last executing test programs: 1.945247212s ago: executing program 4 (id=335): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1.843607321s ago: executing program 0 (id=337): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) 1.460829824s ago: executing program 0 (id=340): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000880)=""/229, 0x0, 0xe5, 0x0, 0xe, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x9, 0x0, &(0x7f0000000280)="cafbda70c1108fcee1", 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0400000004000000040000000500010000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000007bfb628ab2e369e931f3374d127014d514b32c7009b41df72b7bb904d43212df8e61ab065dd049c2f850a4f664b28a4caf6519b5b69cab2ddf636ca5b21276eb9e74c815072da34745101cb4ff5b7afa39cbb7cb10468701af4eb5ea9d139af782c483ff87b4b1585cd171635bee09f88d75501543"], 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000580)={&(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000500)=[{&(0x7f00000003c0)="0a04831e33c5b5cd775364c859a9724c9471", 0x12}, {&(0x7f0000000680)="cc0a0bc4aa3ed8af8d36adc6d64037afd87fba62dd9ddb72152f3b489191f6cb8dcd267eb3af519c3222967199492954be7b7de7bbf83170de8a0a2f2256c6a54cb1", 0x42}], 0x2, &(0x7f0000000780)=ANY=[@ANYBLOB='\x00\r\x00', @ANYRES32=0x0, @ANYBLOB="e000000100000000000000002c000000000000000000000007000000891babac1414bbffffffff0a0101000000bb000000000054000000000000000000000007000000442c71930a01010200000001ac14142200000004ac1414bb000000086401010100000002e000100100000d143712dc21cc0873d60b0febe5ed247aafae3f94040100000000000000180000000000000000000000070000008907d4ffffffff00110000000000000000000000010000000a00"/196], 0xd8}, 0x4000826) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x5, 0x8}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r4}, 0xc) close(r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x75, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x105004, 0xc8, 0x9, 0x8, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x60}, 0x0, 0x107, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40000002) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7968dd986c45630002008daa"], 0xfdef) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRESOCT=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000001000000000400000900000001000000bd49ba49f100ac485cffb42baee5368aee838df748d08f0c9dc3b1ae7ba4f1a708a62d85c859cee339f85b4703768649152244a79fb3357787c0fd53607224b986de28bfb57df23f943c6c51f60eae48635ef54f043e6b25246045d3aa57159a59d20033d875314c451835da60b3a0b436f6166d02755fd2aadf98c56538928b259f2344e1f70d55c9cb129c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b708"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1.460537014s ago: executing program 3 (id=341): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f00000009c0)=""/4096, 0x0, 0x1000, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000004000000bb7f1b00d600feff00d0ff0a9500000000000001"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 1.321492077s ago: executing program 0 (id=342): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000008000000000000000000079100000000000009500000000000d00"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 1.28536349s ago: executing program 2 (id=343): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x2, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020702500000000002020207b1af8ff00000000bda100000000000037010000f8ffffffb702000008000000b7030000000000001609000006000000cf91000000000000b5020000000000008500000085000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf4, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0x40000000000, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) close(r1) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x8}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001280)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0xe) close(0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2e365a339683931c}]}}, 0x0, 0x2a, 0x0, 0xa, 0x0, 0x0, @void, @value}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1eaa00000000000079101000000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x11, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000200)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000001000180100002020704800000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000000000fc8500000004524e2785"], &(0x7f0000000240)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'lo\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8922, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1202, 0x0) 1.27507165s ago: executing program 0 (id=344): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000c63489f00e4fef5e47ea5c05dbfed36aea58b1a083e235c754b9a0fbff6e236fce411eef4074c7f1a557612342fc44288acaedf99315066c33d5105205aeeee1001676b982c030c48cccd0b75b32cc3c92828e4265d997aebe4cdcd3ba6f90b8597b92cafa0043bdfaa31ca76a3d20dcd4add90da0b7e4bc7c15fbd3f60155fb166dadcc7891e1f1180a95aec02ad480960234de1e9af9161ab955680cf5333b937ed944af1dae21798b73cdc05b5f4601441be6275604127281f5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000f8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f00000003c0)=@framed={{}, [@printk={@d, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x72}}, @call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x1c10a1, 0x0, 0x4a}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xf7, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x3, 0x4, 0x4, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xc, 0x4, 0x4, 0x20bf22, 0x0, r11, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$tipc(r10, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x8982, 0x20000500) 1.205164516s ago: executing program 0 (id=345): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x43, 0x0, 0x0, 0x2}]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 1.192620428s ago: executing program 1 (id=346): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000f8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00'}, 0x10) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)='%-010d \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='kfree\x00', r2}, 0x10) (async) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000340)='\xa8T\x8d\xcb\xa7+\xa5\x9ec7\xf7I\'\xbc\xde\t\xed\x1f,\xa4\xb8p\xa5\xbc\xeeT\x9aV\xc4\xe3\xf5\xb1\xd0Y\xc6\x96(\xfa\xe0\xd5\x06W\xf9\xbb\xaf.\xdf@\xa2\x17\x00\xad\x96\xcfu\xb3\xa7') (async) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) perf_event_open(&(0x7f0000000780)={0x1, 0xfffffffffffffd22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x120a0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa056, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x2000000000000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000ff7f000000e90000a3fb6c149db9675a000000000000"], 0x48) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x6d, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000150000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x20000000000000fe, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r5}, &(0x7f00000001c0), &(0x7f0000000340)}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000200)={&(0x7f0000000040)=@abs={0x1, 0x11}, 0x6e, 0x0}, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1.131015273s ago: executing program 0 (id=347): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xb) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="1808000000000000000000000300000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000002f000000b70900000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x25}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='sys_enter\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 1.129935083s ago: executing program 4 (id=348): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0x2}]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) (fail_nth: 6) 880.503964ms ago: executing program 1 (id=349): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xfebd) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe8, 0xe8, 0x9, [@union={0xc, 0x7, 0x0, 0x5, 0x1, 0x10001, [{0x7, 0x0, 0x8}, {0x7, 0x0, 0x4}, {0x5, 0x5, 0x7ff}, {0x10, 0x0, 0x5}, {0x8, 0x5, 0x6e8b}, {0x0, 0x2, 0x8000}, {0x6, 0x3, 0x80}]}, @enum={0x6, 0x2, 0x0, 0x6, 0x4, [{0xc, 0x1645}, {0xb, 0x3}]}, @struct={0x4, 0x6, 0x0, 0x4, 0x1, 0x0, [{0xa, 0x1, 0xfffffff7}, {0xe, 0x3, 0x7}, {0x3, 0x5}, {0x1, 0x0, 0xd07}, {0x3, 0x0, 0x9}, {0x5, 0x2, 0x4}]}, @restrict={0x0, 0x0, 0x0, 0xb, 0x2}, @const={0x1, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x30, 0x0, 0x61, 0x2e, 0x61, 0x2e, 0x6f]}}, &(0x7f0000000240)=""/140, 0x109, 0x8c, 0x0, 0xdc9d, 0x10000, @value}, 0x28) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES64=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 880.179414ms ago: executing program 3 (id=350): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x5, 0x1c, 0x0, 0x0, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x2100, [{0x0, 0x1, 0x20000000}]}]}}, 0x0, 0x42, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 725.050678ms ago: executing program 4 (id=351): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@const={0x0, 0x0, 0x0, 0x2}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x10}]}}, 0x0, 0x36, 0x0, 0x43, 0x0, 0x0, @void, @value}, 0x28) 710.333189ms ago: executing program 3 (id=352): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000880)=""/229, 0x0, 0xe5, 0x0, 0xe, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x9, 0x0, &(0x7f0000000280)="cafbda70c1108fcee1", 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0400000004000000040000000500010000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000007bfb628ab2e369e931f3374d127014d514b32c7009b41df72b7bb904d43212df8e61ab065dd049c2f850a4f664b28a4caf6519b5b69cab2ddf636ca5b21276eb9e74c815072da34745101cb4ff5b7afa39cbb7cb10468701af4eb5ea9d139af782c483ff87b4b1585cd171635bee09f88d75501543"], 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000580)={&(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000500)=[{&(0x7f00000003c0)="0a04831e33c5b5cd775364c859a9724c9471", 0x12}, {&(0x7f0000000680)="cc0a0bc4aa3ed8af8d36adc6d64037afd87fba62dd9ddb72152f3b489191f6cb8dcd267eb3af519c3222967199492954be7b7de7bbf83170de8a0a2f2256c6a54cb1", 0x42}], 0x2, &(0x7f0000000780)=ANY=[@ANYBLOB='\x00\r\x00', @ANYRES32=0x0, @ANYBLOB="e000000100000000000000002c000000000000000000000007000000891babac1414bbffffffff0a0101000000bb000000000054000000000000000000000007000000442c71930a01010200000001ac14142200000004ac1414bb000000086401010100000002e000100100000d143712dc21cc0873d60b0febe5ed247aafae3f94040100000000000000180000000000000000000000070000008907d4ffffffff00110000000000000000000000010000000a00"/196], 0xd8}, 0x4000826) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x5, 0x8}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r4}, 0xc) close(r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x75, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x105004, 0xc8, 0x9, 0x8, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x60}, 0x0, 0x107, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40000002) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7968dd986c45630002008daa"], 0xfdef) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRESOCT=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000001000000000400000900000001000000bd49ba49f100ac485cffb42baee5368aee838df748d08f0c9dc3b1ae7ba4f1a708a62d85c859cee339f85b4703768649152244a79fb3357787c0fd53607224b986de28bfb57df23f943c6c51f60eae48635ef54f043e6b25246045d3aa57159a59d20033d875314c451835da60b3a0b436f6166d02755fd2aadf98c56538928b259f2344e1f70d55c9cb129c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b708"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 649.111944ms ago: executing program 1 (id=353): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) 648.215415ms ago: executing program 4 (id=354): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000880)=""/229, 0x0, 0xe5, 0x0, 0xe, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x9, 0x0, &(0x7f0000000280)="cafbda70c1108fcee1", 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0400000004000000040000000500010000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000007bfb628ab2e369e931f3374d127014d514b32c7009b41df72b7bb904d43212df8e61ab065dd049c2f850a4f664b28a4caf6519b5b69cab2ddf636ca5b21276eb9e74c815072da34745101cb4ff5b7afa39cbb7cb10468701af4eb5ea9d139af782c483ff87b4b1585cd171635bee09f88d75501543"], 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000580)={&(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000500)=[{&(0x7f00000003c0)="0a04831e33c5b5cd775364c859a9724c9471", 0x12}, {&(0x7f0000000680)="cc0a0bc4aa3ed8af8d36adc6d64037afd87fba62dd9ddb72152f3b489191f6cb8dcd267eb3af519c3222967199492954be7b7de7bbf83170de8a0a2f2256c6a54cb1", 0x42}], 0x2, &(0x7f0000000780)=ANY=[@ANYBLOB='\x00\r\x00', @ANYRES32=0x0, @ANYBLOB="e000000100000000000000002c000000000000000000000007000000891babac1414bbffffffff0a0101000000bb000000000054000000000000000000000007000000442c71930a01010200000001ac14142200000004ac1414bb000000086401010100000002e000100100000d143712dc21cc0873d60b0febe5ed247aafae3f94040100000000000000180000000000000000000000070000008907d4ffffffff00110000000000000000000000010000000a00"/196], 0xd8}, 0x4000826) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x5, 0x8}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r4}, 0xc) close(r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x75, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x105004, 0xc8, 0x9, 0x8, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x60}, 0x0, 0x107, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40000002) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7968dd986c45630002008daa"], 0xfdef) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRESOCT=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000001000000000400000900000001000000bd49ba49f100ac485cffb42baee5368aee838df748d08f0c9dc3b1ae7ba4f1a708a62d85c859cee339f85b4703768649152244a79fb3357787c0fd53607224b986de28bfb57df23f943c6c51f60eae48635ef54f043e6b25246045d3aa57159a59d20033d875314c451835da60b3a0b436f6166d02755fd2aadf98c56538928b259f2344e1f70d55c9cb129c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b708"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 640.928055ms ago: executing program 1 (id=355): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xb, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x3c, '\x00', 0x0, @fallback=0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r1, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffcd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000000000000000000000d40e4f1e2b759a94a7deb3402e897389be368d4902e54031e262af867e714a3622c3a0ac8dd4240cf9bb4d295fae178ba7d425027b14bc03043d", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="b4000000000000f1ffff9400000000000000953bb5989ce6b1f64c96c2458f66b4ed80f2ffffffffffffff598ff5381de7a9200634fcf8b48745227e35ac3e3844f3ebf6d15897e627258fb051e4a8994aad3d893637e580c647a72c33ab00000000000042b4654961a077d21f9114c016e31d3e20f61fe1e27e014fd14eec3e4d9bd89254d57e0246bf43dfbdb7de83fcec6f"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000005000000000400000100000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="1a00000000000000000000a7e2cd70bc00000000000000ea1046e7688bc22ae6ddb6ca00000000000000e851"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x37}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x9, 0x0, 0x0, 0x40e00, 0x1b, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000020000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 582.910631ms ago: executing program 2 (id=356): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{}, &(0x7f00000005c0), &(0x7f0000000600)='%-010d \x00'}, 0x20) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3b}}) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x1, 0x80, 0x7, 0x4, 0x4, 0x90, 0x0, 0x1, 0x4000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xf, 0x4, @perf_bp={&(0x7f0000000180), 0x2}, 0x42c8, 0x8, 0xa, 0x3, 0x100000001, 0x7, 0x2, 0x0, 0x1ff}, r3, 0xe, 0xffffffffffffffff, 0x4) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r4}, &(0x7f0000000800), &(0x7f0000000840)=r5}, 0x20) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x10) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f0000000000)=0x1) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 423.137544ms ago: executing program 2 (id=357): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000280)=r2}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 317.972243ms ago: executing program 2 (id=358): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@const={0x0, 0x0, 0x0, 0x2}, @int={0x0, 0x2000, 0x0, 0x1, 0x5, 0x10}]}}, 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 209.070882ms ago: executing program 1 (id=359): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 173.149656ms ago: executing program 3 (id=360): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000200000002000000007000000000000000100000d0000000002000000020000000000000000000102"], &(0x7f0000000b80)=""/230, 0x3f, 0xe6, 0x1, 0x0, 0x0, @void, @value}, 0x28) 141.138949ms ago: executing program 4 (id=361): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0x18, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000fe27008500000008000018b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000007300000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 140.829718ms ago: executing program 3 (id=362): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xfff, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r5}, 0x10) close(r4) sendmsg$unix(r3, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0) 118.479551ms ago: executing program 4 (id=363): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYRESOCT], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0x5, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@initr0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000083600000005000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000e40)={&(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000640)=""/22, 0x16}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f00000008c0)=""/225, 0xe1}, {&(0x7f0000000a40)=""/18, 0x12}, {&(0x7f0000000a80)=""/159, 0x9f}, {&(0x7f0000000b40)=""/28, 0x1c}, {&(0x7f0000000b80)=""/236, 0xec}, {&(0x7f0000000c80)=""/153, 0x99}], 0x8, &(0x7f0000000dc0)=""/94, 0x5e}, 0x100) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000380)=""/205, 0xcd}, {&(0x7f0000000480)=""/67, 0x43}, {&(0x7f0000000500)=""/162, 0xa2}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x5, &(0x7f00000007c0)=""/89, 0x59}, 0x2040) sendmsg$inet(r5, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)=ANY=[], 0x58}, 0x0) sendmsg$inet(r5, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r5, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0x0) close(r4) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000280)=0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000001600)=ANY=[@ANYBLOB="8500000061000000350000000000002085000000080000009500000000000000f4670880271e3503200ffa95b2c8c037c5a142c9a8d76287066c51adde96fcc309926fa3b4b87b3e0cc7444a2391511c97fabd5f9810e81ae0b737136ea6f7be39e434d5ae35de38dde54704d25c79949c00a7c09cc28d7673294f42a5f0a8761b30d64b741a226de7bad76402320e13822c45c0f8612c10b1f3c075ff1ebb755a2dd5760903000000000000006c6386d7ec7209d031f40f3012e9576e51a7f578602f5807785b92e544fc46c744aeeee4418d6af3e4195cc03710212436a4ff3274cac948d85cec074c6949e1298901ebb39522f6649dd76d067a82f5fe47fe5f17f99ab1e394ab800f4104dbffff0000000000005c6d1d224b64be6c4d7f47ef21eb7e46f9aa4a9779f8555eaea768c1f2c221c410ef4b253d110ee282ab94de93d928cf95846be6277c04b4c5324812696aa89e393c941d9541cc6238d0703394a90231ccca9c3499c9a4cd3cd8a4f8070000000b1b2d2747c45b0c52087b5efabf84960ba0e3c4c00322de328c10752a42dca52fb98c1452b6518a6ef7297f7b2744419a2f238f173d0cd46daf2fcb5500f53e7309ec91d83cf4fbf975d9c07d8d3c76e65760ff000000b78863e629b3b200000000000000000000000000008b0000000a449c810d3174cc7ee545867a3126af7a8b20744ea9875b9cba735b9594aa904e5a4bb2c3dfa8ea63e3e7000860000000004a2147c1128c697d9966b3c9f0e9e203911a3fac929a4fc6e625247510bc24e20ad88d4fe6a3ae2f7967546c4aae83352106057ab9cd4b3442a5d10451b95e22f30a85f5681ca3000000000000000000000396e7b6e1aa007018f6d93e79fce95d405b809238cca421c82c96f10dfa978bee51f581d124216e8b83d39db5df2c95d9b1855f77138e438bdc037865f07f98c068be4c6155ec27365410866059475714844a3ea4cbe37e0000000000ef6dc4dd63bb928ff58b3bd2a600089d172a88a8a39d92ad95e74dcdb8b9f9050297815a371deec596838e38068b5e438cbcd585a8cf37c496a8d2dab79d4242a353917ebdf2dc7926d80260898d4e1ca5e3a833f8f65429845bc3c3092af2bc4ee7263d3cbd9cab24eafd961a2d0c7bbfca952475c7e6158bfbb32f187d18f977117101076bad4167d5559ac12ff1473fa0ac0c0e71925a25933bfe309a040034b0cc8f69074670efc8101b89477d23823605dfa8e5945c71a0225b50d18a010ecf3c349cbac4d5191c3d78726b9ab4bff5e05027ca5b338a62e955e514da8ca2846919b7b56c192bb43f7032e485cc664921b7f9133bdbc2ba3cd845997b0dd103c784a53ad0243624566e0dacfe4029ffbe59e7e7751b3a9e619107bde39bfa81791ff0e4577055528aef46891c3c49afda8137d03cf6893db7b0f1fe95f8a096159869db71853b6bb5c08ce5fc61353f1e659d7ac53f54a7e2c94cba21994930a423ac7f84ed873a76b0dda0a4b4c5f87eef3164a0c03bc2a7f08290ddf300b298de3fd97160529231904fd7c67327499d167fb8b9c2f26e27f97cf5e90586ea50b85eb5b420eebe171893782b8326148ef5f5174e7ea5dd7f1caa699e4a241291c2f43e9edbf44c0ffb8ee32a18b659d87fe8f0b61836146e2eab9a767800c2c91190c96cf88466adf775b4cf517dc5e39be99c4ab471f381c3915203cd2f27466c8943a80ba03150699c787696de272affa4e4940e59d8b7c69f804d425e77976c00ca6d3fa7543176a4df033532e5053d72521d097dda0c7a70bd1278c61513c1b87b01d9a9ec4de14693096dab53d3224f245fd5d87984d58dc09d11ba0094ba8c39942be41f362e29bba1cdcf8068a4d8d67d2d6d79aa2d089bc4d475097d7523860ec41dab4fa4b0cfe674c163ad419753bd73882336d42036a179bb33162b31f2a58436ea88fba598fad987a60b1847cc63a77c2bb30477ecbeaaa590cde56be4102d0365987eed64bdf01bbd9aaeb77dde491845e612557fde64b3a185122ff97a365844582ef9086aa0b74bf8a1ba90a8daf3c716f1e7d7d2b20c878027b2f15cb8576d4cbac85aee331a7e38473a91027daec042fc1e2e7665bf3d3e79aed63b521a1541b2e302c9cf222a86ba7a3889861aa18a3104d657a3a5eeac42d91fbaa41885993b78a0b75412d0dd4e0dbb4b55a1076a7b00d0d24d9028a904b1e5b34863f843cd3854e8f73a009662db77b30e9404bfd9c8cb1ea5ed43d7d1198cb8398efa51220708dcd4f7fe373b869ade64a292c58c8737d10ff9409c507f853d3702f4edd09ffad5c42a16166899c46773527d706bcac91abe5614b71ef4f46b52040317d4d4a77236b16830e1bb90affab2df3e0f0251f3b1388f23bb6a05cf3de43dc7d0f312cedabc6dfca340584f208e0955a775af8124c648ec2824ae1a50b8e0b1065a78e069a70e5e671e5a"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000000)="b9ff03076003008cb89e08f00800", 0x0, 0xf001, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x6c}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r8 = openat$cgroup_ro(r7, &(0x7f0000000300)='blkio.bfq.sectors_recursive\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4030582a, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) write$cgroup_devices(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="1e0306003c5c980128846360864666702c1ffe80"], 0xffdd) 65.065175ms ago: executing program 2 (id=364): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000fcffffff18110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r3}, 0x10) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00000000000000000000000001ac1414aa"], 0xfdef) 42.369037ms ago: executing program 2 (id=365): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f00000009c0)=""/4096, 0x0, 0x1000, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1700000000000000040000000300000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000010000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0x200}, 0x8) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000004000000bb7f1b00d600feff0000000a9500000000000001"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xd0, @void, @value}, 0x80) 25.739678ms ago: executing program 3 (id=366): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000140)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1206450000000400000008f1801dfb95c98762", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500), 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000005c0)={0x7, 0x0}, 0x8) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000067d3fd0a00000000090000003ca40100fcff586a363e00002020732500000000002020207b1af8ff00000000bfa10000000000000701000052ffffea44b12e0008000000"], &(0x7f0000000300)='GPL\x00', 0x20, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, r4, 0x8, &(0x7f0000000540)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, r5, 0xffffffffffffffff, 0x2, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff, r6, 0xffffffffffffffff], &(0x7f0000000700)=[{0x5, 0x3, 0x2, 0xc}, {0x5, 0x5, 0xe, 0x3}], 0x10, 0x9, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r9}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0xb, 0x5, 0x10001, 0x89, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r10, 0x0, &(0x7f0000000300)=""/129}, 0x20) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000080)) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r11, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb96f37538e486dd63726558"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) 0s ago: executing program 1 (id=367): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)='%-5lx \x00'}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x2, 0x600, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xa, 0x4, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, &(0x7f0000000880)='GPL\x00', 0x5, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x87, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x80000000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0xd6, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x6, 0x15, &(0x7f0000001480)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b705000000000000611052000000000007000000000000009500000000000800"], &(0x7f00000002c0)='GPL\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2a) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x9, &(0x7f0000000740)=ANY=[@ANYBLOB="18120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000184700000800000000000000000018410000f8ffffff00000000000000000000cd667b08c93ce6fa730dbffbea26eddae262a65e5f93fc2d1cf06906e37fafe3a01907c067a7bfd1b9e669afcd40e0a90fbef70c3d6745fcb9f4b4bcc445595b669e3319020000000000000000ef0f645d5554cf923be026a46e42806c451f832ba16de73f1ec91900fff85dd9970199fc520f1a1215457932"], 0x0, 0x8, 0x32, &(0x7f00000001c0)=""/50, 0x41000, 0x21, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xe8, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8840b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.209' (ED25519) to the list of known hosts. [ 22.392501][ T30] audit: type=1400 audit(1726171934.897:66): avc: denied { integrity } for pid=277 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 22.420789][ T30] audit: type=1400 audit(1726171934.927:67): avc: denied { mounton } for pid=277 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.422342][ T277] cgroup: Unknown subsys name 'net' [ 22.449838][ T30] audit: type=1400 audit(1726171934.927:68): avc: denied { mount } for pid=277 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.486145][ T30] audit: type=1400 audit(1726171934.967:69): avc: denied { unmount } for pid=277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.486447][ T277] cgroup: Unknown subsys name 'devices' [ 22.665525][ T277] cgroup: Unknown subsys name 'hugetlb' [ 22.671925][ T277] cgroup: Unknown subsys name 'rlimit' [ 22.833375][ T30] audit: type=1400 audit(1726171935.347:70): avc: denied { setattr } for pid=277 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.860147][ T30] audit: type=1400 audit(1726171935.347:71): avc: denied { mounton } for pid=277 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.866315][ T280] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.887165][ T30] audit: type=1400 audit(1726171935.347:72): avc: denied { mount } for pid=277 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 22.921947][ T30] audit: type=1400 audit(1726171935.417:73): avc: denied { relabelto } for pid=280 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.950726][ T30] audit: type=1400 audit(1726171935.417:74): avc: denied { write } for pid=280 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.985286][ T30] audit: type=1400 audit(1726171935.497:75): avc: denied { read } for pid=277 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.017318][ T277] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.806793][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.814145][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.822233][ T287] device bridge_slave_0 entered promiscuous mode [ 23.831114][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.839514][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.848242][ T287] device bridge_slave_1 entered promiscuous mode [ 23.911008][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.920055][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.928815][ T289] device bridge_slave_0 entered promiscuous mode [ 23.938914][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.947773][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.957531][ T289] device bridge_slave_1 entered promiscuous mode [ 24.076310][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.085652][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.095232][ T288] device bridge_slave_0 entered promiscuous mode [ 24.103499][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.112125][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.121249][ T288] device bridge_slave_1 entered promiscuous mode [ 24.134561][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.143105][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.155965][ T290] device bridge_slave_0 entered promiscuous mode [ 24.179621][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.188670][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.197488][ T290] device bridge_slave_1 entered promiscuous mode [ 24.210525][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.218913][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.227374][ T291] device bridge_slave_0 entered promiscuous mode [ 24.238253][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.247173][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.255692][ T291] device bridge_slave_1 entered promiscuous mode [ 24.377457][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.385415][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.393706][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.401527][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.433212][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.441443][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.450224][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.458227][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.479552][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.489031][ T288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.498414][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.509649][ T288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.567790][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.578949][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.588396][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.599378][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.627025][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.636526][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.646876][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.655839][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.666451][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.676319][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.686089][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.694428][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.704999][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.732957][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.743967][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.752811][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.761920][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.771965][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.784396][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.805469][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.815818][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.827448][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.835938][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.847145][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.856896][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.865780][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.874202][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.893004][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.903385][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.913419][ T299] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.921424][ T299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.930633][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.943256][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.953061][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.962067][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.986436][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.995767][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.007109][ T299] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.015691][ T299] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.025639][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.035116][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.044554][ T299] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.052191][ T299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.060655][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.070773][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.080620][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.090443][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.100746][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.110555][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.142716][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.152316][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.163355][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.172046][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.181932][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.192286][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.202517][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.213712][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.222456][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.230808][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.239679][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.247098][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.254551][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.263182][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.273429][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.281486][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.294708][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.303437][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.321034][ T288] device veth0_vlan entered promiscuous mode [ 25.333643][ T289] device veth0_vlan entered promiscuous mode [ 25.341658][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.352622][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.361905][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.370606][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.379162][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.387522][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.396059][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.404852][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.413667][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.425261][ T287] device veth0_vlan entered promiscuous mode [ 25.441649][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.451602][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.460564][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.470047][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.479793][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.489218][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.497786][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.509185][ T288] device veth1_macvtap entered promiscuous mode [ 25.525504][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.536851][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.546843][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.555531][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.571222][ T287] device veth1_macvtap entered promiscuous mode [ 25.587830][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.598366][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.611822][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.625206][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.638058][ T291] device veth0_vlan entered promiscuous mode [ 25.652001][ T289] device veth1_macvtap entered promiscuous mode [ 25.661778][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.674240][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.685817][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.696527][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.707359][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.716425][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.724321][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.733123][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.742824][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.751974][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.769556][ T291] device veth1_macvtap entered promiscuous mode [ 25.783821][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.794041][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.805618][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.815640][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.827445][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.837321][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.847087][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.856916][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.866555][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.886908][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.896033][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.904637][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.913979][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.931465][ T290] device veth0_vlan entered promiscuous mode [ 25.946188][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.956327][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.966336][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.974959][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.983937][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.993367][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.002791][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.013063][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.050569][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.064126][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.071905][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.081603][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.092162][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.103008][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.113360][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.123260][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.140318][ T290] device veth1_macvtap entered promiscuous mode [ 26.170269][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.184088][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.207275][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.239066][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.248900][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.278843][ T328] device pim6reg1 entered promiscuous mode [ 26.326705][ T333] device pim6reg1 entered promiscuous mode [ 26.330951][ C1] hrtimer: interrupt took 18843 ns [ 26.458344][ T323] syz.0.1[323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.492048][ T99] udevd[99]: worker [321] terminated by signal 33 (Unknown signal 33) [ 26.520415][ T99] udevd[99]: worker [321] failed while handling '/devices/virtual/block/loop2' [ 26.551744][ T99] udevd[99]: worker [316] terminated by signal 33 (Unknown signal 33) [ 26.574019][ T99] udevd[99]: worker [316] failed while handling '/devices/virtual/block/loop3' [ 26.847372][ T377] device pim6reg1 entered promiscuous mode [ 26.886871][ T380] device pim6reg1 entered promiscuous mode [ 26.918185][ T383] FAULT_INJECTION: forcing a failure. [ 26.918185][ T383] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 26.950655][ T383] CPU: 1 PID: 383 Comm: syz.1.25 Not tainted 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 26.961755][ T383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 26.974320][ T383] Call Trace: [ 26.977711][ T383] [ 26.980567][ T383] dump_stack_lvl+0x151/0x1c0 [ 26.986701][ T383] ? io_uring_drop_tctx_refs+0x190/0x190 [ 26.992816][ T383] dump_stack+0x15/0x20 [ 26.997921][ T383] should_fail+0x3c6/0x510 [ 27.002693][ T383] should_fail_usercopy+0x1a/0x20 [ 27.007874][ T383] _copy_to_user+0x20/0x90 [ 27.012344][ T383] simple_read_from_buffer+0xc7/0x150 [ 27.017762][ T383] proc_fail_nth_read+0x1a3/0x210 [ 27.023490][ T383] ? proc_fault_inject_write+0x390/0x390 [ 27.030065][ T383] ? fsnotify_perm+0x470/0x5d0 [ 27.035368][ T383] ? security_file_permission+0x86/0xb0 [ 27.040722][ T383] ? proc_fault_inject_write+0x390/0x390 [ 27.046442][ T383] vfs_read+0x27d/0xd40 [ 27.050773][ T383] ? kernel_read+0x1f0/0x1f0 [ 27.055107][ T383] ? __kasan_check_write+0x14/0x20 [ 27.061261][ T383] ? mutex_lock+0xb6/0x1e0 [ 27.066206][ T383] ? wait_for_completion_killable_timeout+0x10/0x10 [ 27.075128][ T383] ? __fdget_pos+0x2e7/0x3a0 [ 27.080677][ T383] ? ksys_read+0x77/0x2c0 [ 27.085297][ T383] ksys_read+0x199/0x2c0 [ 27.090904][ T383] ? __kasan_check_write+0x14/0x20 [ 27.095842][ T383] ? vfs_write+0x1110/0x1110 [ 27.100549][ T383] ? __kasan_check_read+0x11/0x20 [ 27.105893][ T383] __x64_sys_read+0x7b/0x90 [ 27.111817][ T383] x64_sys_call+0x28/0x9a0 [ 27.118263][ T383] do_syscall_64+0x3b/0xb0 [ 27.124087][ T383] ? clear_bhb_loop+0x35/0x90 [ 27.130058][ T383] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 27.137735][ T383] RIP: 0033:0x7ff253be993c [ 27.144049][ T383] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 27.171743][ T383] RSP: 002b:00007ff252864030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 27.183988][ T383] RAX: ffffffffffffffda RBX: 00007ff253da2f80 RCX: 00007ff253be993c [ 27.194191][ T383] RDX: 000000000000000f RSI: 00007ff2528640a0 RDI: 0000000000000006 [ 27.203262][ T383] RBP: 00007ff252864090 R08: 0000000000000000 R09: 0000000000000000 [ 27.213697][ T383] R10: 0000000020000380 R11: 0000000000000246 R12: 0000000000000001 [ 27.222499][ T383] R13: 0000000000000000 R14: 00007ff253da2f80 R15: 00007ffff9d6f598 [ 27.232925][ T383] [ 27.435390][ T419] device pim6reg1 entered promiscuous mode [ 27.467095][ T30] kauditd_printk_skb: 37 callbacks suppressed [ 27.467116][ T30] audit: type=1400 audit(1726171939.977:113): avc: denied { cpu } for pid=422 comm="syz.3.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 27.549576][ T429] FAULT_INJECTION: forcing a failure. [ 27.549576][ T429] name failslab, interval 1, probability 0, space 0, times 1 [ 27.568121][ T429] CPU: 0 PID: 429 Comm: syz.2.44 Not tainted 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 27.579201][ T429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 27.590048][ T429] Call Trace: [ 27.593348][ T429] [ 27.596202][ T429] dump_stack_lvl+0x151/0x1c0 [ 27.600892][ T429] ? io_uring_drop_tctx_refs+0x190/0x190 [ 27.608743][ T429] dump_stack+0x15/0x20 [ 27.613325][ T429] should_fail+0x3c6/0x510 [ 27.618896][ T429] __should_failslab+0xa4/0xe0 [ 27.624151][ T429] should_failslab+0x9/0x20 [ 27.629433][ T429] slab_pre_alloc_hook+0x37/0xd0 [ 27.635515][ T429] __kmalloc+0x6d/0x270 [ 27.640508][ T429] ? btf_new_fd+0x2d3/0x910 [ 27.648765][ T429] ? kvmalloc_node+0x1f0/0x4d0 [ 27.654608][ T429] ? sort_r+0x1fa/0x1310 [ 27.659595][ T429] kvmalloc_node+0x1f0/0x4d0 [ 27.665172][ T429] ? vm_mmap+0xb0/0xb0 [ 27.670102][ T429] ? btf_ref_type_check_meta+0x488/0x5b0 [ 27.678613][ T429] btf_check_all_metas+0x48a/0xa40 [ 27.686043][ T429] btf_parse_type_sec+0x141/0x1c10 [ 27.692729][ T429] ? __btf_verifier_log+0x120/0x120 [ 27.699102][ T429] ? sort+0x37/0x50 [ 27.703844][ T429] ? btf_check_sec_info+0x371/0x4f0 [ 27.711210][ T429] ? btf_verifier_log+0x2a0/0x2a0 [ 27.718641][ T429] ? kvmalloc_node+0x281/0x4d0 [ 27.725249][ T429] ? __btf_type_is_scalar_struct+0xa30/0xa30 [ 27.732872][ T429] ? btf_parse_hdr+0x5e6/0x7c0 [ 27.740035][ T429] ? btf_parse_str_sec+0x20e/0x2a0 [ 27.747000][ T429] btf_new_fd+0x59b/0x910 [ 27.751636][ T429] bpf_btf_load+0x6f/0x90 [ 27.755890][ T429] __sys_bpf+0x50e/0x760 [ 27.760756][ T429] ? fput_many+0x160/0x1b0 [ 27.765176][ T429] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 27.770547][ T429] ? debug_smp_processor_id+0x17/0x20 [ 27.778859][ T429] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 27.786847][ T429] __x64_sys_bpf+0x7c/0x90 [ 27.791670][ T429] x64_sys_call+0x87f/0x9a0 [ 27.796428][ T429] do_syscall_64+0x3b/0xb0 [ 27.801041][ T429] ? clear_bhb_loop+0x35/0x90 [ 27.806162][ T429] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 27.812740][ T429] RIP: 0033:0x7f69e98c7ef9 [ 27.817938][ T429] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 27.839090][ T429] RSP: 002b:00007f69e8541038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 27.849748][ T429] RAX: ffffffffffffffda RBX: 00007f69e9a7ff80 RCX: 00007f69e98c7ef9 [ 27.858537][ T429] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 0000000000000012 [ 27.868018][ T429] RBP: 00007f69e8541090 R08: 0000000000000000 R09: 0000000000000000 [ 27.877806][ T429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 27.887391][ T429] R13: 0000000000000000 R14: 00007f69e9a7ff80 R15: 00007ffe46bfd308 [ 27.896221][ T429] [ 27.929194][ T441] device pim6reg1 entered promiscuous mode [ 28.061367][ T460] device macsec0 entered promiscuous mode [ 28.139896][ T469] device pim6reg1 entered promiscuous mode [ 28.167347][ T477] FAULT_INJECTION: forcing a failure. [ 28.167347][ T477] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 28.192778][ T477] CPU: 1 PID: 477 Comm: syz.0.62 Not tainted 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 28.205323][ T477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 28.216363][ T477] Call Trace: [ 28.219794][ T477] [ 28.222519][ T477] dump_stack_lvl+0x151/0x1c0 [ 28.227555][ T477] ? io_uring_drop_tctx_refs+0x190/0x190 [ 28.233891][ T477] dump_stack+0x15/0x20 [ 28.238223][ T477] should_fail+0x3c6/0x510 [ 28.242690][ T477] should_fail_usercopy+0x1a/0x20 [ 28.247833][ T477] _copy_from_user+0x20/0xd0 [ 28.252974][ T477] __sys_bpf+0x1e9/0x760 [ 28.257977][ T477] ? fput_many+0x160/0x1b0 [ 28.263926][ T477] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 28.269385][ T477] ? debug_smp_processor_id+0x17/0x20 [ 28.275234][ T477] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 28.283077][ T477] __x64_sys_bpf+0x7c/0x90 [ 28.288105][ T477] x64_sys_call+0x87f/0x9a0 [ 28.292667][ T477] do_syscall_64+0x3b/0xb0 [ 28.297069][ T477] ? clear_bhb_loop+0x35/0x90 [ 28.301754][ T477] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 28.309174][ T477] RIP: 0033:0x7f81fbbdfef9 [ 28.315731][ T477] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 28.338178][ T477] RSP: 002b:00007f81fa859038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 28.348107][ T477] RAX: ffffffffffffffda RBX: 00007f81fbd97f80 RCX: 00007f81fbbdfef9 [ 28.358831][ T477] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 0000000000000012 [ 28.369058][ T477] RBP: 00007f81fa859090 R08: 0000000000000000 R09: 0000000000000000 [ 28.378858][ T477] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 28.387869][ T477] R13: 0000000000000000 R14: 00007f81fbd97f80 R15: 00007fffc7673218 [ 28.396685][ T477] [ 28.403935][ T479] device pim6reg1 entered promiscuous mode [ 28.764003][ T517] device pim6reg1 entered promiscuous mode [ 28.774882][ T523] device veth0_vlan left promiscuous mode [ 28.782977][ T523] device veth0_vlan entered promiscuous mode [ 28.794423][ T527] device pim6reg1 entered promiscuous mode [ 28.874188][ T30] audit: type=1400 audit(1726171941.387:114): avc: denied { relabelfrom } for pid=528 comm="syz.4.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.942421][ T30] audit: type=1400 audit(1726171941.387:115): avc: denied { relabelto } for pid=528 comm="syz.4.