last executing test programs: 12.944990353s ago: executing program 1 (id=4116): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x4, 0x6, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x5, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r2, &(0x7f0000000300), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000010c0)=ANY=[@ANYBLOB="180000000400000000000000ff03000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008510000000000000950000000000000085100000faffffff18360000030000000000000000000000bf91000000000000b7020000000800008500000084000000b70000000000000095000000000000000ba1f1d4e8694ae43f442a9455db34dd7eda82f5145a424e4f4a74463dc0e6db1ed5f0d3218c1f9cd859e2d61999311889bff320b41823c5d7be07f11799bdc84102e30f5df68e16749f05cfc6b4d831c13e00642f0d", @ANYRESDEC=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffffff, 0xe0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xc4, &(0x7f0000000c80)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0x0, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x4000}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed300000001175f37538e486dd6315ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa13f06558"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) 10.774742054s ago: executing program 0 (id=4237): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x15}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200), 0x0, &(0x7f0000000a40)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="000000001400", @ANYRES32, @ANYBLOB="0000000014000000000000", @ANYRESHEX], 0x88, 0x4}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10.490116699s ago: executing program 1 (id=4116): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x4, 0x6, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x5, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r2, &(0x7f0000000300), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000010c0)=ANY=[@ANYBLOB="180000000400000000000000ff03000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008510000000000000950000000000000085100000faffffff18360000030000000000000000000000bf91000000000000b7020000000800008500000084000000b70000000000000095000000000000000ba1f1d4e8694ae43f442a9455db34dd7eda82f5145a424e4f4a74463dc0e6db1ed5f0d3218c1f9cd859e2d61999311889bff320b41823c5d7be07f11799bdc84102e30f5df68e16749f05cfc6b4d831c13e00642f0d", @ANYRESDEC=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffffff, 0xe0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xc4, &(0x7f0000000c80)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0x0, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x4000}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed300000001175f37538e486dd6315ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa13f06558"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) 8.592248646s ago: executing program 0 (id=4238): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x5, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000010c0)=ANY=[@ANYBLOB="180000000400000000000000ff03000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008510000000000000950000000000000085100000faffffff18360000030000000000000000000000bf91000000000000b7020000000800008500000084000000b70000000000000095000000000000000ba1f1d4e8694ae43f442a9455db34dd7eda82f5145a424e4f4a74463dc0e6db1ed5f0d3218c1f9cd859e2d61999311889bff320b41823c5d7be07f11799bdc84102e30f5df68e16749f05cfc6b4d831c13e00642f0d", @ANYRESDEC=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000900)=ANY=[@ANYRES8], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x7, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="850000009e0000006a0a00ff000000006900c00e00000000950000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000000500a801000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2d) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r4}, 0x10) 8.591335686s ago: executing program 2 (id=4239): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001500000095000000000000003ac6"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x0, 0xe, 0xfeff, &(0x7f0000000100)="e0857f9f582f0300000000080000", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 8.590613026s ago: executing program 3 (id=4240): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x618f27bd6e65be24) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYRES64], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed85"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={r0, &(0x7f0000000400)="681137487ef842e48e8e348710453bb95a064c4c28e067236f7ce73c7bc48724d6f0a6bc5f8211737bf6abb44a3bd3cf8ed21e49b6009ab747f2d3f5878fd259a52604aba577d4e4a4a19f30d25f2320425e4c4e37554382b4fbf3b811dc1dd55b3d493bcffcc20c8322094e1c4ce9a818eac4c6af92029064c36339c85778ad97fb0c4b304dfc95f557c7d0"}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000008385000000710000009500000000002543"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_lookup, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='wake_reaper\x00', r1}, 0xffffffffffffff97) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x41009432, &(0x7f00000005c0)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000000000000ff0f000007000000000000", @ANYRES32, @ANYBLOB="00f1ff00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00'}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1e0000ebffffff00020000000000002817000000", @ANYRES32=r0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000010000000e00"/25], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) 8.589267996s ago: executing program 4 (id=4241): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x15}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200), 0x0, &(0x7f0000000a40)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="000000001400", @ANYRES32, @ANYBLOB="0000000014000000000000", @ANYRESHEX], 0x88, 0x4}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bf"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 8.514593943s ago: executing program 2 (id=4242): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x5, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000010c0)=ANY=[@ANYBLOB="180000000400000000000000ff03000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008510000000000000950000000000000085100000faffffff18360000030000000000000000000000bf91000000000000b7020000000800008500000084000000b70000000000000095000000000000000ba1f1d4e8694ae43f442a9455db34dd7eda82f5145a424e4f4a74463dc0e6db1ed5f0d3218c1f9cd859e2d61999311889bff320b41823c5d7be07f11799bdc84102e30f5df68e16749f05cfc6b4d831c13e00642f0d", @ANYRESDEC=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000900)=ANY=[@ANYRES8], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x7, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="850000009e0000006a0a00ff000000006900c00e00000000950000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000000500a801000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2d) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r4}, 0x10) 8.169484813s ago: executing program 3 (id=4243): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000140)={'virt_wifi0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='bcache_alloc_fail\x00'}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x20, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000002000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x90) r4 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcd, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000100)='cpu&\t0\t\t\t') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) mkdir(0x0, 0x0) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000180)={'veth1_vlan\x00', 0x400}) 8.150876985s ago: executing program 1 (id=4116): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x4, 0x6, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x5, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r2, &(0x7f0000000300), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000010c0)=ANY=[@ANYBLOB="180000000400000000000000ff03000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008510000000000000950000000000000085100000faffffff18360000030000000000000000000000bf91000000000000b7020000000800008500000084000000b70000000000000095000000000000000ba1f1d4e8694ae43f442a9455db34dd7eda82f5145a424e4f4a74463dc0e6db1ed5f0d3218c1f9cd859e2d61999311889bff320b41823c5d7be07f11799bdc84102e30f5df68e16749f05cfc6b4d831c13e00642f0d", @ANYRESDEC=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffffff, 0xe0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xc4, &(0x7f0000000c80)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0x0, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x4000}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed300000001175f37538e486dd6315ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa13f06558"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) 5.982451085s ago: executing program 0 (id=4244): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000001480)=ANY=[@ANYBLOB="9feb010018000000000000006800000068000000030000000f00c20d0000000000000000810000000000000004000000010000000400000000000007000000000e0000000000000903000000000903000000050000000000000b02000000090000000000000a01000000010000000000000e0400000001000000005f00000000000000e29482400615aa7ba52f0ae485ba"], &(0x7f0000000500)=""/128, 0x83, 0x80, 0x0, 0x1000, 0x0, @void, @value}, 0x28) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x3, 0x7, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4000000, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) close(r4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r4, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x2f) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0xffffffef, 0xfff, 0x7, 0x4, r3, 0x0, '\x00', r5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000001440)=ANY=[@ANYRES32=r5, @ANYRESOCT=r4, @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000ac0)={0x1ff, 0x0}, 0x8) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000440)='./file1/file0\x00', 0x0, 0x0, r2}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x1b, 0x8, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x80}, [@ldst={0x0, 0x26999c777c2997cd, 0x1, 0x9, 0x4, 0xfffffffffffffff4, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7a1d, 0x0, 0x0, 0x0, 0x7}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x9}]}, &(0x7f00000009c0)='GPL\x00', 0x101, 0x0, 0x0, 0x41100, 0x8, '\x00', r5, @fallback=0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x2, 0xd, 0x0, 0x1}, 0x10, r7, r1, 0x9, &(0x7f0000000b80)=[r0, r8, r0, r0], &(0x7f0000000bc0)=[{0x0, 0x2, 0xb, 0x3}, {0x1, 0x5, 0xa, 0x2}, {0x4, 0x5, 0xb}, {0x3, 0x5, 0xd, 0x3}, {0x1, 0x5, 0xe}, {0x4, 0x4, 0xb, 0x4}, {0x4, 0x5, 0x3, 0x1}, {0x4, 0x3, 0x9, 0x3}, {0x2, 0x4, 0x10, 0xc}], 0x10, 0x43, @void, @value}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001340)=ANY=[@ANYBLOB="0f00000004000008040000001200000000000000ee83d8df77b3788b6fd023aba8cbb4edb1b440c5239184e1d4356a040eb0df4e922baa0345660913990000f3ab133cdc4f79c28bea9da14458cb499c2f253bb5887f059f44bbd8ae8235efc1f13a97de467745fa5133fa8f4ba181bb511da676ca7df2832ce0c9b865", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xc, &(0x7f0000001540)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRESDEC=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r10}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x2, 0x56d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600), &(0x7f0000001f80), 0xfffffffb, r11}, 0x38) r12 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000300)={0x0, 0x7, [@remote, @broadcast, @empty, @remote, @broadcast, @local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}]}) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x11}, @printk={@s, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r13, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r14, 0x8949, &(0x7f0000000680)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000900)=ANY=[@ANYRES8], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x7, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="850000009e0000006a0a00ff000000006900c00e00000000950000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000000500a801000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2d) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r4}, 0x10) 5.979507305s ago: executing program 3 (id=4246): perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x4, 0x6, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x5, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r1, &(0x7f0000000300), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000010c0)=ANY=[@ANYBLOB="180000000400000000000000ff03000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008510000000000000950000000000000085100000faffffff18360000030000000000000000000000bf91000000000000b7020000000800008500000084000000b70000000000000095000000000000000ba1f1d4e8694ae43f442a9455db34dd7eda82f5145a424e4f4a74463dc0e6db1ed5f0d3218c1f9cd859e2d61999311889bff320b41823c5d7be07f11799bdc84102e30f5df68e16749f05cfc6b4d831c13e00642f0d", @ANYRESDEC=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffffff, 0xe0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xc4, &(0x7f0000000c80)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0x0, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x4000}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed300000001175f37538e486dd6315ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa13f06558"], 0xfdef) write$cgroup_subtree(r6, &(0x7f0000000000), 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000900)=ANY=[@ANYRES8], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x7, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="850000009e0000006a0a00ff000000006900c00e00000000950000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000000500a801000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2d) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r7}, 0x10) 5.978433036s ago: executing program 4 (id=4247): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x15}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200), 0x0, &(0x7f0000000a40)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="000000001400", @ANYRES32, @ANYBLOB="0000000014000000000000", @ANYRESHEX], 0x88, 0x4}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001a00)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 5.57989276s ago: executing program 4 (id=4248): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1700000004000000060000000500000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x5, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000010c0)=ANY=[@ANYBLOB="180000000400000000000000ff03000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008510000000000000950000000000000085100000faffffff18360000030000000000000000000000bf91000000000000b7020000000800008500000084000000b70000000000000095000000000000000ba1f1d4e8694ae43f442a9455db34dd7eda82f5145a424e4f4a74463dc0e6db1ed5f0d3218c1f9cd859e2d61999311889bff320b41823c5d7be07f11799bdc84102e30f5df68e16749f05cfc6b4d831c13e00642f0d", @ANYRESDEC=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000900)=ANY=[@ANYRES8], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x7, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="850000009e0000006a0a00ff000000006900c00e00000000950000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000000500a801000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2d) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r4}, 0x10) 5.497210617s ago: executing program 3 (id=4249): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55, 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 5.215319452s ago: executing program 1 (id=4116): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x4, 0x6, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x5, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r2, &(0x7f0000000300), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000010c0)=ANY=[@ANYBLOB="180000000400000000000000ff03000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008510000000000000950000000000000085100000faffffff18360000030000000000000000000000bf91000000000000b7020000000800008500000084000000b70000000000000095000000000000000ba1f1d4e8694ae43f442a9455db34dd7eda82f5145a424e4f4a74463dc0e6db1ed5f0d3218c1f9cd859e2d61999311889bff320b41823c5d7be07f11799bdc84102e30f5df68e16749f05cfc6b4d831c13e00642f0d", @ANYRESDEC=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffffff, 0xe0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xc4, &(0x7f0000000c80)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0x0, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x4000}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed300000001175f37538e486dd6315ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa13f06558"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) 3.201678029s ago: executing program 0 (id=4250): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x15}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200), 0x0, &(0x7f0000000a40)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="000000001400", @ANYRES32, @ANYBLOB="0000000014000000000000", @ANYRESHEX], 0x88, 0x4}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 3.200376319s ago: executing program 2 (id=4251): openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x403d, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0], 0x0, 0x40086, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0xa1, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x13d, 0x13d, 0x5, [@struct={0x6, 0x6, 0x0, 0x4, 0x1, 0x6, [{0xa, 0x5, 0x6}, {0x6, 0x4, 0x8}, {0x4, 0x2, 0x7f}, {0x3, 0x2, 0x1}, {0xa, 0x5, 0x3f6}, {0xd, 0x2, 0x9}]}, @func={0xf, 0x0, 0x0, 0xc, 0x1}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xd, 0x5}, {0x6}]}, @union={0x8, 0x7, 0x0, 0x5, 0x0, 0x8c9, [{0x6, 0x0, 0x2}, {0x4, 0x4, 0x8}, {0x2, 0x2, 0x6}, {0x8, 0x5, 0x5}, {0x1, 0x2, 0x9}, {0xc, 0x2, 0x8}, {0x9, 0x3, 0x2}]}, @ptr={0x2, 0x0, 0x0, 0x2, 0x3}, @datasec={0x1, 0x6, 0x0, 0xf, 0x1, [{0x5, 0x4}, {0x2, 0xb, 0x1}, {0x3, 0xfff, 0x9}, {0x1, 0x1, 0x8}, {0x5, 0x8}, {0x4, 0x1, 0x1}], 'i'}]}, {0x0, [0x5f, 0x30, 0x30]}}, &(0x7f0000001880)=""/4096, 0x15d, 0x1000, 0x0, 0x4, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x2, 0x7f, 0x7, 0xffffffff, 0xa2, r3, 0x8, '\x00', r5, r6, 0x0, 0x4, 0x2, 0x0, @void, @value, @void, @value}, 0x48) r7 