc036da3e8 [ 149.304658][ T3844] [ 150.539206][ T3900] FAULT_INJECTION: forcing a failure. [ 150.539206][ T3900] name failslab, interval 1, probability 0, space 0, times 0 [ 150.552775][ T3900] CPU: 1 PID: 3900 Comm: syz.2.1137 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 150.562786][ T3900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 150.572859][ T3900] Call Trace: [ 150.576144][ T3900] [ 150.579073][ T3900] __dump_stack+0x21/0x30 [ 150.583409][ T3900] dump_stack_lvl+0xee/0x150 [ 150.588011][ T3900] ? show_regs_print_info+0x20/0x20 [ 150.593214][ T3900] dump_stack+0x15/0x20 [ 150.597385][ T3900] should_fail+0x3c1/0x510 [ 150.601802][ T3900] __should_failslab+0xa4/0xe0 [ 150.606565][ T3900] should_failslab+0x9/0x20 [ 150.611075][ T3900] slab_pre_alloc_hook+0x3b/0xe0 [ 150.616007][ T3900] kmem_cache_alloc_trace+0x48/0x270 [ 150.621290][ T3900] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 150.627003][ T3900] selinux_sk_alloc_security+0x7e/0x1a0 [ 150.632538][ T3900] security_sk_alloc+0x72/0xa0 [ 150.637299][ T3900] sk_prot_alloc+0x108/0x320 [ 150.641883][ T3900] sk_alloc+0x38/0x430 [ 150.645944][ T3900] bpf_prog_test_run_skb+0x24b/0x1150 [ 150.651315][ T3900] ? __kasan_check_write+0x14/0x20 [ 150.656421][ T3900] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 150.662316][ T3900] bpf_prog_test_run+0x3d5/0x620 [ 150.667249][ T3900] ? bpf_prog_query+0x230/0x230 [ 150.672098][ T3900] ? selinux_bpf+0xce/0xf0 [ 150.676540][ T3900] ? security_bpf+0x82/0xa0 [ 150.681172][ T3900] __sys_bpf+0x52c/0x730 [ 150.685430][ T3900] ? bpf_link_show_fdinfo+0x310/0x310 [ 150.690813][ T3900] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 150.696972][ T3900] __x64_sys_bpf+0x7c/0x90 [ 150.701497][ T3900] x64_sys_call+0x4b9/0x9a0 [ 150.706097][ T3900] do_syscall_64+0x4c/0xa0 [ 150.710645][ T3900] ? clear_bhb_loop+0x35/0x90 [ 150.715404][ T3900] ? clear_bhb_loop+0x35/0x90 [ 150.720078][ T3900] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 150.725967][ T3900] RIP: 0033:0x7fc1ed4ef969 [ 150.730389][ T3900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 150.749996][ T3900] RSP: 002b:00007fc1ebb58038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 150.758424][ T3900] RAX: ffffffffffffffda RBX: 00007fc1ed716fa0 RCX: 00007fc1ed4ef969 [ 150.766393][ T3900] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 150.774359][ T3900] RBP: 00007fc1ebb58090 R08: 0000000000000000 R09: 0000000000000000 [ 150.782351][ T3900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 150.790316][ T3900] R13: 0000000000000000 R14: 00007fc1ed716fa0 R15: 00007ffcbf88de68 [ 150.798293][ T3900] [ 151.607132][ T3947] FAULT_INJECTION: forcing a failure. [ 151.607132][ T3947] name failslab, interval 1, probability 0, space 0, times 0 [ 151.625606][ T3947] CPU: 1 PID: 3947 Comm: syz.4.1152 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 151.635539][ T3947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 151.645616][ T3947] Call Trace: [ 151.648897][ T3947] [ 151.651849][ T3947] __dump_stack+0x21/0x30 [ 151.656226][ T3947] dump_stack_lvl+0xee/0x150 [ 151.660829][ T3947] ? show_regs_print_info+0x20/0x20 [ 151.666042][ T3947] dump_stack+0x15/0x20 [ 151.670217][ T3947] should_fail+0x3c1/0x510 [ 151.674642][ T3947] __should_failslab+0xa4/0xe0 [ 151.679433][ T3947] should_failslab+0x9/0x20 [ 151.683944][ T3947] slab_pre_alloc_hook+0x3b/0xe0 [ 151.688891][ T3947] ? __build_skb+0x2d/0x310 [ 151.693411][ T3947] kmem_cache_alloc+0x44/0x260 [ 151.698295][ T3947] __build_skb+0x2d/0x310 [ 151.702651][ T3947] build_skb+0x24/0x200 [ 151.706817][ T3947] bpf_prog_test_run_skb+0x279/0x1150 [ 151.712214][ T3947] ? __kasan_check_write+0x14/0x20 [ 151.717352][ T3947] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 151.723258][ T3947] bpf_prog_test_run+0x3d5/0x620 [ 151.728257][ T3947] ? bpf_prog_query+0x230/0x230 [ 151.733108][ T3947] ? selinux_bpf+0xce/0xf0 [ 151.737533][ T3947] ? security_bpf+0x82/0xa0 [ 151.742029][ T3947] __sys_bpf+0x52c/0x730 [ 151.746264][ T3947] ? bpf_link_show_fdinfo+0x310/0x310 [ 151.751639][ T3947] __x64_sys_bpf+0x7c/0x90 [ 151.756049][ T3947] x64_sys_call+0x4b9/0x9a0 [ 151.760583][ T3947] do_syscall_64+0x4c/0xa0 [ 151.764999][ T3947] ? clear_bhb_loop+0x35/0x90 [ 151.769666][ T3947] ? clear_bhb_loop+0x35/0x90 [ 151.774437][ T3947] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 151.780326][ T3947] RIP: 0033:0x7feba2e22969 [ 151.784862][ T3947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 