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.976916][ T551] FAULT_INJECTION: forcing a failure. [ 28.976916][ T551] name failslab, interval 1, probability 0, space 0, times 0 [ 29.005689][ T551] CPU: 0 PID: 551 Comm: syz.1.89 Not tainted 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 29.016378][ T551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 29.030368][ T551] Call Trace: [ 29.034077][ T551] [ 29.037299][ T551] dump_stack_lvl+0x151/0x1c0 [ 29.042117][ T551] ? io_uring_drop_tctx_refs+0x190/0x190 [ 29.048170][ T551] ? __kasan_check_write+0x14/0x20 [ 29.053260][ T551] ? mutex_unlock+0xb2/0x260 [ 29.057979][ T551] dump_stack+0x15/0x20 [ 29.062259][ T551] should_fail+0x3c6/0x510 [ 29.067021][ T551] __should_failslab+0xa4/0xe0 [ 29.073231][ T551] ? getname_flags+0xba/0x520 [ 29.078136][ T551] should_failslab+0x9/0x20 [ 29.083410][ T551] slab_pre_alloc_hook+0x37/0xd0 [ 29.089264][ T551] ? getname_flags+0xba/0x520 [ 29.094627][ T551] kmem_cache_alloc+0x44/0x200 [ 29.099958][ T551] ? __ia32_sys_read+0x90/0x90 [ 29.106537][ T551] getname_flags+0xba/0x520 [ 29.113990][ T551] __x64_sys_mkdirat+0x7c/0xa0 [ 29.120214][ T551] x64_sys_call+0x6c6/0x9a0 [ 29.126768][ T551] do_syscall_64+0x3b/0xb0 [ 29.132372][ T551] ? clear_bhb_loop+0x35/0x90 [ 29.137489][ T551] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 29.145066][ T551] RIP: 0033:0x7ff253beaef9 [ 29.150614][ T551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 29.174178][ T551] RSP: 002b:00007ff252864038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 29.185089][ T551] RAX: ffffffffffffffda RBX: 00007ff253da2f80 RCX: 00007ff253beaef9 [ 29.194320][ T551] RDX: 00000000000001ff RSI: 0000000020000140 RDI: 0000000000000003 [ 29.203743][ T551] RBP: 00007ff252864090 R08: 0000000000000000 R09: 0000000000000000 [ 29.212424][ T551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 29.221370][ T551] R13: 0000000000000000 R14: 00007ff253da2f80 R15: 00007ffff9d6f598 [ 29.230190][ T551] [ 29.439966][ T560] device pim6reg1 entered promiscuous mode [ 29.555759][ T568] device pim6reg1 entered promiscuous mode [ 29.608773][ T570] FAULT_INJECTION: forcing a failure. [ 29.608773][ T570] name failslab, interval 1, probability 0, space 0, times 0 [ 29.624962][ T570] CPU: 0 PID: 570 Comm: syz.1.97 Not tainted 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 29.636816][ T570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 29.648147][ T570] Call Trace: [ 29.651516][ T570] [ 29.654997][ T570] dump_stack_lvl+0x151/0x1c0 [ 29.660193][ T570] ? io_uring_drop_tctx_refs+0x190/0x190 [ 29.667194][ T570] ? memset+0x35/0x40 [ 29.671812][ T570] dump_stack+0x15/0x20 [ 29.677049][ T570] should_fail+0x3c6/0x510 [ 29.682714][ T570] __should_failslab+0xa4/0xe0 [ 29.687801][ T570] should_failslab+0x9/0x20 [ 29.692955][ T570] slab_pre_alloc_hook+0x37/0xd0 [ 29.699253][ T570] __kmalloc+0x6d/0x270 [ 29.703736][ T570] ? kvmalloc_node+0x1f0/0x4d0 [ 29.709839][ T570] kvmalloc_node+0x1f0/0x4d0 [ 29.714696][ T570] ? vm_mmap+0xb0/0xb0 [ 29.719338][ T570] btf_parse_type_sec+0x1c5/0x1c10 [ 29.726385][ T570] ? sort+0x37/0x50 [ 29.730255][ T570] ? btf_check_sec_info+0x371/0x4f0 [ 29.735405][ T570] ? btf_verifier_log+0x2a0/0x2a0 [ 29.740666][ T570] ? kvmalloc_node+0x281/0x4d0 [ 29.746041][ T570] ? __btf_type_is_scalar_struct+0xa30/0xa30 [ 29.752370][ T570] ? btf_parse_hdr+0x5e6/0x7c0 [ 29.757725][ T570] ? btf_parse_str_sec+0x20e/0x2a0 [ 29.762769][ T570] btf_new_fd+0x59b/0x910 [ 29.767366][ T570] bpf_btf_load+0x6f/0x90 [ 29.771977][ T570] __sys_bpf+0x50e/0x760 [ 29.776586][ T570] ? fput_many+0x160/0x1b0 [ 29.781284][ T570] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 29.787100][ T570] ? debug_smp_processor_id+0x17/0x20 [ 29.792809][ T570] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 29.799180][ T570] __x64_sys_bpf+0x7c/0x90 [ 29.804197][ T570] x64_sys_call+0x87f/0x9a0 [ 29.809131][ T570] do_syscall_64+0x3b/0xb0 [ 29.813842][ T570] ? clear_bhb_loop+0x35/0x90 [ 29.818995][ T570] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 29.825249][ T570] RIP: 0033:0x7ff253beaef9 [ 29.830544][ T570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 29.852951][ T570] RSP: 002b:00007ff252864038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 29.862432][ T570] RAX: ffffffffffffffda RBX: 00007ff253da2f80 RCX: 00007ff253beaef9 [ 29.870940][ T570] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 0000000000000012 [ 29.880248][ T570] RBP: 00007ff252864090 R08: 0000000000000000 R09: 0000000000000000 [ 29.889164][ T570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 29.897419][ T570] R13: 0000000000000000 R14: 00007ff253da2f80 R15: 00007ffff9d6f598 [ 29.906762][ T570] [ 30.414850][ T597] device pim6reg1 entered promiscuous mode [ 30.487968][ T604] device pim6reg1 entered promiscuous mode [ 30.498425][ T602] device veth1_macvtap left promiscuous mode [ 30.682124][ T616] FAULT_INJECTION: forcing a failure. [ 30.682124][ T616] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 30.805010][ T616] CPU: 0 PID: 616 Comm: syz.4.115 Not tainted 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 30.816295][ T616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 30.827735][ T616] Call Trace: [ 30.831107][ T616] [ 30.833972][ T616] dump_stack_lvl+0x151/0x1c0 [ 30.838864][ T616] ? io_uring_drop_tctx_refs+0x190/0x190 [ 30.844419][ T616] ? __kasan_check_write+0x14/0x20 [ 30.850085][ T616] dump_stack+0x15/0x20 [ 30.854422][ T616] should_fail+0x3c6/0x510 [ 30.859042][ T616] ? vlan_exit_net+0x20/0x20 [ 30.863907][ T616] should_fail_usercopy+0x1a/0x20 [ 30.870235][ T616] _copy_from_user+0x20/0xd0 [ 30.875348][ T616] ? vlan_exit_net+0x20/0x20 [ 30.880668][ T616] vlan_ioctl_handler+0xa2/0x9e0 [ 30.885922][ T616] ? vlan_exit_net+0x20/0x20 [ 30.890889][ T616] ? mutex_lock+0xb6/0x1e0 [ 30.896226][ T616] ? selinux_file_ioctl+0x3cc/0x540 [ 30.902088][ T616] ? vlan_exit_net+0x20/0x20 [ 30.907184][ T616] sock_ioctl+0x511/0x740 [ 30.911440][ T616] ? sock_poll+0x400/0x400 [ 30.917155][ T616] ? __fget_files+0x31e/0x380 [ 30.922133][ T616] ? security_file_ioctl+0x84/0xb0 [ 30.928147][ T616] ? sock_poll+0x400/0x400 [ 30.932998][ T616] __se_sys_ioctl+0x114/0x190 [ 30.938421][ T616] __x64_sys_ioctl+0x7b/0x90 [ 30.943077][ T616] x64_sys_call+0x98/0x9a0 [ 30.947855][ T616] do_syscall_64+0x3b/0xb0 [ 30.952367][ T616] ? clear_bhb_loop+0x35/0x90 [ 30.957670][ T616] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 30.965433][ T616] RIP: 0033:0x7fa11e916ef9 [ 30.970070][ T616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 30.992602][ T616] RSP: 002b:00007fa11d590038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 31.002118][ T616] RAX: ffffffffffffffda RBX: 00007fa11eacef80 RCX: 00007fa11e916ef9 [ 31.011042][ T616] RDX: 0000000020000500 RSI: 0000000000008982 RDI: 0000000000000003 [ 31.019876][ T616] RBP: 00007fa11d590090 R08: 0000000000000000 R09: 0000000000000000 [ 31.029575][ T616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 31.039804][ T616] R13: 0000000000000000 R14: 00007fa11eacef80 R15: 00007fff97edb658 [ 31.048607][ T616] [ 31.242470][ T631] device vxcan1 entered promiscuous mode [ 31.373749][ T637] device pim6reg1 entered promiscuous mode [ 31.382370][ T635] FAULT_INJECTION: forcing a failure. [ 31.382370][ T635] name failslab, interval 1, probability 0, space 0, times 0 [ 31.401503][ T635] CPU: 1 PID: 635 Comm: syz.2.121 Not tainted 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 31.412193][ T635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 31.423594][ T635] Call Trace: [ 31.426779][ T635] [ 31.429663][ T635] dump_stack_lvl+0x151/0x1c0 [ 31.434866][ T635] ? io_uring_drop_tctx_refs+0x190/0x190 [ 31.440939][ T635] ? __kasan_check_write+0x14/0x20 [ 31.447758][ T635] ? proc_fail_nth_write+0x20b/0x290 [ 31.454027][ T635] dump_stack+0x15/0x20 [ 31.459383][ T635] should_fail+0x3c6/0x510 [ 31.464670][ T635] __should_failslab+0xa4/0xe0 [ 31.470824][ T635] should_failslab+0x9/0x20 [ 31.475488][ T635] slab_pre_alloc_hook+0x37/0xd0 [ 31.481517][ T635] kmem_cache_alloc_trace+0x48/0x210 [ 31.487520][ T635] ? btf_new_fd+0x11e/0x910 [ 31.492749][ T635] btf_new_fd+0x11e/0x910 [ 31.498861][ T635] bpf_btf_load+0x6f/0x90 [ 31.503869][ T635] __sys_bpf+0x50e/0x760 [ 31.510947][ T635] ? fput_many+0x160/0x1b0 [ 31.516810][ T635] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 31.523161][ T635] ? debug_smp_processor_id+0x17/0x20 [ 31.528942][ T635] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 31.535817][ T635] __x64_sys_bpf+0x7c/0x90 [ 31.540954][ T635] x64_sys_call+0x87f/0x9a0 [ 31.545846][ T635] do_syscall_64+0x3b/0xb0 [ 31.550407][ T635] ? clear_bhb_loop+0x35/0x90 [ 31.555502][ T635] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 31.562142][ T635] RIP: 0033:0x7f69e98c7ef9 [ 31.568394][ T635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 31.594344][ T635] RSP: 002b:00007f69e8541038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 31.606810][ T635] RAX: ffffffffffffffda RBX: 00007f69e9a7ff80 RCX: 00007f69e98c7ef9 [ 31.617384][ T635] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 0000000000000012 [ 31.626509][ T635] RBP: 00007f69e8541090 R08: 0000000000000000 R09: 0000000000000000 [ 31.635173][ T635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 31.643519][ T635] R13: 0000000000000000 R14: 00007f69e9a7ff80 R15: 00007ffe46bfd308 [ 31.652061][ T635] [ 31.711952][ T646] device pim6reg1 entered promiscuous mode [ 31.736336][ T30] audit: type=1400 audit(1726171944.247:116): avc: denied { read } for pid=648 comm="syz.4.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.777503][ T30] audit: type=1400 audit(1726171944.287:117): avc: denied { setopt } for pid=657 comm="syz.0.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 32.058423][ T676] device pim6reg1 entered promiscuous mode [ 32.252307][ T690] device pim6reg1 entered promiscuous mode [ 33.513198][ T710] FAULT_INJECTION: forcing a failure. [ 33.513198][ T710] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 33.554223][ T706] device vxcan1 entered promiscuous mode [ 33.570543][ T710] CPU: 0 PID: 710 Comm: syz.2.151 Not tainted 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 33.581903][ T710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 33.593067][ T710] Call Trace: [ 33.596357][ T710] [ 33.599847][ T710] dump_stack_lvl+0x151/0x1c0 [ 33.606345][ T710] ? io_uring_drop_tctx_refs+0x190/0x190 [ 33.613536][ T710] dump_stack+0x15/0x20 [ 33.618226][ T710] should_fail+0x3c6/0x510 [ 33.624785][ T710] should_fail_usercopy+0x1a/0x20 [ 33.630739][ T710] strncpy_from_user+0x24/0x2d0 [ 33.636388][ T710] ? kmem_cache_alloc+0xf5/0x200 [ 33.642115][ T710] getname_flags+0xf2/0x520 [ 33.647581][ T710] __x64_sys_mkdirat+0x7c/0xa0 [ 33.654537][ T710] x64_sys_call+0x6c6/0x9a0 [ 33.659460][ T710] do_syscall_64+0x3b/0xb0 [ 33.664580][ T710] ? clear_bhb_loop+0x35/0x90 [ 33.669617][ T710] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 33.677404][ T710] RIP: 0033:0x7f69e98c7ef9 [ 33.682002][ T710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 33.703800][ T710] RSP: 002b:00007f69e8541038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 33.713449][ T710] RAX: ffffffffffffffda RBX: 00007f69e9a7ff80 RCX: 00007f69e98c7ef9 [ 33.722832][ T710] RDX: 00000000000001ff RSI: 0000000020000140 RDI: 0000000000000003 [ 33.731086][ T710] RBP: 00007f69e8541090 R08: 0000000000000000 R09: 0000000000000000 [ 33.740060][ T710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 33.748612][ T710] R13: 0000000000000000 R14: 00007f69e9a7ff80 R15: 00007ffe46bfd308 [ 33.757210][ T710] [ 33.770155][ T708] device pim6reg1 entered promiscuous mode [ 33.962817][ T716] device sit0 entered promiscuous mode [ 34.006776][ T720] FAULT_INJECTION: forcing a failure. [ 34.006776][ T720] name failslab, interval 1, probability 0, space 0, times 0 [ 34.040619][ T720] CPU: 0 PID: 720 Comm: syz.0.155 Not tainted 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 34.052098][ T720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 34.063013][ T720] Call Trace: [ 34.066211][ T720] [ 34.069241][ T720] dump_stack_lvl+0x151/0x1c0 [ 34.073950][ T720] ? io_uring_drop_tctx_refs+0x190/0x190 [ 34.079753][ T720] dump_stack+0x15/0x20 [ 34.084275][ T720] should_fail+0x3c6/0x510 [ 34.089328][ T720] __should_failslab+0xa4/0xe0 [ 34.094812][ T720] should_failslab+0x9/0x20 [ 34.100238][ T720] slab_pre_alloc_hook+0x37/0xd0 [ 34.106045][ T720] __kmalloc+0x6d/0x270 [ 34.110928][ T720] ? kvmalloc_node+0x1f0/0x4d0 [ 34.116712][ T720] kvmalloc_node+0x1f0/0x4d0 [ 34.122097][ T720] ? vm_mmap+0xb0/0xb0 [ 34.126213][ T720] btf_parse_type_sec+0x1e3/0x1c10 [ 34.131915][ T720] ? sort+0x37/0x50 [ 34.136058][ T720] ? btf_check_sec_info+0x371/0x4f0 [ 34.141736][ T720] ? btf_verifier_log+0x2a0/0x2a0 [ 34.148526][ T720] ? kvmalloc_node+0x281/0x4d0 [ 34.154125][ T720] ? __btf_type_is_scalar_struct+0xa30/0xa30 [ 34.162547][ T720] ? btf_parse_hdr+0x5e6/0x7c0 [ 34.167678][ T720] ? btf_parse_str_sec+0x20e/0x2a0 [ 34.172946][ T720] btf_new_fd+0x59b/0x910 [ 34.178274][ T720] bpf_btf_load+0x6f/0x90 [ 34.183012][ T720] __sys_bpf+0x50e/0x760 [ 34.187446][ T720] ? fput_many+0x160/0x1b0 [ 34.192402][ T720] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 34.198372][ T720] ? debug_smp_processor_id+0x17/0x20 [ 34.205380][ T720] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 34.213555][ T720] __x64_sys_bpf+0x7c/0x90 [ 34.219108][ T720] x64_sys_call+0x87f/0x9a0 [ 34.224177][ T720] do_syscall_64+0x3b/0xb0 [ 34.228842][ T720] ? clear_bhb_loop+0x35/0x90 [ 34.234024][ T720] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 34.241384][ T720] RIP: 0033:0x7f81fbbdfef9 [ 34.248046][ T720] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.271572][ T720] RSP: 002b:00007f81fa859038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 34.283053][ T720] RAX: ffffffffffffffda RBX: 00007f81fbd97f80 RCX: 00007f81fbbdfef9 [ 34.293117][ T720] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 0000000000000012 [ 34.302806][ T720] RBP: 00007f81fa859090 R08: 0000000000000000 R09: 0000000000000000 [ 34.312078][ T720] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 34.321088][ T720] R13: 0000000000000000 R14: 00007f81fbd97f80 R15: 00007fffc7673218 [ 34.329811][ T720] [ 34.491867][ T733] device pim6reg1 entered promiscuous mode [ 34.600584][ T741] device pim6reg1 entered promiscuous mode [ 34.705484][ T30] audit: type=1400 audit(1726171947.217:118): avc: denied { create } for pid=746 comm="syz.3.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 34.768924][ T754] device syzkaller0 entered promiscuous mode [ 34.837378][ T749] device sit0 entered promiscuous mode [ 35.071319][ T767] FAULT_INJECTION: forcing a failure. [ 35.071319][ T767] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 35.132853][ T767] CPU: 1 PID: 767 Comm: syz.4.172 Not tainted 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 35.145434][ T767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 35.158021][ T767] Call Trace: [ 35.162182][ T767] [ 35.165339][ T767] dump_stack_lvl+0x151/0x1c0 [ 35.170803][ T767] ? io_uring_drop_tctx_refs+0x190/0x190 [ 35.176524][ T767] ? mutex_unlock+0xb2/0x260 [ 35.181034][ T767] dump_stack+0x15/0x20 [ 35.186289][ T767] should_fail+0x3c6/0x510 [ 35.190956][ T767] should_fail_usercopy+0x1a/0x20 [ 35.196181][ T767] _copy_to_user+0x20/0x90 [ 35.200437][ T767] simple_read_from_buffer+0xc7/0x150 [ 35.206066][ T767] proc_fail_nth_read+0x1a3/0x210 [ 35.211356][ T767] ? proc_fault_inject_write+0x390/0x390 [ 35.218026][ T767] ? fsnotify_perm+0x470/0x5d0 [ 35.223002][ T767] ? security_file_permission+0x86/0xb0 [ 35.229059][ T767] ? proc_fault_inject_write+0x390/0x390 [ 35.236163][ T767] vfs_read+0x27d/0xd40 [ 35.240931][ T767] ? __kasan_check_write+0x14/0x20 [ 35.248337][ T767] ? kernel_read+0x1f0/0x1f0 [ 35.253950][ T767] ? __kasan_check_write+0x14/0x20 [ 35.260531][ T767] ? mutex_lock+0xb6/0x1e0 [ 35.266042][ T767] ? wait_for_completion_killable_timeout+0x10/0x10 [ 35.280413][ T767] ? __fdget_pos+0x2e7/0x3a0 [ 35.286035][ T767] ? ksys_read+0x77/0x2c0 [ 35.290577][ T767] ksys_read+0x199/0x2c0 [ 35.294999][ T767] ? vfs_write+0x1110/0x1110 [ 35.300325][ T767] ? debug_smp_processor_id+0x17/0x20 [ 35.305989][ T767] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 35.312223][ T767] __x64_sys_read+0x7b/0x90 [ 35.316837][ T767] x64_sys_call+0x28/0x9a0 [ 35.321578][ T767] do_syscall_64+0x3b/0xb0 [ 35.326340][ T767] ? clear_bhb_loop+0x35/0x90 [ 35.331191][ T767] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 35.337656][ T767] RIP: 0033:0x7fa11e91593c [ 35.341971][ T767] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 35.362454][ T767] RSP: 002b:00007fa11d590030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 35.371059][ T767] RAX: ffffffffffffffda RBX: 00007fa11eacef80 RCX: 00007fa11e91593c [ 35.379165][ T767] RDX: 000000000000000f RSI: 00007fa11d5900a0 RDI: 0000000000000007 [ 35.388024][ T767] RBP: 00007fa11d590090 R08: 0000000000000000 R09: 0000000000000000 [ 35.395833][ T767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 35.404025][ T767] R13: 0000000000000000 R14: 00007fa11eacef80 R15: 00007fff97edb658 [ 35.412023][ T767] [ 35.496562][ T784] device pim6reg1 entered promiscuous mode [ 35.534001][ T30] audit: type=1400 audit(1726171948.047:119): avc: denied { read } for pid=81 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 35.628792][ T791] device pim6reg1 entered promiscuous mode [ 35.688875][ T799] FAULT_INJECTION: forcing a failure. [ 35.688875][ T799] name failslab, interval 1, probability 0, space 0, times 0 [ 35.760877][ T799] CPU: 0 PID: 799 Comm: syz.0.184 Not tainted 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 35.771970][ T799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 35.784433][ T799] Call Trace: [ 35.788419][ T799] [ 35.792153][ T799] dump_stack_lvl+0x151/0x1c0 [ 35.798224][ T799] ? io_uring_drop_tctx_refs+0x190/0x190 [ 35.804504][ T799] dump_stack+0x15/0x20 [ 35.809890][ T799] should_fail+0x3c6/0x510 [ 35.815405][ T799] __should_failslab+0xa4/0xe0 [ 35.820856][ T799] should_failslab+0x9/0x20 [ 35.825826][ T799] slab_pre_alloc_hook+0x37/0xd0 [ 35.831344][ T799] kmem_cache_alloc_trace+0x48/0x210 [ 35.837289][ T799] ? btf_new_fd+0x297/0x910 [ 35.842385][ T799] btf_new_fd+0x297/0x910 [ 35.846746][ T799] bpf_btf_load+0x6f/0x90 [ 35.851423][ T799] __sys_bpf+0x50e/0x760 [ 35.856874][ T799] ? fput_many+0x160/0x1b0 [ 35.861685][ T799] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 35.868337][ T799] ? debug_smp_processor_id+0x17/0x20 [ 35.873721][ T799] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 35.880263][ T799] __x64_sys_bpf+0x7c/0x90 [ 35.885065][ T799] x64_sys_call+0x87f/0x9a0 [ 35.891071][ T799] do_syscall_64+0x3b/0xb0 [ 35.896214][ T799] ? clear_bhb_loop+0x35/0x90 [ 35.903288][ T799] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 35.912519][ T799] RIP: 0033:0x7f81fbbdfef9 [ 35.918913][ T799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 35.942634][ T799] RSP: 002b:00007f81fa859038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 35.952849][ T799] RAX: ffffffffffffffda RBX: 00007f81fbd97f80 RCX: 00007f81fbbdfef9 [ 35.961911][ T799] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 0000000000000012 [ 35.972287][ T799] RBP: 00007f81fa859090 R08: 0000000000000000 R09: 0000000000000000 [ 35.981378][ T799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 35.990234][ T799] R13: 0000000000000000 R14: 00007f81fbd97f80 R15: 00007fffc7673218 [ 35.999988][ T799] [ 36.299787][ T30] audit: type=1400 audit(1726171948.807:120): avc: denied { create } for pid=802 comm="syz.4.