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000100ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = getpid() r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r11}, 0x10) write$cgroup_pid(r8, &(0x7f0000000380)=r10, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000001180)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b706000014000000b7030000000d00008500000005000000bca900000000000035090100000000009500000000000000b7020000000000007b6af8ff00000000b5090000000000007baaf0ff00000000bf8700000000000007080000fffdffffbf2400000000000007060000f0ffffff740200000800000018260000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000000000000b700000000000000950000000000000003ca6090273a"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x82, 0x6, 0x0, 0x0, 0x0, 0x0, 0x50040, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4200, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r12 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r12, 0x5421, 0x20004000) 3.1994174s ago: executing program 3 (id=4252): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x8, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000010700000000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffefb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c250000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000611008000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x3, &(0x7f0000000580)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffd74) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000feffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x6, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x5, 0x7, 0x5, 0x20, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580), &(0x7f0000000600), 0x7ff, r4}, 0x38) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r5}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 3.19859361s ago: executing program 4 (id=4253): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55, 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 2.868481238s ago: executing program 2 (id=4254): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x15}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200), 0x0, &(0x7f0000000a40)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="000000001400", @ANYRES32, @ANYBLOB="0000000014000000000000", @ANYRESHEX], 0x88, 0x4}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001a00)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2.861295219s ago: executing program 1 (id=4116): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x4, 0x6, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x5, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r2, &(0x7f0000000300), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000010c0)=ANY=[@ANYBLOB="180000000400000000000000ff03000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008510000000000000950000000000000085100000faffffff18360000030000000000000000000000bf91000000000000b7020000000800008500000084000000b70000000000000095000000000000000ba1f1d4e8694ae43f442a9455db34dd7eda82f5145a424e4f4a74463dc0e6db1ed5f0d3218c1f9cd859e2d61999311889bff320b41823c5d7be07f11799bdc84102e30f5df68e16749f05cfc6b4d831c13e00642f0d", @ANYRESDEC=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffffff, 0xe0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xc4, &(0x7f0000000c80)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0x0, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x4000}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed300000001175f37538e486dd6315ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa13f06558"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) 731.781966ms ago: executing program 2 (id=4255): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x5, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000010c0)=ANY=[@ANYBLOB="180000000400000000000000ff03000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008510000000000000950000000000000085100000faffffff18360000030000000000000000000000bf91000000000000b7020000000800008500000084000000b70000000000000095000000000000000ba1f1d4e8694ae43f442a9455db34dd7eda82f5145a424e4f4a74463dc0e6db1ed5f0d3218c1f9cd859e2d61999311889bff320b41823c5d7be07f11799bdc84102e30f5df68e16749f05cfc6b4d831c13e00642f0d", @ANYRESDEC=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000900)=ANY=[@ANYRES8], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x7, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="850000009e0000006a0a00ff000000006900c00e00000000950000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000000500a801000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2d) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r4}, 0x10) 730.950256ms ago: executing program 3 (id=4256): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x5, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000010c0)=ANY=[@ANYBLOB="180000000400000000000000ff03000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008510000000000000950000000000000085100000faffffff18360000030000000000000000000000bf91000000000000b7020000000800008500000084000000b70000000000000095000000000000000ba1f1d4e8694ae43f442a9455db34dd7eda82f5145a424e4f4a74463dc0e6db1ed5f0d3218c1f9cd859e2d61999311889bff320b41823c5d7be07f11799bdc84102e30f5df68e16749f05cfc6b4d831c13e00642f0d", @ANYRESDEC=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000900)=ANY=[@ANYRES8], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x7, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="850000009e0000006a0a00ff000000006900c00e00000000950000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000000500a801000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2d) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r4}, 0x10) 714.626118ms ago: executing program 4 (id=4257): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000140)={'virt_wifi0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='bcache_alloc_fail\x00'}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x20, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000002000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x90) r4 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcd, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000100)='cpu&\t0\t\t\t') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) mkdir(0x0, 0x0) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000180)={'veth1_vlan\x00', 0x400}) 714.081688ms ago: executing program 0 (id=4265): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x15}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200), 0x0, &(0x7f0000000a40)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="000000001400", @ANYRES32, @ANYBLOB="0000000014000000000000", @ANYRESHEX], 0x88, 0x4}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001a00)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 456.86845ms ago: executing program 0 (id=4258): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0xfffffffffffffda4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffefffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x15) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xf4e4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x5e}}, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 216.789891ms ago: executing program 4 (id=4259): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x4, 0x6, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x5, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r2, &(0x7f0000000300), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000010c0)=ANY=[@ANYBLOB="180000000400000000000000ff03000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008510000000000000950000000000000085100000faffffff18360000030000000000000000000000bf91000000000000b7020000000800008500000084000000b70000000000000095000000000000000ba1f1d4e8694ae43f442a9455db34dd7eda82f5145a424e4f4a74463dc0e6db1ed5f0d3218c1f9cd859e2d61999311889bff320b41823c5d7be07f11799bdc84102e30f5df68e16749f05cfc6b4d831c13e00642f0d", @ANYRESDEC=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffffff, 0xe0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xc4, &(0x7f0000000c80)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0x0, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x4000}, {{0x18, 0x1, 0x1, 0x0, r6}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r6}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed300000001175f37538e486dd6315ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa13f06558"], 0xfdef) write$cgroup_subtree(r7, &(0x7f0000000000), 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000900)=ANY=[@ANYRES8], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x7, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="850000009e0000006a0a00ff000000006900c00e00000000950000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000000500a801000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2d) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r8}, 0x10) 0s ago: executing program 1 (id=4116): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x4, 0x6, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x5, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r2, &(0x7f0000000300), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000010c0)=ANY=[@ANYBLOB="180000000400000000000000ff03000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008510000000000000950000000000000085100000faffffff18360000030000000000000000000000bf91000000000000b7020000000800008500000084000000b70000000000000095000000000000000ba1f1d4e8694ae43f442a9455db34dd7eda82f5145a424e4f4a74463dc0e6db1ed5f0d3218c1f9cd859e2d61999311889bff320b41823c5d7be07f11799bdc84102e30f5df68e16749f05cfc6b4d831c13e00642f0d", @ANYRESDEC=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffffff, 0xe0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xc4, &(0x7f0000000c80)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0x0, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x4000}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed300000001175f37538e486dd6315ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa13f06558"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) kernel console output (not intermixed with test programs): e team_slave_1 entered promiscuous mode [ 143.244899][ T28] audit: type=1400 audit(1726228522.917:134): avc: denied { create } for pid=3215 comm="syz.1.911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 144.892448][ T3254] device syzkaller0 entered promiscuous mode [ 146.055609][ T3289] device syzkaller0 entered promiscuous mode [ 146.066024][ T3280] device veth0_vlan left promiscuous mode [ 146.072169][ T3280] device veth0_vlan entered promiscuous mode [ 151.078339][ T3331] FAULT_INJECTION: forcing a failure. [ 151.078339][ T3331] name failslab, interval 1, probability 0, space 0, times 0 [ 151.172322][ T3331] CPU: 1 PID: 3331 Comm: syz.4.948 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 151.181777][ T3331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 151.191671][ T3331] Call Trace: [ 151.194794][ T3331] [ 151.197572][ T3331] dump_stack_lvl+0x151/0x1b7 [ 151.202086][ T3331] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 151.207379][ T3331] dump_stack+0x15/0x1c [ 151.211371][ T3331] should_fail_ex+0x3d0/0x520 [ 151.215887][ T3331] ? alloc_vmap_area+0x1a5/0x1aa0 [ 151.220747][ T3331] __should_failslab+0xaf/0xf0 [ 151.225344][ T3331] should_failslab+0x9/0x20 [ 151.229685][ T3331] kmem_cache_alloc_node+0x3e/0x2d0 [ 151.234719][ T3331] alloc_vmap_area+0x1a5/0x1aa0 [ 151.239409][ T3331] ? vm_map_ram+0x940/0x940 [ 151.243744][ T3331] ? __kasan_kmalloc+0x9c/0xb0 [ 151.248346][ T3331] ? kmalloc_node_trace+0x3d/0xb0 [ 151.253206][ T3331] __get_vm_area_node+0x171/0x370 [ 151.258067][ T3331] __vmalloc_node_range+0x36e/0x1540 [ 151.263187][ T3331] ? copy_process+0x5c3/0x3530 [ 151.267789][ T3331] ? kasan_save_alloc_info+0x1f/0x30 [ 151.272910][ T3331] ? vmap+0x2b0/0x2b0 [ 151.276735][ T3331] ? arch_dup_task_struct+0x3f/0x90 [ 151.281774][ T3331] ? memcpy+0x56/0x70 [ 151.285581][ T3331] dup_task_struct+0x3d6/0x7d0 [ 151.290187][ T3331] ? copy_process+0x5c3/0x3530 [ 151.294781][ T3331] copy_process+0x5c3/0x3530 [ 151.299211][ T3331] ? __kasan_check_write+0x14/0x20 [ 151.304151][ T3331] ? proc_fail_nth_write+0x20b/0x290 [ 151.309275][ T3331] ? selinux_file_permission+0x2bb/0x560 [ 151.314741][ T3331] ? proc_fail_nth_read+0x210/0x210 [ 151.319775][ T3331] ? fsnotify_perm+0x6a/0x5d0 [ 151.324288][ T3331] ? idle_dummy+0x10/0x10 [ 151.328455][ T3331] ? vfs_write+0xbb3/0xeb0 [ 151.332721][ T3331] ? __kasan_slab_free+0x11/0x20 [ 151.337831][ T3331] kernel_clone+0x229/0x890 [ 151.342176][ T3331] ? __kasan_check_write+0x14/0x20 [ 151.347117][ T3331] ? mutex_unlock+0xb2/0x260 [ 151.351543][ T3331] ? create_io_thread+0x180/0x180 [ 151.356406][ T3331] __x64_sys_clone+0x231/0x280 [ 151.361007][ T3331] ? __do_sys_vfork+0x110/0x110 [ 151.365696][ T3331] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 151.371590][ T3331] ? exit_to_user_mode_prepare+0x39/0xa0 [ 151.377060][ T3331] x64_sys_call+0x1b0/0x9a0 [ 151.381399][ T3331] do_syscall_64+0x3b/0xb0 [ 151.385655][ T3331] ? clear_bhb_loop+0x55/0xb0 [ 151.390172][ T3331] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 151.395896][ T3331] RIP: 0033:0x7efca657def9 [ 151.400147][ T3331] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 151.419587][ T3331] RSP: 002b:00007efca733efe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 151.427833][ T3331] RAX: ffffffffffffffda RBX: 00007efca6735f80 RCX: 00007efca657def9 [ 151.435645][ T3331] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c2400 [ 151.443454][ T3331] RBP: 00007efca733f090 R08: 0000000000000000 R09: 0000000000000000 [ 151.451266][ T3331] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 151.459078][ T3331] R13: 0000000000000000 R14: 00007efca6735f80 R15: 00007fff2f086f98 [ 151.466897][ T3331] [ 151.470732][ T3331] syz.4.948: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 151.615275][ T3331] CPU: 1 PID: 3331 Comm: syz.4.948 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 151.624822][ T3331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 151.634716][ T3331] Call Trace: [ 151.637840][ T3331] [ 151.640617][ T3331] dump_stack_lvl+0x151/0x1b7 [ 151.645131][ T3331] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 151.650428][ T3331] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 151.656069][ T3331] dump_stack+0x15/0x1c [ 151.660058][ T3331] warn_alloc+0x21a/0x3a0 [ 151.664223][ T3331] ? zone_watermark_ok_safe+0x270/0x270 [ 151.669608][ T3331] ? __get_vm_area_node+0x186/0x370 [ 151.674638][ T3331] ? __get_vm_area_node+0x186/0x370 [ 151.679676][ T3331] __vmalloc_node_range+0x392/0x1540 [ 151.684799][ T3331] ? kasan_save_alloc_info+0x1f/0x30 [ 151.689918][ T3331] ? vmap+0x2b0/0x2b0 [ 151.693731][ T3331] ? arch_dup_task_struct+0x3f/0x90 [ 151.698767][ T3331] ? memcpy+0x56/0x70 [ 151.702585][ T3331] dup_task_struct+0x3d6/0x7d0 [ 151.707192][ T3331] ? copy_process+0x5c3/0x3530 [ 151.711788][ T3331] copy_process+0x5c3/0x3530 [ 151.716217][ T3331] ? __kasan_check_write+0x14/0x20 [ 151.721162][ T3331] ? proc_fail_nth_write+0x20b/0x290 [ 151.726285][ T3331] ? selinux_file_permission+0x2bb/0x560 [ 151.731749][ T3331] ? proc_fail_nth_read+0x210/0x210 [ 151.736782][ T3331] ? fsnotify_perm+0x6a/0x5d0 [ 151.741296][ T3331] ? idle_dummy+0x10/0x10 [ 151.745469][ T3331] ? vfs_write+0xbb3/0xeb0 [ 151.749718][ T3331] ? __kasan_slab_free+0x11/0x20 [ 151.754491][ T3331] kernel_clone+0x229/0x890 [ 151.758826][ T3331] ? __kasan_check_write+0x14/0x20 [ 151.763773][ T3331] ? mutex_unlock+0xb2/0x260 [ 151.768199][ T3331] ? create_io_thread+0x180/0x180 [ 151.773062][ T3331] __x64_sys_clone+0x231/0x280 [ 151.777659][ T3331] ? __do_sys_vfork+0x110/0x110 [ 151.782347][ T3331] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 151.788249][ T3331] ? exit_to_user_mode_prepare+0x39/0xa0 [ 151.793721][ T3331] x64_sys_call+0x1b0/0x9a0 [ 151.798056][ T3331] do_syscall_64+0x3b/0xb0 [ 151.802309][ T3331] ? clear_bhb_loop+0x55/0xb0 [ 151.806821][ T3331] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 151.812552][ T3331] RIP: 0033:0x7efca657def9 [ 151.816804][ T3331] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 151.836245][ T3331] RSP: 002b:00007efca733efe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 151.844488][ T3331] RAX: ffffffffffffffda RBX: 00007efca6735f80 RCX: 00007efca657def9 [ 151.852300][ T3331] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c2400 [ 151.860113][ T3331] RBP: 00007efca733f090 R08: 0000000000000000 R09: 0000000000000000 [ 151.867923][ T3331] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 151.875735][ T3331] R13: 0000000000000000 R14: 00007efca6735f80 R15: 00007fff2f086f98 [ 151.883552][ T3331] [ 151.890726][ T3331] Mem-Info: [ 151.893661][ T3331] active_anon:8732 inactive_anon:0 isolated_anon:0 [ 151.893661][ T3331] active_file:17485 inactive_file:1957 isolated_file:0 [ 151.893661][ T3331] unevictable:0 dirty:170 writeback:13 [ 151.893661][ T3331] slab_reclaimable:6676 slab_unreclaimable:74568 [ 151.893661][ T3331] mapped:21674 shmem:161 pagetables:548 [ 151.893661][ T3331] sec_pagetables:0 bounce:0 [ 151.893661][ T3331] kernel_misc_reclaimable:0 [ 151.893661][ T3331] free:1526795 free_pcp:19281 free_cma:0 [ 151.948835][ T3331] Node 0 active_anon:34868kB inactive_anon:0kB active_file:69940kB inactive_file:7828kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:86692kB dirty:692kB writeback:0kB shmem:652kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4276kB pagetables:2028kB sec_pagetables:0kB all_unreclaimable? no [ 152.067520][ T3331] DMA32 free:2966484kB boost:0kB min:62552kB low:78188kB high:93824kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2971580kB mlocked:0kB bounce:0kB free_pcp:5096kB local_pcp:0kB free_cma:0kB [ 152.126240][ T3331] lowmem_reserve[]: 0 3932 3932 3932 [ 152.131411][ T3331] Normal free:3140632kB boost:0kB min:84900kB low:106124kB high:127348kB reserved_highatomic:0KB active_anon:36668kB inactive_anon:0kB active_file:69940kB inactive_file:7828kB unevictable:0kB writepending:692kB present:5242880kB managed:4026400kB mlocked:0kB bounce:0kB free_pcp:69036kB local_pcp:28596kB free_cma:0kB [ 152.274051][ T3331] lowmem_reserve[]: 0 0 0 0 [ 152.285489][ T3331] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 722*4096kB (M) = 2966484kB [ 152.467831][ T3331] Normal: 1*4kB (U) 1*8kB (M) 19*16kB (UME) 291*32kB (UME) 321*64kB (UME) 57*128kB (UME) 79*256kB (UME) 