151.804466][ T3947] RSP: 002b:00007feba148b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 151.812879][ T3947] RAX: ffffffffffffffda RBX: 00007feba3049fa0 RCX: 00007feba2e22969 [ 151.820848][ T3947] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 151.828820][ T3947] RBP: 00007feba148b090 R08: 0000000000000000 R09: 0000000000000000 [ 151.836798][ T3947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 151.844763][ T3947] R13: 0000000000000000 R14: 00007feba3049fa0 R15: 00007ffd53934408 [ 151.852735][ T3947] [ 151.876279][ T30] audit: type=1400 audit(1746868337.333:143): avc: denied { create } for pid=3951 comm="syz.2.1154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 151.902752][ T30] audit: type=1400 audit(1746868337.333:144): avc: denied { create } for pid=3951 comm="syz.2.1154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 152.166483][ T3976] device sit0 left promiscuous mode [ 152.447621][ T3990] FAULT_INJECTION: forcing a failure. [ 152.447621][ T3990] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 152.500634][ T3990] CPU: 0 PID: 3990 Comm: syz.2.1167 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 152.510665][ T3990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 152.520735][ T3990] Call Trace: [ 152.524022][ T3990] [ 152.526955][ T3990] __dump_stack+0x21/0x30 [ 152.531300][ T3990] dump_stack_lvl+0xee/0x150 [ 152.535902][ T3990] ? show_regs_print_info+0x20/0x20 [ 152.541117][ T3990] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 152.546594][ T3990] dump_stack+0x15/0x20 [ 152.550763][ T3990] should_fail+0x3c1/0x510 [ 152.555273][ T3990] should_fail_usercopy+0x1a/0x20 [ 152.560306][ T3990] _copy_to_user+0x20/0x90 [ 152.564734][ T3990] bpf_test_finish+0x1ae/0x3b0 [ 152.569517][ T3990] ? convert_skb_to___skb+0x360/0x360 [ 152.574906][ T3990] ? convert_skb_to___skb+0x203/0x360 [ 152.580292][ T3990] bpf_prog_test_run_skb+0xbba/0x1150 [ 152.585783][ T3990] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 152.591690][ T3990] bpf_prog_test_run+0x3d5/0x620 [ 152.596635][ T3990] ? bpf_prog_query+0x230/0x230 [ 152.601488][ T3990] ? selinux_bpf+0xce/0xf0 [ 152.605922][ T3990] ? security_bpf+0x82/0xa0 [ 152.610430][ T3990] __sys_bpf+0x52c/0x730 [ 152.614676][ T3990] ? bpf_link_show_fdinfo+0x310/0x310 [ 152.620057][ T3990] ? debug_smp_processor_id+0x17/0x20 [ 152.625438][ T3990] __x64_sys_bpf+0x7c/0x90 [ 152.629859][ T3990] x64_sys_call+0x4b9/0x9a0 [ 152.634458][ T3990] do_syscall_64+0x4c/0xa0 [ 152.638976][ T3990] ? clear_bhb_loop+0x35/0x90 [ 152.643663][ T3990] ? clear_bhb_loop+0x35/0x90 [ 152.648347][ T3990] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 152.654252][ T3990] RIP: 0033:0x7fc1ed4ef969 [ 152.658762][ T3990] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 152.678386][ T3990] RSP: 002b:00007fc1ebb58038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 152.686830][ T3990] RAX: ffffffffffffffda RBX: 00007fc1ed716fa0 RCX: 00007fc1ed4ef969 [ 152.694809][ T3990] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 152.702786][ T3990] RBP: 00007fc1ebb58090 R08: 0000000000000000 R09: 0000000000000000 [ 152.710762][ T3990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 152.718743][ T3990] R13: 0000000000000000 R14: 00007fc1ed716fa0 R15: 00007ffcbf88de68 [ 152.726727][ T3990] [ 153.488355][ T4002] tap0: tun_chr_ioctl cmd 1074025675 [ 153.493684][ T4002] tap0: persist enabled [ 153.572259][ T3995] tap0: tun_chr_ioctl cmd 1074025675 [ 153.595680][ T3995] tap0: persist disabled [ 153.619807][ T4013] device pim6reg1 entered promiscuous mode [ 154.291586][ T101] udevd[101]: worker [3404] terminated by signal 33 (Unknown signal 33) [ 154.313025][ T4027] device pim6reg1 entered promiscuous mode [ 154.340731][ T101] udevd[101]: worker [3404] failed while handling '/devices/virtual/block/loop3' [ 157.038447][ T4124] device veth0_vlan left promiscuous mode [ 157.081035][ T4124] device veth0_vlan entered promiscuous mode [ 157.154038][ T1527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 157.184687][ T1527] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 157.242915][ T1527] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.016595][ T30] audit: type=1400 audit(1746868343.473:145): avc: denied { append } for pid=4153 comm="syz.0.1222" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 158.210723][ T4172] device veth0_vlan left promiscuous mode [ 158.249591][ T4172] device veth0_vlan entered promiscuous mode