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 36.463867][ T827] device pim6reg1 entered promiscuous mode [ 36.505547][ T826] device pim6reg1 entered promiscuous mode [ 36.579017][ T30] audit: type=1400 audit(1726171949.087:121): avc: denied { create } for pid=833 comm="syz.3.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 36.658573][ T30] audit: type=1400 audit(1726171949.137:122): avc: denied { ioctl } for pid=838 comm="syz.0.199" path="/dev/ppp" dev="devtmpfs" ino=134 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.888290][ T854] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.897316][ T854] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.938000][ T854] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.951939][ T854] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.966624][ T854] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.975426][ T854] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.984882][ T854] device bridge0 entered promiscuous mode [ 37.017960][ T859] device pim6reg1 entered promiscuous mode [ 37.030234][ T755] syz.2.167 (755) used greatest stack depth: 21872 bytes left [ 37.044688][ T864] device pim6reg1 entered promiscuous mode [ 37.052641][ T866] device sit0 left promiscuous mode [ 37.091403][ T872] FAULT_INJECTION: forcing a failure. [ 37.091403][ T872] name failslab, interval 1, probability 0, space 0, times 0 [ 37.110449][ T872] CPU: 1 PID: 872 Comm: syz.0.214 Not tainted 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 37.123142][ T872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 37.137789][ T872] Call Trace: [ 37.141105][ T872] [ 37.144651][ T872] dump_stack_lvl+0x151/0x1c0 [ 37.151104][ T872] ? io_uring_drop_tctx_refs+0x190/0x190 [ 37.158587][ T872] dump_stack+0x15/0x20 [ 37.164590][ T872] should_fail+0x3c6/0x510 [ 37.170587][ T872] __should_failslab+0xa4/0xe0 [ 37.176182][ T872] ? __d_alloc+0x2d/0x6c0 [ 37.181388][ T872] should_failslab+0x9/0x20 [ 37.186328][ T872] slab_pre_alloc_hook+0x37/0xd0 [ 37.191255][ T872] ? __d_alloc+0x2d/0x6c0 [ 37.195939][ T872] kmem_cache_alloc+0x44/0x200 [ 37.201619][ T872] __d_alloc+0x2d/0x6c0 [ 37.205792][ T872] d_alloc+0x4b/0x1d0 [ 37.209896][ T872] lookup_one_qstr_excl+0xe7/0x290 [ 37.216100][ T872] filename_create+0x28e/0x530 [ 37.222750][ T872] ? kern_path_create+0x1a0/0x1a0 [ 37.227972][ T872] do_mkdirat+0xbd/0x450 [ 37.233266][ T872] ? strncpy_from_user+0x18e/0x2d0 [ 37.238671][ T872] ? vfs_mkdir+0x610/0x610 [ 37.244158][ T872] ? getname_flags+0x1fd/0x520 [ 37.249286][ T872] __x64_sys_mkdirat+0x89/0xa0 [ 37.255827][ T872] x64_sys_call+0x6c6/0x9a0 [ 37.261670][ T872] do_syscall_64+0x3b/0xb0 [ 37.266144][ T872] ? clear_bhb_loop+0x35/0x90 [ 37.271960][ T872] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 37.279262][ T872] RIP: 0033:0x7f81fbbdfef9 [ 37.284153][ T872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 37.310685][ T872] RSP: 002b:00007f81fa859038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 37.320495][ T872] RAX: ffffffffffffffda RBX: 00007f81fbd97f80 RCX: 00007f81fbbdfef9 [ 37.331290][ T872] RDX: 00000000000001ff RSI: 0000000020000140 RDI: 0000000000000003 [ 37.341120][ T872] RBP: 00007f81fa859090 R08: 0000000000000000 R09: 0000000000000000 [ 37.350775][ T872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 37.359657][ T872] R13: 0000000000000000 R14: 00007f81fbd97f80 R15: 00007fffc7673218 [ 37.368813][ T872] [ 37.439987][ T881] FAULT_INJECTION: forcing a failure. [ 37.439987][ T881] name failslab, interval 1, probability 0, space 0, times 0 [ 37.484310][ T881] CPU: 1 PID: 881 Comm: syz.0.218 Not tainted 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 37.497091][ T881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 37.512170][ T881] Call Trace: [ 37.516885][ T881] [ 37.521561][ T881] dump_stack_lvl+0x151/0x1c0 [ 37.530583][ T881] ? io_uring_drop_tctx_refs+0x190/0x190 [ 37.538755][ T881] dump_stack+0x15/0x20 [ 37.543292][ T881] should_fail+0x3c6/0x510 [ 37.551804][ T881] __should_failslab+0xa4/0xe0 [ 37.560816][ T881] should_failslab+0x9/0x20 [ 37.569026][ T881] slab_pre_alloc_hook+0x37/0xd0 [ 37.577530][ T881] __kmalloc+0x6d/0x270 [ 37.582861][ T881] ? kvmalloc_node+0x1f0/0x4d0 [ 37.590073][ T881] kvmalloc_node+0x1f0/0x4d0 [ 37.595844][ T881] ? vm_mmap+0xb0/0xb0 [ 37.600760][ T881] btf_parse_type_sec+0x201/0x1c10 [ 37.606167][ T881] ? sort+0x37/0x50 [ 37.610792][ T881] ? btf_check_sec_info+0x371/0x4f0 [ 37.616966][ T881] ? btf_verifier_log+0x2a0/0x2a0 [ 37.622875][ T881] ? kvmalloc_node+0x281/0x4d0 [ 37.627464][ T881] ? __btf_type_is_scalar_struct+0xa30/0xa30 [ 37.633278][ T881] ? btf_parse_hdr+0x5e6/0x7c0 [ 37.638247][ T881] ? btf_parse_str_sec+0x20e/0x2a0 [ 37.645761][ T881] btf_new_fd+0x59b/0x910 [ 37.651341][ T881] bpf_btf_load+0x6f/0x90 [ 37.656789][ T881] __sys_bpf+0x50e/0x760 [ 37.661623][ T881] ? fput_many+0x160/0x1b0 [ 37.667390][ T881] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 37.674700][ T881] ? debug_smp_processor_id+0x17/0x20 [ 37.682677][ T881] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 37.691422][ T881] __x64_sys_bpf+0x7c/0x90 [ 37.697826][ T881] x64_sys_call+0x87f/0x9a0 [ 37.703491][ T881] do_syscall_64+0x3b/0xb0 [ 37.709851][ T881] ? clear_bhb_loop+0x35/0x90 [ 37.717437][ T881] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 37.725219][ T881] RIP: 0033:0x7f81fbbdfef9 [ 37.731764][ T881] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 37.759391][ T881] RSP: 002b:00007f81fa859038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 37.769936][ T881] RAX: ffffffffffffffda RBX: 00007f81fbd97f80 RCX: 00007f81fbbdfef9 [ 37.780116][ T881] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 0000000000000012 [ 37.790424][ T881] RBP: 00007f81fa859090 R08: 0000000000000000 R09: 0000000000000000 [ 37.800361][ T881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 37.811362][ T881] R13: 0000000000000000 R14: 00007f81fbd97f80 R15: 00007fffc7673218 [ 37.819625][ T881] [ 38.267197][ T915] device pim6reg1 entered promiscuous mode [ 38.608101][ T941] FAULT_INJECTION: forcing a failure. [ 38.608101][ T941] name failslab, interval 1, probability 0, space 0, times 0 [ 38.637268][ T943] device pim6reg1 entered promiscuous mode [ 38.645791][ T941] CPU: 0 PID: 941 Comm: syz.2.242 Not tainted 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 38.658848][ T941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 38.672212][ T941] Call Trace: [ 38.676509][ T941] [ 38.681075][ T941] dump_stack_lvl+0x151/0x1c0 [ 38.690962][ T941] ? io_uring_drop_tctx_refs+0x190/0x190 [ 38.697673][ T941] ? __kasan_kmalloc+0x9/0x10 [ 38.704428][ T941] ? btf_new_fd+0x297/0x910 [ 38.710462][ T941] ? bpf_btf_load+0x6f/0x90 [ 38.716096][ T941] ? __sys_bpf+0x50e/0x760 [ 38.721413][ T941] ? x64_sys_call+0x87f/0x9a0 [ 38.726075][ T941] ? do_syscall_64+0x3b/0xb0 [ 38.732325][ T941] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 38.740204][ T941] dump_stack+0x15/0x20 [ 38.746300][ T941] should_fail+0x3c6/0x510 [ 38.752137][ T941] __should_failslab+0xa4/0xe0 [ 38.758083][ T941] should_failslab+0x9/0x20 [ 38.763873][ T941] slab_pre_alloc_hook+0x37/0xd0 [ 38.769909][ T941] __kmalloc+0x6d/0x270 [ 38.775733][ T941] ? kvmalloc_node+0x1f0/0x4d0 [ 38.781460][ T941] kvmalloc_node+0x1f0/0x4d0 [ 38.789284][ T941] ? vm_mmap+0xb0/0xb0 [ 38.794564][ T941] ? kmem_cache_alloc_trace+0x115/0x210 [ 38.801257][ T941] ? btf_new_fd+0x297/0x910 [ 38.806232][ T941] btf_new_fd+0x2d3/0x910 [ 38.810947][ T941] bpf_btf_load+0x6f/0x90 [ 38.816123][ T941] __sys_bpf+0x50e/0x760 [ 38.822217][ T941] ? fput_many+0x160/0x1b0 [ 38.827478][ T941] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 38.833803][ T941] ? debug_smp_processor_id+0x17/0x20 [ 38.840226][ T941] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 38.849459][ T941] __x64_sys_bpf+0x7c/0x90 [ 38.854806][ T941] x64_sys_call+0x87f/0x9a0 [ 38.859945][ T941] do_syscall_64+0x3b/0xb0 [ 38.866394][ T941] ? clear_bhb_loop+0x35/0x90 [ 38.872448][ T941] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 38.879705][ T941] RIP: 0033:0x7f69e98c7ef9 [ 38.885593][ T941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 38.910192][ T941] RSP: 002b:00007f69e8541038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 38.922970][ T941] RAX: ffffffffffffffda RBX: 00007f69e9a7ff80 RCX: 00007f69e98c7ef9 [ 38.934003][ T941] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 0000000000000012 [ 38.943226][ T941] RBP: 00007f69e8541090 R08: 0000000000000000 R09: 0000000000000000 [ 38.957465][ T941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 38.973753][ T941] R13: 0000000000000000 R14: 00007f69e9a7ff80 R15: 00007ffe46bfd308 [ 38.984869][ T941] [ 39.007588][ T30] audit: type=1400 audit(1726171951.517:123): avc: denied { create } for pid=946 comm="syz.2.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 39.275971][ T976] device pim6reg1 entered promiscuous mode [ 39.286841][ T984] device pim6reg1 entered promiscuous mode [ 39.363018][ T991] device pim6reg1 entered promiscuous mode [ 39.427853][ T994] device sit0 left promiscuous mode [ 39.621637][ T1017] device pim6reg1 entered promiscuous mode [ 39.668508][ T1022] FAULT_INJECTION: forcing a failure. [ 39.668508][ T1022] name failslab, interval 1, probability 0, space 0, times 0 [ 39.688054][ T1022] CPU: 0 PID: 1022 Comm: syz.0.272 Not tainted 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 39.703205][ T1022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 39.723986][ T1022] Call Trace: [ 39.729177][ T1022] [ 39.732825][ T1022] dump_stack_lvl+0x151/0x1c0 [ 39.739837][ T1022] ? io_uring_drop_tctx_refs+0x190/0x190 [ 39.747818][ T1022] dump_stack+0x15/0x20 [ 39.752542][ T1022] should_fail+0x3c6/0x510 [ 39.758584][ T1022] __should_failslab+0xa4/0xe0 [ 39.763917][ T1022] ? iget_locked+0x1db/0x860 [ 39.769750][ T1022] should_failslab+0x9/0x20 [ 39.774835][ T1022] slab_pre_alloc_hook+0x37/0xd0 [ 39.780218][ T1022] ? iget_locked+0x1db/0x860 [ 39.785332][ T1022] kmem_cache_alloc+0x44/0x200 [ 39.791603][ T1022] ? __d_alloc+0x2d/0x6c0 [ 39.796376][ T1022] iget_locked+0x1db/0x860 [ 39.801181][ T1022] kernfs_get_inode+0x4b/0x6b0 [ 39.807221][ T1022] ? kernfs_find_ns+0x457/0x4a0 [ 39.812883][ T1022] kernfs_iop_lookup+0x1f4/0x2f0 [ 39.818648][ T1022] lookup_one_qstr_excl+0x143/0x290 [ 39.825696][ T1022] filename_create+0x28e/0x530 [ 39.830879][ T1022] ? kern_path_create+0x1a0/0x1a0 [ 39.836782][ T1022] do_mkdirat+0xbd/0x450 [ 39.841370][ T1022] ? strncpy_from_user+0x18e/0x2d0 [ 39.846803][ T1022] ? vfs_mkdir+0x610/0x610 [ 39.851644][ T1022] ? getname_flags+0x1fd/0x520 [ 39.856657][ T1022] __x64_sys_mkdirat+0x89/0xa0 [ 39.861497][ T1022] x64_sys_call+0x6c6/0x9a0 [ 39.866830][ T1022] do_syscall_64+0x3b/0xb0 [ 39.871715][ T1022] ? clear_bhb_loop+0x35/0x90 [ 39.877084][ T1022] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 39.883886][ T1022] RIP: 0033:0x7f81fbbdfef9 [ 39.888745][ T1022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.911329][ T1022] RSP: 002b:00007f81fa859038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 39.921833][ T1022] RAX: ffffffffffffffda RBX: 00007f81fbd97f80 RCX: 00007f81fbbdfef9 [ 39.931456][ T1022] RDX: 00000000000001ff RSI: 0000000020000140 RDI: 0000000000000003 [ 39.940898][ T1022] RBP: 00007f81fa859090 R08: 0000000000000000 R09: 0000000000000000 [ 39.952347][ T1022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 39.960531][ T1022] R13: 0000000000000000 R14: 00007f81fbd97f80 R15: 00007fffc7673218 [ 39.969681][ T1022] [ 40.150359][ T1037] FAULT_INJECTION: forcing a failure. [ 40.150359][ T1037] name failslab, interval 1, probability 0, space 0, times 0 [ 40.263152][ T1037] CPU: 0 PID: 1037 Comm: syz.4.277 Not tainted 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 40.274188][ T1037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 40.285727][ T1037] Call Trace: [ 40.288842][ T1037] [ 40.292057][ T1037] dump_stack_lvl+0x151/0x1c0 [ 40.296666][ T1037] ? io_uring_drop_tctx_refs+0x190/0x190 [ 40.302698][ T1037] ? stack_trace_snprint+0xf0/0xf0 [ 40.307823][ T1037] dump_stack+0x15/0x20 [ 40.312262][ T1037] should_fail+0x3c6/0x510 [ 40.316777][ T1037] __should_failslab+0xa4/0xe0 [ 40.321550][ T1037] ? __d_alloc+0x2d/0x6c0 [ 40.326475][ T1037] should_failslab+0x9/0x20 [ 40.332231][ T1037] slab_pre_alloc_hook+0x37/0xd0 [ 40.337194][ T1037] ? __d_alloc+0x2d/0x6c0 [ 40.341935][ T1037] kmem_cache_alloc+0x44/0x200 [ 40.347035][ T1037] __d_alloc+0x2d/0x6c0 [ 40.351295][ T1037] ? __kasan_check_write+0x14/0x20 [ 40.356929][ T1037] ? _raw_spin_lock+0xa4/0x1b0 [ 40.361812][ T1037] d_alloc_pseudo+0x1d/0x70 [ 40.366619][ T1037] alloc_file_pseudo+0x131/0x2f0 [ 40.372197][ T1037] ? alloc_empty_file_noaccount+0x80/0x80 [ 40.377840][ T1037] __anon_inode_getfd+0x2aa/0x430 [ 40.383124][ T1037] ? anon_inode_getfd+0x40/0x40 [ 40.389732][ T1037] anon_inode_getfd+0x33/0x40 [ 40.394970][ T1037] btf_new_fd+0x77b/0x910 [ 40.401960][ T1037] bpf_btf_load+0x6f/0x90 [ 40.407222][ T1037] __sys_bpf+0x50e/0x760 [ 40.411953][ T1037] ? fput_many+0x160/0x1b0 [ 40.417657][ T1037] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 40.424275][ T1037] ? debug_smp_processor_id+0x17/0x20 [ 40.430119][ T1037] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 40.437824][ T1037] __x64_sys_bpf+0x7c/0x90 [ 40.443215][ T1037] x64_sys_call+0x87f/0x9a0 [ 40.448161][ T1037] do_syscall_64+0x3b/0xb0 [ 40.452788][ T1037] ? clear_bhb_loop+0x35/0x90 [ 40.460323][ T1037] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 40.468029][ T1037] RIP: 0033:0x7fa11e916ef9 [ 40.474838][ T1037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.503905][ T1037] RSP: 002b:00007fa11d590038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 40.515139][ T1037] RAX: ffffffffffffffda RBX: 00007fa11eacef80 RCX: 00007fa11e916ef9 [ 40.523773][ T1037] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 0000000000000012 [ 40.533092][ T1037] RBP: 00007fa11d590090 R08: 0000000000000000 R09: 0000000000000000 [ 40.541874][ T1037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 40.550666][ T1037] R13: 0000000000000000 R14: 00007fa11eacef80 R15: 00007fff97edb658 [ 40.560039][ T1037] [ 40.785693][ T1030] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.836285][ T1030] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.853727][ T1030] device bridge_slave_0 entered promiscuous mode [ 40.881222][ T1030] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.892199][ T30] audit: type=1400 audit(1726171953.407:124): avc: denied { create } for pid=1060 comm="syz.0.