last executing test programs: 7.410984807s ago: executing program 4 (id=3121): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_bridge\x00', 0x400}) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) close(r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2, 0x0, 0x2}, 0x18) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd501783f73268f41, @perf_config_ext={0x3, 0x800}, 0x0, 0xc8, 0x9, 0x6, 0xfffffffffffffffd, 0x1}, 0xffffffffffffffff, 0x0, r3, 0x1) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r4}, 0x18) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) (async) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r9}, 0x10) close(r6) close(0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xf}, 0x10, 0x0, 0x0, 0x6}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYRES16=r8], 0x0, 0xfc5f, 0x0, 0x3, 0x0, 0x0, @void, @value}, 0x28) 4.305749106s ago: executing program 4 (id=3146): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r2}, 0x10) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) 4.249360207s ago: executing program 4 (id=3148): r0 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x6, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x0, 0x0, &(0x7f0000000400), 0x8, 0xe8, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0xb2321, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000002180)=[{&(0x7f0000000e00)}], 0x1, 0x0, 0x0, 0x40044}, 0x0) recvmsg(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000005c0)=""/136, 0x88}], 0x1, &(0x7f0000002f40)=""/244, 0xf4}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000fa8996c649ae942667a7434b000000000000000020000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r5}, 0x10) close(r3) 4.028747779s ago: executing program 4 (id=3151): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0xdd, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000003c0)='percpu_alloc_percpu\x00', r1}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x75, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x9c}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 3.96129933s ago: executing program 4 (id=3152): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000072000000850000000f00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfeff}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f00000002c0), 0x20000000}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, 0x0, 0x0) syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)="2fd0ff0006094f492faff2f173e1ac871d48eef87bb90a19da77ed4bb5ae2e86f7b0cf112203043f022f05c93af58dc47d13e4ed9d9426f7db4e53422cbc58b6b2e48d2a7570b19a5bdcded6dfa976c4bce46e30294d29a8f2bbfa35a756c52f5861fc73de3cd1c8f287a49685e7518b86f45801c10da574d850fd5c2ad8f247931b3c139b7fa61e4af791a289f6f3f4e63a92f6a1f5") unlink(&(0x7f0000000140)='./cgroup\x00') 2.654395106s ago: executing program 2 (id=3173): socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000bcfb0e373c063f545339c7cb42931dbeabcdb4dba4cf7fc9e8de6927d59860517be0dda92b0a8e8bd80173224b2923084e74936b302b7d8fbe41bb8b72634c314552e0f912a87223ecf10a529739e2d158", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0a0000bc13cc948acc0a9b00000008f9ffff0700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000100100000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0xf0, 0x0, 0x0, 0x0, 0x55, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000100100000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0xf0, 0x0, 0x0, 0x0, 0x55, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_free_inode\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3, 0x0, 0x8000000, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3, 0x0, 0x8000000, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) r5 = gettid() bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000780)=ANY=[], 0x0, 0xfffffffffffffed0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000780)=ANY=[], 0x0, 0xfffffffffffffed0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r6}, 0x10) syz_open_procfs$namespace(r5, &(0x7f0000000340)='ns/cgroup\x00') perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x9, 0x9, 0x7, 0x9d, 0x0, 0x80000001, 0x202, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x3, 0x5}, 0x5b02, 0x2, 0x1, 0x9, 0x3, 0x7, 0x7, 0x0, 0x5e48, 0x0, 0x5}, r5, 0x4, r1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x17, 0x4, &(0x7f0000000480)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x5, 0xec, &(0x7f0000000000)=""/236, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x17, 0x4, &(0x7f0000000480)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x5, 0xec, &(0x7f0000000000)=""/236, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x3, 0x261, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x3, 0x261, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r7}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) 2.551985268s ago: executing program 0 (id=3174): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0f00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000005f16ee1160db94fc63471bd0818348"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="0000000000000000000000865300000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00ba400000b48a29813a00000000000000000000000000000000fc00326c588d14c2a4886875c3b8a286d666d22b5362e7746ad56323f3736fad9fd7a27196d9c1d50e7d300b7414b5312d4e818301b49ecb464cf0e387bcdf2602c825f8b8f06de58327530ea75f9089e0a95f47e5b92ee89be78906743d8d46ab7d64df489656d276a56b7e2b8c62861e25b22b4e7e3c1b25def1d3d23de1d2ffeef5cf5e0d461959adc12d356f6d8a0cafced99c3588c32e5b11a0a4fe6d7e5ae22b5792a2da9d9035e95b29145ad05c3df72f46dd4cb087ffd20e19584c5f59b2698ce9588fdd7604f94f47841b0f894f60fd89"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r4, 0x1c, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xb) r6 = perf_event_open(&(0x7f0000000880)={0x2, 0x80, 0x4b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYRESHEX=r3, @ANYRES64=r6, @ANYRES64=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32=r5], 0x50) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x4497784f, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x8, 0x0, 0x2563, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001340)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9, 0x1, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8600b5c4f345c195, '\x00', 0x0, @fallback=0x57888d9881ba7eff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/296], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) 2.467990459s ago: executing program 2 (id=3175): perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xd) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = bpf$ITER_CREATE(0xb, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffffbf) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0xffff, 0x8, 0x9, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x60002080, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001000000b7050000000000006a0a00ff00000000850000000a000000b70000000000000095000000000000009cc6b3fcd62c7d376238975d43a4505f80fc88943c4f0cf08e467b592f868ee30a0e8c1bf176db2a6b2f01806fd3d5707bfd2d84aaa3b1d4e984c46ea7e2a447a36f5662403e1b2be4cc7c2683908a0d411a9872971c7c77f0979b34e1ad837ff0d10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8d0d26b5069f8a98f7dc8f76b74635fc9f9de9ca3c0ec0cb9bf4e418d076df4c7df0a70f2bdf4000000000000b0c2940dd8e263aa743f7555193161f45346b1004006000000e1ffff8816326d7d25c32aac1c7d5b5be399f6609876b5887437a172fbc02a74135b29194e533583412dff048f0000000000000000b2728a0481e9f0da43bb6cfb851cd364ff19ffcafe3e64be033c9d2f002cc93c1c13caec04a347383420336bec88c24a9fb6a6991ddb737d527d6acb15426415b6e8b14fdfa2c6e94bd0339454c13ad3e328a100000000b515a1000000000000000eb2e9c15b6c8f6198282df27badac85"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r2, 0xffff0000, 0x4, 0x0, &(0x7f0000001a40)='+ m\a', 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00007fffffffffffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r4, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000800)={@ifindex=r6, 0x13, 0x1, 0x4, &(0x7f0000000700)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000740)=[0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0], &(0x7f00000007c0)=[0x0]}, 0x40) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000316b0000000000000800000018110000", @ANYRES32=r5, @ANYRESDEC=0x0, @ANYRES32=r4, @ANYBLOB="0000000000000000b70800008ecc00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000bf481800fcffffff183900000300000000000000000000001800000009000000000000000400000008b6fdff001000008510000002000000bf91000000000000b7020000020000008500000084000000b700000000000000950000"], &(0x7f0000000400)='syzkaller\x00', 0x1, 0x25, &(0x7f0000000440)=""/37, 0x41000, 0x29, '\x00', r6, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x0, 0x10, 0x80, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x18, &(0x7f00000000c0)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, @ldst={0x2, 0x6, 0x2, 0x2, 0xa, 0x100}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x4a, &(0x7f0000000180)=""/74, 0x41000, 0x29, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0x6, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[r0], &(0x7f0000000400)=[{0x0, 0x1, 0xa, 0x3}], 0x10, 0x3, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8982, &(0x7f0000000080)) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 2.33599758s ago: executing program 4 (id=3176): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = gettid() syz_open_procfs$namespace(r5, &(0x7f0000000680)='ns/cgroup\x00') (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) r6 = perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0xed, 0x35, 0x0, 0xff, 0x0, 0x5d1, 0x100, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x7ff, 0x2}, 0x4, 0xfa, 0x4, 0x9, 0x5, 0xbae8, 0x5, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xd, r2, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x8e, 0x8, 0x7e, 0x7, 0x0, 0x10000, 0x2500, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0xb8906f37bba4a3c0}, 0x40, 0x7, 0x3, 0x6, 0x7, 0x9, 0x4b1, 0x0, 0xfffffffb, 0x0, 0x7}, r5, 0xf, r6, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r3}, 0x10) (async) syz_clone(0x40100000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.972627905s ago: executing program 0 (id=3179): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000ffffffff00000000000000008500000018000000a5000000230000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000003000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f00800", 0x0, 0x9, 0x60000000, 0x73, 0x0, 0x0, 0x0}, 0x50) 1.910313705s ago: executing program 0 (id=3181): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000001cbca195a8c2f6ea16516f6f7a82f30bb8a2bb214c7f7b74b92466c172a84c784774d55828abb84710b3e6bf9f", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="8510000004000000950000000000000018000000000000000000000000000000950000000000000085100000fcffffff95"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004"], 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xf1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000071122400000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000006b113e000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r6, &(0x7f0000000000), &(0x7f0000000380)=""/76}, 0x20) syz_clone(0x600e7180, 0x0, 0x0, 0x0, 0x0, 0x0) 1.57227336s ago: executing program 2 (id=3184): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r3}, 0x18) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) 1.454210581s ago: executing program 2 (id=3185): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xd, 0x9, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x9}, {}, {0x4, 0x0, 0x6, 0x2, 0x0, 0x0, 0x1f}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1.373175793s ago: executing program 3 (id=3186): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, &(0x7f0000000340), &(0x7f00000003c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r3}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000000000000000, 0x0, 0x80, 0x9}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) 1.255186824s ago: executing program 3 (id=3188): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a80), 0x3b}, 0x20008000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES16], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='xen_mmu_alloc_ptpage\x00', r2, 0x0, 0x8000000000000001}, 0x18) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0xfd00, &(0x7f0000000640)=[{&(0x7f0000000280)=""/230, 0xe6}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xaf) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x11, 0xa, 0x9, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x1ff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000080000000c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000600000000000001000000"], 0x50) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x9d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x40, @void, @value}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)=@generic={&(0x7f0000000040)='./file0\x00'}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x10}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f0, &(0x7f0000000080)) 1.137326385s ago: executing program 2 (id=3189): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x7f, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ff, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe82c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.062124617s ago: executing program 2 (id=3191): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@'], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00'}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) (async) sendmsg$tipc(r1, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, r0}, 0x10) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='fib6_table_lookup\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x80d02, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000002c0)) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x10000, 0x400, 0x0, 0xfffffffe}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd42"], 