37*512kB (UME) 18*1024kB (UME) 7*2048kB (M) 739*4096kB (M) = 3136348kB [ 152.666314][ T3331] 23130 total pagecache pages [ 152.722640][ T3347] device veth0_vlan left promiscuous mode [ 152.728691][ T3331] 0 pages in swap cache [ 152.735300][ T3347] device veth0_vlan entered promiscuous mode [ 152.814369][ T3331] Free swap = 124996kB [ 152.877146][ T3331] Total swap = 124996kB [ 152.881112][ T3331] 2097051 pages RAM [ 152.884756][ T3331] 0 pages HighMem/MovableOnly [ 152.925534][ T3331] 347556 pages reserved [ 152.929700][ T3331] 0 pages cma reserved [ 153.730951][ T3382] device syzkaller0 entered promiscuous mode [ 153.961362][ T3386] device veth1_macvtap left promiscuous mode [ 154.155616][ T28] audit: type=1400 audit(1726228533.837:135): avc: denied { setopt } for pid=3398 comm="syz.2.970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 154.573571][ T3405] device syzkaller0 entered promiscuous mode [ 155.775658][ T3427] FAULT_INJECTION: forcing a failure. [ 155.775658][ T3427] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 155.789908][ T3429] FAULT_INJECTION: forcing a failure. [ 155.789908][ T3429] name failslab, interval 1, probability 0, space 0, times 0 [ 155.802806][ T3427] CPU: 1 PID: 3427 Comm: syz.2.977 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 155.812245][ T3427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 155.822142][ T3427] Call Trace: [ 155.825264][ T3427] [ 155.828042][ T3427] dump_stack_lvl+0x151/0x1b7 [ 155.832556][ T3427] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 155.837848][ T3427] ? iovec_from_user+0x2bd/0x320 [ 155.842623][ T3427] dump_stack+0x15/0x1c [ 155.846614][ T3427] should_fail_ex+0x3d0/0x520 [ 155.851129][ T3427] should_fail+0xb/0x10 [ 155.855129][ T3427] should_fail_usercopy+0x1a/0x20 [ 155.859981][ T3427] _copy_from_user+0x1e/0xc0 [ 155.864412][ T3427] ____sys_sendmsg+0x2f9/0x9a0 [ 155.869010][ T3427] ? __sys_sendmsg_sock+0x40/0x40 [ 155.873873][ T3427] __sys_sendmsg+0x2a9/0x390 [ 155.878300][ T3427] ? ____sys_sendmsg+0x9a0/0x9a0 [ 155.883074][ T3427] ? __kasan_check_write+0x14/0x20 [ 155.888015][ T3427] ? mutex_unlock+0xb2/0x260 [ 155.892444][ T3427] ? __kasan_check_write+0x14/0x20 [ 155.897396][ T3427] ? fpregs_restore_userregs+0x130/0x290 [ 155.902860][ T3427] __x64_sys_sendmsg+0x7f/0x90 [ 155.907457][ T3427] x64_sys_call+0x16a/0x9a0 [ 155.911795][ T3427] do_syscall_64+0x3b/0xb0 [ 155.916050][ T3427] ? clear_bhb_loop+0x55/0xb0 [ 155.920565][ T3427] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 155.926292][ T3427] RIP: 0033:0x7f0f06f7def9 [ 155.930547][ T3427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 155.949989][ T3427] RSP: 002b:00007f0f06dff038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 155.958233][ T3427] RAX: ffffffffffffffda RBX: 00007f0f07135f80 RCX: 00007f0f06f7def9 [ 155.966041][ T3427] RDX: 0000000000000000 RSI: 0000000020001580 RDI: 0000000000000005 [ 155.973856][ T3427] RBP: 00007f0f06dff090 R08: 0000000000000000 R09: 0000000000000000 [ 155.981664][ T3427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 155.989475][ T3427] R13: 0000000000000000 R14: 00007f0f07135f80 R15: 00007ffe0af22cf8 [ 155.997295][ T3427] [ 156.000246][ T3429] CPU: 0 PID: 3429 Comm: syz.3.978 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 156.009614][ T3429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 156.019508][ T3429] Call Trace: [ 156.022635][ T3429] [ 156.025409][ T3429] dump_stack_lvl+0x151/0x1b7 [ 156.029923][ T3429] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 156.035217][ T3429] ? mutex_unlock+0xb2/0x260 [ 156.039641][ T3429] ? _find_next_bit+0x126/0x130 [ 156.044332][ T3429] dump_stack+0x15/0x1c [ 156.048324][ T3429] should_fail_ex+0x3d0/0x520 [ 156.052839][ T3429] ? selinux_perf_event_alloc+0x51/0x140 [ 156.058305][ T3429] __should_failslab+0xaf/0xf0 [ 156.062904][ T3429] should_failslab+0x9/0x20 [ 156.067242][ T3429] __kmem_cache_alloc_node+0x3d/0x250 [ 156.072450][ T3429] ? selinux_perf_event_alloc+0x51/0x140 [ 156.077918][ T3429] kmalloc_trace+0x2a/0xa0 [ 156.082181][ T3429] selinux_perf_event_alloc+0x51/0x140 [ 156.087468][ T3429] security_perf_event_alloc+0x62/0x90 [ 156.092761][ T3429] perf_event_alloc+0x1544/0x1840 [ 156.097628][ T3429] __se_sys_perf_event_open+0xb27/0x3d60 [ 156.103091][ T3429] ? clockevents_program_event+0x22f/0x300 [ 156.108733][ T3429] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 156.114196][ T3429] ? kvm_sched_clock_read+0x18/0x40 [ 156.119242][ T3429] __x64_sys_perf_event_open+0xbf/0xd0 [ 156.124962][ T3429] x64_sys_call+0x7de/0x9a0 [ 156.129300][ T3429] do_syscall_64+0x3b/0xb0 [ 156.133552][ T3429] ? clear_bhb_loop+0x55/0xb0 [ 156.138068][ T3429] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 156.144060][ T3429] RIP: 0033:0x7fa07cd7def9 [ 156.148308][ T3429] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 156.167751][ T3429] RSP: 002b:00007fa07daf9038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 156.175995][ T3429] RAX: ffffffffffffffda RBX: 00007fa07cf35f80 RCX: 00007fa07cd7def9 [ 156.183806][ T3429] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000300 [ 156.191617][ T3429] RBP: 00007fa07daf9090 R08: 0000000000000000 R09: 0000000000000000 [ 156.199437][ T3429] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 156.207240][ T3429] R13: 0000000000000000 R14: 00007fa07cf35f80 R15: 00007ffd24a10c78 [ 156.215056][ T3429] [ 160.487290][ T28] audit: type=1400 audit(1726228540.157:136): avc: denied { write } for pid=3529 comm="syz.4.1009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 162.957753][ T3577] device syzkaller0 entered promiscuous mode [ 164.174770][ T3594] device syzkaller0 entered promiscuous mode [ 165.675053][ T3613] device syzkaller0 entered promiscuous mode [ 165.837981][ T3627] device sit0 left promiscuous mode [ 166.009874][ T3628] device sit0 entered promiscuous mode [ 166.736994][ T3655] bridge0: port 3(team_slave_1) entered blocking state [ 166.846826][ T3655] bridge0: port 3(team_slave_1) entered disabled state [ 166.908387][ T3655] device team_slave_1 entered promiscuous mode [ 167.302909][ T3657] device team_slave_1 left promiscuous mode [ 167.320037][ T3657] bridge0: port 3(team_slave_1) entered disabled state [ 170.262850][ T3747] device pim6reg1 entered promiscuous mode [ 170.414816][ T3749] device syzkaller0 entered promiscuous mode [ 170.504505][ T3758] FAULT_INJECTION: forcing a failure. [ 170.504505][ T3758] name failslab, interval 1, probability 0, space 0, times 0 [ 170.516970][ T3758] CPU: 1 PID: 3758 Comm: syz.3.1078 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 170.526464][ T3758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 170.536350][ T3758] Call Trace: [ 170.539479][ T3758] [ 170.542253][ T3758] dump_stack_lvl+0x151/0x1b7 [ 170.546770][ T3758] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 170.552064][ T3758] ? __kernel_text_address+0xd/0x40 [ 170.557093][ T3758] ? unwind_get_return_address+0x4d/0x90 [ 170.562563][ T3758] dump_stack+0x15/0x1c [ 170.566555][ T3758] should_fail_ex+0x3d0/0x520 [ 170.571073][ T3758] ? dst_alloc+0x164/0x1e0 [ 170.575321][ T3758] __should_failslab+0xaf/0xf0 [ 170.579921][ T3758] should_failslab+0x9/0x20 [ 170.584260][ T3758] kmem_cache_alloc+0x3b/0x2c0 [ 170.588864][ T3758] dst_alloc+0x164/0x1e0 [ 170.592940][ T3758] ip_route_output_key_hash_rcu+0x14ad/0x2040 [ 170.598847][ T3758] ip_route_output_flow+0x16b/0x340 [ 170.603877][ T3758] ? ipv4_sk_update_pmtu+0x1e60/0x1e60 [ 170.609175][ T3758] ip_tunnel_xmit+0xc46/0x2ac0 [ 170.613772][ T3758] ? tnl_update_pmtu+0xba0/0xba0 [ 170.618541][ T3758] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 170.623839][ T3758] ? gre_build_header+0x260/0x8c0 [ 170.628699][ T3758] ipgre_xmit+0x8c1/0xc80 [ 170.632867][ T3758] dev_hard_start_xmit+0x1de/0x630 [ 170.637811][ T3758] __dev_queue_xmit+0x18a4/0x36e0 [ 170.642673][ T3758] ? __dev_queue_xmit+0x2a6/0x36e0 [ 170.647616][ T3758] ? netdev_core_pick_tx+0x350/0x350 [ 170.652738][ T3758] ? __kasan_check_write+0x14/0x20 [ 170.657686][ T3758] ? skb_release_data+0x19e/0x840 [ 170.662544][ T3758] ? __kasan_kmalloc+0x9c/0xb0 [ 170.667148][ T3758] ? __kasan_check_write+0x14/0x20 [ 170.672092][ T3758] ? pskb_expand_head+0x7a8/0x1380 [ 170.677041][ T3758] __bpf_redirect+0xa29/0x1180 [ 170.681643][ T3758] bpf_clone_redirect+0x24d/0x390 [ 170.686503][ T3758] bpf_prog_208b094576c80b22+0x56/0x5b [ 170.691795][ T3758] ? module_enable_nx+0x160/0x3a0 [ 170.696655][ T3758] ? __stack_depot_save+0x36/0x480 [ 170.701605][ T3758] ? kasan_set_track+0x60/0x70 [ 170.706201][ T3758] ? kasan_set_track+0x4b/0x70 [ 170.710802][ T3758] ? kasan_save_alloc_info+0x1f/0x30 [ 170.715922][ T3758] ? __kasan_slab_alloc+0x6c/0x80 [ 170.720782][ T3758] ? slab_post_alloc_hook+0x53/0x2c0 [ 170.725904][ T3758] ? kmem_cache_alloc+0x175/0x2c0 [ 170.730851][ T3758] ? build_skb+0x2c/0x220 [ 170.735017][ T3758] ? bpf_prog_test_run_skb+0x3ad/0x13a0 [ 170.740398][ T3758] ? bpf_prog_test_run+0x3b0/0x630 [ 170.745344][ T3758] ? __sys_bpf+0x59f/0x7f0 [ 170.749598][ T3758] ? __x64_sys_bpf+0x7c/0x90 [ 170.754025][ T3758] ? x64_sys_call+0x87f/0x9a0 [ 170.758541][ T3758] ? do_syscall_64+0x3b/0xb0 [ 170.762964][ T3758] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 170.768870][ T3758] ? ktime_get+0x12f/0x160 [ 170.773120][ T3758] bpf_test_run+0x4ab/0xa40 [ 170.777470][ T3758] ? convert___skb_to_skb+0x670/0x670 [ 170.782667][ T3758] ? eth_type_trans+0x43b/0x710 [ 170.787356][ T3758] ? eth_get_headlen+0x240/0x240 [ 170.792128][ T3758] ? convert___skb_to_skb+0x44/0x670 [ 170.797250][ T3758] ? build_skb+0xde/0x220 [ 170.801416][ T3758] bpf_prog_test_run_skb+0xaf1/0x13a0 [ 170.806627][ T3758] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 170.812351][ T3758] ? __kasan_check_write+0x14/0x20 [ 170.817297][ T3758] ? fput+0x15b/0x1b0 [ 170.821115][ T3758] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 170.826847][ T3758] bpf_prog_test_run+0x3b0/0x630 [ 170.831618][ T3758] ? bpf_prog_query+0x260/0x260 [ 170.836307][ T3758] ? selinux_bpf+0xd2/0x100 [ 170.840644][ T3758] ? security_bpf+0x82/0xb0 [ 170.844985][ T3758] __sys_bpf+0x59f/0x7f0 [ 170.849074][ T3758] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 170.854274][ T3758] ? __ia32_sys_read+0x90/0x90 [ 170.858873][ T3758] ? debug_smp_processor_id+0x17/0x20 [ 170.864084][ T3758] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 170.869981][ T3758] __x64_sys_bpf+0x7c/0x90 [ 170.874236][ T3758] x64_sys_call+0x87f/0x9a0 [ 170.878574][ T3758] do_syscall_64+0x3b/0xb0 [ 170.882825][ T3758] ? clear_bhb_loop+0x55/0xb0 [ 170.887342][ T3758] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 170.893068][ T3758] RIP: 0033:0x7fa07cd7def9 [ 170.897322][ T3758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 170.916762][ T3758] RSP: 002b:00007fa07daf9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 170.925006][ T3758] RAX: ffffffffffffffda RBX: 00007fa07cf35f80 RCX: 00007fa07cd7def9 [ 170.932819][ T3758] RDX: 000000000000001e RSI: 0000000020000080 RDI: 000000000000000a [ 170.940631][ T3758] RBP: 00007fa07daf9090 R08: 0000000000000000 R09: 0000000000000000 [ 170.948442][ T3758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 170.956252][ T3758] R13: 0000000000000000 R14: 00007fa07cf35f80 R15: 00007ffd24a10c78 [ 170.964069][ T3758] [ 171.595391][ T3783] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.609733][ T3783] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.998481][ T28] audit: type=1400 audit(1726228553.677:137): avc: denied { write } for pid=3824 comm="syz.4.1099" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 174.480996][ T3845] device syzkaller0 entered promiscuous mode [ 174.526287][ T3844] device sit0 left promiscuous mode [ 174.539653][ T3846] device sit0 entered promiscuous mode [ 175.510073][ T3891] device sit0 entered promiscuous mode [ 176.330388][ T3894] device syzkaller0 entered promiscuous mode [ 182.997582][ T3971] bridge0: port 3(veth1_macvtap) entered blocking state [ 183.132559][ T3971] bridge0: port 3(veth1_macvtap) entered disabled state [ 184.695149][ T4013] device sit0 left promiscuous mode [ 189.045895][ T4067] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.052741][ T4067] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.353874][ T4067] device bridge_slave_0 entered promiscuous mode [ 189.950131][ T4067] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.966225][ T4067] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.026555][ T4067] device bridge_slave_1 entered promiscuous mode [ 191.428129][ T4112] device syzkaller0 entered promiscuous mode [ 191.766540][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.773792][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.167090][ T4130] syz.0.1187 (4130) used obsolete PPPIOCDETACH ioctl [ 192.175454][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.183540][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.222899][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.229777][ T357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.251241][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.314712][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.326637][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.333497][ T357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.465940][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.482535][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.490421][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.498498][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.819521][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.831056][ T28] audit: type=1400 audit(1726228572.417:138): avc: denied { create } for pid=4138 comm="syz.2.1190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 192.856248][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 192.881530][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 193.067610][ T4140] device syzkaller0 entered promiscuous mode [ 193.147780][ T4067] device veth0_vlan entered promiscuous mode [ 193.155524][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 193.163207][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 193.345488][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 193.352771][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 193.612431][ T4067] device veth1_macvtap entered promiscuous mode [ 193.752442][ T4148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 193.856092][ T4148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 193.864048][ T4148] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 194.545881][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 194.586329][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 194.681355][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 194.771425][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 194.856506][ T4162] device veth1_macvtap left promiscuous mode [ 194.910408][ T4172] device pim6reg1 entered promiscuous mode [ 195.510540][ T4173] device syzkaller0 entered promiscuous mode [ 195.918613][ T28] audit: type=1400 audit(1726228575.597:139): avc: denied { mounton } for pid=4067 comm="syz-executor" path="/root/syzkaller.Y8leZp/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 196.183429][ T28] audit: type=1400 audit(1726228575.597:140): avc: denied { mount } for pid=4067 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 196.205531][ T28] audit: type=1400 audit(1726228575.617:141): avc: denied { mounton } for pid=4067 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 196.634980][ T4197] device syzkaller0 entered promiscuous mode [ 197.360746][ T4219] bond_slave_1: mtu less than device minimum [ 197.610913][ T4223] device syzkaller0 entered promiscuous mode [ 198.691361][ T4244] device wg2 left promiscuous mode [ 198.807199][ T4242] device wg2 entered promiscuous mode [ 199.791081][ T4261] device syzkaller0 entered promiscuous mode [ 200.273387][ T28] audit: type=1400 audit(1726228579.947:142): avc: denied { read } for pid=4267 comm="syz.1.1224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 200.825300][ T4281] device veth0_vlan left promiscuous mode [ 200.904623][ T4281] device veth0_vlan entered promiscuous mode [ 200.946898][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 200.960492][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 201.056173][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 201.646878][ T8] device team_slave_1 left promiscuous mode [ 201.656230][ T8] bridge0: port 3(team_slave_1) entered disabled state [ 201.782300][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.965990][ T8] device bridge_slave_0 left promiscuous mode [ 201.971938][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.125507][ T8] device veth1_macvtap left promiscuous mode [ 202.186500][ T8] device veth0_vlan left promiscuous mode [ 204.158754][ T4358] device syzkaller0 entered promiscuous mode [ 205.303398][ T4393] FAULT_INJECTION: forcing a failure. [ 205.303398][ T4393] name failslab, interval 1, probability 0, space 0, times 0 [ 205.433230][ T4393] CPU: 0 PID: 4393 Comm: syz.0.1263 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 205.442772][ T4393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 205.452664][ T4393] Call Trace: [ 205.455787][ T4393] [ 205.458580][ T4393] dump_stack_lvl+0x151/0x1b7 [ 205.463082][ T4393] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 205.468376][ T4393] dump_stack+0x15/0x1c [ 205.472369][ T4393] should_fail_ex+0x3d0/0x520 [ 205.476882][ T4393] ? __alloc_file+0x29/0x2a0 [ 205.481305][ T4393] __should_failslab+0xaf/0xf0 [ 205.485909][ T4393] should_failslab+0x9/0x20 [ 205.490246][ T4393] kmem_cache_alloc+0x3b/0x2c0 [ 205.494845][ T4393] ? _raw_spin_trylock_bh+0x190/0x190 [ 205.500058][ T4393] __alloc_file+0x29/0x2a0 [ 205.504310][ T4393] alloc_empty_file+0x95/0x180 [ 205.508909][ T4393] alloc_file+0x5a/0x5e0 [ 205.512989][ T4393] alloc_file_pseudo+0x259/0x2f0 [ 205.517796][ T4393] ? alloc_empty_file_noaccount+0x80/0x80 [ 205.523318][ T4393] ? tipc_sk_finish_conn+0x5ac/0x860 [ 205.528442][ T4393] sock_alloc_file+0xbb/0x260 [ 205.532950][ T4393] __sys_socketpair+0x405/0x6e0 [ 205.537637][ T4393] ? __ia32_sys_socket+0x90/0x90 [ 205.542409][ T4393] ? __ia32_sys_read+0x90/0x90 [ 205.547014][ T4393] ? debug_smp_processor_id+0x17/0x20 [ 205.552215][ T4393] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 205.558118][ T4393] __x64_sys_socketpair+0x9b/0xb0 [ 205.562981][ T4393] x64_sys_call+0x19b/0x9a0 [ 205.567317][ T4393] do_syscall_64+0x3b/0xb0 [ 205.571571][ T4393] ? clear_bhb_loop+0x55/0xb0 [ 205.576087][ T4393] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 205.581815][ T4393] RIP: 0033:0x7fdf5177def9 [ 205.586066][ T4393] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 205.605510][ T4393] RSP: 002b:00007fdf524b4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 205.613754][ T4393] RAX: ffffffffffffffda RBX: 00007fdf51935f80 RCX: 00007fdf5177def9 [ 205.621565][ T4393] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 205.629377][ T4393] RBP: 00007fdf524b4090 R08: 0000000000000000 R09: 0000000000000000 [ 205.637187][ T4393] R10: 0000000020000940 R11: 0000000000000246 R12: 0000000000000002 [ 205.644995][ T4393] R13: 0000000000000000 R14: 00007fdf51935f80 R15: 00007ffc5cfa0f08 [ 205.652812][ T4393] [ 206.131211][ T4409] device syzkaller0 entered promiscuous mode [ 206.204310][ T4422] device veth1_macvtap left promiscuous mode [ 207.104440][ T4436] device syzkaller0 entered promiscuous mode [ 210.546211][ T4501] device syzkaller0 entered promiscuous mode [ 210.971325][ T4536] Â: renamed from pim6reg1 [ 213.306877][ T4609] syz.0.1331[4609] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.306939][ T4609] syz.0.1331[4609] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.949292][ T4841] device syzkaller0 entered promiscuous mode [ 230.113171][ T4942] FAULT_INJECTION: forcing a failure. [ 230.113171][ T4942] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 230.256976][ T4942] CPU: 0 PID: 4942 Comm: syz.4.1441 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 230.266525][ T4942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 230.276421][ T4942] Call Trace: [ 230.279552][ T4942] [ 230.282320][ T4942] dump_stack_lvl+0x151/0x1b7 [ 230.286836][ T4942] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 230.292128][ T4942] ? ioctl_has_perm+0x3f0/0x560 [ 230.296815][ T4942] dump_stack+0x15/0x1c [ 230.300807][ T4942] should_fail_ex+0x3d0/0x520 [ 230.305320][ T4942] should_fail+0xb/0x10 [ 230.309318][ T4942] should_fail_usercopy+0x1a/0x20 [ 230.314176][ T4942] _copy_from_user+0x1e/0xc0 [ 230.318602][ T4942] __tun_chr_ioctl+0x28c/0x22d0 [ 230.323291][ T4942] ? tun_flow_create+0x320/0x320 [ 230.328061][ T4942] ? __fget_files+0x2cb/0x330 [ 230.332578][ T4942] tun_chr_ioctl+0x2a/0x40 [ 230.336826][ T4942] ? tun_chr_poll+0x670/0x670 [ 230.341339][ T4942] __se_sys_ioctl+0x114/0x190 [ 230.345858][ T4942] __x64_sys_ioctl+0x7b/0x90 [ 230.350278][ T4942] x64_sys_call+0x98/0x9a0 [ 230.354527][ T4942] do_syscall_64+0x3b/0xb0 [ 230.358781][ T4942] ? clear_bhb_loop+0x55/0xb0 [ 230.363297][ T4942] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 230.369023][ T4942] RIP: 0033:0x7efca657def9 [ 230.373279][ T4942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 230.392718][ T4942] RSP: 002b:00007efca733f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 230.400966][ T4942] RAX: ffffffffffffffda RBX: 00007efca6735f80 RCX: 00007efca657def9 [ 230.408775][ T4942] RDX: 0000000020001480 RSI: 00000000400454ca RDI: 0000000000000009 [ 230.416590][ T4942] RBP: 00007efca733f090 R08: 0000000000000000 R09: 0000000000000000 [ 230.424397][ T4942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 230.432208][ T4942] R13: 0000000000000000 R14: 00007efca6735f80 R15: 00007fff2f086f98 [ 230.440026][ T4942] [ 231.997972][ T4990] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.090590][ T4990] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.212412][ T4990] device bridge_slave_0 entered promiscuous mode [ 232.274467][ T4990] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.281388][ T4990] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.288591][ T4990] device bridge_slave_1 entered promiscuous mode [ 232.367898][ T10] device bridge_slave_1 left promiscuous mode [ 232.374116][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.407361][ T10] device bridge_slave_0 left promiscuous mode [ 232.413351][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.488282][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.631033][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.685658][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.700490][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.720943][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.727834][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.873708][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.963933][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.003872][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.010739][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.136231][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.198057][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.206421][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.214325][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.228976][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.236681][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 234.244811][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 234.278359][ T4990] device veth0_vlan entered promiscuous mode [ 234.318287][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 234.329374][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 234.356038][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 234.463753][ T4990] device veth1_macvtap entered promiscuous mode [ 234.505639][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 234.528320][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 234.547320][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 234.578804][ T5090] device bridge0 entered promiscuous mode [ 234.587315][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 234.597624][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 239.390473][ T5160] device sit0 entered promiscuous mode [ 239.486979][ T5167] syz.1.1511[5167] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.487047][ T5167] syz.1.1511[5167] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.917217][ T5188] device syzkaller0 entered promiscuous mode [ 244.785001][ T5228] device syzkaller0 entered promiscuous mode [ 245.620364][ T5281] device syzkaller0 entered promiscuous mode [ 248.037972][ T5365] FAULT_INJECTION: forcing a failure. [ 248.037972][ T5365] name failslab, interval 1, probability 0, space 0, times 0 [ 248.195516][ T5365] CPU: 0 PID: 5365 Comm: syz.1.1577 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 248.205059][ T5365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 248.214951][ T5365] Call Trace: [ 248.218076][ T5365] [ 248.220851][ T5365] dump_stack_lvl+0x151/0x1b7 [ 248.225367][ T5365] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 248.230658][ T5365] ? __stack_depot_save+0x36/0x480 [ 248.235613][ T5365] dump_stack+0x15/0x1c [ 248.239600][ T5365] should_fail_ex+0x3d0/0x520 [ 248.244114][ T5365] ? __kthread_create_on_node+0x135/0x550 [ 248.249666][ T5365] __should_failslab+0xaf/0xf0 [ 248.254269][ T5365] should_failslab+0x9/0x20 [ 248.258605][ T5365] __kmem_cache_alloc_node+0x3d/0x250 [ 248.263812][ T5365] ? put_cpu_map_entry+0x760/0x760 [ 248.268763][ T5365] ? __kthread_create_on_node+0x135/0x550 [ 248.274313][ T5365] kmalloc_trace+0x2a/0xa0 [ 248.278566][ T5365] ? put_cpu_map_entry+0x760/0x760 [ 248.283514][ T5365] __kthread_create_on_node+0x135/0x550 [ 248.288896][ T5365] ? kthread_create_on_node+0x120/0x120 [ 248.294286][ T5365] ? kasan_save_alloc_info+0x1f/0x30 [ 248.299402][ T5365] ? __kasan_kmalloc+0x9c/0xb0 [ 248.304004][ T5365] ? put_cpu_map_entry+0x760/0x760 [ 248.308945][ T5365] kthread_create_on_node+0xda/0x120 [ 248.314073][ T5365] ? kvmalloc_node+0x26c/0x640 [ 248.318668][ T5365] ? __kasan_kmalloc+0x9c/0xb0 [ 248.323269][ T5365] ? tsk_fork_get_node+0x10/0x10 [ 248.328047][ T5365] ? bpf_map_kmalloc_node+0x1d8/0x2c0 [ 248.333246][ T5365] cpu_map_update_elem+0xa3f/0xf50 [ 248.338195][ T5365] ? cpu_map_lookup_elem+0x100/0x100 [ 248.343314][ T5365] ? kvmalloc_node+0x26c/0x640 [ 248.347924][ T5365] bpf_map_update_value+0x1a3/0x410 [ 248.352948][ T5365] map_update_elem+0x500/0x680 [ 248.357553][ T5365] __sys_bpf+0x460/0x7f0 [ 248.361629][ T5365] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 248.366842][ T5365] ? __ia32_sys_read+0x90/0x90 [ 248.371438][ T5365] ? debug_smp_processor_id+0x17/0x20 [ 248.376643][ T5365] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 248.382553][ T5365] __x64_sys_bpf+0x7c/0x90 [ 248.386799][ T5365] x64_sys_call+0x87f/0x9a0 [ 248.391138][ T5365] do_syscall_64+0x3b/0xb0 [ 248.395390][ T5365] ? clear_bhb_loop+0x55/0xb0 [ 248.399903][ T5365] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 248.405631][ T5365] RIP: 0033:0x7fb1ddd7def9 [ 248.409888][ T5365] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 248.429331][ T5365] RSP: 002b:00007fb1dec12038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 248.437573][ T5365] RAX: ffffffffffffffda RBX: 00007fb1ddf35f80 RCX: 00007fb1ddd7def9 [ 248.445383][ T5365] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000002 [ 248.453194][ T5365] RBP: 00007fb1dec12090 R08: 0000000000000000 R09: 0000000000000000 [ 248.461094][ T5365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 248.468907][ T5365] R13: 0000000000000000 R14: 00007fb1ddf35f80 R15: 00007fffe0a15748 [ 248.476720][ T5365] [ 249.508592][ T5390] device syzkaller0 entered promiscuous mode [ 249.684793][ T5410] device bridge_slave_1 left promiscuous mode [ 249.698513][ T5410] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.708098][ T5410] device bridge_slave_0 left promiscuous mode [ 249.714062][ T5410] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.979376][ T5425] device wg2 left promiscuous mode [ 249.990273][ T5425] device wg2 entered promiscuous mode [ 250.844833][ T5452] device syzkaller0 entered promiscuous mode [ 252.817274][ T5520] device syzkaller0 entered promiscuous mode [ 255.208091][ T28] audit: type=1400 audit(1726228634.887:143): avc: denied { create } for pid=5596 comm="syz.4.1649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 255.233355][ T5587] device syzkaller0 entered promiscuous mode [ 255.856125][ T5615] device veth1_macvtap left promiscuous mode [ 256.987255][ T5628] device syzkaller0 entered promiscuous mode [ 257.091434][ T28] audit: type=1400 audit(1726228636.767:144): avc: denied { write } for pid=5639 comm="syz.2.1664" name="net" dev="proc" ino=30015 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 257.227792][ T28] audit: type=1400 audit(1726228636.767:145): avc: denied { add_name } for pid=5639 comm="syz.2.1664" name="blkio.throttle.io_service_bytes_recursive" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 257.462274][ T28] audit: type=1400 audit(1726228636.767:146): avc: denied { create } for pid=5639 comm="syz.2.1664" name="blkio.throttle.io_service_bytes_recursive" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 257.493078][ T28] audit: type=1400 audit(1726228636.767:147): avc: denied { associate } for pid=5639 comm="syz.2.1664" name="blkio.throttle.io_service_bytes_recursive" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 257.519949][ T5647] device syzkaller0 entered promiscuous mode [ 258.211805][ T5678] FAULT_INJECTION: forcing a failure. [ 258.211805][ T5678] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 258.385787][ T5678] CPU: 1 PID: 5678 Comm: syz.4.1677 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 258.395333][ T5678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 258.405241][ T5678] Call Trace: [ 258.408354][ T5678] [ 258.411132][ T5678] dump_stack_lvl+0x151/0x1b7 [ 258.415648][ T5678] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 258.420940][ T5678] dump_stack+0x15/0x1c [ 258.424930][ T5678] should_fail_ex+0x3d0/0x520 [ 258.429444][ T5678] should_fail+0xb/0x10 [ 258.433438][ T5678] should_fail_usercopy+0x1a/0x20 [ 258.438301][ T5678] _copy_to_user+0x1e/0x90 [ 258.442553][ T5678] generic_map_lookup_batch+0x778/0xcc0 [ 258.447934][ T5678] ? bpf_map_update_value+0x410/0x410 [ 258.453139][ T5678] ? __fdget+0x1b7/0x240 [ 258.457216][ T5678] ? bpf_map_update_value+0x410/0x410 [ 258.462431][ T5678] bpf_map_do_batch+0x2e2/0x630 [ 258.467114][ T5678] __sys_bpf+0x66b/0x7f0 [ 258.471191][ T5678] ? clockevents_program_event+0x22f/0x300 [ 258.476834][ T5678] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 258.482043][ T5678] ? __sched_clock_gtod_offset+0x100/0x100 [ 258.487688][ T5678] ? debug_smp_processor_id+0x17/0x20 [ 258.492896][ T5678] __x64_sys_bpf+0x7c/0x90 [ 258.497143][ T5678] x64_sys_call+0x87f/0x9a0 [ 258.501482][ T5678] do_syscall_64+0x3b/0xb0 [ 258.505734][ T5678] ? clear_bhb_loop+0x55/0xb0 [ 258.510246][ T5678] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 258.516324][ T5678] RIP: 0033:0x7efca657def9 [ 258.520575][ T5678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 258.540018][ T5678] RSP: 002b:00007efca733f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 258.548263][ T5678] RAX: ffffffffffffffda RBX: 00007efca6735f80 RCX: 00007efca657def9 [ 258.556072][ T5678] RDX: 0000000000000038 RSI: 00000000200004c0 RDI: 0000000000000018 [ 258.563885][ T5678] RBP: 00007efca733f090 R08: 0000000000000000 R09: 0000000000000000 [ 258.571696][ T5678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 258.579507][ T5678] R13: 0000000000000000 R14: 00007efca6735f80 R15: 00007fff2f086f98 [ 258.587325][ T5678] [ 259.495105][ T5725] FAULT_INJECTION: forcing a failure. [ 259.495105][ T5725] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 259.665555][ T5725] CPU: 0 PID: 5725 Comm: syz.4.1695 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 259.675101][ T5725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 259.684993][ T5725] Call Trace: [ 259.688116][ T5725] [ 259.690893][ T5725] dump_stack_lvl+0x151/0x1b7 [ 259.695409][ T5725] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 259.700703][ T5725] dump_stack+0x15/0x1c [ 259.704694][ T5725] should_fail_ex+0x3d0/0x520 [ 259.709211][ T5725] should_fail+0xb/0x10 [ 259.713209][ T5725] should_fail_usercopy+0x1a/0x20 [ 259.718062][ T5725] _copy_from_user+0x1e/0xc0 [ 259.722487][ T5725] bpf_test_init+0x12e/0x190 [ 259.726918][ T5725] bpf_prog_test_run_skb+0x297/0x13a0 [ 259.732128][ T5725] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 259.737852][ T5725] ? __kasan_check_write+0x14/0x20 [ 259.742799][ T5725] ? fput+0x15b/0x1b0 [ 259.746614][ T5725] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 259.752344][ T5725] bpf_prog_test_run+0x3b0/0x630 [ 259.757118][ T5725] ? bpf_prog_query+0x260/0x260 [ 259.761805][ T5725] ? selinux_bpf+0xd2/0x100 [ 259.766154][ T5725] ? security_bpf+0x82/0xb0 [ 259.770485][ T5725] __sys_bpf+0x59f/0x7f0 [ 259.774563][ T5725] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 259.779774][ T5725] ? __ia32_sys_read+0x90/0x90 [ 259.784372][ T5725] ? debug_smp_processor_id+0x17/0x20 [ 259.789580][ T5725] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 259.795481][ T5725] __x64_sys_bpf+0x7c/0x90 [ 259.799735][ T5725] x64_sys_call+0x87f/0x9a0 [ 259.804072][ T5725] do_syscall_64+0x3b/0xb0 [ 259.808326][ T5725] ? clear_bhb_loop+0x55/0xb0 [ 259.812846][ T5725] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 259.818568][ T5725] RIP: 0033:0x7efca657def9 [ 259.822822][ T5725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 259.842353][ T5725] RSP: 002b:00007efca733f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 259.850594][ T5725] RAX: ffffffffffffffda RBX: 00007efca6735f80 RCX: 00007efca657def9 [ 259.858403][ T5725] RDX: 0000000000000048 RSI: 0000000020000340 RDI: 000000000000000a [ 259.866215][ T5725] RBP: 00007efca733f090 R08: 0000000000000000 R09: 0000000000000000 [ 259.874032][ T5725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 259.881840][ T5725] R13: 0000000000000000 R14: 00007efca6735f80 R15: 00007fff2f086f98 [ 259.889658][ T5725] [ 260.007723][ T5735] FAULT_INJECTION: forcing a failure. [ 260.007723][ T5735] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 260.020704][ T5735] CPU: 1 PID: 5735 Comm: syz.3.1699 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 260.030225][ T5735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 260.040121][ T5735] Call Trace: [ 260.043244][ T5735] [ 260.046019][ T5735] dump_stack_lvl+0x151/0x1b7 [ 260.050532][ T5735] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 260.055828][ T5735] dump_stack+0x15/0x1c [ 260.059820][ T5735] should_fail_ex+0x3d0/0x520 [ 260.064333][ T5735] should_fail+0xb/0x10 [ 260.068325][ T5735] should_fail_usercopy+0x1a/0x20 [ 260.073184][ T5735] _copy_to_user+0x1e/0x90 [ 260.077440][ T5735] simple_read_from_buffer+0xc7/0x150 [ 260.082646][ T5735] proc_fail_nth_read+0x1a3/0x210 [ 260.087507][ T5735] ? proc_fault_inject_write+0x390/0x390 [ 260.092973][ T5735] ? fsnotify_perm+0x470/0x5d0 [ 260.097580][ T5735] ? security_file_permission+0x86/0xb0 [ 260.102954][ T5735] ? proc_fault_inject_write+0x390/0x390 [ 260.108423][ T5735] vfs_read+0x26c/0xad0 [ 260.112416][ T5735] ? __kasan_slab_free+0x11/0x20 [ 260.117191][ T5735] ? kernel_read+0x1f0/0x1f0 [ 260.121614][ T5735] ? mutex_lock+0xb1/0x1e0 [ 260.125869][ T5735] ? bit_wait_io_timeout+0x120/0x120 [ 260.131004][ T5735] ? __fdget_pos+0x2e2/0x390 [ 260.135419][ T5735] ? ksys_read+0x77/0x2c0 [ 260.139593][ T5735] ksys_read+0x199/0x2c0 [ 260.143662][ T5735] ? __blkcg_punt_bio_submit+0x180/0x180 [ 260.149129][ T5735] ? vfs_write+0xeb0/0xeb0 [ 260.153382][ T5735] ? fpregs_restore_userregs+0x130/0x290 [ 260.158852][ T5735] __x64_sys_read+0x7b/0x90 [ 260.163193][ T5735] x64_sys_call+0x28/0x9a0 [ 260.167442][ T5735] do_syscall_64+0x3b/0xb0 [ 260.171695][ T5735] ? clear_bhb_loop+0x55/0xb0 [ 260.176216][ T5735] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 260.181938][ T5735] RIP: 0033:0x7fa07cd7c93c [ 260.186193][ T5735] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 260.205634][ T5735] RSP: 002b:00007fa07daf9030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 260.213883][ T5735] RAX: ffffffffffffffda RBX: 00007fa07cf35f80 RCX: 00007fa07cd7c93c [ 260.221688][ T5735] RDX: 000000000000000f RSI: 00007fa07daf90a0 RDI: 0000000000000003 [ 260.229499][ T5735] RBP: 00007fa07daf9090 R08: 0000000000000000 R09: 0000000000000000 [ 260.237313][ T5735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 260.245123][ T5735] R13: 0000000000000000 R14: 00007fa07cf35f80 R15: 00007ffd24a10c78 [ 260.252939][ T5735] [ 260.278141][ T5740] device sit0 left promiscuous mode [ 260.377805][ T28] audit: type=1400 audit(1726228640.057:148): avc: denied { create } for pid=5743 comm="syz.2.1703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 260.454820][ T5740] device sit0 entered promiscuous mode [ 264.052541][ T5859] syz.1.1743[5859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.052613][ T5859] syz.1.1743[5859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.258585][ T5854] device syzkaller0 entered promiscuous mode [ 266.778752][ T5920] device syzkaller0 entered promiscuous mode [ 270.580685][ T6042] device syzkaller0 entered promiscuous mode [ 273.250693][ T6120] FAULT_INJECTION: forcing a failure. [ 273.250693][ T6120] name failslab, interval 1, probability 0, space 0, times 0 [ 273.385667][ T6120] CPU: 1 PID: 6120 Comm: syz.0.1828 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 273.395211][ T6120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 273.405199][ T6120] Call Trace: [ 273.408314][ T6120] [ 273.411102][ T6120] dump_stack_lvl+0x151/0x1b7 [ 273.415613][ T6120] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 273.420902][ T6120] dump_stack+0x15/0x1c [ 273.424891][ T6120] should_fail_ex+0x3d0/0x520 [ 273.429406][ T6120] ? security_file_alloc+0x29/0x120 [ 273.434441][ T6120] __should_failslab+0xaf/0xf0 [ 273.439039][ T6120] should_failslab+0x9/0x20 [ 273.443381][ T6120] kmem_cache_alloc+0x3b/0x2c0 [ 273.447982][ T6120] ? __alloc_file+0x29/0x2a0 [ 273.452408][ T6120] security_file_alloc+0x29/0x120 [ 273.457268][ T6120] __alloc_file+0xb2/0x2a0 [ 273.461522][ T6120] alloc_empty_file+0x95/0x180 [ 273.466122][ T6120] alloc_file+0x5a/0x5e0 [ 273.470201][ T6120] alloc_file_pseudo+0x259/0x2f0 [ 273.474976][ T6120] ? alloc_empty_file_noaccount+0x80/0x80 [ 273.480529][ T6120] anon_inode_getfd+0xde/0x200 [ 273.485129][ T6120] btf_new_fd+0x667/0x800 [ 273.489295][ T6120] bpf_btf_load+0x6f/0x90 [ 273.493458][ T6120] __sys_bpf+0x586/0x7f0 [ 273.497544][ T6120] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 273.503098][ T6120] ? fpregs_restore_userregs+0x130/0x290 [ 273.508563][ T6120] __x64_sys_bpf+0x7c/0x90 [ 273.512814][ T6120] x64_sys_call+0x87f/0x9a0 [ 273.517153][ T6120] do_syscall_64+0x3b/0xb0 [ 273.521405][ T6120] ? clear_bhb_loop+0x55/0xb0 [ 273.525921][ T6120] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 273.531649][ T6120] RIP: 0033:0x7f3e2337def9 [ 273.535902][ T6120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 273.555342][ T6120] RSP: 002b:00007f3e24172038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 273.563589][ T6120] RAX: ffffffffffffffda RBX: 00007f3e23535f80 RCX: 00007f3e2337def9 [ 273.571398][ T6120] RDX: 0000000000000020 RSI: 00000000200003c0 RDI: 0000000000000012 [ 273.579210][ T6120] RBP: 00007f3e24172090 R08: 0000000000000000 R09: 0000000000000000 [ 273.587024][ T6120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 273.594832][ T6120] R13: 0000000000000000 R14: 00007f3e23535f80 R15: 00007fff6a609838 [ 273.602651][ T6120] [ 273.671634][ T6123] device sit0 entered promiscuous mode [ 274.738934][ T6161] device syzkaller0 entered promiscuous mode [ 275.224492][ T28] audit: type=1400 audit(1726228654.897:149): avc: denied { create } for pid=6151 comm="syz.1.1838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 275.580928][ T6192] FAULT_INJECTION: forcing a failure. [ 275.580928][ T6192] name failslab, interval 1, probability 0, space 0, times 0 [ 275.605791][ T6192] CPU: 1 PID: 6192 Comm: syz.0.1849 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 275.615326][ T6192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 275.625221][ T6192] Call Trace: [ 275.628344][ T6192] [ 275.631122][ T6192] dump_stack_lvl+0x151/0x1b7 [ 275.635638][ T6192] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 275.640934][ T6192] ? debug_smp_processor_id+0x17/0x20 [ 275.646137][ T6192] ? get_perf_callchain+0x5cb/0x810 [ 275.651172][ T6192] dump_stack+0x15/0x1c [ 275.655163][ T6192] should_fail_ex+0x3d0/0x520 [ 275.659679][ T6192] ? __get_vm_area_node+0x129/0x370 [ 275.664713][ T6192] __should_failslab+0xaf/0xf0 [ 275.669313][ T6192] should_failslab+0x9/0x20 [ 275.673650][ T6192] __kmem_cache_alloc_node+0x3d/0x250 [ 275.678861][ T6192] ? __get_vm_area_node+0x129/0x370 [ 275.683892][ T6192] kmalloc_node_trace+0x26/0xb0 [ 275.688580][ T6192] __get_vm_area_node+0x129/0x370 [ 275.693442][ T6192] __vmalloc_node_range+0x36e/0x1540 [ 275.698559][ T6192] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 275.703947][ T6192] ? avc_denied+0x1b0/0x1b0 [ 275.708283][ T6192] ? selinux_capable+0x2f1/0x430 [ 275.713051][ T6192] ? vmap+0x2b0/0x2b0 [ 275.716874][ T6192] ? irqentry_exit+0x30/0x40 [ 275.721298][ T6192] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 275.726940][ T6192] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 275.732319][ T6192] __vmalloc+0x7a/0x90 [ 275.736228][ T6192] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 275.741615][ T6192] bpf_prog_alloc_no_stats+0x3e/0x400 [ 275.746819][ T6192] bpf_prog_alloc+0x22/0x1c0 [ 275.751242][ T6192] bpf_prog_load+0x84a/0x1bf0 [ 275.755760][ T6192] ? map_freeze+0x3a0/0x3a0 [ 275.760100][ T6192] ? selinux_bpf+0xcb/0x100 [ 275.764437][ T6192] ? security_bpf+0x82/0xb0 [ 275.768775][ T6192] __sys_bpf+0x52c/0x7f0 [ 275.772858][ T6192] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 275.778066][ T6192] ? __ia32_sys_read+0x90/0x90 [ 275.782662][ T6192] ? debug_smp_processor_id+0x17/0x20 [ 275.787869][ T6192] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 275.793772][ T6192] __x64_sys_bpf+0x7c/0x90 [ 275.798024][ T6192] x64_sys_call+0x87f/0x9a0 [ 275.802745][ T6192] do_syscall_64+0x3b/0xb0 [ 275.806996][ T6192] ? clear_bhb_loop+0x55/0xb0 [ 275.811518][ T6192] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 275.817239][ T6192] RIP: 0033:0x7f3e2337def9 [ 275.821493][ T6192] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 275.840938][ T6192] RSP: 002b:00007f3e24172038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 275.849178][ T6192] RAX: ffffffffffffffda RBX: 00007f3e23535f80 RCX: 00007f3e2337def9 [ 275.856993][ T6192] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 275.864802][ T6192] RBP: 00007f3e24172090 R08: 0000000000000000 R09: 0000000000000000 [ 275.872614][ T6192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 275.880424][ T6192] R13: 0000000000000000 R14: 00007f3e23535f80 R15: 00007fff6a609838 [ 275.888241][ T6192] [ 275.898224][ T6192] syz.0.1849: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 275.916252][ T6192] CPU: 0 PID: 6192 Comm: syz.0.1849 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 275.925782][ T6192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 275.935673][ T6192] Call Trace: [ 275.938795][ T6192] [ 275.941575][ T6192] dump_stack_lvl+0x151/0x1b7 [ 275.946088][ T6192] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 275.951383][ T6192] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 275.957024][ T6192] dump_stack+0x15/0x1c [ 275.961021][ T6192] warn_alloc+0x21a/0x3a0 [ 275.965181][ T6192] ? should_failslab+0x9/0x20 [ 275.969696][ T6192] ? zone_watermark_ok_safe+0x270/0x270 [ 275.975078][ T6192] ? kmalloc_node_trace+0x3d/0xb0 [ 275.979942][ T6192] ? __get_vm_area_node+0x361/0x370 [ 275.984970][ T6192] __vmalloc_node_range+0x392/0x1540 [ 275.990093][ T6192] ? avc_denied+0x1b0/0x1b0 [ 275.994433][ T6192] ? selinux_capable+0x2f1/0x430 [ 275.999205][ T6192] ? vmap+0x2b0/0x2b0 [ 276.003026][ T6192] ? irqentry_exit+0x30/0x40 [ 276.007454][ T6192] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 276.013090][ T6192] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 276.018471][ T6192] __vmalloc+0x7a/0x90 [ 276.022382][ T6192] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 276.027761][ T6192] bpf_prog_alloc_no_stats+0x3e/0x400 [ 276.032969][ T6192] bpf_prog_alloc+0x22/0x1c0 [ 276.037395][ T6192] bpf_prog_load+0x84a/0x1bf0 [ 276.041913][ T6192] ? map_freeze+0x3a0/0x3a0 [ 276.046249][ T6192] ? selinux_bpf+0xcb/0x100 [ 276.050586][ T6192] ? security_bpf+0x82/0xb0 [ 276.054926][ T6192] __sys_bpf+0x52c/0x7f0 [ 276.059006][ T6192] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 276.064214][ T6192] ? __ia32_sys_read+0x90/0x90 [ 276.068815][ T6192] ? debug_smp_processor_id+0x17/0x20 [ 276.074020][ T6192] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 276.079923][ T6192] __x64_sys_bpf+0x7c/0x90 [ 276.084175][ T6192] x64_sys_call+0x87f/0x9a0 [ 276.088524][ T6192] do_syscall_64+0x3b/0xb0 [ 276.092768][ T6192] ? clear_bhb_loop+0x55/0xb0 [ 276.097281][ T6192] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 276.103009][ T6192] RIP: 0033:0x7f3e2337def9 [ 276.107264][ T6192] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 276.126703][ T6192] RSP: 002b:00007f3e24172038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 276.134956][ T6192] RAX: ffffffffffffffda RBX: 00007f3e23535f80 RCX: 00007f3e2337def9 [ 276.142761][ T6192] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 276.150571][ T6192] RBP: 00007f3e24172090 R08: 0000000000000000 R09: 0000000000000000 [ 276.158381][ T6192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 276.166195][ T6192] R13: 0000000000000000 R14: 00007f3e23535f80 R15: 00007fff6a609838 [ 276.174018][ T6192] [ 276.216412][ T6192] Mem-Info: [ 276.219774][ T6192] active_anon:12711 inactive_anon:0 isolated_anon:0 [ 276.219774][ T6192] active_file:21389 inactive_file:2009 isolated_file:0 [ 276.219774][ T6192] unevictable:0 dirty:135 writeback:0 [ 276.219774][ T6192] slab_reclaimable:6789 slab_unreclaimable:75692 [ 276.219774][ T6192] mapped:21179 shmem:245 pagetables:554 [ 276.219774][ T6192] sec_pagetables:0 bounce:0 [ 276.219774][ T6192] kernel_misc_reclaimable:0 [ 276.219774][ T6192] free:1522174 free_pcp:13419 free_cma:0 [ 276.501604][ T6192] Node 0 active_anon:50844kB inactive_anon:0kB active_file:85556kB inactive_file:8036kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:84716kB dirty:540kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4356kB pagetables:2216kB sec_pagetables:0kB all_unreclaimable? no [ 276.554141][ T6192] DMA32 free:2966484kB boost:0kB min:62552kB low:78188kB high:93824kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2971580kB mlocked:0kB bounce:0kB free_pcp:5096kB local_pcp:5096kB free_cma:0kB [ 276.796980][ T6192] lowmem_reserve[]: 0 3932 3932 3932 [ 276.806787][ T6192] Normal free:3122084kB boost:0kB min:84900kB low:106124kB high:127348kB reserved_highatomic:0KB active_anon:50144kB inactive_anon:0kB active_file:85556kB inactive_file:8036kB unevictable:0kB writepending:540kB present:5242880kB managed:4026400kB mlocked:0kB bounce:0kB free_pcp:50376kB local_pcp:15312kB free_cma:0kB [ 276.907495][ T6192] lowmem_reserve[]: 0 0 0 0 [ 276.950788][ T6192] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 722*4096kB (M) = 2966484kB [ 277.071332][ T6216] device syzkaller0 entered promiscuous mode [ 277.143655][ T6192] Normal: 1633*4kB (ME) 1068*8kB (ME) 1188*16kB (UME) 560*32kB (UME) 299*64kB (UME) 155*128kB (UME) 18*256kB (UME) 7*512kB (UME) 0*1024kB 6*2048kB (UM) 672*4096kB (M) = 2863972kB [ 277.364536][ T6192] 23589 total pagecache pages [ 277.375701][ T6192] 0 pages in swap cache [ 277.379669][ T6192] Free swap = 124996kB [ 277.383709][ T6192] Total swap = 124996kB [ 277.447311][ T6192] 2097051 pages RAM [ 277.450941][ T6192] 0 pages HighMem/MovableOnly [ 277.579786][ T6192] 347556 pages reserved [ 277.583765][ T6192] 0 pages cma reserved [ 279.180786][ T6260] device syzkaller0 entered promiscuous mode [ 281.185415][ T6309] device syzkaller0 entered promiscuous mode [ 281.393900][ T6306] device sit0 left promiscuous mode [ 286.462872][ T6447] device syzkaller0 entered promiscuous mode [ 287.576514][ T6461] device syzkaller0 entered promiscuous mode [ 288.950570][ T6517] FAULT_INJECTION: forcing a failure. [ 288.950570][ T6517] name failslab, interval 1, probability 0, space 0, times 0 [ 289.274050][ T6517] CPU: 0 PID: 6517 Comm: syz.4.1949 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 289.283598][ T6517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 289.293490][ T6517] Call Trace: [ 289.296614][ T6517] [ 289.299392][ T6517] dump_stack_lvl+0x151/0x1b7 [ 289.303903][ T6517] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 289.309201][ T6517] dump_stack+0x15/0x1c [ 289.313199][ T6517] should_fail_ex+0x3d0/0x520 [ 289.317707][ T6517] ? __alloc_file+0x29/0x2a0 [ 289.322134][ T6517] __should_failslab+0xaf/0xf0 [ 289.326733][ T6517] should_failslab+0x9/0x20 [ 289.331070][ T6517] kmem_cache_alloc+0x3b/0x2c0 [ 289.335672][ T6517] ? _raw_spin_trylock_bh+0x190/0x190 [ 289.340880][ T6517] __alloc_file+0x29/0x2a0 [ 289.345132][ T6517] alloc_empty_file+0x95/0x180 [ 289.349735][ T6517] alloc_file+0x5a/0x5e0 [ 289.353812][ T6517] alloc_file_pseudo+0x259/0x2f0 [ 289.358588][ T6517] ? alloc_empty_file_noaccount+0x80/0x80 [ 289.364142][ T6517] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 289.369000][ T6517] anon_inode_getfile+0xa7/0x180 [ 289.373778][ T6517] bpf_link_prime+0xed/0x250 [ 289.378289][ T6517] bpf_raw_tp_link_attach+0x2e6/0x6b0 [ 289.383499][ T6517] ? bpf_insn_prepare_dump+0x950/0x950 [ 289.388794][ T6517] ? __kasan_check_write+0x14/0x20 [ 289.393734][ T6517] ? fput+0x15b/0x1b0 [ 289.397560][ T6517] bpf_raw_tracepoint_open+0x22d/0x4a0 [ 289.402849][ T6517] ? bpf_obj_get_info_by_fd+0x3e60/0x3e60 [ 289.408406][ T6517] ? security_bpf+0x46/0xb0 [ 289.412746][ T6517] ? security_bpf+0x82/0xb0 [ 289.417090][ T6517] __sys_bpf+0x4f5/0x7f0 [ 289.421162][ T6517] ? clockevents_program_event+0x22f/0x300 [ 289.426803][ T6517] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 289.432014][ T6517] ? __sched_clock_gtod_offset+0x100/0x100 [ 289.437656][ T6517] ? debug_smp_processor_id+0x17/0x20 [ 289.442860][ T6517] __x64_sys_bpf+0x7c/0x90 [ 289.447114][ T6517] x64_sys_call+0x87f/0x9a0 [ 289.451451][ T6517] do_syscall_64+0x3b/0xb0 [ 289.455709][ T6517] ? clear_bhb_loop+0x55/0xb0 [ 289.460220][ T6517] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 289.465945][ T6517] RIP: 0033:0x7efca657def9 [ 289.470201][ T6517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 289.489644][ T6517] RSP: 002b:00007efca733f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 289.497889][ T6517] RAX: ffffffffffffffda RBX: 00007efca6735f80 RCX: 00007efca657def9 [ 289.505699][ T6517] RDX: 0000000000000010 RSI: 0000000020000080 RDI: 0000000000000011 [ 289.513513][ T6517] RBP: 00007efca733f090 R08: 0000000000000000 R09: 0000000000000000 [ 289.521323][ T6517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 289.529135][ T6517] R13: 0000000000000000 R14: 00007efca6735f80 R15: 00007fff2f086f98 [ 289.536950][ T6517] [ 290.242250][ T6547] FAULT_INJECTION: forcing a failure. [ 290.242250][ T6547] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 290.436031][ T6547] CPU: 1 PID: 6547 Comm: syz.4.1959 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 290.445575][ T6547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 290.455470][ T6547] Call Trace: [ 290.458595][ T6547] [ 290.461372][ T6547] dump_stack_lvl+0x151/0x1b7 [ 290.465885][ T6547] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 290.471183][ T6547] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 290.477170][ T6547] dump_stack+0x15/0x1c [ 290.481163][ T6547] should_fail_ex+0x3d0/0x520 [ 290.485676][ T6547] should_fail+0xb/0x10 [ 290.489668][ T6547] should_fail_usercopy+0x1a/0x20 [ 290.494528][ T6547] _copy_from_user+0x1e/0xc0 [ 290.498955][ T6547] generic_map_update_batch+0x54c/0x8c0 [ 290.504339][ T6547] ? generic_map_delete_batch+0x5c0/0x5c0 [ 290.509889][ T6547] ? generic_map_delete_batch+0x5c0/0x5c0 [ 290.515450][ T6547] ? bpf_map_do_batch+0x37c/0x630 [ 290.520305][ T6547] ? generic_map_delete_batch+0x5c0/0x5c0 [ 290.525891][ T6547] bpf_map_do_batch+0x4cc/0x630 [ 290.530552][ T6547] __sys_bpf+0x66b/0x7f0 [ 290.534713][ T6547] ? clockevents_program_event+0x22f/0x300 [ 290.540356][ T6547] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 290.545566][ T6547] ? __sched_clock_gtod_offset+0x100/0x100 [ 290.551207][ T6547] ? debug_smp_processor_id+0x17/0x20 [ 290.556415][ T6547] __x64_sys_bpf+0x7c/0x90 [ 290.560668][ T6547] x64_sys_call+0x87f/0x9a0 [ 290.565002][ T6547] do_syscall_64+0x3b/0xb0 [ 290.569258][ T6547] ? clear_bhb_loop+0x55/0xb0 [ 290.573771][ T6547] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 290.579498][ T6547] RIP: 0033:0x7efca657def9 [ 290.583758][ T6547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 290.603194][ T6547] RSP: 002b:00007efca733f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 290.611439][ T6547] RAX: ffffffffffffffda RBX: 00007efca6735f80 RCX: 00007efca657def9 [ 290.619251][ T6547] RDX: 0000000000000038 RSI: 00000000200006c0 RDI: 000000000000001a [ 290.627063][ T6547] RBP: 00007efca733f090 R08: 0000000000000000 R09: 0000000000000000 [ 290.634872][ T6547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 290.642683][ T6547] R13: 0000000000000000 R14: 00007efca6735f80 R15: 00007fff2f086f98 [ 290.650500][ T6547] [ 291.425609][ T6585] device wg2 entered promiscuous mode [ 293.066438][ T6639] FAULT_INJECTION: forcing a failure. [ 293.066438][ T6639] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 293.346336][ T6639] CPU: 1 PID: 6639 Comm: syz.2.1988 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 293.355884][ T6639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 293.365778][ T6639] Call Trace: [ 293.368903][ T6639] [ 293.371681][ T6639] dump_stack_lvl+0x151/0x1b7 [ 293.376194][ T6639] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 293.381489][ T6639] ? do_filp_open+0x230/0x480 [ 293.385999][ T6639] ? __x64_sys_openat+0x243/0x290 [ 293.390863][ T6639] ? x64_sys_call+0x6bf/0x9a0 [ 293.395375][ T6639] ? do_syscall_64+0x3b/0xb0 [ 293.399808][ T6639] dump_stack+0x15/0x1c [ 293.403794][ T6639] should_fail_ex+0x3d0/0x520 [ 293.408315][ T6639] should_fail_alloc_page+0x68/0x90 [ 293.413346][ T6639] __alloc_pages+0x1f4/0x780 [ 293.417770][ T6639] ? prep_new_page+0x110/0x110 [ 293.422367][ T6639] ? __kasan_check_write+0x14/0x20 [ 293.427318][ T6639] ? lockref_get+0x200/0x290 [ 293.431748][ T6639] __get_free_pages+0xe/0x30 [ 293.436166][ T6639] selinux_genfs_get_sid+0x56/0x2a0 [ 293.441205][ T6639] inode_doinit_with_dentry+0x8d2/0x1070 [ 293.446528][ T6649] FAULT_INJECTION: forcing a failure. [ 293.446528][ T6649] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 293.446669][ T6639] ? sb_finish_set_opts+0xa90/0xa90 [ 293.446692][ T6639] ? atime_needs_update+0x810/0x810 [ 293.446713][ T6639] selinux_d_instantiate+0x27/0x40 [ 293.474538][ T6639] security_d_instantiate+0x9f/0x100 [ 293.479652][ T6639] d_splice_alias+0x6d/0x390 [ 293.484082][ T6639] kernfs_iop_lookup+0x29e/0x2f0 [ 293.488859][ T6639] ? kernfs_dop_revalidate+0x550/0x550 [ 293.494145][ T6639] path_openat+0x10fd/0x2d60 [ 293.498578][ T6639] ? do_filp_open+0x480/0x480 [ 293.503094][ T6639] do_filp_open+0x230/0x480 [ 293.507428][ T6639] ? vfs_tmpfile+0x480/0x480 [ 293.511857][ T6639] ? alloc_fd+0x4fa/0x5a0 [ 293.516024][ T6639] do_sys_openat2+0x151/0x890 [ 293.520530][ T6639] ? bit_wait_io_timeout+0x120/0x120 [ 293.525652][ T6639] ? __mutex_lock_slowpath+0x10/0x10 [ 293.530773][ T6639] ? do_sys_open+0x220/0x220 [ 293.535198][ T6639] ? fput+0x15b/0x1b0 [ 293.539016][ T6639] ? ksys_write+0x260/0x2c0 [ 293.543356][ T6639] __x64_sys_openat+0x243/0x290 [ 293.548050][ T6639] ? __ia32_sys_open+0x270/0x270 [ 293.552819][ T6639] ? debug_smp_processor_id+0x17/0x20 [ 293.558028][ T6639] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 293.563927][ T6639] ? exit_to_user_mode_prepare+0x39/0xa0 [ 293.569396][ T6639] x64_sys_call+0x6bf/0x9a0 [ 293.573735][ T6639] do_syscall_64+0x3b/0xb0 [ 293.577994][ T6639] ? clear_bhb_loop+0x55/0xb0 [ 293.582500][ T6639] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 293.588228][ T6639] RIP: 0033:0x7f0f06f7def9 [ 293.592480][ T6639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 293.611921][ T6639] RSP: 002b:00007f0f06dff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 293.620167][ T6639] RAX: ffffffffffffffda RBX: 00007f0f07135f80 RCX: 00007f0f06f7def9 [ 293.627980][ T6639] RDX: 0000000000000002 RSI: 0000000020000280 RDI: 0000000000000008 [ 293.635790][ T6639] RBP: 00007f0f06dff090 R08: 0000000000000000 R09: 0000000000000000 [ 293.643601][ T6639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 293.651503][ T6639] R13: 0000000000000000 R14: 00007f0f07135f80 R15: 00007ffe0af22cf8 [ 293.659321][ T6639] [ 293.693237][ T6649] CPU: 1 PID: 6649 Comm: syz.0.1990 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 293.702769][ T6649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 293.712662][ T6649] Call Trace: [ 293.715787][ T6649] [ 293.718566][ T6649] dump_stack_lvl+0x151/0x1b7 [ 293.723079][ T6649] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 293.728371][ T6649] ? perf_swevent_hrtimer+0x449/0x4f0 [ 293.733581][ T6649] dump_stack+0x15/0x1c [ 293.737573][ T6649] should_fail_ex+0x3d0/0x520 [ 293.742088][ T6649] should_fail+0xb/0x10 [ 293.746078][ T6649] should_fail_usercopy+0x1a/0x20 [ 293.750938][ T6649] _copy_to_user+0x1e/0x90 [ 293.755191][ T6649] simple_read_from_buffer+0xc7/0x150 [ 293.760403][ T6649] proc_fail_nth_read+0x1a3/0x210 [ 293.765266][ T6649] ? proc_fault_inject_write+0x390/0x390 [ 293.770728][ T6649] ? fsnotify_perm+0x470/0x5d0 [ 293.775330][ T6649] ? security_file_permission+0x86/0xb0 [ 293.780706][ T6649] ? proc_fault_inject_write+0x390/0x390 [ 293.786178][ T6649] vfs_read+0x26c/0xad0 [ 293.790172][ T6649] ? kernel_read+0x1f0/0x1f0 [ 293.794596][ T6649] ? mutex_lock+0xb1/0x1e0 [ 293.798849][ T6649] ? bit_wait_io_timeout+0x120/0x120 [ 293.803971][ T6649] ? __fdget_pos+0x2e2/0x390 [ 293.808484][ T6649] ? ksys_read+0x77/0x2c0 [ 293.812648][ T6649] ksys_read+0x199/0x2c0 [ 293.816731][ T6649] ? vfs_write+0xeb0/0xeb0 [ 293.820980][ T6649] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 293.826971][ T6649] __x64_sys_read+0x7b/0x90 [ 293.831313][ T6649] x64_sys_call+0x28/0x9a0 [ 293.835563][ T6649] do_syscall_64+0x3b/0xb0 [ 293.839816][ T6649] ? clear_bhb_loop+0x55/0xb0 [ 293.844328][ T6649] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 293.850057][ T6649] RIP: 0033:0x7f3e2337c93c [ 293.854314][ T6649] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 293.873750][ T6649] RSP: 002b:00007f3e24172030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 293.881995][ T6649] RAX: ffffffffffffffda RBX: 00007f3e23535f80 RCX: 00007f3e2337c93c [ 293.889808][ T6649] RDX: 000000000000000f RSI: 00007f3e241720a0 RDI: 0000000000000008 [ 293.897620][ T6649] RBP: 00007f3e24172090 R08: 0000000000000000 R09: 0000000000000000 [ 293.905430][ T6649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 293.913241][ T6649] R13: 0000000000000000 R14: 00007f3e23535f80 R15: 00007fff6a609838 [ 293.921061][ T6649] [ 293.928023][ T28] audit: type=1400 audit(1726228673.607:150): avc: denied { unlink } for pid=84 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 294.020835][ T6644] device syzkaller0 entered promiscuous mode [ 295.572920][ T6705] device sit0 entered promiscuous mode [ 297.422000][ T6749] device syzkaller0 entered promiscuous mode [ 297.538570][ T6754] device syzkaller0 entered promiscuous mode [ 297.809081][ T6766] device veth0_vlan left promiscuous mode [ 297.880729][ T6766] device veth0_vlan entered promiscuous mode [ 297.999068][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 298.014227][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 298.107982][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 298.351324][ T6770] device syzkaller0 entered promiscuous mode [ 298.361105][ T6781] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.369026][ T6781] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.388756][ T6781] device bridge0 left promiscuous mode [ 298.813564][ T6801] device veth1_macvtap entered promiscuous mode [ 298.834235][ T6801] device macsec0 entered promiscuous mode [ 298.844084][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 305.196639][ T6965] FAULT_INJECTION: forcing a failure. [ 305.196639][ T6965] name failslab, interval 1, probability 0, space 0, times 0 [ 305.264811][ T6965] CPU: 1 PID: 6965 Comm: syz.4.2087 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 305.274351][ T6965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 305.284245][ T6965] Call Trace: [ 305.287369][ T6965] [ 305.290151][ T6965] dump_stack_lvl+0x151/0x1b7 [ 305.294661][ T6965] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 305.299958][ T6965] dump_stack+0x15/0x1c [ 305.303948][ T6965] should_fail_ex+0x3d0/0x520 [ 305.308461][ T6965] ? security_file_alloc+0x29/0x120 [ 305.313498][ T6965] __should_failslab+0xaf/0xf0 [ 305.318097][ T6965] should_failslab+0x9/0x20 [ 305.322435][ T6965] kmem_cache_alloc+0x3b/0x2c0 [ 305.327033][ T6965] ? __alloc_file+0x29/0x2a0 [ 305.331464][ T6965] security_file_alloc+0x29/0x120 [ 305.336322][ T6965] __alloc_file+0xb2/0x2a0 [ 305.340576][ T6965] alloc_empty_file+0x95/0x180 [ 305.345178][ T6965] alloc_file+0x5a/0x5e0 [ 305.349256][ T6965] alloc_file_pseudo+0x259/0x2f0 [ 305.354028][ T6965] ? alloc_empty_file_noaccount+0x80/0x80 [ 305.359585][ T6965] ? tipc_sk_finish_conn+0x5ac/0x860 [ 305.364707][ T6965] sock_alloc_file+0xbb/0x260 [ 305.369219][ T6965] __sys_socketpair+0x405/0x6e0 [ 305.373904][ T6965] ? __ia32_sys_socket+0x90/0x90 [ 305.378677][ T6965] ? __ia32_sys_read+0x90/0x90 [ 305.383279][ T6965] ? debug_smp_processor_id+0x17/0x20 [ 305.388484][ T6965] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 305.394820][ T6965] __x64_sys_socketpair+0x9b/0xb0 [ 305.399683][ T6965] x64_sys_call+0x19b/0x9a0 [ 305.404021][ T6965] do_syscall_64+0x3b/0xb0 [ 305.408273][ T6965] ? clear_bhb_loop+0x55/0xb0 [ 305.412786][ T6965] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 305.418515][ T6965] RIP: 0033:0x7efca657def9 [ 305.422770][ T6965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 305.442211][ T6965] RSP: 002b:00007efca733f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 305.450456][ T6965] RAX: ffffffffffffffda RBX: 00007efca6735f80 RCX: 00007efca657def9 [ 305.458266][ T6965] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 305.466078][ T6965] RBP: 00007efca733f090 R08: 0000000000000000 R09: 0000000000000000 [ 305.473887][ T6965] R10: 0000000020000940 R11: 0000000000000246 R12: 0000000000000002 [ 305.481700][ T6965] R13: 0000000000000000 R14: 00007efca6735f80 R15: 00007fff2f086f98 [ 305.489515][ T6965] [ 308.308564][ T7032] device syzkaller0 entered promiscuous mode [ 308.405246][ T7053] syz.2.2115[7053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.405316][ T7053] syz.2.2115[7053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.869267][ T7045] device syzkaller0 entered promiscuous mode [ 309.946923][ T7071] FAULT_INJECTION: forcing a failure. [ 309.946923][ T7071] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 310.034904][ T7071] CPU: 1 PID: 7071 Comm: syz.4.2120 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 310.044461][ T7071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 310.054346][ T7071] Call Trace: [ 310.057468][ T7071] [ 310.060243][ T7071] dump_stack_lvl+0x151/0x1b7 [ 310.064763][ T7071] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 310.070054][ T7071] dump_stack+0x15/0x1c [ 310.074044][ T7071] should_fail_ex+0x3d0/0x520 [ 310.078559][ T7071] should_fail+0xb/0x10 [ 310.082550][ T7071] should_fail_usercopy+0x1a/0x20 [ 310.087414][ T7071] _copy_from_iter+0x18d/0xe00 [ 310.092011][ T7071] ? __alloc_pages+0x3a1/0x780 [ 310.096612][ T7071] ? copyout_mc+0x80/0x80 [ 310.100781][ T7071] ? __kasan_check_write+0x14/0x20 [ 310.105725][ T7071] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 310.110672][ T7071] ? _raw_spin_lock_irqsave+0x210/0x210 [ 310.116060][ T7071] copy_page_from_iter+0x1d7/0x2b0 [ 310.121002][ T7071] pipe_write+0x7c1/0x1990 [ 310.125270][ T7071] ? pipe_read+0x1040/0x1040 [ 310.129680][ T7071] ? selinux_file_permission+0x440/0x560 [ 310.135147][ T7071] ? fsnotify_perm+0x6a/0x5d0 [ 310.139664][ T7071] vfs_write+0x902/0xeb0 [ 310.143748][ T7071] ? __kasan_slab_free+0x11/0x20 [ 310.148519][ T7071] ? file_end_write+0x1c0/0x1c0 [ 310.153408][ T7071] ? __fget_files+0x2cb/0x330 [ 310.157929][ T7071] ? __fdget_pos+0x204/0x390 [ 310.162341][ T7071] ? ksys_write+0x77/0x2c0 [ 310.166599][ T7071] ksys_write+0x199/0x2c0 [ 310.170764][ T7071] ? __ia32_sys_read+0x90/0x90 [ 310.175362][ T7071] ? debug_smp_processor_id+0x17/0x20 [ 310.180568][ T7071] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 310.186472][ T7071] __x64_sys_write+0x7b/0x90 [ 310.190899][ T7071] x64_sys_call+0x2f/0x9a0 [ 310.195149][ T7071] do_syscall_64+0x3b/0xb0 [ 310.199401][ T7071] ? clear_bhb_loop+0x55/0xb0 [ 310.203916][ T7071] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 310.209643][ T7071] RIP: 0033:0x7efca657def9 [ 310.213896][ T7071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 310.233340][ T7071] RSP: 002b:00007efca733f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 310.241587][ T7071] RAX: ffffffffffffffda RBX: 00007efca6735f80 RCX: 00007efca657def9 [ 310.249397][ T7071] RDX: 00000000fffffdef RSI: 00000000200001c0 RDI: 0000000000000000 [ 310.257208][ T7071] RBP: 00007efca733f090 R08: 0000000000000000 R09: 0000000000000000 [ 310.265017][ T7071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 310.272826][ T7071] R13: 0000000000000000 R14: 00007efca6735f80 R15: 00007fff2f086f98 [ 310.280643][ T7071] [ 310.846141][ T7098] device veth1_macvtap left promiscuous mode [ 310.904972][ T7098] device macsec0 left promiscuous mode [ 311.087806][ T7104] FAULT_INJECTION: forcing a failure. [ 311.087806][ T7104] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 311.286734][ T7104] CPU: 0 PID: 7104 Comm: syz.1.2131 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 311.296280][ T7104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 311.306176][ T7104] Call Trace: [ 311.309298][ T7104] [ 311.312075][ T7104] dump_stack_lvl+0x151/0x1b7 [ 311.316589][ T7104] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 311.321887][ T7104] dump_stack+0x15/0x1c [ 311.325876][ T7104] should_fail_ex+0x3d0/0x520 [ 311.330389][ T7104] should_fail+0xb/0x10 [ 311.334382][ T7104] should_fail_usercopy+0x1a/0x20 [ 311.339242][ T7104] _copy_from_iter+0x18d/0xe00 [ 311.343844][ T7104] ? __alloc_pages+0x3a1/0x780 [ 311.348442][ T7104] ? copyout_mc+0x80/0x80 [ 311.352610][ T7104] ? __kasan_check_write+0x14/0x20 [ 311.357557][ T7104] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 311.362501][ T7104] ? _raw_spin_lock_irqsave+0x210/0x210 [ 311.367887][ T7104] copy_page_from_iter+0x1d7/0x2b0 [ 311.372832][ T7104] pipe_write+0x7c1/0x1990 [ 311.377090][ T7104] ? pipe_read+0x1040/0x1040 [ 311.381514][ T7104] ? selinux_file_permission+0x440/0x560 [ 311.386977][ T7104] ? fsnotify_perm+0x6a/0x5d0 [ 311.391494][ T7104] vfs_write+0x902/0xeb0 [ 311.395571][ T7104] ? __kasan_slab_free+0x11/0x20 [ 311.400347][ T7104] ? file_end_write+0x1c0/0x1c0 [ 311.405031][ T7104] ? __fget_files+0x2cb/0x330 [ 311.409547][ T7104] ? __fdget_pos+0x204/0x390 [ 311.413970][ T7104] ? ksys_write+0x77/0x2c0 [ 311.418225][ T7104] ksys_write+0x199/0x2c0 [ 311.422392][ T7104] ? __ia32_sys_read+0x90/0x90 [ 311.426990][ T7104] ? debug_smp_processor_id+0x17/0x20 [ 311.432197][ T7104] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 311.438101][ T7104] __x64_sys_write+0x7b/0x90 [ 311.442526][ T7104] x64_sys_call+0x2f/0x9a0 [ 311.446779][ T7104] do_syscall_64+0x3b/0xb0 [ 311.451031][ T7104] ? clear_bhb_loop+0x55/0xb0 [ 311.455544][ T7104] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 311.461272][ T7104] RIP: 0033:0x7fb1ddd7def9 [ 311.465525][ T7104] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 311.484969][ T7104] RSP: 002b:00007fb1dec12038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 311.493214][ T7104] RAX: ffffffffffffffda RBX: 00007fb1ddf35f80 RCX: 00007fb1ddd7def9 [ 311.501023][ T7104] RDX: 00000000fffffdef RSI: 00000000200001c0 RDI: 0000000000000000 [ 311.508837][ T7104] RBP: 00007fb1dec12090 R08: 0000000000000000 R09: 0000000000000000 [ 311.516649][ T7104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 311.524457][ T7104] R13: 0000000000000000 R14: 00007fb1ddf35f80 R15: 00007fffe0a15748 [ 311.532273][ T7104] [ 317.830370][ T7201] device syzkaller0 entered promiscuous mode [ 319.277759][ T7217] device syzkaller0 entered promiscuous mode [ 322.251055][ T7291] device sit0 entered promiscuous mode [ 325.045885][ T7361] device syzkaller0 entered promiscuous mode [ 325.158228][ T7362] device syzkaller0 entered promiscuous mode [ 329.208617][ T7476] syz.0.2246[7476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.208705][ T7476] syz.0.2246[7476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.673452][ T7518] device syzkaller0 entered promiscuous mode [ 331.977993][ T28] audit: type=1400 audit(1726228711.657:151): avc: denied { create } for pid=7549 comm="syz.2.2271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 333.365944][ T7587] FAULT_INJECTION: forcing a failure. [ 333.365944][ T7587] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 333.455044][ T7587] CPU: 1 PID: 7587 Comm: syz.3.2282 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 333.464587][ T7587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 333.474485][ T7587] Call Trace: [ 333.477604][ T7587] [ 333.480381][ T7587] dump_stack_lvl+0x151/0x1b7 [ 333.484893][ T7587] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 333.490185][ T7587] ? migrate_enable+0x1cb/0x2b0 [ 333.494874][ T7587] dump_stack+0x15/0x1c [ 333.498864][ T7587] should_fail_ex+0x3d0/0x520 [ 333.503379][ T7587] should_fail+0xb/0x10 [ 333.507370][ T7587] should_fail_usercopy+0x1a/0x20 [ 333.512229][ T7587] _copy_to_user+0x1e/0x90 [ 333.516483][ T7587] generic_map_lookup_batch+0x778/0xcc0 [ 333.521871][ T7587] ? bpf_map_update_value+0x410/0x410 [ 333.527073][ T7587] ? __fdget+0x1b7/0x240 [ 333.531155][ T7587] ? bpf_map_update_value+0x410/0x410 [ 333.536360][ T7587] bpf_map_do_batch+0x2e2/0x630 [ 333.541046][ T7587] __sys_bpf+0x66b/0x7f0 [ 333.545125][ T7587] ? clockevents_program_event+0x22f/0x300 [ 333.550767][ T7587] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 333.555975][ T7587] ? __sched_clock_gtod_offset+0x100/0x100 [ 333.561615][ T7587] ? debug_smp_processor_id+0x17/0x20 [ 333.566823][ T7587] __x64_sys_bpf+0x7c/0x90 [ 333.571078][ T7587] x64_sys_call+0x87f/0x9a0 [ 333.575414][ T7587] do_syscall_64+0x3b/0xb0 [ 333.579666][ T7587] ? clear_bhb_loop+0x55/0xb0 [ 333.584183][ T7587] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 333.589910][ T7587] RIP: 0033:0x7fa07cd7def9 [ 333.594169][ T7587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 333.613604][ T7587] RSP: 002b:00007fa07daf9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 333.621849][ T7587] RAX: ffffffffffffffda RBX: 00007fa07cf35f80 RCX: 00007fa07cd7def9 [ 333.629661][ T7587] RDX: 0000000000000038 RSI: 00000000200004c0 RDI: 0000000000000018 [ 333.637471][ T7587] RBP: 00007fa07daf9090 R08: 0000000000000000 R09: 0000000000000000 [ 333.645283][ T7587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 333.653094][ T7587] R13: 0000000000000000 R14: 00007fa07cf35f80 R15: 00007ffd24a10c78 [ 333.660910][ T7587] [ 334.160587][ T7584] device syzkaller0 entered promiscuous mode [ 337.826765][ T7674] FAULT_INJECTION: forcing a failure. [ 337.826765][ T7674] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 337.870814][ T7674] CPU: 0 PID: 7674 Comm: syz.4.2309 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 337.880365][ T7674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 337.890259][ T7674] Call Trace: [ 337.893382][ T7674] [ 337.896680][ T7674] dump_stack_lvl+0x151/0x1b7 [ 337.901282][ T7674] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 337.906573][ T7674] ? migrate_enable+0x1cb/0x2b0 [ 337.911261][ T7674] dump_stack+0x15/0x1c [ 337.915253][ T7674] should_fail_ex+0x3d0/0x520 [ 337.919770][ T7674] should_fail+0xb/0x10 [ 337.923759][ T7674] should_fail_usercopy+0x1a/0x20 [ 337.928619][ T7674] _copy_to_user+0x1e/0x90 [ 337.932871][ T7674] generic_map_lookup_batch+0x6ff/0xcc0 [ 337.938431][ T7674] ? bpf_map_update_value+0x410/0x410 [ 337.943638][ T7674] ? __fdget+0x1b7/0x240 [ 337.947714][ T7674] ? bpf_map_update_value+0x410/0x410 [ 337.952921][ T7674] bpf_map_do_batch+0x2e2/0x630 [ 337.957611][ T7674] __sys_bpf+0x66b/0x7f0 [ 337.961689][ T7674] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 337.966898][ T7674] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 337.972885][ T7674] __x64_sys_bpf+0x7c/0x90 [ 337.977136][ T7674] x64_sys_call+0x87f/0x9a0 [ 337.981476][ T7674] do_syscall_64+0x3b/0xb0 [ 337.985729][ T7674] ? clear_bhb_loop+0x55/0xb0 [ 337.990241][ T7674] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 337.995969][ T7674] RIP: 