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 40.918553][ T1030] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.934357][ T1030] device bridge_slave_1 entered promiscuous mode [ 40.944783][ T1062] device pim6reg1 entered promiscuous mode [ 41.377531][ T1093] FAULT_INJECTION: forcing a failure. [ 41.377531][ T1093] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 41.493390][ T1093] CPU: 1 PID: 1093 Comm: syz.0.296 Not tainted 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 41.496114][ T1099] ------------[ cut here ]------------ [ 41.507906][ T1093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 41.507930][ T1093] Call Trace: [ 41.507939][ T1093] [ 41.507950][ T1093] dump_stack_lvl+0x151/0x1c0 [ 41.507984][ T1093] ? io_uring_drop_tctx_refs+0x190/0x190 [ 41.508004][ T1093] ? __kmalloc+0x13a/0x270 [ 41.508025][ T1093] ? kvmalloc_node+0x1f0/0x4d0 [ 41.508048][ T1093] dump_stack+0x15/0x20 [ 41.508067][ T1093] should_fail+0x3c6/0x510 [ 41.508109][ T1093] should_fail_usercopy+0x1a/0x20 [ 41.508127][ T1093] _copy_from_user+0x20/0xd0 [ 41.515492][ T1099] Please remove unsupported %[ 41.528103][ T1093] btf_new_fd+0x360/0x910 [ 41.528145][ T1093] bpf_btf_load+0x6f/0x90 [ 41.528163][ T1093] __sys_bpf+0x50e/0x760 [ 41.528179][ T1093] ? fput_many+0x160/0x1b0 [ 41.528198][ T1093] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 41.528219][ T1093] ? debug_smp_processor_id+0x17/0x20 [ 41.528238][ T1093] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 41.528261][ T1093] __x64_sys_bpf+0x7c/0x90 [ 41.528278][ T1093] x64_sys_call+0x87f/0x9a0 [ 41.528297][ T1093] do_syscall_64+0x3b/0xb0 [ 41.531978][ T1099] WARNING: CPU: 0 PID: 1099 at lib/vsprintf.c:2667 format_decode+0x12d2/0x1f10 [ 41.534991][ T1093] ? clear_bhb_loop+0x35/0x90 [ 41.535018][ T1093] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 41.535038][ T1093] RIP: 0033:0x7f81fbbdfef9 [ 41.535054][ T1093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 41.535068][ T1093] RSP: 002b:00007f81fa859038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 41.535091][ T1093] RAX: ffffffffffffffda RBX: 00007f81fbd97f80 RCX: 00007f81fbbdfef9 [ 41.535105][ T1093] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 0000000000000012 [ 41.535117][ T1093] RBP: 00007f81fa859090 R08: 0000000000000000 R09: 0000000000000000 [ 41.535130][ T1093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 41.535141][ T1093] R13: 0000000000000000 R14: 00007f81fbd97f80 R15: 00007fffc7673218 [ 41.535158][ T1093] [ 41.581647][ T1030] device veth0_vlan entered promiscuous mode [ 41.582681][ T1099] Modules linked in: [ 41.582702][ T1099] CPU: 0 PID: 1099 Comm: syz.2.298 Not tainted 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 41.582727][ T1099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 41.582737][ T1099] RIP: 0010:format_decode+0x12d2/0x1f10 [ 41.582768][ T1099] Code: 9d 04 01 48 b8 00 00 00 00 00 fc ff df 41 0f b6 04 07 84 c0 0f 85 30 0c 00 00 41 0f be 36 48 c7 c7 40 9e a4 85 e8 5e fb b8 fe <0f> 0b e9 01 fa ff ff 48 8b 4c 24 18 80 e1 07 38 c1 0f 8c e3 ed ff [ 41.598716][ T1030] device veth1_macvtap entered promiscuous mode [ 41.600862][ T1099] RSP: 0018:ffffc90000c9f600 EFLAGS: 00010246 [ 41.600895][ T1099] RAX: 996bd62632c4fd00 RBX: 00000000ffffffdb RCX: ffff88810af42780 [ 41.600910][ T1099] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 41.600921][ T1099] RBP: ffffc90000c9f6f0 R08: ffffffff815796f5 R09: 0000000000000003 [ 41.600933][ T1099] R10: fffff52000193e1c R11: dffffc0000000001 R12: ffff0a00ffffff00 [ 41.606602][ T30] audit: type=1400 audit(1726171954.077:125): avc: denied { remove_name } for pid=81 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 41.611042][ T1099] R13: ffff0000ffffff00 R14: ffffc90000c9f92c R15: 1ffff92000193f25 [ 41.611068][ T1099] FS: 00007f69e85206c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 41.611086][ T1099] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 41.611099][ T1099] CR2: 00007f69e84ffd58 CR3: 000000012889e000 CR4: 00000000003506b0 [ 41.611118][ T1099] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 41.611129][ T1099] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 41.611142][ T1099] Call Trace: [ 41.611147][ T1099] [ 41.611155][ T1099] ? show_regs+0x58/0x60 [ 41.611180][ T1099] ? __warn+0x160/0x2f0 [ 41.611196][ T1099] ? format_decode+0x12d2/0x1f10 [ 41.611216][ T1099] ? report_bug+0x3d9/0x5b0 [ 41.611235][ T1099] ? format_decode+0x12d2/0x1f10 [ 41.611252][ T1099] ? handle_bug+0x41/0x70 [ 41.611269][ T1099] ? exc_invalid_op+0x1b/0x50 [ 41.620131][ T30] audit: type=1400 audit(1726171954.077:126): avc: denied { rename } for pid=81 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 41.624261][ T1099] ? asm_exc_invalid_op+0x1b/0x20 [ 42.046315][ T1099] ? __wake_up_klogd+0xd5/0x110 [ 42.051410][ T1099] ? format_decode+0x12d2/0x1f10 [ 42.057377][ T1099] ? __kernel_text_address+0x9b/0x110 [ 42.063017][ T1099] ? vsnprintf+0x1c70/0x1c70 [ 42.069146][ T1099] ? bstr_printf+0x1b6/0x10c0 [ 42.075124][ T1099] ? memcpy+0x56/0x70 [ 42.079750][ T1099] bstr_printf+0x130/0x10c0 [ 42.085085][ T1099] ? bpf_bprintf_cleanup+0xc0/0xc0 [ 42.090290][ T1099] ? vbin_printf+0x1bc0/0x1bc0 [ 42.096190][ T1099] ? bpf_trace_printk+0x122/0x330 [ 42.103355][ T1099] ? memcpy+0x56/0x70 [ 42.107269][ T1099] bpf_trace_printk+0x1b5/0x330 [ 42.113032][ T1099] ? kmem_cache_alloc+0xf5/0x200 [ 42.121687][ T1099] ? ktime_get+0xf1/0x160 [ 42.127120][ T1099] ? bpf_probe_write_user+0xf0/0xf0 [ 42.134036][ T1099] ? x64_sys_call+0x87f/0x9a0 [ 42.140312][ T1099] ? ktime_get+0xf1/0x160 [ 42.146800][ T1099] bpf_prog_12183cdb1cd51dab+0x2e/0xc9c [ 42.154078][ T1099] bpf_test_run+0x478/0xa10 [ 42.159962][ T1099] ? convert___skb_to_skb+0x570/0x570 [ 42.167385][ T1099] ? eth_type_trans+0x2e4/0x620 [ 42.172868][ T1099] ? eth_get_headlen+0x240/0x240 [ 42.179757][ T1099] ? convert___skb_to_skb+0x44/0x570 [ 42.186465][ T1099] bpf_prog_test_run_skb+0xb41/0x1420 [ 42.193371][ T1099] ? cgroup_freezing+0x88/0xb0 [ 42.198932][ T1099] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 42.207915][ T1099] ? __kasan_check_write+0x14/0x20 [ 42.215211][ T1099] ? fput_many+0x160/0x1b0 [ 42.220809][ T1099] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 42.228142][ T1099] bpf_prog_test_run+0x3b0/0x630 [ 42.233676][ T1099] ? bpf_prog_query+0x220/0x220 [ 42.240603][ T1099] ? selinux_bpf+0xd2/0x100 [ 42.246182][ T1099] ? security_bpf+0x82/0xb0 [ 42.253982][ T1099] __sys_bpf+0x525/0x760 [ 42.259585][ T1099] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 42.266348][ T1099] ? __kasan_check_read+0x11/0x20 [ 42.271934][ T1099] __x64_sys_bpf+0x7c/0x90 [ 42.279298][ T1099] x64_sys_call+0x87f/0x9a0 [ 42.284221][ T1099] do_syscall_64+0x3b/0xb0 [ 42.288887][ T1099] ? clear_bhb_loop+0x35/0x90 [ 42.294515][ T1099] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 42.304040][ T1099] RIP: 0033:0x7f69e98c7ef9 [ 42.309543][ T1099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.335000][ T1099] RSP: 002b:00007f69e8520038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 42.344602][ T1099] RAX: ffffffffffffffda RBX: 00007f69e9a80058 RCX: 00007f69e98c7ef9 [ 42.353646][ T1099] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 42.362950][ T1099] RBP: 00007f69e993ab76 R08: 0000000000000000 R09: 0000000000000000 [ 42.372865][ T1099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 42.382986][ T1099] R13: 0000000000000000 R14: 00007f69e9a80058 R15: 00007ffe46bfd308 [ 42.391606][ T1099] [ 42.395581][ T1099] ---[ end trace d7d1ccbaaa8cc137 ]--- [ 42.410314][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 42.421044][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 42.450953][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 42.460582][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 42.472681][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 42.483075][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 42.492675][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 42.504243][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 42.516226][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 42.526353][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 42.538375][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 42.548019][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.556990][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.568061][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 42.579880][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 42.591898][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.602699][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.614612][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 42.626586][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 42.636751][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 42.648971][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 42.664881][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 42.677894][ T30] audit: type=1400 audit(1726171955.187:127): avc: denied { mounton } for pid=1030 comm="syz-executor" path="/root/syzkaller.Wrv8V2/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 42.707140][ T30] audit: type=1400 audit(1726171955.197:128): avc: denied { mount } for pid=1030 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 42.737716][ T30] audit: type=1400 audit(1726171955.247:129): avc: denied { mounton } for pid=1030 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 42.756477][ T1119] device pim6reg1 entered promiscuous mode [ 42.804026][ T30] audit: type=1400 audit(1726171955.307:130): avc: denied { create } for pid=1120 comm="syz.0.307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 43.012688][ T30] audit: type=1400 audit(1726171955.517:131): avc: denied { tracepoint } for pid=1140 comm="syz.4.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 43.084586][ T30] audit: type=1400 audit(1726171955.597:132): avc: denied { create } for pid=1140 comm="syz.4.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 43.136492][ T1153] FAULT_INJECTION: forcing a failure. [ 43.136492][ T1153] name failslab, interval 1, probability 0, space 0, times 0 [ 43.150685][ T1149] device pim6reg1 entered promiscuous mode [ 43.154389][ T1153] CPU: 0 PID: 1153 Comm: syz.4.320 Tainted: G W 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 43.172736][ T1153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 43.185384][ T1153] Call Trace: [ 43.189899][ T1153] [ 43.192955][ T1153] dump_stack_lvl+0x151/0x1c0 [ 43.199792][ T1153] ? io_uring_drop_tctx_refs+0x190/0x190 [ 43.206594][ T1153] ? pcpu_memcg_post_alloc_hook+0x1b1/0x260 [ 43.213353][ T1153] ? trace_raw_output_percpu_destroy_chunk+0xc0/0xc0 [ 43.221159][ T1153] dump_stack+0x15/0x20 [ 43.225882][ T1153] should_fail+0x3c6/0x510 [ 43.230449][ T1153] __should_failslab+0xa4/0xe0 [ 43.235227][ T1153] should_failslab+0x9/0x20 [ 43.240074][ T1153] slab_pre_alloc_hook+0x37/0xd0 [ 43.245431][ T1153] kmem_cache_alloc_trace+0x48/0x210 [ 43.251136][ T1153] ? percpu_ref_init+0xc8/0x340 [ 43.255992][ T1153] ? cgroup_setup_root+0x8f0/0x8f0 [ 43.261055][ T1153] percpu_ref_init+0xc8/0x340 [ 43.266341][ T1153] ? cgroup_setup_root+0x8f0/0x8f0 [ 43.272613][ T1153] ? cgroup_mkdir+0x2bd/0x1490 [ 43.277818][ T1153] cgroup_mkdir+0x2e9/0x1490 [ 43.283135][ T1153] ? selinux_determine_inode_label+0x29c/0x3b0 [ 43.290235][ T1153] ? css_task_iter_end+0x2c0/0x2c0 [ 43.296429][ T1153] ? selinux_determine_inode_label+0x3b0/0x3b0 [ 43.303627][ T1153] ? css_task_iter_end+0x2c0/0x2c0 [ 43.310106][ T1153] kernfs_iop_mkdir+0x1c4/0x2d0 [ 43.315246][ T1153] vfs_mkdir+0x3f6/0x610 [ 43.321021][ T1153] do_mkdirat+0x1eb/0x450 [ 43.325765][ T1153] ? vfs_mkdir+0x610/0x610 [ 43.330761][ T1153] ? getname_flags+0x1fd/0x520 [ 43.336905][ T1153] __x64_sys_mkdirat+0x89/0xa0 [ 43.343257][ T1153] x64_sys_call+0x6c6/0x9a0 [ 43.349047][ T1153] do_syscall_64+0x3b/0xb0 [ 43.356470][ T1153] ? clear_bhb_loop+0x35/0x90 [ 43.361224][ T1153] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 43.368362][ T1153] RIP: 0033:0x7fa11e916ef9 [ 43.373576][ T1153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.395697][ T1153] RSP: 002b:00007fa11d590038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 43.406233][ T1153] RAX: ffffffffffffffda RBX: 00007fa11eacef80 RCX: 00007fa11e916ef9 [ 43.415541][ T1153] RDX: 00000000000001ff RSI: 0000000020000140 RDI: 0000000000000003 [ 43.424512][ T1153] RBP: 00007fa11d590090 R08: 0000000000000000 R09: 0000000000000000 [ 43.433032][ T1153] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 43.443026][ T1153] R13: 0000000000000000 R14: 00007fa11eacef80 R15: 00007fff97edb658 [ 43.453777][ T1153] [ 43.559440][ T1159] device pim6reg1 entered promiscuous mode [ 43.568381][ T1147] device pim6reg1 entered promiscuous mode [ 43.710013][ T1175] FAULT_INJECTION: forcing a failure. [ 43.710013][ T1175] name failslab, interval 1, probability 0, space 0, times 0 [ 43.725585][ T1175] CPU: 0 PID: 1175 Comm: syz.3.329 Tainted: G W 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 43.738897][ T1175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 43.751207][ T1175] Call Trace: [ 43.755899][ T1175] [ 43.759850][ T1175] dump_stack_lvl+0x151/0x1c0 [ 43.766248][ T1175] ? io_uring_drop_tctx_refs+0x190/0x190 [ 43.774524][ T1175] dump_stack+0x15/0x20 [ 43.780645][ T1175] should_fail+0x3c6/0x510 [ 43.787450][ T1175] __should_failslab+0xa4/0xe0 [ 43.793059][ T1175] ? __alloc_file+0x29/0x2a0 [ 43.800188][ T1175] should_failslab+0x9/0x20 [ 43.805052][ T1175] slab_pre_alloc_hook+0x37/0xd0 [ 43.810861][ T1175] ? __alloc_file+0x29/0x2a0 [ 43.816858][ T1175] kmem_cache_alloc+0x44/0x200 [ 43.822546][ T1175] ? _raw_spin_trylock_bh+0x190/0x190 [ 43.829430][ T1175] __alloc_file+0x29/0x2a0 [ 43.836364][ T1175] alloc_empty_file+0x95/0x180 [ 43.842518][ T1175] alloc_file+0x5a/0x4e0 [ 43.847031][ T1175] alloc_file_pseudo+0x259/0x2f0 [ 43.853752][ T1175] ? alloc_empty_file_noaccount+0x80/0x80 [ 43.861160][ T1175] __anon_inode_getfd+0x2aa/0x430 [ 43.867877][ T1175] ? anon_inode_getfd+0x40/0x40 [ 43.874887][ T1175] anon_inode_getfd+0x33/0x40 [ 43.880104][ T1175] btf_new_fd+0x77b/0x910 [ 43.884391][ T1175] bpf_btf_load+0x6f/0x90 [ 43.889706][ T1175] __sys_bpf+0x50e/0x760 [ 43.894373][ T1175] ? fput_many+0x160/0x1b0 [ 43.899633][ T1175] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 43.905550][ T1175] ? debug_smp_processor_id+0x17/0x20 [ 43.912271][ T1175] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 43.919376][ T1175] __x64_sys_bpf+0x7c/0x90 [ 43.924282][ T1175] x64_sys_call+0x87f/0x9a0 [ 43.929634][ T1175] do_syscall_64+0x3b/0xb0 [ 43.934426][ T1175] ? clear_bhb_loop+0x35/0x90 [ 43.940501][ T1175] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 43.946957][ T1175] RIP: 0033:0x7f3dfdd32ef9 [ 43.952046][ T1175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.974007][ T1175] RSP: 002b:00007f3dfc9ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 43.983261][ T1175] RAX: ffffffffffffffda RBX: 00007f3dfdeeaf80 RCX: 00007f3dfdd32ef9 [ 43.992494][ T1175] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 0000000000000012 [ 44.004027][ T1175] RBP: 00007f3dfc9ac090 R08: 0000000000000000 R09: 0000000000000000 [ 44.017487][ T1175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 44.028083][ T1175] R13: 0000000000000000 R14: 00007f3dfdeeaf80 R15: 00007ffc4987d3f8 [ 44.037672][ T1175] [ 44.934056][ T1196] device pim6reg1 entered promiscuous mode [ 45.047161][ T1210] device pim6reg1 entered promiscuous mode [ 45.330542][ T1227] FAULT_INJECTION: forcing a failure. [ 45.330542][ T1227] name failslab, interval 1, probability 0, space 0, times 0 [ 45.348940][ T1227] CPU: 0 PID: 1227 Comm: syz.4.348 Tainted: G W 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 45.362059][ T1227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 45.365970][ T30] audit: type=1400 audit(1726171957.857:133): avc: denied { write } for pid=1217 comm="syz.2.343" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 45.374430][ T1227] Call Trace: [ 45.374444][ T1227] [ 45.374453][ T1227] dump_stack_lvl+0x151/0x1c0 [ 45.374486][ T1227] ? io_uring_drop_tctx_refs+0x190/0x190 [ 45.423501][ T1227] dump_stack+0x15/0x20 [ 45.427871][ T1227] should_fail+0x3c6/0x510 [ 45.432355][ T1227] __should_failslab+0xa4/0xe0 [ 45.438235][ T1227] should_failslab+0x9/0x20 [ 45.443766][ T1227] slab_pre_alloc_hook+0x37/0xd0 [ 45.449776][ T1227] __kmalloc+0x6d/0x270 [ 45.453861][ T1227] ? btf_new_fd+0x2d3/0x910 [ 45.458941][ T1227] ? kvmalloc_node+0x1f0/0x4d0 [ 45.464245][ T1227] ? sort_r+0x1fa/0x1310 [ 45.469061][ T1227] kvmalloc_node+0x1f0/0x4d0 [ 45.474745][ T1227] ? vm_mmap+0xb0/0xb0 [ 45.480874][ T1227] ? btf_ref_type_check_meta+0x488/0x5b0 [ 45.488505][ T1227] btf_check_all_metas+0x48a/0xa40 [ 45.495140][ T1227] btf_parse_type_sec+0x141/0x1c10 [ 45.501198][ T1227] ? __btf_verifier_log+0x120/0x120 [ 45.507379][ T1227] ? sort+0x37/0x50 [ 45.515193][ T1227] ? btf_check_sec_info+0x371/0x4f0 [ 45.521336][ T1227] ? btf_verifier_log+0x2a0/0x2a0 [ 45.526991][ T1227] ? kvmalloc_node+0x281/0x4d0 [ 45.532960][ T1227] ? __btf_type_is_scalar_struct+0xa30/0xa30 [ 45.539149][ T1227] ? btf_parse_hdr+0x5e6/0x7c0 [ 45.544719][ T1227] ? btf_parse_str_sec+0x20e/0x2a0 [ 45.550800][ T1227] btf_new_fd+0x59b/0x910 [ 45.555880][ T1227] bpf_btf_load+0x6f/0x90 [ 45.560218][ T1227] __sys_bpf+0x50e/0x760 [ 45.564778][ T1227] ? fput_many+0x160/0x1b0 [ 45.569477][ T1227] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 45.575603][ T1227] ? debug_smp_processor_id+0x17/0x20 [ 45.582431][ T1227] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 45.590150][ T1227] __x64_sys_bpf+0x7c/0x90 [ 45.595061][ T1227] x64_sys_call+0x87f/0x9a0 [ 45.601093][ T1227] do_syscall_64+0x3b/0xb0 [ 45.606235][ T1227] ? clear_bhb_loop+0x35/0x90 [ 45.613191][ T1227] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 45.622764][ T1227] RIP: 0033:0x7fa11e916ef9 [ 45.627732][ T1227] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.650576][ T1227] RSP: 002b:00007fa11d590038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 45.661474][ T1227] RAX: ffffffffffffffda RBX: 00007fa11eacef80 RCX: 00007fa11e916ef9 [ 45.672892][ T1227] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 0000000000000012 [ 45.682847][ T1227] RBP: 00007fa11d590090 R08: 0000000000000000 R09: 0000000000000000 [ 45.692014][ T1227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 