0xfdef) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000), 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000800)='fib6_table_lookup\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000800)='fib6_table_lookup\x00', r9}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) 613.656142ms ago: executing program 1 (id=3196): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000259f0780f9926f680a65eff3000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000240)=r1, 0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='mm_page_free_batched\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000202064250000eed5002020081bd0ce44dd5fd273bd207b1af8ff00000000bfa104000000000007010000f8ffffffb302002e633e6d54f6b263b80af63b6072dc52dee5951efa3a11b034ae10fca13419dd48430dc46189a01ee781e49de9a515d08815414fa907b44704496cfbc2e24003cac1af7482247b46fdc42449f0821621468c9690ace8d6e390f901a26e2ed44c92f0b3e9"], 0x0, 0x0, 0xffffffa7, 0x0, 0x0, 0x52, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x822e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x18, 0x1, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r4) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f00000002c0), 0x20000000}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 592.623422ms ago: executing program 3 (id=3197): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000d"], &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1, 0x0, 0x0, @void, @value}, 0x20) 461.341024ms ago: executing program 1 (id=3198): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000980)={{r0}, &(0x7f0000000580), &(0x7f0000000940)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b0000000000f5ffffffffffffffac1414aa"], 0xfdef) 452.738124ms ago: executing program 3 (id=3199): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000f7fffffffeefff16f21e001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x5, 0x5, 0x408, 0xcd, 0x101, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xebff, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 423.857664ms ago: executing program 1 (id=3200): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000006000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000045b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r2, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) 333.314275ms ago: executing program 3 (id=3201): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f00000004c0), 0x75, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="b9ff030f6044238cb89e14f088ca1bff430500001100630377fbac141414e000000162079f4b4d2f87e56dca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x0, 0xa00}, 0x2c) 326.445016ms ago: executing program 1 (id=3202): r0 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x6, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x0, 0x0, &(0x7f0000000400), 0x8, 0xe8, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0xb2321, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000002180)=[{&(0x7f0000000e00)="388c0171eb3749c778a2c6b12c9d4a311252d3b5f87fb7517793d788e25f31199fbd3981a959718dc7d0b47b332ba7f680f8fd7016386591be5ebf9d157895d2a800f2a0bc232b90e6a66e3ddc33a1ff6bbbe2bdb10aca1742c2bde8700db4ec6e7b7e3c729c10e8b523d7449d38e545441b8e", 0x73}], 0x1, 0x0, 0x0, 0x40044}, 0x0) recvmsg(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000005c0)=""/136, 0x88}], 0x1, &(0x7f0000002f40)=""/244, 0xf4}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000fa8996c649ae942667a7434b000000000000000020000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r5}, 0x10) close(r3) 272.550806ms ago: executing program 0 (id=3203): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000170000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r1, 0x27, 0x14, 0x0, &(0x7f0000000440)="f8ad48cc02cb29dcc8007f5b0800", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x18) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180040000000edff00000000000000008500000f00000018010000646c0125000000000000bfa100000000000007010000f8ff09ffb702000008000000b70300740530870000800000850016000006000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="00000000000000000050b3d900"/23, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0x14, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) close(r7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYBLOB], 0x48) r8 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x2c, 0x3, 0x6, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x18, 0xb, &(0x7f0000000780)=ANY=[@ANYRESOCT=r8], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) 98.498859ms ago: executing program 3 (id=3204): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x811}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1c00000002000000010000000800000004000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="03000000020000000500000000000000000000000000000000000000c4ac07f087b4aeaf8fc5c0ce4f20ded5358d15496a44d9bebf4ad18f7ebf268e0bc71adcda5530427b5050463999cce8f11870d78320ed6c6cc5d07f6d68778389eca9adeb59927711525e098737722b3849804e11d2a61d47b23d9dbbfe2526c284eda638a7a9e829eaaabdc1"], 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x4d100000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r3, &(0x7f0000001380)="17", &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r3, 0x0, &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r3, &(0x7f0000001380), &(0x7f0000000000)=""/1, 0x2}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001100)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000580)={0xffffffffffffffff, &(0x7f0000000280)="5174b53c966bf31cc87680575185daab7d9ac017687a0d015e79586e", &(0x7f0000000340)=""/205}, 0x20) setsockopt$sock_attach_bpf(r5, 0x1, 0x2c, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000002f51d1b3b64bea46e53526000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020020008500000082"], 0x0, 0xffffffff, 0x0, 0x0, 0x41100, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 97.977759ms ago: executing program 1 (id=3205): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, 0x0, &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 82.536479ms ago: executing program 0 (id=3206): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r3}, 0x10) write$cgroup_int(r2, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) 13.353789ms ago: executing program 1 (id=3207): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001500)=ANY=[@ANYBLOB="180000000040000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000198500000071000000850000005000000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000eaffffff0000ac1414aa"], 0xfdef) 0s ago: executing program 0 (id=3208): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000100000d00000000000000000300000000000000000000010500000020000000000000000000000300000000020000000200000000f700"], 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYBLOB], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0x0, 0x0}, 0x10) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x18000000}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r3}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, 0x0, &(0x7f0000000180)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.53' (ED25519) to the list of known hosts. [ 22.318649][ T30] audit: type=1400 audit(1745984642.748:80): avc: denied { integrity } for pid=266 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 22.343061][ T30] audit: type=1400 audit(1745984642.778:81): avc: denied { mounton } for pid=266 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.344376][ T266] cgroup: Unknown subsys name 'net' [ 22.365963][ T30] audit: type=1400 audit(1745984642.778:82): avc: denied { mount } for pid=266 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.393475][ T266] cgroup: Unknown subsys name 'devices' [ 22.393527][ T30] audit: type=1400 audit(1745984642.808:83): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 22.420717][ T30] audit: type=1400 audit(1745984642.808:84): avc: denied { unmount } for pid=266 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.652811][ T266] cgroup: Unknown subsys name 'hugetlb' [ 22.658426][ T266] cgroup: Unknown subsys name 'rlimit' [ 22.859209][ T30] audit: type=1400 audit(1745984643.288:85): avc: denied { setattr } for pid=266 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.882383][ T30] audit: type=1400 audit(1745984643.288:86): avc: denied { mounton } for pid=266 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 22.900924][ T268] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.907262][ T30] audit: type=1400 audit(1745984643.288:87): avc: denied { mount } for pid=266 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.938768][ T30] audit: type=1400 audit(1745984643.348:88): avc: denied { relabelto } for pid=268 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.944570][ T266] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.964543][ T30] audit: type=1400 audit(1745984643.348:89): avc: denied { write } for pid=268 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.579308][ T274] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.586389][ T274] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.593933][ T274] device bridge_slave_0 entered promiscuous mode [ 23.622279][ T274] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.629321][ T274] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.636785][ T274] device bridge_slave_1 entered promiscuous mode [ 23.649661][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.656935][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.664472][ T275] device bridge_slave_0 entered promiscuous mode [ 23.671465][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.678499][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.686020][ T275] device bridge_slave_1 entered promiscuous mode [ 23.737259][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.744468][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.751962][ T276] device bridge_slave_0 entered promiscuous mode [ 23.772860][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.779906][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.787366][ T276] device bridge_slave_1 entered promiscuous mode [ 23.801055][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.808101][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.815620][ T278] device bridge_slave_0 entered promiscuous mode [ 23.833750][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.840802][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.848137][ T278] device bridge_slave_1 entered promiscuous mode [ 23.877893][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.885143][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.892626][ T277] device bridge_slave_0 entered promiscuous mode [ 23.912623][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.919674][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.927157][ T277] device bridge_slave_1 entered promiscuous mode [ 24.044518][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.051594][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.058858][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.065895][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.115820][ T274] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.122883][ T274] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.130128][ T274] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.137162][ T274] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.145642][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.152709][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.159966][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.167000][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.193967][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.201039][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.208300][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.215342][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.232059][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.239414][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.247011][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.254961][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.262132][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.269771][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.277033][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.284761][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.292142][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.337395][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.346045][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.353125][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.361195][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.369354][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.376390][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.383786][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.391245][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.399415][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.407674][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.414709][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.422213][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.430366][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.437401][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.444707][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.453821][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.476328][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.484575][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.492288][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.500431][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.507479][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.514972][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.523347][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.530362][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.537812][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.546041][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.553082][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.560381][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.568620][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.575652][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.602257][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.610427][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.618742][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.627078][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.635573][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.643920][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.651996][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.659975][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.667954][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.676393][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.684615][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.692797][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.702569][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.710051][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.724238][ T276] device veth0_vlan entered promiscuous mode [ 24.731402][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.739810][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.748259][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.756849][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.765437][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.773595][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.787043][ T274] device veth0_vlan entered promiscuous mode [ 24.797063][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.804645][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.812339][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.821048][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.829215][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.836266][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.843709][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.852250][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.860360][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.867394][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.874826][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.882931][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.891024][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.898695][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.906235][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.923649][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.931882][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.939831][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.948599][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.957600][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.965932][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.977784][ T274] device veth1_macvtap entered promiscuous mode [ 24.993740][ T275] device veth0_vlan entered promiscuous mode [ 25.000981][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.009037][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.016794][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.024545][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.032961][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.041190][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.048721][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.057108][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.065460][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.073459][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.081489][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.088928][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.097361][ T277] device veth0_vlan entered promiscuous mode [ 25.109356][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.117600][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.125870][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.135698][ T276] device veth1_macvtap entered promiscuous mode [ 25.149037][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.156760][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.165105][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.173627][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.182250][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.190499][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.198917][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.209784][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.218148][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.227947][ T277] device veth1_macvtap entered promiscuous mode [ 25.240766][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.248964][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.258935][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.267210][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.283835][ T278] device veth0_vlan entered promiscuous mode [ 25.291389][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.291516][ T274] request_module fs-gadgetfs succeeded, but still no fs? [ 25.299851][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.314718][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.323449][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.331093][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.341098][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.349488][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.358689][ T275] device veth1_macvtap entered promiscuous mode [ 25.390653][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.398810][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.415748][ T278] device veth1_macvtap entered promiscuous mode [ 25.428652][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.437305][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.446534][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.455122][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.479784][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.491833][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.500250][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.509465][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.640605][ C0] hrtimer: interrupt took 26753 ns [ 28.015268][ T30] kauditd_printk_skb: 44 callbacks suppressed [ 28.015284][ T30] audit: type=1400 audit(1745984648.448:134): avc: denied { write } for pid=384 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.090107][ T385] @0ÿ: renamed from bond_slave_0 [ 29.044476][ T30] audit: type=1400 audit(1745984649.478:135): avc: denied { write } for pid=404 comm="syz.0.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 29.298320][ T30] audit: type=1400 audit(1745984649.718:136): avc: denied { create } for pid=413 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 29.392991][ T30] audit: type=1400 audit(1745984649.828:137): avc: denied { cpu } for pid=413 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 29.534501][ T30] audit: type=1400 audit(1745984649.968:138): avc: denied { create } for pid=419 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 29.690309][ T30] audit: type=1400 audit(1745984650.008:139): avc: denied { read } for pid=423 comm="syz.4.37" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.814946][ T30] audit: type=1400 audit(1745984650.008:140): avc: denied { open } for pid=423 comm="syz.4.37" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.069656][ T30] audit: type=1400 audit(1745984650.018:141): avc: denied { ioctl } for pid=423 comm="syz.4.37" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x7451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 33.100585][ C1] sched: RT throttling activated [ 34.759071][ T30] audit: type=1400 audit(1745984655.188:142): avc: denied { create } for pid=483 comm="syz.2.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 35.021036][ T488] device pim6reg1 entered promiscuous mode [ 36.609282][ T30] audit: type=1400 audit(1745984657.038:143): avc: denied { create } for pid=514 comm="syz.0.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 37.449196][ T30] audit: type=1400 audit(1745984657.878:144): avc: denied { create } for pid=525 comm="syz.2.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 38.325966][ T546] device pim6reg1 entered promiscuous mode [ 40.496801][ T597] device pim6reg1 entered promiscuous mode [ 41.095975][ T516] syz.2.60 (516) used greatest stack depth: 22144 bytes left [ 46.699550][ T648] syz.1.108 (648) used greatest stack depth: 21248 bytes left [ 51.446683][ T761] IPv6: wlan1: Disabled Multicast RS [ 51.556400][ T772] ªªªªªª: renamed from vlan0 [ 51.568157][ T772] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 51.576067][ T772] syzkaller0: linktype set to 0 [ 51.625177][ T30] audit: type=1400 audit(1745984672.058:145): avc: denied { tracepoint } for pid=778 comm="syz.0.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 51.878669][ T30] audit: type=1400 audit(1745984672.308:146): avc: denied { create } for pid=808 comm="syz.3.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 52.220166][ T30] audit: type=1400 audit(1745984672.648:147): avc: denied { read } for pid=826 comm="syz.2.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 53.917203][ T899] FAULT_INJECTION: forcing a failure. [ 53.917203][ T899] name failslab, interval 1, probability 0, space 0, times 1 [ 53.980545][ T899] CPU: 1 PID: 899 Comm: syz.2.179 Not tainted 5.15.180-syzkaller-00024-g88c4075c39ed #0 [ 53.990314][ T899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 54.000407][ T899] Call Trace: [ 54.003698][ T899] [ 54.006646][ T899] __dump_stack+0x21/0x30 [ 54.011009][ T899] dump_stack_lvl+0xee/0x150 [ 54.015622][ T899] ? show_regs_print_info+0x20/0x20 [ 54.020845][ T899] dump_stack+0x15/0x20 [ 54.025020][ T899] should_fail+0x3c1/0x510 [ 54.029462][ T899] __should_failslab+0xa4/0xe0 [ 54.034238][ T899] should_failslab+0x9/0x20 [ 54.038753][ T899] slab_pre_alloc_hook+0x3b/0xe0 [ 54.043705][ T899] ? anon_vma_fork+0x200/0x510 [ 54.048485][ T899] kmem_cache_alloc+0x44/0x260 [ 54.053283][ T899] anon_vma_fork+0x200/0x510 [ 54.057888][ T899] copy_mm+0x9d1/0x1390 [ 54.062065][ T899] ? copy_signal+0x600/0x600 [ 54.066668][ T899] ? __init_rwsem+0xfc/0x1d0 [ 54.071264][ T899] ? copy_signal+0x4cb/0x600 [ 54.075868][ T899] copy_process+0x1159/0x3250 [ 54.080560][ T899] ? __kasan_check_write+0x14/0x20 [ 54.085683][ T899] ? proc_fail_nth_write+0x17a/0x1f0 [ 54.090984][ T899] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 54.096112][ T899] ? security_file_permission+0x83/0xa0 [ 54.101676][ T899] kernel_clone+0x23f/0x940 [ 54.106194][ T899] ? create_io_thread+0x130/0x130 [ 54.111232][ T899] ? __kasan_check_write+0x14/0x20 [ 54.116364][ T899] ? mutex_unlock+0x89/0x220 [ 54.120967][ T899] __x64_sys_clone+0x176/0x1d0 [ 54.125746][ T899] ? __kasan_check_write+0x14/0x20 [ 54.130868][ T899] ? __ia32_sys_vfork+0xf0/0xf0 [ 54.135739][ T899] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 54.141821][ T899] x64_sys_call+0x41f/0x9a0 [ 54.146336][ T899] do_syscall_64+0x4c/0xa0 [ 54.150770][ T899] ? clear_bhb_loop+0x35/0x90 [ 54.155455][ T899] ? clear_bhb_loop+0x35/0x90 [ 54.160144][ T899] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 54.166058][ T899] RIP: 0033:0x7f726897c969 [ 54.170484][ T899] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 54.190100][ T899] RSP: 002b:00007f7266fe4fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 54.198532][ T899] RAX: ffffffffffffffda RBX: 00007f7268ba3fa0 RCX: 00007f726897c969 [ 54.206513][ T899] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 54.214497][ T899] RBP: 00007f7266fe5090 R08: 0000000000000000 R09: 0000000000000000 [ 54.222492][ T899] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 54.230473][ T899] R13: 0000000000000000 R14: 00007f7268ba3fa0 R15: 00007ffecee40568 [ 54.238465][ T899] [ 55.594223][ T30] audit: type=1400 audit(1745984676.028:148): avc: denied { ioctl } for pid=946 comm="syz.2.195" path="socket:[17855]" dev="sockfs" ino=17855 ioctlcmd=0x8943 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 56.188162][ T985] device veth1_macvtap left promiscuous mode [ 56.275395][ T990] device veth1_macvtap left promiscuous mode [ 56.462891][ T994] device veth1_macvtap entered promiscuous mode [ 56.505612][ T994] device macsec0 entered promiscuous mode [ 58.754693][ T1090] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.765042][ T1090] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.847523][ T1091] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.854635][ T1091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.862002][ T1091] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.869026][ T1091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.058079][ T1091] device bridge0 entered promiscuous mode [ 59.416821][ T1121] device veth1_macvtap left promiscuous mode [ 60.007562][ T30] audit: type=1400 audit(1745984680.438:149): avc: denied { create } for pid=1130 comm="syz.3.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 63.466640][ T30] audit: type=1400 audit(1745984683.898:150): avc: denied { create } for pid=1274 comm="syz.4.