0033:0x7efca657def9 [ 338.000223][ T7674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 338.019666][ T7674] RSP: 002b:00007efca733f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 338.027911][ T7674] RAX: ffffffffffffffda RBX: 00007efca6735f80 RCX: 00007efca657def9 [ 338.035722][ T7674] RDX: 0000000000000038 RSI: 00000000200004c0 RDI: 0000000000000018 [ 338.043533][ T7674] RBP: 00007efca733f090 R08: 0000000000000000 R09: 0000000000000000 [ 338.051345][ T7674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 338.059158][ T7674] R13: 0000000000000000 R14: 00007efca6735f80 R15: 00007fff2f086f98 [ 338.066973][ T7674] [ 338.152608][ T7696] bridge0: port 3(team_slave_1) entered blocking state [ 338.246607][ T7696] bridge0: port 3(team_slave_1) entered disabled state [ 338.253848][ T7696] device team_slave_1 entered promiscuous mode [ 338.264908][ T7700] device team_slave_1 left promiscuous mode [ 338.320725][ T7700] bridge0: port 3(team_slave_1) entered disabled state [ 339.038126][ T7718] FAULT_INJECTION: forcing a failure. [ 339.038126][ T7718] name failslab, interval 1, probability 0, space 0, times 0 [ 339.165454][ T7718] CPU: 1 PID: 7718 Comm: syz.0.2324 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 339.175006][ T7718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 339.184899][ T7718] Call Trace: [ 339.188020][ T7718] [ 339.190798][ T7718] dump_stack_lvl+0x151/0x1b7 [ 339.195315][ T7718] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 339.200609][ T7718] dump_stack+0x15/0x1c [ 339.204597][ T7718] should_fail_ex+0x3d0/0x520 [ 339.209114][ T7718] ? sk_prot_alloc+0xf9/0x330 [ 339.213625][ T7718] __should_failslab+0xaf/0xf0 [ 339.218228][ T7718] should_failslab+0x9/0x20 [ 339.222563][ T7718] __kmem_cache_alloc_node+0x3d/0x250 [ 339.227863][ T7718] ? sk_prot_alloc+0xf9/0x330 [ 339.232372][ T7718] __kmalloc+0xa3/0x1e0 [ 339.236368][ T7718] sk_prot_alloc+0xf9/0x330 [ 339.240704][ T7718] sk_alloc+0x38/0x440 [ 339.244608][ T7718] ? bpf_test_init+0x169/0x190 [ 339.249211][ T7718] bpf_prog_test_run_skb+0x384/0x13a0 [ 339.254425][ T7718] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 339.260149][ T7718] ? __kasan_check_write+0x14/0x20 [ 339.265094][ T7718] ? fput+0x15b/0x1b0 [ 339.268914][ T7718] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 339.274640][ T7718] bpf_prog_test_run+0x3b0/0x630 [ 339.279415][ T7718] ? bpf_prog_query+0x260/0x260 [ 339.284099][ T7718] ? selinux_bpf+0xd2/0x100 [ 339.288441][ T7718] ? security_bpf+0x82/0xb0 [ 339.292782][ T7718] __sys_bpf+0x59f/0x7f0 [ 339.296863][ T7718] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 339.302073][ T7718] ? __ia32_sys_read+0x90/0x90 [ 339.306669][ T7718] ? debug_smp_processor_id+0x17/0x20 [ 339.311874][ T7718] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 339.317778][ T7718] __x64_sys_bpf+0x7c/0x90 [ 339.322030][ T7718] x64_sys_call+0x87f/0x9a0 [ 339.326370][ T7718] do_syscall_64+0x3b/0xb0 [ 339.330621][ T7718] ? clear_bhb_loop+0x55/0xb0 [ 339.335137][ T7718] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 339.340866][ T7718] RIP: 0033:0x7f3e2337def9 [ 339.345118][ T7718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 339.364558][ T7718] RSP: 002b:00007f3e24172038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 339.372801][ T7718] RAX: ffffffffffffffda RBX: 00007f3e23535f80 RCX: 00007f3e2337def9 [ 339.380614][ T7718] RDX: 0000000000000048 RSI: 0000000020000340 RDI: 000000000000000a [ 339.388424][ T7718] RBP: 00007f3e24172090 R08: 0000000000000000 R09: 0000000000000000 [ 339.396238][ T7718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 339.404050][ T7718] R13: 0000000000000000 R14: 00007f3e23535f80 R15: 00007fff6a609838 [ 339.411865][ T7718] [ 339.998565][ T7745] device sit0 left promiscuous mode [ 340.449505][ T7753] device sit0 entered promiscuous mode [ 340.823700][ T7767] device macsec0 entered promiscuous mode [ 341.157698][ T7781] ------------[ cut here ]------------ [ 341.164679][ T7781] WARNING: CPU: 0 PID: 7781 at kernel/bpf/btf.c:1957 btf_type_id_size+0x8c4/0x950 [ 341.174698][ T7781] Modules linked in: [ 341.178678][ T7781] CPU: 0 PID: 7781 Comm: syz.1.2346 Not tainted 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 341.189097][ T7781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 341.200148][ T7781] RIP: 0010:btf_type_id_size+0x8c4/0x950 [ 341.206171][ T7781] Code: 89 f2 e9 21 fa ff ff 44 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 4a fa ff ff 4c 89 ff e8 16 82 29 00 e9 3d fa ff ff e8 8c 53 e2 ff <0f> 0b 31 db e9 39 fa ff ff 44 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c [ 341.226031][ T7781] RSP: 0018:ffffc9000182fb90 EFLAGS: 00010283 [ 341.232807][ T7781] RAX: ffffffff819351c4 RBX: 0000000011000000 RCX: 0000000000040000 [ 341.241042][ T7781] RDX: ffffc90001d8f000 RSI: 0000000000000084 RDI: 0000000000000085 [ 341.249791][ T7781] RBP: ffffc9000182fbf0 R08: ffffffff81934d0f R09: ffffffff81934c90 [ 341.259194][ T7781] R10: 0000000000000005 R11: ffff88811d793cc0 R12: 0000000000000009 [ 341.268550][ T7781] R13: dffffc0000000000 R14: ffff888108db0800 R15: 0000000000000001 [ 341.278589][ T7781] FS: 00007fb1dec126c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 341.287921][ T7781] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 341.295586][ T7781] CR2: 000000110c28106f CR3: 000000013e884000 CR4: 00000000003506b0 [ 341.304591][ T7781] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 341.312754][ T7781] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 341.321220][ T7781] Call Trace: [ 341.326579][ T7781] [ 341.329681][ T7781] ? show_regs+0x58/0x60 [ 341.334329][ T7781] ? __warn+0x160/0x3d0 [ 341.340224][ T7781] ? btf_type_id_size+0x8c4/0x950 [ 341.347341][ T7781] ? report_bug+0x4d5/0x7d0 [ 341.355340][ T7781] ? btf_type_id_size+0x8c4/0x950 [ 341.362340][ T7781] ? handle_bug+0x41/0x70 [ 341.367482][ T7781] ? exc_invalid_op+0x1b/0x50 [ 341.372472][ T7781] ? asm_exc_invalid_op+0x1b/0x20 [ 341.378341][ T7781] ? btf_type_id_size+0x390/0x950 [ 341.383828][ T7781] ? btf_type_id_size+0x40f/0x950 [ 341.389031][ T7781] ? btf_type_id_size+0x8c4/0x950 [ 341.394320][ T7781] ? btf_type_id_size+0x8c4/0x950 [ 341.400344][ T7781] map_check_btf+0x134/0xb90 [ 341.406122][ T7781] ? irqentry_exit+0x30/0x40 [ 341.412339][ T7781] ? bpf_prog_bind_map+0x970/0x970 [ 341.418939][ T7781] map_create+0x78c/0xcf0 [ 341.423040][ T7781] __sys_bpf+0x2e6/0x7f0 [ 341.427380][ T7781] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 341.432611][ T7781] ? __x64_sys_futex+0x100/0x100 [ 341.437789][ T7781] ? fpregs_restore_userregs+0x130/0x290 [ 341.443241][ T7781] __x64_sys_bpf+0x7c/0x90 [ 341.447521][ T7781] x64_sys_call+0x87f/0x9a0 [ 341.452111][ T7781] do_syscall_64+0x3b/0xb0 [ 341.456382][ T7781] ? clear_bhb_loop+0x55/0xb0 [ 341.461051][ T7781] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 341.466909][ T7781] RIP: 0033:0x7fb1ddd7def9 [ 341.471250][ T7781] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 341.490980][ T7781] RSP: 002b:00007fb1dec12038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 341.499420][ T7781] RAX: ffffffffffffffda RBX: 00007fb1ddf35f80 RCX: 00007fb1ddd7def9 [ 341.507259][ T7781] RDX: 0000000000000048 RSI: 0000000020000500 RDI: 0000000000000000 [ 341.515040][ T7781] RBP: 00007fb1dddf0b76 R08: 0000000000000000 R09: 0000000000000000 [ 341.523049][ T7781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 341.531081][ T7781] R13: 0000000000000000 R14: 00007fb1ddf35f80 R15: 00007fffe0a15748 [ 341.539053][ T7781] [ 341.541920][ T7781] ---[ end trace 0000000000000000 ]--- [ 341.765226][ T7805] bridge0: port 3(veth1_macvtap) entered blocking state [ 341.772075][ T7805] bridge0: port 3(veth1_macvtap) entered disabled state [ 341.974143][ T7814] device syzkaller0 entered promiscuous mode [ 342.025342][ T7823] bridge0: port 3(team_slave_1) entered blocking state [ 342.061243][ T7823] bridge0: port 3(team_slave_1) entered disabled state [ 342.131376][ T7823] device team_slave_1 entered promiscuous mode [ 342.164742][ T7825] device team_slave_1 left promiscuous mode [ 342.170806][ T7825] bridge0: port 3(team_slave_1) entered disabled state [ 342.538155][ T7844] syz.0.2368[7844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.538216][ T7844] syz.0.2368[7844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.577891][ T7848] FAULT_INJECTION: forcing a failure. [ 342.577891][ T7848] name failslab, interval 1, probability 0, space 0, times 0 [ 342.643774][ T7848] CPU: 0 PID: 7848 Comm: syz.1.2369 Tainted: G W 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 342.654793][ T7848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 342.664690][ T7848] Call Trace: [ 342.667812][ T7848] [ 342.670587][ T7848] dump_stack_lvl+0x151/0x1b7 [ 342.675114][ T7848] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 342.680398][ T7848] dump_stack+0x15/0x1c [ 342.684388][ T7848] should_fail_ex+0x3d0/0x520 [ 342.688902][ T7848] ? getname_flags+0xba/0x520 [ 342.693414][ T7848] __should_failslab+0xaf/0xf0 [ 342.698013][ T7848] should_failslab+0x9/0x20 [ 342.702354][ T7848] kmem_cache_alloc+0x3b/0x2c0 [ 342.706954][ T7848] ? vfs_write+0xbb3/0xeb0 [ 342.711208][ T7848] ? __kasan_slab_free+0x11/0x20 [ 342.715989][ T7848] getname_flags+0xba/0x520 [ 342.720320][ T7848] getname+0x19/0x20 [ 342.724486][ T7848] do_sys_openat2+0xe0/0x890 [ 342.728915][ T7848] ? bit_wait_io_timeout+0x120/0x120 [ 342.734034][ T7848] ? __mutex_lock_slowpath+0x10/0x10 [ 342.739154][ T7848] ? do_sys_open+0x220/0x220 [ 342.743581][ T7848] ? fput+0x15b/0x1b0 [ 342.747399][ T7848] ? ksys_write+0x260/0x2c0 [ 342.751752][ T7848] __x64_sys_openat+0x243/0x290 [ 342.756427][ T7848] ? __ia32_sys_open+0x270/0x270 [ 342.761198][ T7848] ? debug_smp_processor_id+0x17/0x20 [ 342.766409][ T7848] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 342.772311][ T7848] ? exit_to_user_mode_prepare+0x39/0xa0 [ 342.777776][ T7848] x64_sys_call+0x6bf/0x9a0 [ 342.782114][ T7848] do_syscall_64+0x3b/0xb0 [ 342.786368][ T7848] ? clear_bhb_loop+0x55/0xb0 [ 342.790883][ T7848] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 342.796611][ T7848] RIP: 0033:0x7fb1ddd7def9 [ 342.800863][ T7848] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 342.820392][ T7848] RSP: 002b:00007fb1dec12038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 342.828634][ T7848] RAX: ffffffffffffffda RBX: 00007fb1ddf35f80 RCX: 00007fb1ddd7def9 [ 342.836455][ T7848] RDX: 0000000000000002 RSI: 0000000020000200 RDI: 0000000000000006 [ 342.844258][ T7848] RBP: 00007fb1dec12090 R08: 0000000000000000 R09: 0000000000000000 [ 342.852069][ T7848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 342.859881][ T7848] R13: 0000000000000000 R14: 00007fb1ddf35f80 R15: 00007fffe0a15748 [ 342.867695][ T7848] [ 343.248741][ T7862] device veth0_vlan left promiscuous mode [ 343.254611][ T7862] device veth0_vlan entered promiscuous mode [ 343.323467][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 343.335087][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 343.376455][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 343.415478][ T7863] device sit0 left promiscuous mode [ 343.973949][ T7880] device syzkaller0 entered promiscuous mode [ 343.983267][ T7869] device sit0 left promiscuous mode [ 344.508075][ T7892] FAULT_INJECTION: forcing a failure. [ 344.508075][ T7892] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 344.611279][ T7892] CPU: 0 PID: 7892 Comm: syz.3.2383 Tainted: G W 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 344.622308][ T7892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 344.632205][ T7892] Call Trace: [ 344.635328][ T7892] [ 344.638107][ T7892] dump_stack_lvl+0x151/0x1b7 [ 344.642617][ T7892] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 344.647913][ T7892] dump_stack+0x15/0x1c [ 344.651903][ T7892] should_fail_ex+0x3d0/0x520 [ 344.656419][ T7892] should_fail+0xb/0x10 [ 344.660410][ T7892] should_fail_usercopy+0x1a/0x20 [ 344.665270][ T7892] _copy_to_user+0x1e/0x90 [ 344.669525][ T7892] simple_read_from_buffer+0xc7/0x150 [ 344.674730][ T7892] proc_fail_nth_read+0x1a3/0x210 [ 344.679591][ T7892] ? proc_fault_inject_write+0x390/0x390 [ 344.685058][ T7892] ? fsnotify_perm+0x470/0x5d0 [ 344.689660][ T7892] ? security_file_permission+0x86/0xb0 [ 344.695041][ T7892] ? proc_fault_inject_write+0x390/0x390 [ 344.700510][ T7892] vfs_read+0x26c/0xad0 [ 344.704504][ T7892] ? kernel_read+0x1f0/0x1f0 [ 344.708928][ T7892] ? mutex_lock+0xb1/0x1e0 [ 344.713182][ T7892] ? bit_wait_io_timeout+0x120/0x120 [ 344.718303][ T7892] ? __fdget_pos+0x2e2/0x390 [ 344.722728][ T7892] ? ksys_read+0x77/0x2c0 [ 344.726895][ T7892] ksys_read+0x199/0x2c0 [ 344.730976][ T7892] ? vfs_write+0xeb0/0xeb0 [ 344.735227][ T7892] ? debug_smp_processor_id+0x17/0x20 [ 344.740434][ T7892] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 344.746337][ T7892] __x64_sys_read+0x7b/0x90 [ 344.750675][ T7892] x64_sys_call+0x28/0x9a0 [ 344.754928][ T7892] do_syscall_64+0x3b/0xb0 [ 344.759181][ T7892] ? clear_bhb_loop+0x55/0xb0 [ 344.763697][ T7892] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 344.769421][ T7892] RIP: 0033:0x7fa07cd7c93c [ 344.773676][ T7892] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 344.793118][ T7892] RSP: 002b:00007fa07daf9030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 344.801363][ T7892] RAX: ffffffffffffffda RBX: 00007fa07cf35f80 RCX: 00007fa07cd7c93c [ 344.809181][ T7892] RDX: 000000000000000f RSI: 00007fa07daf90a0 RDI: 000000000000000b [ 344.816987][ T7892] RBP: 00007fa07daf9090 R08: 0000000000000000 R09: 0000000000000000 [ 344.824798][ T7892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 344.832608][ T7892] R13: 0000000000000000 R14: 00007fa07cf35f80 R15: 00007ffd24a10c78 [ 344.840424][ T7892] [ 348.032710][ T7963] device syzkaller0 entered promiscuous mode [ 349.485071][ T8020] device wg2 entered promiscuous mode [ 350.864654][ T8053] device syzkaller0 entered promiscuous mode [ 351.405389][ T8073] device veth1_macvtap left promiscuous mode [ 354.502178][ T8153] device syzkaller0 entered promiscuous mode [ 356.482648][ T8211] device syzkaller0 entered promiscuous mode [ 358.651563][ T8271] device syzkaller0 entered promiscuous mode [ 363.821629][ T8415] device syzkaller0 entered promiscuous mode [ 368.924405][ T8556] device syzkaller0 entered promiscuous mode [ 372.886269][ T8645] device syzkaller0 entered promiscuous mode [ 378.626543][ T8807] device syzkaller0 entered promiscuous mode [ 380.825606][ T8860] device syzkaller0 entered promiscuous mode [ 382.852978][ T8911] device syzkaller0 entered promiscuous mode [ 386.346415][ T9014] device syzkaller0 entered promiscuous mode [ 389.987045][ T9096] device syzkaller0 entered promiscuous mode [ 392.374076][ T9177] device syzkaller0 entered promiscuous mode [ 395.669339][ T9266] device syzkaller0 entered promiscuous mode [ 397.619272][ T9326] device syzkaller0 entered promiscuous mode [ 401.443336][ T9422] device syzkaller0 entered promiscuous mode [ 401.587342][ T9413] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.694827][ T9413] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.822191][ T9413] device bridge_slave_0 entered promiscuous mode [ 402.725212][ T9413] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.742637][ T9413] bridge0: port 2(bridge_slave_1) entered disabled state [ 402.830028][ T9413] device bridge_slave_1 entered promiscuous mode [ 403.432339][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 403.440266][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 403.559921][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 403.588907][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 403.604992][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.611846][ T357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 403.619277][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 403.627434][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 403.635625][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.642464][ T357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 404.172163][ T9480] device syzkaller0 entered promiscuous mode [ 404.266686][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 404.295189][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 404.364017][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 404.436089][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 404.509464][ T9413] device veth0_vlan entered promiscuous mode [ 404.655128][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 404.673048][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 404.787683][ T9413] device veth1_macvtap entered promiscuous mode [ 404.795907][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 404.803109][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 404.943714][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 404.957645][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 404.966971][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 405.033989][ T4148] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 405.074427][ T4148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 405.180745][ T4148] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 405.289714][ T4148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 406.831892][ T9532] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.839505][ T9532] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.846924][ T9532] device bridge_slave_0 entered promiscuous mode [ 406.901628][ T9546] device syzkaller0 entered promiscuous mode [ 407.150648][ T9532] bridge0: port 2(bridge_slave_1) entered blocking state [ 407.169296][ T9532] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.270726][ T9532] device bridge_slave_1 entered promiscuous mode [ 407.586098][ T884] device team_slave_1 left promiscuous mode [ 407.595501][ T884] bridge0: port 3(team_slave_1) entered disabled state [ 407.697952][ T884] device bridge_slave_1 left promiscuous mode [ 407.705343][ T884] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.756090][ T884] device bridge_slave_0 left promiscuous mode [ 407.783944][ T884] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.952101][ T9592] device syzkaller0 entered promiscuous mode [ 409.072618][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 409.082723][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 409.095323][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 