45.702488][ T1227] R13: 0000000000000000 R14: 00007fa11eacef80 R15: 00007fff97edb658 [ 45.713764][ T1227] [ 45.750138][ T1232] device bridge0 entered promiscuous mode [ 46.023715][ T1258] device pim6reg1 entered promiscuous mode [ 46.220269][ T1261] device pim6reg1 entered promiscuous mode [ 46.431390][ T1274] device wg2 entered promiscuous mode [ 146.462944][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 146.475868][ C0] rcu: 0-...!: (1 GPs behind) idle=c0f/1/0x4000000000000000 softirq=4853/4854 fqs=0 last_accelerate: 9c62/c373 dyntick_enabled: 1 [ 146.496278][ C0] (t=10000 jiffies g=3481 q=126) [ 146.502246][ C0] rcu: rcu_preempt kthread timer wakeup didn't happen for 9999 jiffies! g3481 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 [ 146.517532][ C0] rcu: Possible timer handling issue on cpu=1 timer-softirq=1105 [ 146.527423][ C0] rcu: rcu_preempt kthread starved for 10005 jiffies! g3481 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=1 [ 146.541426][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 146.556157][ C0] rcu: RCU grace-period kthread stack dump: [ 146.563264][ C0] task:rcu_preempt state:I stack:27976 pid: 14 ppid: 2 flags:0x00004000 [ 146.576672][ C0] Call Trace: [ 146.581195][ C0] [ 146.584577][ C0] __schedule+0xccc/0x1590 [ 146.591155][ C0] ? release_firmware_map_entry+0x190/0x190 [ 146.598038][ C0] ? __kasan_check_write+0x14/0x20 [ 146.604502][ C0] schedule+0x11f/0x1e0 [ 146.609520][ C0] schedule_timeout+0x18c/0x370 [ 146.615762][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 146.623543][ C0] ? console_conditional_schedule+0x30/0x30 [ 146.631066][ C0] ? update_process_times+0x200/0x200 [ 146.638049][ C0] ? prepare_to_swait_event+0x308/0x320 [ 146.645295][ C0] rcu_gp_fqs_loop+0x2af/0xf80 [ 146.650263][ C0] ? debug_smp_processor_id+0x17/0x20 [ 146.657235][ C0] ? __note_gp_changes+0x4ab/0x920 [ 146.663713][ C0] ? rcu_gp_init+0xc30/0xc30 [ 146.668899][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 146.676144][ C0] ? rcu_gp_init+0x9cf/0xc30 [ 146.683240][ C0] rcu_gp_kthread+0xa4/0x350 [ 146.689853][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 146.698135][ C0] ? wake_nocb_gp+0x1e0/0x1e0 [ 146.703802][ C0] ? __kasan_check_read+0x11/0x20 [ 146.710371][ C0] ? __kthread_parkme+0xb2/0x200 [ 146.717040][ C0] kthread+0x421/0x510 [ 146.723200][ C0] ? wake_nocb_gp+0x1e0/0x1e0 [ 146.730611][ C0] ? kthread_blkcg+0xd0/0xd0 [ 146.737033][ C0] ret_from_fork+0x1f/0x30 [ 146.742398][ C0] [ 146.745556][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 146.754587][ C0] Sending NMI from CPU 0 to CPUs 1: [ 146.762585][ C1] NMI backtrace for cpu 1 [ 146.762614][ C1] CPU: 1 PID: 1279 Comm: syz.1.367 Tainted: G W 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 146.762637][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 146.762647][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 146.762678][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 0b ed 12 04 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 146.762691][ C1] RSP: 0018:ffffc90005606ee0 EFLAGS: 00000246 [ 146.762710][ C1] RAX: 0000000000000001 RBX: 1ffff92000ac0de0 RCX: 1ffffffff0d5ab14 [ 146.762732][ C1] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7138ad4 [ 146.762742][ C1] RBP: ffffc90005606f90 R08: dffffc0000000000 R09: ffffed103ee2715b [ 146.762754][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 146.762764][ C1] R13: ffff8881f7138ad4 R14: 0000000000000001 R15: 1ffff92000ac0de4 [ 146.762891][ C1] FS: 00007ff0e293c6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 146.762908][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 146.762919][ C1] CR2: 00000000200000c0 CR3: 00000001342d8000 CR4: 00000000003506a0 [ 146.762935][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 146.762945][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 146.762955][ C1] Call Trace: [ 146.762975][ C1] [ 146.762987][ C1] ? show_regs+0x58/0x60 [ 146.763013][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 146.763033][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 146.763051][ C1] ? kvm_wait+0x147/0x180 [ 146.763067][ C1] ? kvm_wait+0x147/0x180 [ 146.763081][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 146.763097][ C1] ? nmi_handle+0xa8/0x280 [ 146.763113][ C1] ? kvm_wait+0x147/0x180 [ 146.763126][ C1] ? default_do_nmi+0x69/0x160 [ 146.763142][ C1] ? exc_nmi+0xad/0x100 [ 146.763155][ C1] ? end_repeat_nmi+0x16/0x31 [ 146.763182][ C1] ? kvm_wait+0x147/0x180 [ 146.763196][ C1] ? kvm_wait+0x147/0x180 [ 146.763210][ C1] ? kvm_wait+0x147/0x180 [ 146.763223][ C1] [ 146.763228][ C1] [ 146.763233][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 146.763248][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 146.763265][ C1] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 146.763287][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 146.763306][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 146.763322][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 146.763338][ C1] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 146.763358][ C1] sock_hash_delete_elem+0x177/0x400 [ 146.763376][ C1] ? sock_hash_lookup+0x610/0x610 [ 146.763400][ C1] ? 0xffffffffa0028c14 [ 146.763422][ C1] ? security_compute_sid+0x1d7d/0x1f40 [ 146.763444][ C1] bpf_prog_c9faa1663fd3be42+0x3d/0xe4 [ 146.763457][ C1] bpf_trace_run2+0xec/0x210 [ 146.763473][ C1] ? context_to_sid+0x5a8/0x600 [ 146.763490][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 146.763505][ C1] ? security_compute_sid+0x1d7d/0x1f40 [ 146.763520][ C1] ? security_compute_sid+0x1d7d/0x1f40 [ 146.763535][ C1] __bpf_trace_kfree+0x6f/0x90 [ 146.763561][ C1] ? security_compute_sid+0x1d7d/0x1f40 [ 146.763583][ C1] kfree+0x1f3/0x220 [ 146.763599][ C1] ? policydb_context_isvalid+0x1de/0x430 [ 146.763621][ C1] security_compute_sid+0x1d7d/0x1f40 [ 146.763637][ C1] ? __kasan_slab_free_mempool+0xc0/0xd0 [ 146.763657][ C1] ? security_transition_sid+0x90/0x90 [ 146.763672][ C1] ? memcpy+0x56/0x70 [ 146.763687][ C1] ? avc_has_perm_noaudit+0x2dd/0x430 [ 146.763710][ C1] ? avc_has_perm+0x16f/0x260 [ 146.763725][ C1] security_transition_sid+0x7d/0x90 [ 146.763748][ C1] selinux_determine_inode_label+0x29c/0x3b0 [ 146.763765][ C1] may_create+0x2fe/0x540 [ 146.763780][ C1] ? selinux_determine_inode_label+0x3b0/0x3b0 [ 146.763797][ C1] ? make_kgid+0x6f0/0x6f0 [ 146.763811][ C1] selinux_inode_create+0x22/0x30 [ 146.763827][ C1] security_inode_create+0xac/0x100 [ 146.763843][ C1] path_openat+0xe05/0x2f40 [ 146.763865][ C1] ? do_filp_open+0x460/0x460 [ 146.763883][ C1] do_filp_open+0x21c/0x460 [ 146.763898][ C1] ? vfs_tmpfile+0x2c0/0x2c0 [ 146.763918][ C1] do_sys_openat2+0x13f/0x830 [ 146.763931][ C1] ? create_io_thread+0x1e0/0x1e0 [ 146.763948][ C1] ? do_sys_open+0x220/0x220 [ 146.763960][ C1] ? debug_smp_processor_id+0x17/0x20 [ 146.763977][ C1] __x64_sys_openat+0x243/0x290 [ 146.763989][ C1] ? __ia32_sys_open+0x270/0x270 [ 146.764002][ C1] ? __kasan_check_read+0x11/0x20 [ 146.764017][ C1] ? exit_to_user_mode_prepare+0x7e/0xa0 [ 146.764034][ C1] x64_sys_call+0x6bf/0x9a0 [ 146.764050][ C1] do_syscall_64+0x3b/0xb0 [ 146.764067][ C1] ? clear_bhb_loop+0x35/0x90 [ 146.764080][ C1] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 146.764097][ C1] RIP: 0033:0x7ff0e3cc2ef9 [ 146.764112][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 146.764125][ C1] RSP: 002b:00007ff0e293c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 146.764145][ C1] RAX: ffffffffffffffda RBX: 00007ff0e3e7af80 RCX: 00007ff0e3cc2ef9 [ 146.764156][ C1] RDX: 00000000000026e1 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 146.764299][ C1] RBP: 00007ff0e3d35b76 R08: 0000000000000000 R09: 0000000000000000 [ 146.764311][ C1] R10: 000003a0ffffffff R11: 0000000000000246 R12: 0000000000000000 [ 146.764321][ C1] R13: 0000000000000000 R14: 00007ff0e3e7af80 R15: 00007ffdaebbb6a8 [ 146.764346][ C1] [ 146.764608][ C0] NMI backtrace for cpu 0 [ 147.484651][ C0] CPU: 0 PID: 1277 Comm: syz.3.366 Tainted: G W 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 147.502076][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 147.516895][ C0] Call Trace: [ 147.520702][ C0] [ 147.524587][ C0] dump_stack_lvl+0x151/0x1c0 [ 147.530667][ C0] ? io_uring_drop_tctx_refs+0x190/0x190 [ 147.538328][ C0] ? ttwu_do_wakeup+0x187/0x430 [ 147.545122][ C0] dump_stack+0x15/0x20 [ 147.550248][ C0] nmi_cpu_backtrace+0x2f7/0x300 [ 147.559026][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 147.569903][ C0] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 147.578141][ C0] ? __kasan_check_write+0x14/0x20 [ 147.586482][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 147.594450][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 147.606473][ C0] nmi_trigger_cpumask_backtrace+0x15d/0x270 [ 147.614807][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 147.621584][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 147.628537][ C0] rcu_dump_cpu_stacks+0x1d8/0x330 [ 147.634470][ C0] print_cpu_stall+0x315/0x5f0 [ 147.640413][ C0] rcu_sched_clock_irq+0x989/0x12f0 [ 147.646452][ C0] ? rcu_boost_kthread_setaffinity+0x340/0x340 [ 147.655744][ C0] ? hrtimer_run_queues+0x15f/0x440 [ 147.664781][ C0] update_process_times+0x198/0x200 [ 147.673753][ C0] tick_sched_timer+0x188/0x240 [ 147.682233][ C0] ? tick_setup_sched_timer+0x480/0x480 [ 147.696048][ C0] __hrtimer_run_queues+0x41a/0xad0 [ 147.705314][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 147.713844][ C0] ? clockevents_program_event+0x22f/0x300 [ 147.723047][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 147.733190][ C0] hrtimer_interrupt+0x40c/0xaa0 [ 147.739602][ C0] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 147.749138][ C0] sysvec_apic_timer_interrupt+0x95/0xc0 [ 147.758135][ C0] [ 147.761603][ C0] [ 147.765533][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 147.774026][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 147.779550][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 0b ed 12 04 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 147.806443][ C0] RSP: 0018:ffffc900056e69a0 EFLAGS: 00000246 [ 147.814096][ C0] RAX: 0000000000000003 RBX: 1ffff92000adcd38 RCX: ffffffff81552f9f [ 147.823246][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff888113bb8198 [ 147.834567][ C0] RBP: ffffc900056e6a50 R08: dffffc0000000000 R09: ffffed1022777034 [ 147.845689][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 147.854546][ C0] R13: ffff888113bb8198 R14: 0000000000000003 R15: 1ffff92000adcd3c [ 147.863547][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 147.870313][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 147.877509][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 147.883325][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 147.891689][ C0] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 147.898973][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 147.907523][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 147.915421][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 147.924663][ C0] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 147.934230][ C0] sock_hash_delete_elem+0x177/0x400 [ 147.941496][ C0] ? is_bpf_text_address+0x172/0x190 [ 147.948426][ C0] ? sock_hash_lookup+0x610/0x610 [ 147.955279][ C0] ? unwind_get_return_address+0x4d/0x90 [ 147.963159][ C0] ? arch_stack_walk+0xf3/0x140 [ 147.968308][ C0] ? sock_map_unref+0x352/0x4d0 [ 147.974216][ C0] bpf_prog_c9faa1663fd3be42+0x3d/0xe4 [ 147.981756][ C0] bpf_trace_run2+0xec/0x210 [ 147.987185][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 147.992933][ C0] ? stack_trace_save+0x113/0x1c0 [ 147.999726][ C0] ? sock_map_unref+0x352/0x4d0 [ 148.006578][ C0] ? sock_map_unref+0x352/0x4d0 [ 148.012756][ C0] __bpf_trace_kfree+0x6f/0x90 [ 148.018402][ C0] ? sock_map_unref+0x352/0x4d0 [ 148.024373][ C0] kfree+0x1f3/0x220 [ 148.028505][ C0] sock_map_unref+0x352/0x4d0 [ 148.033717][ C0] sock_hash_delete_elem+0x388/0x400 [ 148.039721][ C0] ? kvm_sched_clock_read+0x18/0x40 [ 148.046912][ C0] ? sched_clock+0x9/0x10 [ 148.052438][ C0] ? sock_hash_lookup+0x610/0x610 [ 148.060077][ C0] ? page_ext_put+0x1c/0x30 [ 148.068310][ C0] ? kvfree+0x35/0x40 [ 148.074894][ C0] bpf_prog_c9faa1663fd3be42+0x3d/0xe4 [ 148.084437][ C0] bpf_trace_run2+0xec/0x210 [ 148.091931][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 148.098796][ C0] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 148.108918][ C0] ? kvfree+0x35/0x40 [ 148.115393][ C0] ? free_unref_page+0x2b3/0x750 [ 148.124723][ C0] ? kvfree+0x35/0x40 [ 148.131651][ C0] __bpf_trace_kfree+0x6f/0x90 [ 148.140258][ C0] ? kvfree+0x35/0x40 [ 148.146679][ C0] kfree+0x1f3/0x220 [ 148.155381][ C0] kvfree+0x35/0x40 [ 148.161886][ C0] __vunmap+0x850/0x8f0 [ 148.169648][ C0] vfree+0x7f/0xb0 [ 148.175815][ C0] bpf_prog_calc_tag+0x69a/0x8f0 [ 148.182059][ C0] ? __bpf_prog_free+0xe0/0xe0 [ 148.189213][ C0] resolve_pseudo_ldimm64+0xe0/0x1240 [ 148.197027][ C0] ? check_attach_btf_id+0x40f/0xef0 [ 148.203986][ C0] ? verbose+0x2a0/0x2a0 [ 148.208680][ C0] ? check_attach_btf_id+0xef0/0xef0 [ 148.215385][ C0] ? __mark_reg_known+0x1b0/0x1b0 [ 148.221771][ C0] ? security_capable+0x87/0xb0 [ 148.226633][ C0] bpf_check+0x3174/0x12bf0 [ 148.231160][ C0] ? 0xffffffffa0028c14 [ 148.235435][ C0] ? is_bpf_text_address+0x172/0x190 [ 148.240747][ C0] ? stack_trace_save+0x1c0/0x1c0 [ 148.245637][ C0] ? __kernel_text_address+0x9b/0x110 [ 148.250862][ C0] ? unwind_get_return_address+0x4d/0x90 [ 148.257014][ C0] ? bpf_get_btf_vmlinux+0x60/0x60 [ 148.262132][ C0] ? arch_stack_walk+0xf3/0x140 [ 148.267395][ C0] ? stack_trace_save+0x113/0x1c0 [ 148.273362][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 148.278754][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 148.285375][ C0] ? __stack_depot_save+0x34/0x470 [ 148.290518][ C0] ? ____kasan_kmalloc+0xed/0x110 [ 148.296588][ C0] ? ____kasan_kmalloc+0xdb/0x110 [ 148.301708][ C0] ? __kasan_kmalloc+0x9/0x10 [ 148.307416][ C0] ? kmem_cache_alloc_trace+0x115/0x210 [ 148.314196][ C0] ? selinux_bpf_prog_alloc+0x51/0x140 [ 148.321734][ C0] ? security_bpf_prog_alloc+0x62/0x90 [ 148.328481][ C0] ? bpf_prog_load+0x9ee/0x1b50 [ 148.335004][ C0] ? __sys_bpf+0x4bc/0x760 [ 148.340090][ C0] ? __x64_sys_bpf+0x7c/0x90 [ 148.344894][ C0] ? x64_sys_call+0x87f/0x9a0 [ 148.350227][ C0] ? do_syscall_64+0x3b/0xb0 [ 148.354884][ C0] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 148.361930][ C0] ? __kasan_kmalloc+0x9/0x10 [ 148.368049][ C0] ? memset+0x35/0x40 [ 148.373538][ C0] ? bpf_obj_name_cpy+0x196/0x1e0 [ 148.379945][ C0] bpf_prog_load+0x12ac/0x1b50 [ 148.385206][ C0] ? map_freeze+0x370/0x370 [ 148.390177][ C0] ? selinux_bpf+0xcb/0x100 [ 148.396579][ C0] ? security_bpf+0x82/0xb0 [ 148.401167][ C0] __sys_bpf+0x4bc/0x760 [ 148.406790][ C0] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 148.413669][ C0] ? __kasan_check_read+0x11/0x20 [ 148.419281][ C0] __x64_sys_bpf+0x7c/0x90 [ 148.424221][ C0] x64_sys_call+0x87f/0x9a0 [ 148.428781][ C0] do_syscall_64+0x3b/0xb0 [ 148.434691][ C0] ? clear_bhb_loop+0x35/0x90 [ 148.440650][ C0] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 148.448186][ C0] RIP: 0033:0x7f3dfdd32ef9 [ 148.452794][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 148.478545][ C0] RSP: 002b:00007f3dfc9ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 148.490953][ C0] RAX: ffffffffffffffda RBX: 00007f3dfdeeaf80 RCX: 00007f3dfdd32ef9 [ 148.499928][ C0] RDX: 0000000000000090 RSI: 00000000200005c0 RDI: 0000000000000005 [ 148.509287][ C0] RBP: 00007f3dfdda5b76 R08: 0000000000000000 R09: 0000000000000000 [ 148.519152][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 148.528535][ C0] R13: 0000000000000000 R14: 00007f3dfdeeaf80 R15: 00007ffc4987d3f8 [ 148.536995][ C0] [ 148.540115][ C0] Sending NMI from CPU 0 to CPUs 1: [ 148.545853][ C1] NMI backtrace for cpu 1 [ 148.545889][ C1] CPU: 1 PID: 1279 Comm: syz.1.367 Tainted: G W 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 148.545909][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 148.545918][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 148.545942][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 0b ed 12 04 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 148.545954][ C1] RSP: 0018:ffffc90005606ee0 EFLAGS: 00000246 [ 148.545970][ C1] RAX: 0000000000000001 RBX: 1ffff92000ac0de0 RCX: 1ffffffff0d5ab14 [ 148.545982][ C1] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7138ad4 [ 148.545991][ C1] RBP: ffffc90005606f90 R08: dffffc0000000000 R09: ffffed103ee2715b [ 148.546002][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 148.546012][ C1] R13: ffff8881f7138ad4 R14: 0000000000000001 R15: 1ffff92000ac0de4 [ 148.546024][ C1] FS: 00007ff0e293c6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 148.546039][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 148.546050][ C1] CR2: 00000000200000c0 CR3: 00000001342d8000 CR4: 00000000003506a0 [ 148.546066][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 148.546076][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 148.546086][ C1] Call Trace: [ 148.546093][ C1] [ 148.546102][ C1] ? show_regs+0x58/0x60 [ 148.546119][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 148.546138][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 148.546155][ C1] ? kvm_wait+0x147/0x180 [ 148.546168][ C1] ? kvm_wait+0x147/0x180 [ 148.546182][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 148.546199][ C1] ? nmi_handle+0xa8/0x280 [ 148.546214][ C1] ? kvm_wait+0x147/0x180 [ 148.546227][ C1] ? kvm_wait+0x147/0x180 [ 148.546241][ C1] ? default_do_nmi+0x69/0x160 [ 148.546256][ C1] ? exc_nmi+0xad/0x100 [ 148.546268][ C1] ? end_repeat_nmi+0x16/0x31 [ 148.546285][ C1] ? kvm_wait+0x147/0x180 [ 148.546299][ C1] ? kvm_wait+0x147/0x180 [ 148.546313][ C1] ? kvm_wait+0x147/0x180 [ 148.546326][ C1] [ 148.546331][ C1] [ 148.546336][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 148.546351][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 148.546368][ C1] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 148.546389][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 148.546407][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 148.546424][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 148.546449][ C1] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 148.546469][ C1] sock_hash_delete_elem+0x177/0x400 [ 148.546487][ C1] ? sock_hash_lookup+0x610/0x610 [ 148.546503][ C1] ? 