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 64.018206][ T1294] device pim6reg1 entered promiscuous mode [ 65.112250][ T1356] device pim6reg1 entered promiscuous mode [ 65.184840][ T1359] FAULT_INJECTION: forcing a failure. [ 65.184840][ T1359] name failslab, interval 1, probability 0, space 0, times 0 [ 65.235058][ T1359] CPU: 1 PID: 1359 Comm: syz.2.329 Not tainted 5.15.180-syzkaller-00024-g88c4075c39ed #0 [ 65.245005][ T1359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 65.255085][ T1359] Call Trace: [ 65.258372][ T1359] [ 65.261313][ T1359] __dump_stack+0x21/0x30 [ 65.265664][ T1359] dump_stack_lvl+0xee/0x150 [ 65.270267][ T1359] ? show_regs_print_info+0x20/0x20 [ 65.275481][ T1359] ? __stack_depot_save+0x34/0x480 [ 65.280600][ T1359] ? stack_trace_save+0x98/0xe0 [ 65.285457][ T1359] dump_stack+0x15/0x20 [ 65.289621][ T1359] should_fail+0x3c1/0x510 [ 65.294060][ T1359] __should_failslab+0xa4/0xe0 [ 65.298835][ T1359] should_failslab+0x9/0x20 [ 65.303350][ T1359] slab_pre_alloc_hook+0x3b/0xe0 [ 65.308302][ T1359] ? __alloc_skb+0xe0/0x740 [ 65.312814][ T1359] kmem_cache_alloc+0x44/0x260 [ 65.317592][ T1359] __alloc_skb+0xe0/0x740 [ 65.321934][ T1359] alloc_skb_with_frags+0xa8/0x620 [ 65.327064][ T1359] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 65.332538][ T1359] sock_alloc_send_pskb+0x853/0x980 [ 65.337754][ T1359] ? sock_kzfree_s+0x60/0x60 [ 65.342356][ T1359] ? __kasan_check_write+0x14/0x20 [ 65.347475][ T1359] ? _raw_spin_lock+0x8e/0xe0 [ 65.352163][ T1359] ? _raw_spin_trylock_bh+0x130/0x130 [ 65.357547][ T1359] ? security_socket_getpeersec_dgram+0xaa/0xc0 [ 65.363799][ T1359] unix_dgram_sendmsg+0x5ea/0x1880 [ 65.368928][ T1359] ? unwind_get_return_address+0x4d/0x90 [ 65.374566][ T1359] ? stack_trace_save+0xe0/0xe0 [ 65.379427][ T1359] ? selinux_socket_sendmsg+0x208/0x2e0 [ 65.384993][ T1359] ? selinux_socket_accept+0x500/0x500 [ 65.390462][ T1359] ? unix_dgram_poll+0x6b0/0x6b0 [ 65.395408][ T1359] ? stack_trace_save+0x98/0xe0 [ 65.400270][ T1359] unix_seqpacket_sendmsg+0x118/0x1e0 [ 65.405645][ T1359] ? unix_dgram_peer_wake_me+0x450/0x450 [ 65.411285][ T1359] ____sys_sendmsg+0x5a2/0x8c0 [ 65.416058][ T1359] ? __sys_sendmsg_sock+0x40/0x40 [ 65.421177][ T1359] ? kstrtouint_from_user+0x1a0/0x200 [ 65.426579][ T1359] ? import_iovec+0x7c/0xb0 [ 65.431089][ T1359] ___sys_sendmsg+0x1f0/0x260 [ 65.435775][ T1359] ? __sys_sendmsg+0x250/0x250 [ 65.440555][ T1359] ? __fdget+0x1a1/0x230 [ 65.444806][ T1359] __x64_sys_sendmsg+0x1e2/0x2a0 [ 65.449756][ T1359] ? ___sys_sendmsg+0x260/0x260 [ 65.454620][ T1359] ? ksys_write+0x1eb/0x240 [ 65.459141][ T1359] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 65.465224][ T1359] x64_sys_call+0x4b/0x9a0 [ 65.469649][ T1359] do_syscall_64+0x4c/0xa0 [ 65.474090][ T1359] ? clear_bhb_loop+0x35/0x90 [ 65.478780][ T1359] ? clear_bhb_loop+0x35/0x90 [ 65.483464][ T1359] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 65.489385][ T1359] RIP: 0033:0x7f726897c969 [ 65.493807][ T1359] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 65.513613][ T1359] RSP: 002b:00007f7266fe5038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 65.522040][ T1359] RAX: ffffffffffffffda RBX: 00007f7268ba3fa0 RCX: 00007f726897c969 [ 65.530020][ T1359] RDX: 0000000000000050 RSI: 00002000000021c0 RDI: 0000000000000007 [ 65.538009][ T1359] RBP: 00007f7266fe5090 R08: 0000000000000000 R09: 0000000000000000 [ 65.545993][ T1359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 65.553969][ T1359] R13: 0000000000000000 R14: 00007f7268ba3fa0 R15: 00007ffecee40568 [ 65.561959][ T1359] [ 65.649366][ T1363] device macsec0 entered promiscuous mode [ 65.778719][ T1369] syz.0.342 (1369) used obsolete PPPIOCDETACH ioctl [ 65.961694][ T30] audit: type=1400 audit(1745984686.388:151): avc: denied { write } for pid=1380 comm="syz.0.337" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 67.120372][ T1425] device wg2 entered promiscuous mode [ 67.390184][ T30] audit: type=1400 audit(1745984687.818:152): avc: denied { create } for pid=1433 comm="syz.3.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 68.063885][ T1446] FAULT_INJECTION: forcing a failure. [ 68.063885][ T1446] name failslab, interval 1, probability 0, space 0, times 0 [ 68.167694][ T1446] CPU: 1 PID: 1446 Comm: syz.4.363 Not tainted 5.15.180-syzkaller-00024-g88c4075c39ed #0 [ 68.177553][ T1446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 68.187644][ T1446] Call Trace: [ 68.190929][ T1446] [ 68.193856][ T1446] __dump_stack+0x21/0x30 [ 68.198199][ T1446] dump_stack_lvl+0xee/0x150 [ 68.202809][ T1446] ? show_regs_print_info+0x20/0x20 [ 68.208026][ T1446] dump_stack+0x15/0x20 [ 68.212201][ T1446] should_fail+0x3c1/0x510 [ 68.216641][ T1446] __should_failslab+0xa4/0xe0 [ 68.221421][ T1446] should_failslab+0x9/0x20 [ 68.225940][ T1446] slab_pre_alloc_hook+0x3b/0xe0 [ 68.230892][ T1446] ? anon_vma_clone+0xc0/0x500 [ 68.235660][ T1446] kmem_cache_alloc+0x44/0x260 [ 68.240416][ T1446] anon_vma_clone+0xc0/0x500 [ 68.245020][ T1446] anon_vma_fork+0x8c/0x510 [ 68.249517][ T1446] copy_mm+0x9d1/0x1390 [ 68.253669][ T1446] ? copy_signal+0x600/0x600 [ 68.258252][ T1446] ? __init_rwsem+0xfc/0x1d0 [ 68.262837][ T1446] ? copy_signal+0x4cb/0x600 [ 68.267440][ T1446] copy_process+0x1159/0x3250 [ 68.272128][ T1446] ? __kasan_check_write+0x14/0x20 [ 68.277255][ T1446] ? proc_fail_nth_write+0x17a/0x1f0 [ 68.282540][ T1446] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 68.287649][ T1446] ? security_file_permission+0x83/0xa0 [ 68.293190][ T1446] kernel_clone+0x23f/0x940 [ 68.297687][ T1446] ? create_io_thread+0x130/0x130 [ 68.302705][ T1446] ? __kasan_check_write+0x14/0x20 [ 68.307805][ T1446] ? mutex_unlock+0x89/0x220 [ 68.312389][ T1446] __x64_sys_clone+0x176/0x1d0 [ 68.317145][ T1446] ? __kasan_check_write+0x14/0x20 [ 68.322260][ T1446] ? __ia32_sys_vfork+0xf0/0xf0 [ 68.327109][ T1446] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 68.333170][ T1446] x64_sys_call+0x41f/0x9a0 [ 68.337664][ T1446] do_syscall_64+0x4c/0xa0 [ 68.342071][ T1446] ? clear_bhb_loop+0x35/0x90 [ 68.346738][ T1446] ? clear_bhb_loop+0x35/0x90 [ 68.351403][ T1446] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 68.357290][ T1446] RIP: 0033:0x7f4b2683c969 [ 68.361696][ T1446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 68.381307][ T1446] RSP: 002b:00007f4b24ea4fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 68.389710][ T1446] RAX: ffffffffffffffda RBX: 00007f4b26a63fa0 RCX: 00007f4b2683c969 [ 68.397674][ T1446] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 68.405634][ T1446] RBP: 00007f4b24ea5090 R08: 0000000000000000 R09: 0000000000000000 [ 68.413595][ T1446] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 68.421564][ T1446] R13: 0000000000000000 R14: 00007f4b26a63fa0 R15: 00007ffd31589388 [ 68.429529][ T1446] [ 70.271492][ T1491] ref_ctr_offset mismatch. inode: 0x1b9 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 72.240734][ T1560] device veth0_vlan left promiscuous mode [ 72.301616][ T1560] device veth0_vlan entered promiscuous mode [ 72.428001][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.444902][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.477145][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.908607][ T1631] syz.1.420[1631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.908706][ T1631] syz.1.420[1631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.353857][ T1648] device syzkaller0 entered promiscuous mode [ 74.502884][ T1654] FAULT_INJECTION: forcing a failure. [ 74.502884][ T1654] name failslab, interval 1, probability 0, space 0, times 0 [ 74.651856][ T1654] CPU: 0 PID: 1654 Comm: syz.0.428 Not tainted 5.15.180-syzkaller-00024-g88c4075c39ed #0 [ 74.661840][ T1654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 74.671914][ T1654] Call Trace: [ 74.675220][ T1654] [ 74.678164][ T1654] __dump_stack+0x21/0x30 [ 74.682573][ T1654] dump_stack_lvl+0xee/0x150 [ 74.687275][ T1654] ? show_regs_print_info+0x20/0x20 [ 74.692511][ T1654] dump_stack+0x15/0x20 [ 74.696692][ T1654] should_fail+0x3c1/0x510 [ 74.701128][ T1654] ? alloc_skb_with_frags+0xa8/0x620 [ 74.706453][ T1654] __should_failslab+0xa4/0xe0 [ 74.711237][ T1654] should_failslab+0x9/0x20 [ 74.715755][ T1654] slab_pre_alloc_hook+0x3b/0xe0 [ 74.720713][ T1654] ? alloc_skb_with_frags+0xa8/0x620 [ 74.726018][ T1654] ? alloc_skb_with_frags+0xa8/0x620 [ 74.731326][ T1654] __kmalloc_track_caller+0x6c/0x2c0 [ 74.736631][ T1654] ? alloc_skb_with_frags+0xa8/0x620 [ 74.741947][ T1654] ? alloc_skb_with_frags+0xa8/0x620 [ 74.747254][ T1654] __alloc_skb+0x21a/0x740 [ 74.751693][ T1654] alloc_skb_with_frags+0xa8/0x620 [ 74.756826][ T1654] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 74.762332][ T1654] sock_alloc_send_pskb+0x853/0x980 [ 74.767566][ T1654] ? sock_kzfree_s+0x60/0x60 [ 74.772189][ T1654] ? __kasan_check_write+0x14/0x20 [ 74.777323][ T1654] ? _raw_spin_lock+0x8e/0xe0 [ 74.782020][ T1654] ? _raw_spin_trylock_bh+0x130/0x130 [ 74.787422][ T1654] ? security_socket_getpeersec_dgram+0xaa/0xc0 [ 74.793686][ T1654] unix_dgram_sendmsg+0x5ea/0x1880 [ 74.798820][ T1654] ? unwind_get_return_address+0x4d/0x90 [ 74.804480][ T1654] ? stack_trace_save+0xe0/0xe0 [ 74.809344][ T1654] ? selinux_socket_sendmsg+0x208/0x2e0 [ 74.814924][ T1654] ? selinux_socket_accept+0x500/0x500 [ 74.820397][ T1654] ? unix_dgram_poll+0x6b0/0x6b0 [ 74.825466][ T1654] ? stack_trace_save+0x98/0xe0 [ 74.830347][ T1654] ? debug_smp_processor_id+0x17/0x20 [ 74.835734][ T1654] ? bpf_bprintf_prepare+0x1115/0x13c0 [ 74.841198][ T1654] unix_seqpacket_sendmsg+0x118/0x1e0 [ 74.846569][ T1654] ? unix_dgram_peer_wake_me+0x450/0x450 [ 74.852199][ T1654] ____sys_sendmsg+0x5a2/0x8c0 [ 74.856963][ T1654] ? __sys_sendmsg_sock+0x40/0x40 [ 74.861982][ T1654] ? kstrtouint_from_user+0x1a0/0x200 [ 74.867352][ T1654] ? import_iovec+0x7c/0xb0 [ 74.871852][ T1654] ___sys_sendmsg+0x1f0/0x260 [ 74.876532][ T1654] ? __sys_sendmsg+0x250/0x250 [ 74.881327][ T1654] ? __fdget+0x1a1/0x230 [ 74.885564][ T1654] __x64_sys_sendmsg+0x1e2/0x2a0 [ 74.890496][ T1654] ? ___sys_sendmsg+0x260/0x260 [ 74.895336][ T1654] ? ksys_write+0x1eb/0x240 [ 74.899841][ T1654] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 74.905903][ T1654] x64_sys_call+0x4b/0x9a0 [ 74.910325][ T1654] do_syscall_64+0x4c/0xa0 [ 74.914732][ T1654] ? clear_bhb_loop+0x35/0x90 [ 74.919399][ T1654] ? clear_bhb_loop+0x35/0x90 [ 74.924060][ T1654] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 74.929946][ T1654] RIP: 0033:0x7f4cb967d969 [ 74.934349][ T1654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 74.954326][ T1654] RSP: 002b:00007f4cb7ce6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 74.962742][ T1654] RAX: ffffffffffffffda RBX: 00007f4cb98a4fa0 RCX: 00007f4cb967d969 [ 74.970734][ T1654] RDX: 0000000000000050 RSI: 00002000000021c0 RDI: 0000000000000007 [ 74.978701][ T1654] RBP: 00007f4cb7ce6090 R08: 0000000000000000 R09: 0000000000000000 [ 74.986665][ T1654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 74.994626][ T1654] R13: 0000000000000000 R14: 00007f4cb98a4fa0 R15: 00007ffd72c1d4d8 [ 75.002594][ T1654] [ 77.189094][ T1740] FAULT_INJECTION: forcing a failure. [ 77.189094][ T1740] name failslab, interval 1, probability 0, space 0, times 0 [ 77.240663][ T1740] CPU: 1 PID: 1740 Comm: syz.1.459 Not tainted 5.15.180-syzkaller-00024-g88c4075c39ed #0 [ 77.250531][ T1740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 77.260766][ T1740] Call Trace: [ 77.264057][ T1740] [ 77.266996][ T1740] __dump_stack+0x21/0x30 [ 77.271337][ T1740] dump_stack_lvl+0xee/0x150 [ 77.275938][ T1740] ? show_regs_print_info+0x20/0x20 [ 77.281147][ T1740] dump_stack+0x15/0x20 [ 77.285403][ T1740] should_fail+0x3c1/0x510 [ 77.289830][ T1740] __should_failslab+0xa4/0xe0 [ 77.294607][ T1740] should_failslab+0x9/0x20 [ 77.299119][ T1740] slab_pre_alloc_hook+0x3b/0xe0 [ 77.304069][ T1740] ? anon_vma_fork+0xf2/0x510 [ 77.308756][ T1740] kmem_cache_alloc+0x44/0x260 [ 77.313529][ T1740] anon_vma_fork+0xf2/0x510 [ 77.318043][ T1740] copy_mm+0x9d1/0x1390 [ 77.322212][ T1740] ? copy_signal+0x600/0x600 [ 77.326807][ T1740] ? __init_rwsem+0xfc/0x1d0 [ 77.331405][ T1740] ? copy_signal+0x4cb/0x600 [ 77.336011][ T1740] copy_process+0x1159/0x3250 [ 77.340705][ T1740] ? __kasan_check_write+0x14/0x20 [ 77.342845][ T1744] device syzkaller0 entered promiscuous mode [ 77.345823][ T1740] ? proc_fail_nth_write+0x17a/0x1f0 [ 77.357062][ T1740] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 77.362186][ T1740] ? security_file_permission+0x83/0xa0 [ 77.367745][ T1740] kernel_clone+0x23f/0x940 [ 77.372262][ T1740] ? create_io_thread+0x130/0x130 [ 77.377301][ T1740] ? __kasan_check_write+0x14/0x20 [ 77.382422][ T1740] ? mutex_unlock+0x89/0x220 [ 77.387045][ T1740] __x64_sys_clone+0x176/0x1d0 [ 77.391819][ T1740] ? __kasan_check_write+0x14/0x20 [ 77.397022][ T1740] ? __ia32_sys_vfork+0xf0/0xf0 [ 77.401885][ T1740] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 77.408326][ T1740] x64_sys_call+0x41f/0x9a0 [ 77.412843][ T1740] do_syscall_64+0x4c/0xa0 [ 77.417275][ T1740] ? clear_bhb_loop+0x35/0x90 [ 77.421961][ T1740] ? clear_bhb_loop+0x35/0x90 [ 77.426651][ T1740] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 77.432715][ T1740] RIP: 0033:0x7f3975777969 [ 77.437128][ T1740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 77.456814][ T1740] RSP: 002b:00007f3973ddffe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 77.465222][ T1740] RAX: ffffffffffffffda RBX: 00007f397599efa0 RCX: 00007f3975777969 [ 77.473185][ T1740] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 77.481150][ T1740] RBP: 00007f3973de0090 R08: 0000000000000000 R09: 0000000000000000 [ 77.489114][ T1740] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 77.497078][ T1740] R13: 0000000000000000 R14: 00007f397599efa0 R15: 00007ffc52ffcca8 [ 77.505050][ T1740] [ 78.742088][ T1779] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.750286][ T1779] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.666500][ T30] audit: type=1400 audit(1745984702.098:153): avc: denied { create } for pid=1868 comm="syz.0.