409.187210][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 409.194881][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 409.219552][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 409.239680][ T1088] bridge0: port 1(bridge_slave_0) entered blocking state [ 409.246551][ T1088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 409.359676][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 409.429477][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 409.471480][ T1088] bridge0: port 2(bridge_slave_1) entered blocking state [ 409.478357][ T1088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 409.587426][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 409.617582][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 409.691998][ T9532] device veth0_vlan entered promiscuous mode [ 409.739328][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 409.761463][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 409.789049][ T9532] device veth1_macvtap entered promiscuous mode [ 409.820965][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 409.828660][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 409.836419][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 409.844396][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 409.861536][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 409.934795][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 410.003238][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 410.085687][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 410.145468][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 413.055841][ T9691] device syzkaller0 entered promiscuous mode [ 416.371987][ T9794] device syzkaller0 entered promiscuous mode [ 418.028314][ T9851] device syzkaller0 entered promiscuous mode [ 421.044749][ T9958] device syzkaller0 entered promiscuous mode [ 422.857417][T10013] device syzkaller0 entered promiscuous mode [ 424.447755][T10064] device syzkaller0 entered promiscuous mode [ 428.718901][T10170] device syzkaller0 entered promiscuous mode [ 435.032184][T10345] device syzkaller0 entered promiscuous mode [ 435.209917][T10348] device syzkaller0 entered promiscuous mode [ 435.270507][T10344] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.277397][T10344] bridge0: port 1(bridge_slave_0) entered disabled state [ 435.284824][T10344] device bridge_slave_0 entered promiscuous mode [ 435.292216][T10344] bridge0: port 2(bridge_slave_1) entered blocking state [ 435.406163][T10344] bridge0: port 2(bridge_slave_1) entered disabled state [ 435.529116][T10344] device bridge_slave_1 entered promiscuous mode [ 435.870095][ T4148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 435.878666][ T4148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 436.204457][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 436.217597][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 436.225678][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 436.232938][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 436.240490][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 436.306048][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 436.405599][ T301] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.412467][ T301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 436.520594][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 436.588774][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 436.649488][ T301] bridge0: port 2(bridge_slave_1) entered blocking state [ 436.656352][ T301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 436.745311][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 436.775874][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 436.783663][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 436.802705][T10344] device veth0_vlan entered promiscuous mode [ 436.856028][ T4148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 436.863976][ T4148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 436.935340][T10344] device veth1_macvtap entered promiscuous mode [ 436.958313][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 436.969685][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 436.989699][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 437.009001][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 437.116432][ T1226] device veth0_vlan left promiscuous mode [ 438.007741][T10405] device syzkaller0 entered promiscuous mode [ 440.128425][T10469] FAULT_INJECTION: forcing a failure. [ 440.128425][T10469] name failslab, interval 1, probability 0, space 0, times 0 [ 440.369281][T10469] CPU: 0 PID: 10469 Comm: syz.1.3240 Tainted: G W 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 440.380387][T10469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 440.390295][T10469] Call Trace: [ 440.393406][T10469] [ 440.396182][T10469] dump_stack_lvl+0x151/0x1b7 [ 440.400704][T10469] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 440.405993][T10469] dump_stack+0x15/0x1c [ 440.409986][T10469] should_fail_ex+0x3d0/0x520 [ 440.414509][T10469] ? trace_mmap_lock_reg+0x140/0x2a0 [ 440.419616][T10469] __should_failslab+0xaf/0xf0 [ 440.424217][T10469] should_failslab+0x9/0x20 [ 440.428558][T10469] __kmem_cache_alloc_node+0x3d/0x250 [ 440.433764][T10469] ? __kasan_kmalloc+0x9c/0xb0 [ 440.438366][T10469] ? trace_mmap_lock_reg+0x140/0x2a0 [ 440.443487][T10469] kmalloc_trace+0x2a/0xa0 [ 440.447746][T10469] trace_mmap_lock_reg+0x140/0x2a0 [ 440.452693][T10469] tracepoint_add_func+0x90/0x940 [ 440.457545][T10469] ? alloc_file_pseudo+0x280/0x2f0 [ 440.462494][T10469] ? __bpf_trace_mmap_lock+0x40/0x40 [ 440.467613][T10469] tracepoint_probe_register_prio_may_exist+0x11c/0x180 [ 440.474387][T10469] ? acct_clear_integrals+0x30/0x30 [ 440.479418][T10469] ? __bpf_trace_mmap_lock+0x40/0x40 [ 440.484540][T10469] ? ihold+0x2e/0x60 [ 440.488365][T10469] bpf_probe_register+0x152/0x1e0 [ 440.493226][T10469] bpf_raw_tp_link_attach+0x456/0x6b0 [ 440.498432][T10469] ? bpf_insn_prepare_dump+0x950/0x950 [ 440.503731][T10469] ? __kasan_check_write+0x14/0x20 [ 440.508688][T10469] ? fput+0x15b/0x1b0 [ 440.512492][T10469] bpf_raw_tracepoint_open+0x22d/0x4a0 [ 440.517786][T10469] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 440.523775][T10469] ? bpf_obj_get_info_by_fd+0x3e60/0x3e60 [ 440.529333][T10469] ? __sys_bpf+0x2c6/0x7f0 [ 440.533587][T10469] __sys_bpf+0x4f5/0x7f0 [ 440.537670][T10469] ? clockevents_program_event+0x22f/0x300 [ 440.543303][T10469] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 440.548513][T10469] ? __sched_clock_gtod_offset+0x100/0x100 [ 440.554155][T10469] ? debug_smp_processor_id+0x17/0x20 [ 440.559363][T10469] __x64_sys_bpf+0x7c/0x90 [ 440.563964][T10469] x64_sys_call+0x87f/0x9a0 [ 440.568300][T10469] do_syscall_64+0x3b/0xb0 [ 440.572552][T10469] ? clear_bhb_loop+0x55/0xb0 [ 440.577068][T10469] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 440.582794][T10469] RIP: 0033:0x7fb1ddd7def9 [ 440.587047][T10469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 440.606489][T10469] RSP: 002b:00007fb1dec12038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 440.614734][T10469] RAX: ffffffffffffffda RBX: 00007fb1ddf35f80 RCX: 00007fb1ddd7def9 [ 440.622544][T10469] RDX: 0000000000000010 RSI: 0000000020000080 RDI: 0000000000000011 [ 440.630355][T10469] RBP: 00007fb1dec12090 R08: 0000000000000000 R09: 0000000000000000 [ 440.638168][T10469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 440.645979][T10469] R13: 0000000000000000 R14: 00007fb1ddf35f80 R15: 00007fffe0a15748 [ 440.653799][T10469] [ 443.323762][T10539] device syzkaller0 entered promiscuous mode [ 446.010655][T10597] device syzkaller0 entered promiscuous mode [ 448.461009][T10654] device syzkaller0 entered promiscuous mode [ 448.760051][T10660] device syzkaller0 entered promiscuous mode [ 450.972394][T10720] device syzkaller0 entered promiscuous mode [ 451.980715][T10730] device syzkaller0 entered promiscuous mode [ 453.685162][T10765] device syzkaller0 entered promiscuous mode [ 454.844343][T10795] device syzkaller0 entered promiscuous mode [ 455.512175][T10804] device syzkaller0 entered promiscuous mode [ 456.684505][T10844] FAULT_INJECTION: forcing a failure. [ 456.684505][T10844] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 456.827877][T10844] CPU: 0 PID: 10844 Comm: syz.0.3359 Tainted: G W 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 456.838993][T10844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 456.848877][T10844] Call Trace: [ 456.852000][T10844] [ 456.854777][T10844] dump_stack_lvl+0x151/0x1b7 [ 456.859295][T10844] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 456.864586][T10844] ? migrate_enable+0x1cb/0x2b0 [ 456.869274][T10844] dump_stack+0x15/0x1c [ 456.873312][T10844] should_fail_ex+0x3d0/0x520 [ 456.877781][T10844] should_fail+0xb/0x10 [ 456.881770][T10844] should_fail_usercopy+0x1a/0x20 [ 456.886629][T10844] _copy_from_user+0x1e/0xc0 [ 456.891060][T10844] generic_map_update_batch+0x4d9/0x8c0 [ 456.896446][T10844] ? generic_map_delete_batch+0x5c0/0x5c0 [ 456.901997][T10844] ? generic_map_delete_batch+0x5c0/0x5c0 [ 456.907550][T10844] bpf_map_do_batch+0x4cc/0x630 [ 456.912239][T10844] __sys_bpf+0x66b/0x7f0 [ 456.916313][T10844] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 456.921527][T10844] ? __ia32_sys_read+0x90/0x90 [ 456.926124][T10844] ? debug_smp_processor_id+0x17/0x20 [ 456.931330][T10844] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 456.937235][T10844] __x64_sys_bpf+0x7c/0x90 [ 456.941484][T10844] x64_sys_call+0x87f/0x9a0 [ 456.945826][T10844] do_syscall_64+0x3b/0xb0 [ 456.950078][T10844] ? clear_bhb_loop+0x55/0xb0 [ 456.954591][T10844] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 456.960316][T10844] RIP: 0033:0x7f3e2337def9 [ 456.964569][T10844] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 456.984012][T10844] RSP: 002b:00007f3e24151038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 456.992257][T10844] RAX: ffffffffffffffda RBX: 00007f3e23536058 RCX: 00007f3e2337def9 [ 457.000067][T10844] RDX: 0000000000000038 RSI: 00000000200006c0 RDI: 000000000000001a [ 457.007878][T10844] RBP: 00007f3e24151090 R08: 0000000000000000 R09: 0000000000000000 [ 457.015692][T10844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 457.023505][T10844] R13: 0000000000000000 R14: 00007f3e23536058 R15: 00007fff6a609838 [ 457.031322][T10844] [ 457.993051][T10859] device syzkaller0 entered promiscuous mode [ 461.165221][T10936] device syzkaller0 entered promiscuous mode [ 464.248154][T11012] device syzkaller0 entered promiscuous mode [ 466.371056][T11074] device syzkaller0 entered promiscuous mode [ 468.790883][T11138] device syzkaller0 entered promiscuous mode [ 469.041788][T11153] device veth1_macvtap left promiscuous mode [ 469.500925][ T28] audit: type=1400 audit(1726228849.177:152): avc: denied { write } for pid=11166 comm="syz.4.3457" name="cgroup.subtree_control" dev="cgroup2" ino=361 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 469.898862][ T28] audit: type=1400 audit(1726228849.177:153): avc: denied { open } for pid=11166 comm="syz.4.3457" path="" dev="cgroup2" ino=361 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 471.120570][T11198] device syzkaller0 entered promiscuous mode [ 473.343819][ T28] audit: type=1400 audit(1726228853.017:154): avc: denied { create } for pid=11273 comm="syz.2.3490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 473.382804][T11267] device syzkaller0 entered promiscuous mode [ 476.146239][T11348] device syzkaller0 entered promiscuous mode [ 476.299280][T11354] device wg2 entered promiscuous mode [ 476.445353][T11364] FAULT_INJECTION: forcing a failure. [ 476.445353][T11364] name failslab, interval 1, probability 0, space 0, times 0 [ 476.676024][T11364] CPU: 0 PID: 11364 Comm: syz.4.3517 Tainted: G W 6.1.93-syzkaller-00007-g6e5b92a6a151 #0 [ 476.687135][T11364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 476.697030][T11364] Call Trace: [ 476.700152][T11364] [ 476.702937][T11364] dump_stack_lvl+0x151/0x1b7 [ 476.707447][T11364] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 476.712737][T11364] ? free_unref_page_commit+0x1f5/0x510 [ 476.718118][T11364] dump_stack+0x15/0x1c [ 476.722107][T11364] should_fail_ex+0x3d0/0x520 [ 476.726621][T11364] ? inode_doinit_use_xattr+0x5c/0x3d0 [ 476.731915][T11364] __should_failslab+0xaf/0xf0 [ 476.736516][T11364] should_failslab+0x9/0x20 [ 476.740854][T11364] __kmem_cache_alloc_node+0x3d/0x250 [ 476.746073][T11364] ? inode_doinit_use_xattr+0x5c/0x3d0 [ 476.751357][T11364] kmalloc_trace+0x2a/0xa0 [ 476.755617][T11364] inode_doinit_use_xattr+0x5c/0x3d0 [ 476.760847][T11364] inode_doinit_with_dentry+0xaa3/0x1070 [ 476.766313][T11364] ? sb_finish_set_opts+0xa90/0xa90 [ 476.771344][T11364] ? atime_needs_update+0x810/0x810 [ 476.776383][T11364] selinux_d_instantiate+0x27/0x40 [ 476.781327][T11364] security_d_instantiate+0x9f/0x100 [ 476.786449][T11364] d_splice_alias+0x6d/0x390 [ 476.790875][T11364] kernfs_iop_lookup+0x29e/0x2f0 [ 476.795648][T11364] ? kernfs_dop_revalidate+0x550/0x550 [ 476.800950][T11364] path_openat+0x10fd/0x2d60 [ 476.805374][T11364] ? do_filp_open+0x480/0x480 [ 476.809888][T11364] do_filp_open+0x230/0x480 [ 476.814222][T11364] ? vfs_tmpfile+0x480/0x480 [ 476.818650][T11364] ? alloc_fd+0x4fa/0x5a0 [ 476.822817][T11364] do_sys_openat2+0x151/0x890 [ 476.827328][T11364] ? bit_wait_io_timeout+0x120/0x120 [ 476.832446][T11364] ? __mutex_lock_slowpath+0x10/0x10 [ 476.837575][T11364] ? do_sys_open+0x220/0x220 [ 476.841995][T11364] ? fput+0x15b/0x1b0 [ 476.845813][T11364] ? ksys_write+0x260/0x2c0 [ 476.850152][T11364] __x64_sys_openat+0x243/0x290 [ 476.854839][T11364] ? __ia32_sys_open+0x270/0x270 [ 476.859614][T11364] ? debug_smp_processor_id+0x17/0x20 [ 476.864820][T11364] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 476.870722][T11364] ? exit_to_user_mode_prepare+0x39/0xa0 [ 476.876191][T11364] x64_sys_call+0x6bf/0x9a0 [ 476.880529][T11364] do_syscall_64+0x3b/0xb0 [ 476.884783][T11364] ? clear_bhb_loop+0x55/0xb0 [ 476.889305][T11364] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 476.895025][T11364] RIP: 0033:0x7f579757def9 [ 476.899280][T11364] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 476.920108][T11364] RSP: 002b:00007f57982eb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 476.928353][T11364] RAX: ffffffffffffffda RBX: 00007f5797735f80 RCX: 00007f579757def9 [ 476.936165][T11364] RDX: 0000000000000002 RSI: 0000000020000280 RDI: 0000000000000008 [ 476.943976][T11364] RBP: 00007f57982eb090 R08: 0000000000000000 R09: 0000000000000000 [ 476.951789][T11364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 476.959601][T11364] R13: 0000000000000000 R14: 00007f5797735f80 R15: 00007ffd0f5d9098 [ 476.967414][T11364] [ 479.527488][T11427] device syzkaller0 entered promiscuous mode [ 479.746560][T11437] device syzkaller0 entered promiscuous mode [ 483.899871][T11541] device syzkaller0 entered promiscuous mode [ 484.879178][T11562] device syzkaller0 entered promiscuous mode [ 484.895933][T11572] device pim6reg1 entered promiscuous mode [ 485.532245][T11584] device syzkaller0 entered promiscuous mode [ 485.856648][T11594] device syzkaller0 entered promiscuous mode [ 486.125960][T11613] syz.3.3589[11613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 486.126043][T11613] syz.3.3589[11613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.440925][T11647] device syzkaller0 entered promiscuous mode [ 488.687523][T11670] device syzkaller0 entered promiscuous mode [ 489.099160][T11683] device syzkaller0 entered promiscuous mode [ 491.119201][T11732] device syzkaller0 entered promiscuous mode [ 493.018769][T11781] device syzkaller0 entered promiscuous mode [ 494.701458][T11819] device syzkaller0 entered promiscuous mode [ 497.025126][T11889] device syzkaller0 entered promiscuous mode [ 500.973188][T11963] device syzkaller0 entered promiscuous mode [ 502.905728][T11988] device syzkaller0 entered promiscuous mode [ 505.974322][T12073] device syzkaller0 entered promiscuous mode [ 508.411769][T12119] device syzkaller0 entered promiscuous mode [ 510.153314][T12132] device syzkaller0 entered promiscuous mode [ 512.383468][T12223] device syzkaller0 entered promiscuous mode [ 513.387792][T12243] device syzkaller0 entered promiscuous mode [ 514.174069][T12255] device syzkaller0 entered promiscuous mode [ 514.854000][T12259] device syzkaller0 entered promiscuous mode [ 517.291777][T12339] device syzkaller0 entered promiscuous mode [ 552.068352][ T43] device bridge_slave_1 left promiscuous mode [ 552.074459][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 552.145212][ T43] device bridge_slave_0 left promiscuous mode [ 552.225570][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 552.294674][ T43] device veth1_macvtap left promiscuous mode [ 552.318860][ T43] device veth0_vlan left promiscuous mode SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=1 req=4116 state=3 status=67 (errno 32: Broken pipe) [ 590.926231][ T1226] device bridge_slave_1 left promiscuous mode [ 590.932138][ T1226] bridge0: port 2(bridge_slave_1) entered disabled state [ 590.939447][ T1226] device bridge_slave_0 left promiscuous mode [ 590.945344][ T1226] bridge0: port 1(bridge_slave_0) entered disabled state [ 590.952953][ T1226] device bridge_slave_1 left promiscuous mode [ 590.958911][ T1226] bridge0: port 2(bridge_slave_1) entered disabled state [ 590.966035][ T1226] device bridge_slave_0 left promiscuous mode [ 590.971920][ T1226] bridge0: port 1(bridge_slave_0) entered disabled state [ 590.979462][ T1226] device bridge_slave_1 left promiscuous mode [ 590.985345][ T1226] bridge0: port 2(bridge_slave_1) entered disabled state [ 590.992577][ T1226] device bridge_slave_0 left promiscuous mode [ 590.998527][ T1226] bridge0: port 1(bridge_slave_0) entered disabled state [ 591.006069][ T1226] device bridge_slave_1 left promiscuous mode [ 591.011953][ T1226] bridge0: port 2(bridge_slave_1) entered disabled state [ 591.019182][ T1226] device bridge_slave_0 left promiscuous mode [ 591.025065][ T1226] bridge0: port 1(bridge_slave_0) entered disabled state [ 591.033103][ T1226] device veth0_vlan left promiscuous mode [ 591.039179][ T1226] device veth1_macvtap left promiscuous mode [ 591.044971][ T1226] device veth0_vlan left promiscuous mode [ 591.050900][ T1226] device veth1_macvtap left promiscuous mode [ 591.056748][ T1226] device veth0_vlan left promiscuous mode