0xffffffffa0028c14 [ 148.546514][ C1] ? security_compute_sid+0x1d7d/0x1f40 [ 148.546531][ C1] bpf_prog_c9faa1663fd3be42+0x3d/0xe4 [ 148.546545][ C1] bpf_trace_run2+0xec/0x210 [ 148.546561][ C1] ? context_to_sid+0x5a8/0x600 [ 148.546578][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 148.546593][ C1] ? security_compute_sid+0x1d7d/0x1f40 [ 148.546608][ C1] ? security_compute_sid+0x1d7d/0x1f40 [ 148.546623][ C1] __bpf_trace_kfree+0x6f/0x90 [ 148.546639][ C1] ? security_compute_sid+0x1d7d/0x1f40 [ 148.546654][ C1] kfree+0x1f3/0x220 [ 148.546670][ C1] ? policydb_context_isvalid+0x1de/0x430 [ 148.546685][ C1] security_compute_sid+0x1d7d/0x1f40 [ 148.546702][ C1] ? __kasan_slab_free_mempool+0xc0/0xd0 [ 148.546722][ C1] ? security_transition_sid+0x90/0x90 [ 148.546737][ C1] ? memcpy+0x56/0x70 [ 148.546752][ C1] ? avc_has_perm_noaudit+0x2dd/0x430 [ 148.546773][ C1] ? avc_has_perm+0x16f/0x260 [ 148.546789][ C1] security_transition_sid+0x7d/0x90 [ 148.546805][ C1] selinux_determine_inode_label+0x29c/0x3b0 [ 148.546822][ C1] may_create+0x2fe/0x540 [ 148.546837][ C1] ? selinux_determine_inode_label+0x3b0/0x3b0 [ 148.546854][ C1] ? make_kgid+0x6f0/0x6f0 [ 148.546876][ C1] selinux_inode_create+0x22/0x30 [ 148.546893][ C1] security_inode_create+0xac/0x100 [ 148.546910][ C1] path_openat+0xe05/0x2f40 [ 148.546932][ C1] ? do_filp_open+0x460/0x460 [ 148.546951][ C1] do_filp_open+0x21c/0x460 [ 148.546965][ C1] ? vfs_tmpfile+0x2c0/0x2c0 [ 148.546987][ C1] do_sys_openat2+0x13f/0x830 [ 148.547000][ C1] ? create_io_thread+0x1e0/0x1e0 [ 148.547018][ C1] ? do_sys_open+0x220/0x220 [ 148.547030][ C1] ? debug_smp_processor_id+0x17/0x20 [ 148.547048][ C1] __x64_sys_openat+0x243/0x290 [ 148.547062][ C1] ? __ia32_sys_open+0x270/0x270 [ 148.547076][ C1] ? __kasan_check_read+0x11/0x20 [ 148.547091][ C1] ? exit_to_user_mode_prepare+0x7e/0xa0 [ 148.547109][ C1] x64_sys_call+0x6bf/0x9a0 [ 148.547123][ C1] do_syscall_64+0x3b/0xb0 [ 148.547138][ C1] ? clear_bhb_loop+0x35/0x90 [ 148.547151][ C1] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 148.547168][ C1] RIP: 0033:0x7ff0e3cc2ef9 [ 148.547181][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 148.547193][ C1] RSP: 002b:00007ff0e293c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 148.547209][ C1] RAX: ffffffffffffffda RBX: 00007ff0e3e7af80 RCX: 00007ff0e3cc2ef9 [ 148.547220][ C1] RDX: 00000000000026e1 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 148.547231][ C1] RBP: 00007ff0e3d35b76 R08: 0000000000000000 R09: 0000000000000000 [ 148.547240][ C1] R10: 000003a0ffffffff R11: 0000000000000246 R12: 0000000000000000 [ 148.547250][ C1] R13: 0000000000000000 R14: 00007ff0e3e7af80 R15: 00007ffdaebbb6a8 [ 148.547263][ C1] [ 287.909297][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 226s! [syz.3.366:1277] [ 287.920339][ C0] Modules linked in: [ 287.925629][ C0] CPU: 0 PID: 1277 Comm: syz.3.366 Tainted: G W 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 287.937388][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 287.948793][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 287.954690][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 0b ed 12 04 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 287.980481][ C0] RSP: 0018:ffffc900056e69a0 EFLAGS: 00000246 [ 287.988520][ C0] RAX: 0000000000000003 RBX: 1ffff92000adcd38 RCX: ffffffff81552f9f [ 287.997494][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff888113bb8198 [ 288.007021][ C0] RBP: ffffc900056e6a50 R08: dffffc0000000000 R09: ffffed1022777034 [ 288.016784][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 288.026903][ C0] R13: ffff888113bb8198 R14: 0000000000000003 R15: 1ffff92000adcd3c [ 288.037975][ C0] FS: 00007f3dfc9ac6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 288.048806][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 288.057824][ C0] CR2: 0000000000000000 CR3: 0000000133fac000 CR4: 00000000003506b0 [ 288.066988][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 288.075776][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 288.084720][ C0] Call Trace: [ 288.087930][ C0] [ 288.090926][ C0] ? show_regs+0x58/0x60 [ 288.094972][ C0] ? watchdog_timer_fn+0x4b1/0x5f0 [ 288.099933][ C0] ? proc_watchdog_cpumask+0xd0/0xd0 [ 288.105125][ C0] ? __hrtimer_run_queues+0x41a/0xad0 [ 288.110424][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 288.115628][ C0] ? clockevents_program_event+0x22f/0x300 [ 288.121890][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 288.128410][ C0] ? hrtimer_interrupt+0x40c/0xaa0 [ 288.133621][ C0] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 288.140201][ C0] ? sysvec_apic_timer_interrupt+0x95/0xc0 [ 288.148075][ C0] [ 288.151507][ C0] [ 288.154852][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 288.161406][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 288.168566][ C0] ? kvm_wait+0x147/0x180 [ 288.173365][ C0] ? asm_common_interrupt+0x27/0x40 [ 288.178619][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 288.184470][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 288.191943][ C0] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 288.199957][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 288.208141][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 288.213086][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 288.218708][ C0] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 288.225434][ C0] sock_hash_delete_elem+0x177/0x400 [ 288.231011][ C0] ? is_bpf_text_address+0x172/0x190 [ 288.236918][ C0] ? sock_hash_lookup+0x610/0x610 [ 288.244934][ C0] ? unwind_get_return_address+0x4d/0x90 [ 288.252215][ C0] ? arch_stack_walk+0xf3/0x140 [ 288.257662][ C0] ? sock_map_unref+0x352/0x4d0 [ 288.262529][ C0] bpf_prog_c9faa1663fd3be42+0x3d/0xe4 [ 288.268606][ C0] bpf_trace_run2+0xec/0x210 [ 288.274113][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 288.279990][ C0] ? stack_trace_save+0x113/0x1c0 [ 288.285990][ C0] ? sock_map_unref+0x352/0x4d0 [ 288.292433][ C0] ? sock_map_unref+0x352/0x4d0 [ 288.299057][ C0] __bpf_trace_kfree+0x6f/0x90 [ 288.304262][ C0] ? sock_map_unref+0x352/0x4d0 [ 288.311308][ C0] kfree+0x1f3/0x220 [ 288.315447][ C0] sock_map_unref+0x352/0x4d0 [ 288.320611][ C0] sock_hash_delete_elem+0x388/0x400 [ 288.327139][ C0] ? kvm_sched_clock_read+0x18/0x40 [ 288.332804][ C0] ? sched_clock+0x9/0x10 [ 288.337186][ C0] ? sock_hash_lookup+0x610/0x610 [ 288.342514][ C0] ? page_ext_put+0x1c/0x30 [ 288.347148][ C0] ? kvfree+0x35/0x40 [ 288.352861][ C0] bpf_prog_c9faa1663fd3be42+0x3d/0xe4 [ 288.360503][ C0] bpf_trace_run2+0xec/0x210 [ 288.365014][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 288.371922][ C0] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 288.378381][ C0] ? kvfree+0x35/0x40 [ 288.384022][ C0] ? free_unref_page+0x2b3/0x750 [ 288.390347][ C0] ? kvfree+0x35/0x40 [ 288.395029][ C0] __bpf_trace_kfree+0x6f/0x90 [ 288.402167][ C0] ? kvfree+0x35/0x40 [ 288.407136][ C0] kfree+0x1f3/0x220 [ 288.411508][ C0] kvfree+0x35/0x40 [ 288.415527][ C0] __vunmap+0x850/0x8f0 [ 288.419961][ C0] vfree+0x7f/0xb0 [ 288.424602][ C0] bpf_prog_calc_tag+0x69a/0x8f0 [ 288.429717][ C0] ? __bpf_prog_free+0xe0/0xe0 [ 288.435773][ C0] resolve_pseudo_ldimm64+0xe0/0x1240 [ 288.444269][ C0] ? check_attach_btf_id+0x40f/0xef0 [ 288.450136][ C0] ? verbose+0x2a0/0x2a0 [ 288.455355][ C0] ? check_attach_btf_id+0xef0/0xef0 [ 288.461688][ C0] ? __mark_reg_known+0x1b0/0x1b0 [ 288.467302][ C0] ? security_capable+0x87/0xb0 [ 288.472285][ C0] bpf_check+0x3174/0x12bf0 [ 288.477034][ C0] ? 0xffffffffa0028c14 [ 288.482388][ C0] ? is_bpf_text_address+0x172/0x190 [ 288.489828][ C0] ? stack_trace_save+0x1c0/0x1c0 [ 288.496518][ C0] ? __kernel_text_address+0x9b/0x110 [ 288.502706][ C0] ? unwind_get_return_address+0x4d/0x90 [ 288.509931][ C0] ? bpf_get_btf_vmlinux+0x60/0x60 [ 288.515526][ C0] ? arch_stack_walk+0xf3/0x140 [ 288.521659][ C0] ? stack_trace_save+0x113/0x1c0 [ 288.527606][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 288.533115][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 288.538935][ C0] ? __stack_depot_save+0x34/0x470 [ 288.544577][ C0] ? ____kasan_kmalloc+0xed/0x110 [ 288.550272][ C0] ? ____kasan_kmalloc+0xdb/0x110 [ 288.564551][ C0] ? __kasan_kmalloc+0x9/0x10 [ 288.570418][ C0] ? kmem_cache_alloc_trace+0x115/0x210 [ 288.577452][ C0] ? selinux_bpf_prog_alloc+0x51/0x140 [ 288.584248][ C0] ? security_bpf_prog_alloc+0x62/0x90 [ 288.590287][ C0] ? bpf_prog_load+0x9ee/0x1b50 [ 288.595077][ C0] ? __sys_bpf+0x4bc/0x760 [ 288.600231][ C0] ? __x64_sys_bpf+0x7c/0x90 [ 288.605402][ C0] ? x64_sys_call+0x87f/0x9a0 [ 288.610886][ C0] ? do_syscall_64+0x3b/0xb0 [ 288.616024][ C0] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 288.622565][ C0] ? __kasan_kmalloc+0x9/0x10 [ 288.627407][ C0] ? memset+0x35/0x40 [ 288.632047][ C0] ? bpf_obj_name_cpy+0x196/0x1e0 [ 288.637438][ C0] bpf_prog_load+0x12ac/0x1b50 [ 288.643185][ C0] ? map_freeze+0x370/0x370 [ 288.648091][ C0] ? selinux_bpf+0xcb/0x100 [ 288.653578][ C0] ? security_bpf+0x82/0xb0 [ 288.658079][ C0] __sys_bpf+0x4bc/0x760 [ 288.666175][ C0] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 288.672368][ C0] ? __kasan_check_read+0x11/0x20 [ 288.679301][ C0] __x64_sys_bpf+0x7c/0x90 [ 288.684971][ C0] x64_sys_call+0x87f/0x9a0 [ 288.691303][ C0] do_syscall_64+0x3b/0xb0 [ 288.697227][ C0] ? clear_bhb_loop+0x35/0x90 [ 288.703052][ C0] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 288.711124][ C0] RIP: 0033:0x7f3dfdd32ef9 [ 288.716137][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 288.742235][ C0] RSP: 002b:00007f3dfc9ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 288.753492][ C0] RAX: ffffffffffffffda RBX: 00007f3dfdeeaf80 RCX: 00007f3dfdd32ef9 [ 288.762396][ C0] RDX: 0000000000000090 RSI: 00000000200005c0 RDI: 0000000000000005 [ 288.772354][ C0] RBP: 00007f3dfdda5b76 R08: 0000000000000000 R09: 0000000000000000 [ 288.781877][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 288.791106][ C0] R13: 0000000000000000 R14: 00007f3dfdeeaf80 R15: 00007ffc4987d3f8 [ 288.800239][ C0] [ 288.804249][ C0] Sending NMI from CPU 0 to CPUs 1: [ 288.809956][ C1] NMI backtrace for cpu 1 [ 288.809977][ C1] CPU: 1 PID: 1279 Comm: syz.1.367 Tainted: G W 5.15.160-syzkaller-00026-ge6fb3b0fa87f #0 [ 288.809999][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 288.810009][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 288.810036][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 0b ed 12 04 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 288.810050][ C1] RSP: 0018:ffffc90005606ee0 EFLAGS: 00000246 [ 288.810067][ C1] RAX: 0000000000000001 RBX: 1ffff92000ac0de0 RCX: 1ffffffff0d5ab14 [ 288.810079][ C1] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7138ad4 [ 288.810100][ C1] RBP: ffffc90005606f90 R08: dffffc0000000000 R09: ffffed103ee2715b [ 288.810111][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 288.810123][ C1] R13: ffff8881f7138ad4 R14: 0000000000000001 R15: 1ffff92000ac0de4 [ 288.810134][ C1] FS: 00007ff0e293c6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 288.810149][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 288.810160][ C1] CR2: 00000000200000c0 CR3: 00000001342d8000 CR4: 00000000003506a0 [ 288.810178][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 288.810196][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 288.810206][ C1] Call Trace: [ 288.810214][ C1] [ 288.810232][ C1] ? show_regs+0x58/0x60 [ 288.810249][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 288.810270][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 288.810288][ C1] ? kvm_wait+0x147/0x180 [ 288.810311][ C1] ? kvm_wait+0x147/0x180 [ 288.810324][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 288.810342][ C1] ? nmi_handle+0xa8/0x280 [ 288.810357][ C1] ? kvm_wait+0x147/0x180 [ 288.810370][ C1] ? kvm_wait+0x147/0x180 [ 288.810383][ C1] ? default_do_nmi+0x69/0x160 [ 288.810399][ C1] ? exc_nmi+0xad/0x100 [ 288.810412][ C1] ? end_repeat_nmi+0x16/0x31 [ 288.810430][ C1] ? kvm_wait+0x147/0x180 [ 288.810443][ C1] ? kvm_wait+0x147/0x180 [ 288.810457][ C1] ? kvm_wait+0x147/0x180 [ 288.810470][ C1] [ 288.810475][ C1] [ 288.810480][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 288.810495][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 288.810512][ C1] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 288.810534][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 288.810553][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 288.810569][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 288.810585][ C1] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 288.810606][ C1] sock_hash_delete_elem+0x177/0x400 [ 288.810623][ C1] ? sock_hash_lookup+0x610/0x610 [ 288.810640][ C1] ? 0xffffffffa0028c14 [ 288.810651][ C1] ? security_compute_sid+0x1d7d/0x1f40 [ 288.810669][ C1] bpf_prog_c9faa1663fd3be42+0x3d/0xe4 [ 288.810683][ C1] bpf_trace_run2+0xec/0x210 [ 288.810699][ C1] ? context_to_sid+0x5a8/0x600 [ 288.810716][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 288.810731][ C1] ? security_compute_sid+0x1d7d/0x1f40 [ 288.810746][ C1] ? security_compute_sid+0x1d7d/0x1f40 [ 288.810761][ C1] __bpf_trace_kfree+0x6f/0x90 [ 288.810777][ C1] ? security_compute_sid+0x1d7d/0x1f40 [ 288.810792][ C1] kfree+0x1f3/0x220 [ 288.810807][ C1] ? policydb_context_isvalid+0x1de/0x430 [ 288.810823][ C1] security_compute_sid+0x1d7d/0x1f40 [ 288.810840][ C1] ? __kasan_slab_free_mempool+0xc0/0xd0 [ 288.810860][ C1] ? security_transition_sid+0x90/0x90 [ 288.810875][ C1] ? memcpy+0x56/0x70 [ 288.810890][ C1] ? avc_has_perm_noaudit+0x2dd/0x430 [ 288.810912][ C1] ? avc_has_perm+0x16f/0x260 [ 288.810927][ C1] security_transition_sid+0x7d/0x90 [ 288.810943][ C1] selinux_determine_inode_label+0x29c/0x3b0 [ 288.810961][ C1] may_create+0x2fe/0x540 [ 288.810976][ C1] ? selinux_determine_inode_label+0x3b0/0x3b0 [ 288.811001][ C1] ? make_kgid+0x6f0/0x6f0 [ 288.811017][ C1] selinux_inode_create+0x22/0x30 [ 288.811032][ C1] security_inode_create+0xac/0x100 [ 288.811050][ C1] path_openat+0xe05/0x2f40 [ 288.811071][ C1] ? do_filp_open+0x460/0x460 [ 288.811097][ C1] do_filp_open+0x21c/0x460 [ 288.811112][ C1] ? vfs_tmpfile+0x2c0/0x2c0 [ 288.811133][ C1] do_sys_openat2+0x13f/0x830 [ 288.811146][ C1] ? create_io_thread+0x1e0/0x1e0 [ 288.811176][ C1] ? do_sys_open+0x220/0x220 [ 288.811188][ C1] ? debug_smp_processor_id+0x17/0x20 [ 288.811206][ C1] __x64_sys_openat+0x243/0x290 [ 288.811220][ C1] ? __ia32_sys_open+0x270/0x270 [ 288.811233][ C1] ? __kasan_check_read+0x11/0x20 [ 288.811249][ C1] ? exit_to_user_mode_prepare+0x7e/0xa0 [ 288.811266][ C1] x64_sys_call+0x6bf/0x9a0 [ 288.811281][ C1] do_syscall_64+0x3b/0xb0 [ 288.811296][ C1] ? clear_bhb_loop+0x35/0x90 [ 288.811309][ C1] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 288.811326][ C1] RIP: 0033:0x7ff0e3cc2ef9 [ 288.811340][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 288.811352][ C1] RSP: 002b:00007ff0e293c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 288.811368][ C1] RAX: ffffffffffffffda RBX: 00007ff0e3e7af80 RCX: 00007ff0e3cc2ef9 [ 288.811379][ C1] RDX: 00000000000026e1 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 288.811390][ C1] RBP: 00007ff0e3d35b76 R08: 0000000000000000 R09: 0000000000000000 [ 288.811399][ C1] R10: 000003a0ffffffff R11: 0000000000000246 R12: 0000000000000000 [ 288.811409][ C1] R13: 0000000000000000 R14: 00007ff0e3e7af80 R15: 00007ffdaebbb6a8 [ 288.811423][ C1]