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 81.887001][ T1902] device macsec0 left promiscuous mode [ 81.907383][ T1902] device veth1_macvtap entered promiscuous mode [ 81.925335][ T1902] device macsec0 entered promiscuous mode [ 81.959064][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 86.911778][ T2118] syz.2.591[2118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.911875][ T2118] syz.2.591[2118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.494394][ T2156] device pim6reg1 entered promiscuous mode [ 88.700979][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 89.388315][ T2194] FAULT_INJECTION: forcing a failure. [ 89.388315][ T2194] name failslab, interval 1, probability 0, space 0, times 0 [ 89.415286][ T2194] CPU: 1 PID: 2194 Comm: syz.4.619 Not tainted 5.15.180-syzkaller-00024-g88c4075c39ed #0 [ 89.425141][ T2194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 89.435219][ T2194] Call Trace: [ 89.438508][ T2194] [ 89.441459][ T2194] __dump_stack+0x21/0x30 [ 89.445811][ T2194] dump_stack_lvl+0xee/0x150 [ 89.450411][ T2194] ? show_regs_print_info+0x20/0x20 [ 89.455634][ T2194] dump_stack+0x15/0x20 [ 89.459803][ T2194] should_fail+0x3c1/0x510 [ 89.464226][ T2194] __should_failslab+0xa4/0xe0 [ 89.469000][ T2194] should_failslab+0x9/0x20 [ 89.473510][ T2194] slab_pre_alloc_hook+0x3b/0xe0 [ 89.478456][ T2194] ? anon_vma_clone+0xc0/0x500 [ 89.483237][ T2194] kmem_cache_alloc+0x44/0x260 [ 89.488009][ T2194] anon_vma_clone+0xc0/0x500 [ 89.492610][ T2194] anon_vma_fork+0x8c/0x510 [ 89.497128][ T2194] copy_mm+0x9d1/0x1390 [ 89.501296][ T2194] ? copy_signal+0x600/0x600 [ 89.505896][ T2194] ? __init_rwsem+0xfc/0x1d0 [ 89.510499][ T2194] ? copy_signal+0x4cb/0x600 [ 89.515092][ T2194] copy_process+0x1159/0x3250 [ 89.519780][ T2194] ? __kasan_check_write+0x14/0x20 [ 89.524896][ T2194] ? proc_fail_nth_write+0x17a/0x1f0 [ 89.530205][ T2194] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 89.535361][ T2194] ? security_file_permission+0x83/0xa0 [ 89.540929][ T2194] kernel_clone+0x23f/0x940 [ 89.545454][ T2194] ? create_io_thread+0x130/0x130 [ 89.550489][ T2194] ? __kasan_check_write+0x14/0x20 [ 89.555620][ T2194] ? mutex_unlock+0x89/0x220 [ 89.560329][ T2194] __x64_sys_clone+0x176/0x1d0 [ 89.565123][ T2194] ? __kasan_check_write+0x14/0x20 [ 89.570253][ T2194] ? __ia32_sys_vfork+0xf0/0xf0 [ 89.575115][ T2194] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 89.581214][ T2194] x64_sys_call+0x41f/0x9a0 [ 89.585737][ T2194] do_syscall_64+0x4c/0xa0 [ 89.590166][ T2194] ? clear_bhb_loop+0x35/0x90 [ 89.594946][ T2194] ? clear_bhb_loop+0x35/0x90 [ 89.599642][ T2194] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 89.605552][ T2194] RIP: 0033:0x7f4b2683c969 [ 89.610047][ T2194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 89.629774][ T2194] RSP: 002b:00007f4b24ea4fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 89.638226][ T2194] RAX: ffffffffffffffda RBX: 00007f4b26a63fa0 RCX: 00007f4b2683c969 [ 89.646217][ T2194] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 89.654200][ T2194] RBP: 00007f4b24ea5090 R08: 0000000000000000 R09: 0000000000000000 [ 89.662181][ T2194] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 89.670162][ T2194] R13: 0000000000000000 R14: 00007f4b26a63fa0 R15: 00007ffd31589388 [ 89.678155][ T2194] [ 90.768531][ T2239] FAULT_INJECTION: forcing a failure. [ 90.768531][ T2239] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 90.793094][ T2239] CPU: 1 PID: 2239 Comm: syz.4.634 Not tainted 5.15.180-syzkaller-00024-g88c4075c39ed #0 [ 90.802954][ T2239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 90.813002][ T2239] Call Trace: [ 90.816272][ T2239] [ 90.819196][ T2239] __dump_stack+0x21/0x30 [ 90.823526][ T2239] dump_stack_lvl+0xee/0x150 [ 90.828188][ T2239] ? show_regs_print_info+0x20/0x20 [ 90.833392][ T2239] ? 0xffffffffa0016674 [ 90.837542][ T2239] dump_stack+0x15/0x20 [ 90.841686][ T2239] should_fail+0x3c1/0x510 [ 90.846098][ T2239] should_fail_alloc_page+0x55/0x80 [ 90.851296][ T2239] prepare_alloc_pages+0x156/0x600 [ 90.856418][ T2239] ? __alloc_pages_bulk+0xab0/0xab0 [ 90.861622][ T2239] ? pcpu_chunk_refresh_hint+0x7e5/0x930 [ 90.867266][ T2239] __alloc_pages+0x10a/0x440 [ 90.871986][ T2239] ? prep_new_page+0x110/0x110 [ 90.876758][ T2239] pcpu_populate_chunk+0x184/0xcb0 [ 90.881871][ T2239] ? _find_next_bit+0x1b5/0x200 [ 90.886873][ T2239] pcpu_alloc+0xc4d/0x1660 [ 90.891294][ T2239] __alloc_percpu_gfp+0x25/0x30 [ 90.896140][ T2239] bpf_map_alloc_percpu+0xc5/0x150 [ 90.901250][ T2239] array_map_alloc+0x39a/0x6d0 [ 90.906027][ T2239] map_create+0x455/0x21b0 [ 90.910467][ T2239] __sys_bpf+0x2cf/0x730 [ 90.914719][ T2239] ? bpf_link_show_fdinfo+0x310/0x310 [ 90.920095][ T2239] ? debug_smp_processor_id+0x17/0x20 [ 90.925471][ T2239] __x64_sys_bpf+0x7c/0x90 [ 90.929884][ T2239] x64_sys_call+0x4b9/0x9a0 [ 90.934378][ T2239] do_syscall_64+0x4c/0xa0 [ 90.938790][ T2239] ? clear_bhb_loop+0x35/0x90 [ 90.943476][ T2239] ? clear_bhb_loop+0x35/0x90 [ 90.948167][ T2239] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 90.954075][ T2239] RIP: 0033:0x7f4b2683c969 [ 90.958510][ T2239] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 90.978216][ T2239] RSP: 002b:00007f4b24ea5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 90.986633][ T2239] RAX: ffffffffffffffda RBX: 00007f4b26a63fa0 RCX: 00007f4b2683c969 [ 90.994598][ T2239] RDX: 0000000000000048 RSI: 0000200000000b00 RDI: 2000000000000000 [ 91.002560][ T2239] RBP: 00007f4b24ea5090 R08: 0000000000000000 R09: 0000000000000000 [ 91.010524][ T2239] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 91.018502][ T2239] R13: 0000000000000000 R14: 00007f4b26a63fa0 R15: 00007ffd31589388 [ 91.026482][ T2239] [ 91.523248][ T2250] device pim6reg1 entered promiscuous mode [ 93.564747][ T2306] device pim6reg1 entered promiscuous mode [ 95.954488][ T30] audit: type=1400 audit(1745984716.388:154): avc: denied { create } for pid=2355 comm="syz.4.677" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 96.048473][ T2350] device pim6reg1 entered promiscuous mode [ 97.015295][ T2395] bond_slave_1: mtu less than device minimum [ 97.061487][ T2395] ref_ctr_offset mismatch. inode: 0x2f1 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 97.477945][ T2410] device pim6reg1 entered promiscuous mode [ 106.964724][ T2564] device syzkaller0 entered promiscuous mode [ 108.921209][ T2605] device sit0 entered promiscuous mode [ 109.917166][ T2609] device syzkaller0 entered promiscuous mode [ 112.143463][ T2632] device syzkaller0 entered promiscuous mode [ 114.522748][ T2689] ref_ctr_offset mismatch. inode: 0x362 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 118.727526][ T2759] device pim6reg1 entered promiscuous mode [ 120.152253][ T2798] device syzkaller0 entered promiscuous mode [ 121.151507][ T2821] -: renamed from syzkaller0 [ 121.950130][ T30] audit: type=1400 audit(1745984742.378:155): avc: denied { create } for pid=2834 comm="syz.0.838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 122.108263][ T2835] @ÿ: renamed from bond_slave_0 [ 123.073047][ T30] audit: type=1400 audit(1745984743.508:156): avc: denied { create } for pid=2849 comm="syz.3.843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 123.762974][ T2873] device pim6reg1 entered promiscuous mode [ 125.244215][ T2882] device syzkaller0 entered promiscuous mode [ 126.856416][ T2903] device syzkaller0 entered promiscuous mode [ 129.298886][ T2935] device syzkaller0 entered promiscuous mode [ 133.316296][ T2986] device syzkaller0 entered promiscuous mode [ 134.340605][ T3008] device veth0_vlan left promiscuous mode [ 134.386729][ T3008] device veth0_vlan entered promiscuous mode [ 134.498076][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.522346][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 134.556552][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 136.140848][ T3030] device syzkaller0 entered promiscuous mode [ 142.057949][ T3142] device syzkaller0 entered promiscuous mode [ 142.477160][ T3149] device syzkaller0 entered promiscuous mode [ 142.854035][ T3160] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.862455][ T3160] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.882495][ T3160] device bridge0 left promiscuous mode [ 143.096605][ T30] audit: type=1400 audit(1745984763.528:157): avc: denied { create } for pid=3165 comm="syz.1.941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 143.985752][ T30] audit: type=1400 audit(1745984764.408:158): avc: denied { create } for pid=3186 comm="syz.3.950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 144.467080][ T3190] device syzkaller0 entered promiscuous mode [ 145.699557][ T3241] device sit0 left promiscuous mode [ 146.000730][ T3247] device sit0 entered promiscuous mode [ 146.812560][ T3314] device syzkaller0 entered promiscuous mode [ 146.984661][ T3313] device syzkaller0 entered promiscuous mode [ 146.999374][ T3310] device sit0 entered promiscuous mode [ 147.250072][ T3318] device syzkaller0 entered promiscuous mode [ 147.404960][ T3323] device syzkaller0 entered promiscuous mode [ 147.906029][ T3370] syz.2.1016[3370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.906124][ T3370] syz.2.1016[3370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.345765][ T3384] device syzkaller0 entered promiscuous mode [ 149.252565][ T3405] tap0: tun_chr_ioctl cmd 1074025681 [ 150.162306][ T3428] device syzkaller0 entered promiscuous mode [ 150.205734][ T3429] device syzkaller0 entered promiscuous mode [ 150.444958][ T3473] device pim6reg1 entered promiscuous mode [ 150.677219][ T3481] device syzkaller0 entered promiscuous mode [ 151.338987][ T3527] device syzkaller0 entered promiscuous mode [ 151.455945][ T3539] device syzkaller0 entered promiscuous mode [ 153.020301][ T30] audit: type=1400 audit(1745984773.448:159): avc: denied { create } for pid=3605 comm="syz.4.1100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 153.343649][ T3625] device syzkaller0 entered promiscuous mode [ 153.515632][ T3628] device syzkaller0 entered promiscuous mode [ 153.942177][ T3640] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.951871][ T3640] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.038451][ T3643] device bridge_slave_1 left promiscuous mode [ 154.060682][ T3643] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.093871][ T3643] device bridge_slave_0 left promiscuous mode [ 154.117958][ T3643] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.505190][ T3661] device syzkaller0 entered promiscuous mode [ 154.609043][ T3676] device veth1_macvtap left promiscuous mode [ 155.009010][ T3696] device veth1_macvtap entered promiscuous mode [ 155.020259][ T3696] device macsec0 entered promiscuous mode [ 155.059399][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 155.804515][ T3740] bond_slave_1: mtu less than device minimum [ 156.015885][ T3756] bond_slave_1: mtu less than device minimum [ 156.220402][ T3757] device syzkaller0 entered promiscuous mode [ 156.484547][ T3764] device syzkaller0 entered promiscuous mode [ 157.018560][ T30] audit: type=1400 audit(1745984777.448:160): avc: denied { create } for pid=3832 comm="syz.0.1180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 158.867038][ T3912] device sit0 left promiscuous mode [ 159.014264][ T3919] device tunl0 entered promiscuous mode [ 159.429911][ T30] audit: type=1400 audit(1745984779.858:161): avc: denied { create } for pid=3943 comm="syz.0.1221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 159.532849][ T3939] device syzkaller0 entered promiscuous mode [ 159.840059][ T3968] device veth0_vlan left promiscuous mode [ 159.846117][ T3968] device veth0_vlan entered promiscuous mode [ 159.865664][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 159.881402][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 159.893084][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 159.949887][ T30] audit: type=1400 audit(1745984780.378:162): avc: denied { create } for pid=3967 comm="syz.2.1231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 162.041318][ T4067] syz.3.1273[4067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.041385][ T4067] syz.3.1273[4067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.161426][ T4067] syz.3.1273[4067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.190998][ T4067] syz.3.1273[4067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.247829][ T4069] device syzkaller0 entered promiscuous mode [ 162.593242][ T4078] device syzkaller0 entered promiscuous mode [ 164.168189][ T4118] device syzkaller0 entered promiscuous mode [ 164.943693][ T4125] device syzkaller0 entered promiscuous mode [ 166.515802][ T4207] device veth0_vlan left promiscuous mode [ 166.523119][ T4207] device veth0_vlan entered promiscuous mode [ 166.841661][ T30] audit: type=1400 audit(1745984787.268:163): avc: denied { create } for pid=4217 comm="syz.0.1329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 167.791405][ T4260] device syzkaller0 entered promiscuous mode [ 167.900970][ T4273] device sit0 entered promiscuous mode [ 168.527966][ T4276] device syzkaller0 entered promiscuous mode [ 168.634790][ T4279] device syzkaller0 entered promiscuous mode [ 169.273279][ T4317] device syzkaller0 entered promiscuous mode [ 169.366812][ T4323] ref_ctr_offset mismatch. inode: 0x639 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 169.503403][ T4334] device sit0 entered promiscuous mode [ 169.736524][ T4337] device syzkaller0 entered promiscuous mode [ 170.255496][ T4358] device syzkaller0 entered promiscuous mode [ 171.072211][ T30] audit: type=1400 audit(1745984791.508:164): avc: denied { create } for pid=4413 comm="syz.3.1402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 171.478739][ T4433] device syzkaller0 entered promiscuous mode [ 172.207890][ T4469] device syzkaller0 entered promiscuous mode [ 173.476385][ T4522] device syzkaller0 entered promiscuous mode [ 173.628188][ T4541] device sit0 entered promiscuous mode [ 174.212654][ T4548] device syzkaller0 entered promiscuous mode [ 174.595109][ T4549] device syzkaller0 entered promiscuous mode [ 175.294926][ T4581] device syzkaller0 entered promiscuous mode [ 175.388317][ T4582] device syzkaller0 entered promiscuous mode [ 176.238880][ T4626] device syzkaller0 entered promiscuous mode [ 176.260946][ T30] audit: type=1400 audit(1745984796.698:165): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 176.288105][ T30] audit: type=1400 audit(1745984796.698:166): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 176.325346][ T30] audit: type=1400 audit(1745984796.698:167): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 176.435167][ T4646] device syzkaller0 entered promiscuous mode [ 176.453799][ T4643] device syzkaller0 entered promiscuous mode [ 177.434614][ T4691] device syzkaller0 entered promiscuous mode [ 178.505472][ T30] audit: type=1400 audit(1745984798.938:168): avc: denied { create } for pid=4716 comm="syz.1.1512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 180.684238][ T4748] device syzkaller0 entered promiscuous mode [ 181.004114][ T4760] device syzkaller0 entered promiscuous mode [ 182.148638][ T4790] device syzkaller0 entered promiscuous mode [ 182.649953][ T4828] device wg2 entered promiscuous mode [ 185.187985][ T4917] ref_ctr_offset mismatch. inode: 0x6b6 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 185.228237][ T4922] GPL: port 1(erspan0) entered blocking state [ 185.249813][ T4922] GPL: port 1(erspan0) entered disabled state [ 185.291843][ T4922] device erspan0 entered promiscuous mode [ 185.319035][ T4922] GPL: port 1(erspan0) entered blocking state [ 185.325187][ T4922] GPL: port 1(erspan0) entered forwarding state [ 185.689232][ T4937] device sit0 left promiscuous mode [ 185.889868][ T4940] device sit0 entered promiscuous mode [ 186.024436][ T4948] ref_ctr_offset mismatch. inode: 0x5b4 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 186.141480][ T4947] GPL: port 1(erspan0) entered blocking state [ 186.185837][ T4947] GPL: port 1(erspan0) entered disabled state [ 186.198383][ T4947] device erspan0 entered promiscuous mode [ 186.252861][ T4953] device sit0 left promiscuous mode [ 186.751253][ T4948] GPL: port 1(erspan0) entered blocking state [ 186.757691][ T4948] GPL: port 1(erspan0) entered forwarding state [ 187.401415][ T5018] ªªªªªª: renamed from vlan0 [ 188.436444][ T5057] syz.3.1632 (5057) used greatest stack depth: 21040 bytes left [ 188.788935][ T5093] device veth0_vlan left promiscuous mode [ 188.898389][ T5093] device veth0_vlan entered promiscuous mode [ 189.137538][ T5085] cgroup: fork rejected by pids controller in /syz4 [ 189.613771][ T5126] device syzkaller0 entered promiscuous mode [ 191.071213][ T5165] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.078294][ T5165] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.085812][ T5165] device bridge_slave_0 entered promiscuous mode [ 191.093752][ T5165] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.101145][ T5165] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.109201][ T5165] device bridge_slave_1 entered promiscuous mode [ 191.297311][ T30] audit: type=1400 audit(1745984811.728:169): avc: denied { create } for pid=5165 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 191.325025][ T5165] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.332149][ T5165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.339437][ T5165] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.346489][ T5165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.355674][ T30] audit: type=1400 audit(1745984811.748:170): avc: denied { write } for pid=5165 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 191.377614][ T30] audit: type=1400 audit(1745984811.748:171): avc: denied { read } for pid=5165 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 191.441913][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.449515][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.457737][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.467411][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.475687][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.482729][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.559280][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.577952][ T4711] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.585081][ T4711] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.631326][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.689249][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.790316][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 191.832613][ T5165] device veth0_vlan entered promiscuous mode [ 191.881078][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.974479][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 192.021258][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 192.060152][ T5165] device veth1_macvtap entered promiscuous mode [ 192.091995][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 192.130897][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 192.169702][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 192.221301][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 192.270151][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 192.501584][ T10] device veth1_macvtap left promiscuous mode [ 192.524196][ T10] device veth0_vlan left promiscuous mode [ 193.742513][ T5248] device syzkaller0 entered promiscuous mode [ 193.836498][ T5264] device veth0_vlan left promiscuous mode [ 193.903639][ T5264] device veth0_vlan entered promiscuous mode [ 193.940176][ T5266] device syzkaller0 left promiscuous mode [ 193.972137][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 193.983894][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 193.991905][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 194.303529][ T30] audit: type=1400 audit(1745984814.738:172): avc: denied { write } for pid=5295 comm="syz.2.1720" name="cgroup.subtree_control" dev="cgroup2" ino=139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 194.396410][ T30] audit: type=1400 audit(1745984814.758:173): avc: denied { open } for pid=5295 comm="syz.2.1720" path="" dev="cgroup2" ino=139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 194.473707][ T5302] device wg2 left promiscuous mode [ 194.549008][ T5302] device wg2 entered promiscuous mode [ 195.100507][ T5328] device syzkaller0 entered promiscuous mode [ 195.442189][ T5351] device macsec0 left promiscuous mode [ 195.557861][ T5365] device veth1_macvtap left promiscuous mode [ 195.615213][ T5365] device macsec0 left promiscuous mode [ 196.160210][ T5389] device syzkaller0 entered promiscuous mode [ 196.667622][ T5396] device syzkaller0 entered promiscuous mode [ 197.668334][ T5446] device syzkaller0 entered promiscuous mode [ 199.126812][ T5505] device syzkaller0 entered promiscuous mode [ 200.400733][ T5564] device syzkaller0 entered promiscuous mode [ 200.525177][ T5574] device wg2 entered promiscuous mode [ 200.644538][ T5583] device syzkaller0 entered promiscuous mode [ 200.775321][ T30] audit: type=1400 audit(1745984821.208:174): avc: denied { append } for pid=5597 comm="syz.2.1836" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 201.414028][ T5643] €Â: renamed from pim6reg1 [ 201.449105][ T5643] €Â0: renamed from pim6reg1 [ 201.688981][ T5655] device syzkaller0 entered promiscuous mode [ 201.841266][ T5661] device syzkaller0 entered promiscuous mode [ 202.517160][ T5689] device syzkaller0 entered promiscuous mode [ 202.704285][ T5705] device syzkaller0 entered promiscuous mode [ 203.692535][ T5785] device syzkaller0 entered promiscuous mode [ 205.778712][ T5902] syz.0.1942[5902] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.778808][ T5902] syz.0.1942[5902] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.390095][ T5912] device syzkaller0 entered promiscuous mode [ 206.898833][ T5929] device veth0_vlan left promiscuous mode [ 206.905642][ T5929] device veth0_vlan entered promiscuous mode [ 207.122131][ T5927] device pim6reg1 entered promiscuous mode [ 207.321260][ T5948] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.328517][ T5948] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.447269][ T5970] syz.2.1965[5970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.447365][ T5970] syz.2.1965[5970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.970113][ T5985] device sit0 left promiscuous mode [ 210.468114][ T6104] syz.0.2014[6104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.468186][ T6104] syz.0.2014[6104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.018985][ T6129] device syzkaller0 entered promiscuous mode [ 213.464456][ T6199] device syzkaller0 entered promiscuous mode [ 214.134367][ T30] audit: type=1400 audit(1745984834.568:175): avc: denied { create } for pid=6230 comm="syz.0.2060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 215.671624][ T6333] device syzkaller0 entered promiscuous mode [ 226.017720][ T30] audit: type=1400 audit(1745984846.448:176): avc: denied { create } for pid=6426 comm="syz.4.2135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 228.676042][ T6537] device veth1_macvtap left promiscuous mode [ 228.695127][ T6537] device macsec0 entered promiscuous mode [ 228.770516][ T6544] device veth1_macvtap entered promiscuous mode [ 228.806698][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 229.379526][ T6570] device pim6reg1 entered promiscuous mode [ 230.057549][ T6602] device pim6reg1 entered promiscuous mode [ 230.842384][ T6628] device syzkaller0 entered promiscuous mode [ 232.067569][ T6684] device syzkaller0 entered promiscuous mode [ 235.540477][ T6759] device syzkaller0 entered promiscuous mode [ 235.730050][ T6783] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.945129][ T6821] device syzkaller0 entered promiscuous mode [ 239.194009][ T6858] device syzkaller0 entered promiscuous mode [ 240.408976][ T6910] device veth0_vlan left promiscuous mode [ 240.421443][ T6910] device veth0_vlan entered promiscuous mode [ 240.428269][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.445182][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 240.459284][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 242.110652][ T6955] device sit0 left promiscuous mode [ 243.149585][ T6998] device syzkaller0 entered promiscuous mode [ 245.002103][ T7057] device syzkaller0 entered promiscuous mode [ 245.999275][ T7098] device syzkaller0 entered promiscuous mode [ 246.084160][ T7104] ------------[ cut here ]------------ [ 246.096215][ T7104] trace type BPF program uses run-time allocation [ 246.116124][ T7104] WARNING: CPU: 0 PID: 7104 at kernel/bpf/verifier.c:11701 check_map_prog_compatibility+0x6cd/0x870 [ 246.127487][ T7104] Modules linked in: [ 246.166710][ T7104] CPU: 0 PID: 7104 Comm: syz.2.2385 Not tainted 5.15.180-syzkaller-00024-g88c4075c39ed #0 [ 246.241071][ T7104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 246.251427][ T7104] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 246.258353][ T7104] Code: ee ff 48 c7 c6 20 df 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 b6 4c ee ff c6 05 03 82 6b 05 01 48 c7 c7 80 db 47 85 e8 53 7b 21 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 246.380611][ T7104] RSP: 0018:ffffc900009a7428 EFLAGS: 00010246 [ 246.407466][ T7104] RAX: a101c353ea3a1800 RBX: 0000000000000001 RCX: 0000000000080000 [ 246.471430][ T7104] RDX: ffffc90002780000 RSI: 0000000000003155 RDI: 0000000000003156 [ 246.504729][ T7104] RBP: ffffc900009a7470 R08: dffffc0000000000 R09: ffffed103ee065e8 [ 246.514401][ T7104] R10: ffffed103ee065e8 R11: 1ffff1103ee065e7 R12: ffff888110be0000 [ 246.544877][ T7104] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888127d6e800 [ 246.555145][ T7104] FS: 00007f7266fe56c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 246.567953][ T7104] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 246.575511][ T7104] CR2: 00007fcaa09a9bac CR3: 0000000104983000 CR4: 00000000003506b0 [ 246.586293][ T7104] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 246.595454][ T7104] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 246.615050][ T7104] Call Trace: [ 246.618904][ T7104] [ 246.622510][ T7104] resolve_pseudo_ldimm64+0x685/0x11d0 [ 246.628274][ T7104] ? __sanitizer_cov_trace_const_cmp4+0x1/0x90 [ 246.635211][ T7104] ? check_attach_btf_id+0xde0/0xde0 [ 246.652341][ T7104] ? bpf_check+0x266c/0xf330 [ 246.672849][ T7104] ? __sanitizer_cov_trace_switch+0x54/0xe0 [ 246.683773][ T7104] bpf_check+0x2c44/0xf330 [ 246.706842][ T7104] ? is_bpf_text_address+0x177/0x190 [ 246.721820][ T7104] ? bpf_get_btf_vmlinux+0x60/0x60 [ 246.734215][ T7104] ? unwind_get_return_address+0x4d/0x90 [ 246.746095][ T7104] ? stack_trace_save+0xe0/0xe0 [ 246.757063][ T7104] ? arch_stack_walk+0xee/0x140 [ 246.766113][ T7104] ? stack_trace_save+0x98/0xe0 [ 246.778198][ T7104] ? __stack_depot_save+0x34/0x480 [ 246.789522][ T7104] ? __kasan_slab_alloc+0x69/0xf0 [ 246.800597][ T7104] ? __kasan_kmalloc+0xec/0x110 [ 246.825852][ T7104] ? __kasan_kmalloc+0xda/0x110 [ 246.837162][ T7104] ? kmem_cache_alloc_trace+0x119/0x270 [ 246.847241][ T7104] ? selinux_bpf_prog_alloc+0x51/0x140 [ 246.857236][ T7104] ? security_bpf_prog_alloc+0x62/0x90 [ 246.864267][ T7141] device syzkaller0 entered promiscuous mode [ 246.870321][ T7104] ? bpf_prog_load+0x97c/0x1550 [ 246.876020][ T7104] ? __sys_bpf+0x4c3/0x730 [ 246.884909][ T7104] ? __x64_sys_bpf+0x7c/0x90 [ 246.895138][ T7104] ? x64_sys_call+0x4b9/0x9a0 [ 246.902976][ T7104] ? do_syscall_64+0x4c/0xa0 [ 246.911910][ T7104] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 246.918071][ T7104] ? irqentry_exit+0x37/0x40 [ 246.923354][ T7104] ? irqentry_exit+0x37/0x40 [ 246.928003][ T7104] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 246.934247][ T7104] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 246.940457][ T7104] ? memset+0x35/0x40 [ 246.969197][ T7104] ? bpf_obj_name_cpy+0x193/0x1e0 [ 247.011966][ T7104] bpf_prog_load+0x1042/0x1550 [ 247.051897][ T7104] ? map_freeze+0x360/0x360 [ 247.070576][ T7104] ? selinux_bpf+0xc7/0xf0 [ 247.107895][ T7104] ? security_bpf+0x82/0xa0 [ 247.132816][ T7104] __sys_bpf+0x4c3/0x730 [ 247.149088][ T7104] ? bpf_link_show_fdinfo+0x310/0x310 [ 247.172351][ T7104] __x64_sys_bpf+0x7c/0x90 [ 247.199222][ T7104] x64_sys_call+0x4b9/0x9a0 [ 247.234407][ T7104] do_syscall_64+0x4c/0xa0 [ 247.265972][ T7104] ? clear_bhb_loop+0x35/0x90 [ 247.312182][ T7104] ? clear_bhb_loop+0x35/0x90 [ 247.329912][ T7104] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 247.401170][ T7104] RIP: 0033:0x7f726897c969 [ 247.414817][ T7104] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 247.495784][ T7167] device syzkaller0 entered promiscuous mode [ 247.505418][ T7165] device veth1_macvtap left promiscuous mode [ 247.514928][ T7165] device macsec0 left promiscuous mode [ 247.530694][ T7104] RSP: 002b:00007f7266fe5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 247.541057][ T7104] RAX: ffffffffffffffda RBX: 00007f7268ba3fa0 RCX: 00007f726897c969 [ 247.549210][ T7104] RDX: 0000000000000052 RSI: 0000200000000200 RDI: 0000000000000005 [ 247.567408][ T7104] RBP: 00007f72689feab1 R08: 0000000000000000 R09: 0000000000000000 [ 247.642914][ T7104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 247.655991][ T7104] R13: 0000000000000000 R14: 00007f7268ba3fa0 R15: 00007ffecee40568 [ 247.684427][ T7104] [ 247.687493][ T7104] ---[ end trace a9ebea5341f16443 ]--- [ 248.358786][ T7203] device syzkaller0 entered promiscuous mode [ 248.417364][ T7209] bond_slave_1: mtu less than device minimum [ 248.638141][ T7229] syz.4.2432[7229] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.788033][ T7241] device syzkaller0 entered promiscuous mode [ 248.965878][ T7251] device syzkaller0 entered promiscuous mode [ 249.826405][ T7294] syz.2.2460[7294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.826499][ T7294] syz.2.2460[7294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.879665][ T7291] device syzkaller0 entered promiscuous mode [ 251.633076][ T7324] device syzkaller0 entered promiscuous mode [ 252.063291][ T7338] device syzkaller0 entered promiscuous mode [ 254.139766][ T7373] device syzkaller0 entered promiscuous mode [ 254.353297][ T7394] device syzkaller0 entered promiscuous mode [ 254.518782][ T7417] device syzkaller0 entered promiscuous mode [ 254.600964][ T7422] device syzkaller0 entered promiscuous mode [ 254.676071][ T7432] FAULT_INJECTION: forcing a failure. [ 254.676071][ T7432] name failslab, interval 1, probability 0, space 0, times 0 [ 254.709069][ T7432] CPU: 1 PID: 7432 Comm: syz.0.2513 Tainted: G W 5.15.180-syzkaller-00024-g88c4075c39ed #0 [ 254.720413][ T7432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 254.730482][ T7432] Call Trace: [ 254.733751][ T7432] [ 254.736668][ T7432] __dump_stack+0x21/0x30 [ 254.741075][ T7432] dump_stack_lvl+0xee/0x150 [ 254.745669][ T7432] ? show_regs_print_info+0x20/0x20 [ 254.750866][ T7432] ? avc_has_perm_noaudit+0x2f4/0x460 [ 254.756221][ T7432] dump_stack+0x15/0x20 [ 254.760358][ T7432] should_fail+0x3c1/0x510 [ 254.764777][ T7432] __should_failslab+0xa4/0xe0 [ 254.769531][ T7432] should_failslab+0x9/0x20 [ 254.774018][ T7432] slab_pre_alloc_hook+0x3b/0xe0 [ 254.778943][ T7432] ? __alloc_skb+0xe0/0x740 [ 254.783431][ T7432] kmem_cache_alloc+0x44/0x260 [ 254.788181][ T7432] __alloc_skb+0xe0/0x740 [ 254.792498][ T7432] alloc_skb_with_frags+0xa8/0x620 [ 254.797598][ T7432] ? search_extable+0xd0/0xd0 [ 254.802258][ T7432] ? copy_from_kernel_nofault+0x1f2/0x370 [ 254.807979][ T7432] ? search_extable+0x8c/0xd0 [ 254.812644][ T7432] sock_alloc_send_pskb+0x853/0x980 [ 254.817829][ T7432] ? is_bpf_text_address+0x177/0x190 [ 254.823121][ T7432] ? sock_kzfree_s+0x60/0x60 [ 254.827697][ T7432] ? kernelmode_fixup_or_oops+0x85/0xd0 [ 254.833230][ T7432] ? __bad_area_nosemaphore+0xb5/0x460 [ 254.838681][ T7432] tun_get_user+0x4e6/0x31b0 [ 254.843273][ T7432] ? asm_exc_page_fault+0x27/0x30 [ 254.848292][ T7432] ? tun_do_read+0x1c40/0x1c40 [ 254.853049][ T7432] ? kstrtouint_from_user+0x1a0/0x200 [ 254.858436][ T7432] ? kstrtol_from_user+0x260/0x260 [ 254.863578][ T7432] ? btf_parse_type_sec+0xe10/0x1b70 [ 254.868879][ T7432] ? avc_policy_seqno+0x1b/0x70 [ 254.873724][ T7432] ? selinux_file_permission+0x2aa/0x510 [ 254.879345][ T7432] tun_chr_write_iter+0x1eb/0x2e0 [ 254.884359][ T7432] vfs_write+0x802/0xf70 [ 254.888608][ T7432] ? file_end_write+0x1b0/0x1b0 [ 254.893447][ T7432] ? __fget_files+0x2c4/0x320 [ 254.898258][ T7432] ? __fdget_pos+0x1f7/0x380 [ 254.902968][ T7432] ? ksys_write+0x71/0x240 [ 254.907399][ T7432] ksys_write+0x140/0x240 [ 254.911727][ T7432] ? __ia32_sys_read+0x90/0x90 [ 254.916502][ T7432] ? debug_smp_processor_id+0x17/0x20 [ 254.921865][ T7432] __x64_sys_write+0x7b/0x90 [ 254.926448][ T7432] x64_sys_call+0x8ef/0x9a0 [ 254.930951][ T7432] do_syscall_64+0x4c/0xa0 [ 254.935354][ T7432] ? clear_bhb_loop+0x35/0x90 [ 254.940056][ T7432] ? clear_bhb_loop+0x35/0x90 [ 254.944735][ T7432] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 254.950620][ T7432] RIP: 0033:0x7f4cb967d969 [ 254.955022][ T7432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 254.974628][ T7432] RSP: 002b:00007f4cb7ce6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 254.983031][ T7432] RAX: ffffffffffffffda RBX: 00007f4cb98a4fa0 RCX: 00007f4cb967d969 [ 254.990991][ T7432] RDX: 000000000000fdef RSI: 0000200000000300 RDI: 00000000000000c8 [ 254.998945][ T7432] RBP: 00007f4cb7ce6090 R08: 0000000000000000 R09: 0000000000000000 [ 255.006901][ T7432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 255.014854][ T7432] R13: 0000000000000000 R14: 00007f4cb98a4fa0 R15: 00007ffd72c1d4d8 [ 255.022821][ T7432] [ 255.424724][ T7444] device syzkaller0 entered promiscuous mode [ 255.465209][ T7458] device syzkaller0 entered promiscuous mode [ 258.111040][ T7566] device wg2 entered promiscuous mode [ 259.064368][ T7591] device syzkaller0 entered promiscuous mode [ 259.190423][ T7598] device wg2 left promiscuous mode [ 259.407105][ T7631] FAULT_INJECTION: forcing a failure. [ 259.407105][ T7631] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 259.490588][ T7631] CPU: 1 PID: 7631 Comm: syz.3.2584 Tainted: G W 5.15.180-syzkaller-00024-g88c4075c39ed #0 [ 259.501917][ T7631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 259.511991][ T7631] Call Trace: [ 259.515294][ T7631] [ 259.518235][ T7631] __dump_stack+0x21/0x30 [ 259.522587][ T7631] dump_stack_lvl+0xee/0x150 [ 259.527198][ T7631] ? show_regs_print_info+0x20/0x20 [ 259.532410][ T7631] ? stack_trace_save+0x98/0xe0 [ 259.537268][ T7631] dump_stack+0x15/0x20 [ 259.541422][ T7631] should_fail+0x3c1/0x510 [ 259.545836][ T7631] should_fail_alloc_page+0x55/0x80 [ 259.551029][ T7631] prepare_alloc_pages+0x156/0x600 [ 259.556137][ T7631] ? __alloc_pages_bulk+0xab0/0xab0 [ 259.561336][ T7631] __alloc_pages+0x10a/0x440 [ 259.565946][ T7631] ? prep_new_page+0x110/0x110 [ 259.570711][ T7631] kmalloc_order+0x4c/0x160 [ 259.575214][ T7631] ? alloc_skb_with_frags+0xa8/0x620 [ 259.580499][ T7631] kmalloc_order_trace+0x18/0xb0 [ 259.585432][ T7631] __kmalloc_track_caller+0x198/0x2c0 [ 259.590840][ T7631] ? kmem_cache_alloc+0xf7/0x260 [ 259.595768][ T7631] ? alloc_skb_with_frags+0xa8/0x620 [ 259.601048][ T7631] __alloc_skb+0x21a/0x740 [ 259.605458][ T7631] alloc_skb_with_frags+0xa8/0x620 [ 259.610569][ T7631] ? cmp_ex_search+0x1e/0x80 [ 259.615235][ T7631] ? bsearch+0x96/0xc0 [ 259.619292][ T7631] ? search_extable+0xd0/0xd0 [ 259.623955][ T7631] ? copy_from_kernel_nofault+0x1f2/0x370 [ 259.629667][ T7631] sock_alloc_send_pskb+0x853/0x980 [ 259.634856][ T7631] ? copy_from_kernel_nofault+0x1f2/0x370 [ 259.640566][ T7631] ? is_bpf_text_address+0x177/0x190 [ 259.645840][ T7631] ? __kernel_text_address+0xa0/0x100 [ 259.651224][ T7631] ? sock_kzfree_s+0x60/0x60 [ 259.655816][ T7631] ? kernelmode_fixup_or_oops+0x85/0xd0 [ 259.661443][ T7631] tun_get_user+0x4e6/0x31b0 [ 259.666030][ T7631] ? tun_do_read+0x1c40/0x1c40 [ 259.670786][ T7631] ? kstrtouint_from_user+0x1a0/0x200 [ 259.676164][ T7631] ? kstrtol_from_user+0x260/0x260 [ 259.681259][ T7631] ? bpf_probe_read_compat+0x156/0x180 [ 259.686711][ T7631] ? dev_map_lookup_elem+0x67/0x100 [ 259.691904][ T7631] ? avc_policy_seqno+0x1b/0x70 [ 259.696743][ T7631] ? selinux_file_permission+0x2aa/0x510 [ 259.702371][ T7631] tun_chr_write_iter+0x1eb/0x2e0 [ 259.707406][ T7631] vfs_write+0x802/0xf70 [ 259.711651][ T7631] ? file_end_write+0x1b0/0x1b0 [ 259.716513][ T7631] ? __fget_files+0x2c4/0x320 [ 259.721187][ T7631] ? __fdget_pos+0x1f7/0x380 [ 259.725763][ T7631] ? ksys_write+0x71/0x240 [ 259.730164][ T7631] ksys_write+0x140/0x240 [ 259.734485][ T7631] ? __ia32_sys_read+0x90/0x90 [ 259.739256][ T7631] ? debug_smp_processor_id+0x17/0x20 [ 259.744625][ T7631] __x64_sys_write+0x7b/0x90 [ 259.749209][ T7631] x64_sys_call+0x8ef/0x9a0 [ 259.753704][ T7631] do_syscall_64+0x4c/0xa0 [ 259.758114][ T7631] ? clear_bhb_loop+0x35/0x90 [ 259.762778][ T7631] ? clear_bhb_loop+0x35/0x90 [ 259.767448][ T7631] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 259.773333][ T7631] RIP: 0033:0x7faf13f7a969 [ 259.777735][ T7631] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 259.797322][ T7631] RSP: 002b:00007faf125e3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 259.805719][ T7631] RAX: ffffffffffffffda RBX: 00007faf141a1fa0 RCX: 00007faf13f7a969 [ 259.813675][ T7631] RDX: 000000000000fdef RSI: 0000200000000300 RDI: 00000000000000c8 [ 259.821659][ T7631] RBP: 00007faf125e3090 R08: 0000000000000000 R09: 0000000000000000 [ 259.829617][ T7631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 259.837572][ T7631] R13: 0000000000000000 R14: 00007faf141a1fa0 R15: 00007fff955bc788 [ 259.845534][ T7631] [ 260.155637][ T7634] device syzkaller0 entered promiscuous mode [ 260.896641][ T7672] device veth0_vlan left promiscuous mode [ 261.098485][ T7672] device veth0_vlan entered promiscuous mode [ 261.139462][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 261.158175][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.188206][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.636643][ T7715] device pim6reg1 entered promiscuous mode [ 262.199634][ T7749] syz.3.2629[7749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.201387][ T7749] syz.3.2629[7749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.232335][ T7784] device syzkaller0 entered promiscuous mode [ 265.096473][ T7863] FAULT_INJECTION: forcing a failure. [ 265.096473][ T7863] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 265.241963][ T7863] CPU: 0 PID: 7863 Comm: syz.0.2669 Tainted: G W 5.15.180-syzkaller-00024-g88c4075c39ed #0 [ 265.253298][ T7863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 265.263458][ T7863] Call Trace: [ 265.266752][ T7863] [ 265.269690][ T7863] __dump_stack+0x21/0x30 [ 265.274043][ T7863] dump_stack_lvl+0xee/0x150 [ 265.278648][ T7863] ? show_regs_print_info+0x20/0x20 [ 265.283882][ T7863] dump_stack+0x15/0x20 [ 265.288052][ T7863] should_fail+0x3c1/0x510 [ 265.292481][ T7863] should_fail_usercopy+0x1a/0x20 [ 265.297516][ T7863] _copy_from_iter+0x21a/0x1050 [ 265.302387][ T7863] ? __kasan_check_write+0x14/0x20 [ 265.307511][ T7863] ? skb_set_owner_w+0x24d/0x370 [ 265.312463][ T7863] ? copy_mc_pipe_to_iter+0x770/0x770 [ 265.317858][ T7863] ? __kernel_text_address+0xa0/0x100 [ 265.323239][ T7863] ? check_stack_object+0x81/0x140 [ 265.328361][ T7863] ? __kasan_check_read+0x11/0x20 [ 265.333399][ T7863] ? __check_object_size+0x2f4/0x3c0 [ 265.338701][ T7863] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 265.344455][ T7863] ? kernelmode_fixup_or_oops+0x85/0xd0 [ 265.350019][ T7863] ? skb_put+0x10e/0x1f0 [ 265.354272][ T7863] tun_get_user+0xc21/0x31b0 [ 265.358876][ T7863] ? tun_do_read+0x1c40/0x1c40 [ 265.363653][ T7863] ? kstrtouint_from_user+0x1a0/0x200 [ 265.369038][ T7863] ? kstrtol_from_user+0x260/0x260 [ 265.374156][ T7863] ? bpf_probe_read_compat+0x156/0x180 [ 265.379633][ T7863] ? dev_map_lookup_elem+0x67/0x100 [ 265.384849][ T7863] ? avc_policy_seqno+0x1b/0x70 [ 265.389712][ T7863] ? selinux_file_permission+0x2aa/0x510 [ 265.395363][ T7863] tun_chr_write_iter+0x1eb/0x2e0 [ 265.400416][ T7863] vfs_write+0x802/0xf70 [ 265.404677][ T7863] ? file_end_write+0x1b0/0x1b0 [ 265.409553][ T7863] ? __fget_files+0x2c4/0x320 [ 265.414247][ T7863] ? __fdget_pos+0x1f7/0x380 [ 265.418930][ T7863] ? ksys_write+0x71/0x240 [ 265.423353][ T7863] ksys_write+0x140/0x240 [ 265.427780][ T7863] ? __ia32_sys_read+0x90/0x90 [ 265.432554][ T7863] ? debug_smp_processor_id+0x17/0x20 [ 265.437936][ T7863] __x64_sys_write+0x7b/0x90 [ 265.442538][ T7863] x64_sys_call+0x8ef/0x9a0 [ 265.447052][ T7863] do_syscall_64+0x4c/0xa0 [ 265.451481][ T7863] ? clear_bhb_loop+0x35/0x90 [ 265.456177][ T7863] ? clear_bhb_loop+0x35/0x90 [ 265.460868][ T7863] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 265.466774][ T7863] RIP: 0033:0x7f4cb967d969 [ 265.471284][ T7863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 265.490898][ T7863] RSP: 002b:00007f4cb7ce6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 265.499330][ T7863] RAX: ffffffffffffffda RBX: 00007f4cb98a4fa0 RCX: 00007f4cb967d969 [ 265.507318][ T7863] RDX: 000000000000fdef RSI: 0000200000000300 RDI: 00000000000000c8 [ 265.515306][ T7863] RBP: 00007f4cb7ce6090 R08: 0000000000000000 R09: 0000000000000000 [ 265.523287][ T7863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 265.531271][ T7863] R13: 0000000000000000 R14: 00007f4cb98a4fa0 R15: 00007ffd72c1d4d8 [ 265.539265][ T7863] [ 267.780361][ T8025] device syzkaller0 entered promiscuous mode [ 268.287809][ T8023] device syzkaller0 entered promiscuous mode [ 269.079327][ T30] audit: type=1400 audit(1745984889.508:177): avc: denied { create } for pid=8076 comm="syz.2.2752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 278.106860][ T8202] device sit0 entered promiscuous mode [ 279.269859][ T8213] bond_slave_1: mtu less than device minimum [ 279.932330][ T8244] FAULT_INJECTION: forcing a failure. [ 279.932330][ T8244] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 280.015188][ T8244] CPU: 1 PID: 8244 Comm: syz.1.2814 Tainted: G W 5.15.180-syzkaller-00024-g88c4075c39ed #0 [ 280.026525][ T8244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 280.036596][ T8244] Call Trace: [ 280.039995][ T8244] [ 280.042930][ T8244] __dump_stack+0x21/0x30 [ 280.047278][ T8244] dump_stack_lvl+0xee/0x150 [ 280.051879][ T8244] ? show_regs_print_info+0x20/0x20 [ 280.057093][ T8244] dump_stack+0x15/0x20 [ 280.061276][ T8244] should_fail+0x3c1/0x510 [ 280.065726][ T8244] should_fail_usercopy+0x1a/0x20 [ 280.070759][ T8244] _copy_to_user+0x20/0x90 [ 280.075187][ T8244] simple_read_from_buffer+0xe9/0x160 [ 280.080573][ T8244] proc_fail_nth_read+0x19a/0x210 [ 280.085608][ T8244] ? proc_fault_inject_write+0x2f0/0x2f0 [ 280.091250][ T8244] ? security_file_permission+0x83/0xa0 [ 280.096809][ T8244] ? proc_fault_inject_write+0x2f0/0x2f0 [ 280.102464][ T8244] vfs_read+0x282/0xbe0 [ 280.106629][ T8244] ? kernel_read+0x1f0/0x1f0 [ 280.111225][ T8244] ? __kasan_check_write+0x14/0x20 [ 280.116354][ T8244] ? mutex_lock+0x95/0x1a0 [ 280.120787][ T8244] ? wait_for_completion_killable_timeout+0x10/0x10 [ 280.127385][ T8244] ? __fget_files+0x2c4/0x320 [ 280.132084][ T8244] ? __fdget_pos+0x2d2/0x380 [ 280.136683][ T8244] ? ksys_read+0x71/0x240 [ 280.141018][ T8244] ksys_read+0x140/0x240 [ 280.145274][ T8244] ? vfs_write+0xf70/0xf70 [ 280.149698][ T8244] ? debug_smp_processor_id+0x17/0x20 [ 280.155083][ T8244] __x64_sys_read+0x7b/0x90 [ 280.159593][ T8244] x64_sys_call+0x96d/0x9a0 [ 280.164103][ T8244] do_syscall_64+0x4c/0xa0 [ 280.168534][ T8244] ? clear_bhb_loop+0x35/0x90 [ 280.173219][ T8244] ? clear_bhb_loop+0x35/0x90 [ 280.177902][ T8244] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 280.183807][ T8244] RIP: 0033:0x7f397577637c [ 280.188227][ T8244] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 280.207840][ T8244] RSP: 002b:00007f3973de0030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 280.216247][ T8244] RAX: ffffffffffffffda RBX: 00007f397599efa0 RCX: 00007f397577637c [ 280.224224][ T8244] RDX: 000000000000000f RSI: 00007f3973de00a0 RDI: 0000000000000007 [ 280.232186][ T8244] RBP: 00007f3973de0090 R08: 0000000000000000 R09: 0000000000000000 [ 280.240148][ T8244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 280.248111][ T8244] R13: 0000000000000000 R14: 00007f397599efa0 R15: 00007ffc52ffcca8 [ 280.256079][ T8244] [ 280.618573][ T8267] syz.4.2821[8267] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.618640][ T8267] syz.4.2821[8267] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.740109][ T8425] ªªªªªª: renamed from vlan0 [ 284.336199][ T8439] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.371099][ T8439] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.433362][ T8439] device bridge_slave_0 entered promiscuous mode [ 284.540157][ T8439] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.567830][ T8439] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.594537][ T8439] device bridge_slave_1 entered promiscuous mode [ 284.852259][ T1053] GPL: port 1(erspan0) entered disabled state [ 284.873552][ T1053] device erspan0 left promiscuous mode [ 284.879061][ T1053] GPL: port 1(erspan0) entered disabled state [ 285.134959][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 285.144375][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 285.320966][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 285.353799][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.402273][ T4711] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.409375][ T4711] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.532829][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 285.559029][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 285.567652][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 285.592350][ T4711] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.599443][ T4711] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.651760][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 285.680238][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.725583][ T1053] device bridge_slave_1 left promiscuous mode [ 285.738883][ T1053] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.765315][ T1053] device bridge_slave_0 left promiscuous mode [ 285.818403][ T1053] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.863568][ T1053] device veth1_macvtap left promiscuous mode [ 285.889971][ T1053] device veth0_vlan left promiscuous mode [ 286.094618][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 286.118610][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 286.196681][ T8500] device pim6reg1 entered promiscuous mode [ 286.223162][ T8439] device veth0_vlan entered promiscuous mode [ 286.381269][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 286.389719][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 286.398259][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 286.406201][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.414240][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 286.421864][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.436281][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 286.448775][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 286.485208][ T8439] device veth1_macvtap entered promiscuous mode [ 286.523676][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 286.534369][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 286.597346][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 286.635895][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 286.671424][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 287.630456][ T8560] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.646429][ T8560] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.741097][ T8560] device bridge_slave_0 entered promiscuous mode [ 287.750132][ T8560] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.757472][ T8560] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.765257][ T8560] device bridge_slave_1 entered promiscuous mode [ 288.271639][ T8593] device syzkaller0 entered promiscuous mode [ 288.651729][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 288.712550][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 288.833149][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 288.901323][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.978122][ T447] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.985237][ T447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.050743][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 289.060257][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 289.132262][ T447] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.139337][ T447] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.264007][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 289.321269][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 289.462577][ T8631] device syzkaller0 entered promiscuous mode [ 289.525682][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 289.543076][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 289.611099][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 289.735298][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 289.781088][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 289.850948][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 289.908588][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 289.982020][ T8560] device veth0_vlan entered promiscuous mode [ 290.101285][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 290.131137][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 290.167232][ T8560] device veth1_macvtap entered promiscuous mode [ 290.201664][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 290.240916][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 290.331124][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 290.366464][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 290.413249][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 290.693109][ T1053] device bridge_slave_1 left promiscuous mode [ 290.699413][ T1053] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.795322][ T1053] device bridge_slave_0 left promiscuous mode [ 290.843761][ T1053] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.277443][ T8673] device syzkaller0 entered promiscuous mode [ 291.341880][ T8702] ref_ctr_offset mismatch. inode: 0xaec offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 291.665460][ T8736] device syzkaller0 entered promiscuous mode [ 292.145759][ T8748] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.178277][ T8748] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.186190][ T8748] device bridge_slave_0 entered promiscuous mode [ 292.194654][ T8748] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.220641][ T8748] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.241411][ T8748] device bridge_slave_1 entered promiscuous mode [ 292.500109][ T8783] device syzkaller0 entered promiscuous mode [ 292.800215][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 292.810345][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 292.881505][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 292.891103][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 292.915718][ T447] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.922811][ T447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.934988][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 292.943937][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 292.952241][ T447] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.959303][ T447] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.085974][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 293.094232][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.103002][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 293.138974][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 293.147537][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 293.155701][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 293.171283][ T447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 293.201043][ T8748] device veth0_vlan entered promiscuous mode [ 293.218786][ T8822] device syzkaller0 entered promiscuous mode [ 293.400418][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 293.415896][ T8748] device veth1_macvtap entered promiscuous mode [ 293.434658][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 293.469210][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 293.570181][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 293.623660][ T4711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 293.931839][ T8851] bond_slave_1: mtu less than device minimum [ 293.966701][ T8854] device syzkaller0 entered promiscuous mode [ 294.172837][ T1053] device bridge_slave_1 left promiscuous mode [ 294.194676][ T1053] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.230994][ T1053] device bridge_slave_0 left promiscuous mode [ 294.237437][ T1053] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.245927][ T1053] device veth1_macvtap left promiscuous mode [ 294.431426][ T8871] device veth0_vlan left promiscuous mode [ 294.444600][ T8871] device veth0_vlan entered promiscuous mode [ 295.228291][ T8895] device syzkaller0 entered promiscuous mode [ 296.633879][ T8949] device syzkaller0 entered promiscuous mode [ 297.181600][ T8977] device syzkaller0 entered promiscuous mode [ 298.088551][ T9008] device syzkaller0 entered promiscuous mode [ 303.008672][ T9157] device sit0 entered promiscuous mode [ 304.589184][ T9218] device syzkaller0 entered promiscuous mode [ 305.183627][ T9238] syz.2.3191[9238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.183705][ T9238] syz.2.3191[9238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.271327][ T9239] syz.2.3191[9239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.379554][ T9239] syz.2.3191[9239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.059344][ T9276] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.079984][ T9276] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.131377][ T274] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 306.143129][ T274] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 306.151554][ T274] CPU: 0 PID: 274 Comm: syz-executor Tainted: G W 5.15.180-syzkaller-00024-g88c4075c39ed #0 [ 306.162920][ T274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 306.172979][ T274] RIP: 0010:__rb_erase_color+0x1e6/0xaf0 [ 306.178620][ T274] Code: 00 fc ff df 48 89 4d c0 80 3c 01 00 74 08 48 89 df e8 8e 22 3b ff 4c 8b 2b 4d 89 ef 49 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 07 00 74 08 4c 89 ef e8 6b 22 3b ff 41 f6 45 00 01 48 89 [ 306.198266][ T274] RSP: 0000:ffffc900009c76c0 EFLAGS: 00010246 [ 306.204336][ T274] RAX: dffffc0000000000 RBX: ffff88810f9cabf8 RCX: 1ffff11021f3957f [ 306.212301][ T274] RDX: ffffffff819addd0 RSI: 1ffff1102132b410 RDI: ffff88810f9cabe8 [ 306.220269][ T274] RBP: ffffc900009c7720 R08: dffffc0000000000 R09: ffffed102132b414 [ 306.228318][ T274] R10: ffffed102132b414 R11: 1ffff1102132b413 R12: 1ffff11021f39580 [ 306.236286][ T274] R13: 0000000000000000 R14: ffff88810f9cabe8 R15: 0000000000000000 [ 306.244251][ T274] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 306.253189][ T274] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 306.259766][ T274] CR2: 0000555582c5e4a8 CR3: 00000001262b4000 CR4: 00000000003506b0 [ 306.267735][ T274] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 306.275717][ T274] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 306.283680][ T274] Call Trace: [ 306.286950][ T274] [ 306.289875][ T274] ? anon_vma_interval_tree_iter_next+0x380/0x380 [ 306.296290][ T274] vma_interval_tree_remove+0xadf/0xb00 [ 306.301833][ T274] unlink_file_vma+0xd7/0xf0 [ 306.306418][ T274] free_pgtables+0x139/0x280 [ 306.310997][ T274] exit_mmap+0x407/0x860 [ 306.315232][ T274] ? vm_brk+0x30/0x30 [ 306.319204][ T274] ? mutex_unlock+0x89/0x220 [ 306.323789][ T274] ? uprobe_clear_state+0x2c1/0x320 [ 306.328983][ T274] __mmput+0x93/0x320 [ 306.332959][ T274] ? mmput+0x48/0x150 [ 306.336940][ T274] mmput+0x50/0x150 [ 306.340745][ T274] do_exit+0x9ca/0x27a0 [ 306.344890][ T274] ? put_task_struct+0x90/0x90 [ 306.349638][ T274] ? irqentry_exit+0x37/0x40 [ 306.354287][ T274] ? sysvec_irq_work+0x61/0xc0 [ 306.359037][ T274] ? asm_sysvec_irq_work+0x1b/0x20 [ 306.364138][ T274] do_group_exit+0x141/0x310 [ 306.368718][ T274] get_signal+0x66a/0x1480 [ 306.373125][ T274] ? __perf_event_task_sched_in+0x1fb/0x280 [ 306.379016][ T274] arch_do_signal_or_restart+0xc1/0x10f0 [ 306.384647][ T274] ? perf_sched_cb_inc+0x240/0x240 [ 306.389749][ T274] ? __kasan_check_write+0x14/0x20 [ 306.394849][ T274] ? finish_task_switch+0x209/0x780 [ 306.400035][ T274] ? __switch_to_asm+0x3a/0x60 [ 306.404781][ T274] ? get_sigframe_size+0x10/0x10 [ 306.409714][ T274] exit_to_user_mode_loop+0xa7/0xe0 [ 306.414905][ T274] exit_to_user_mode_prepare+0x5a/0xa0 [ 306.420351][ T274] irqentry_exit_to_user_mode+0x9/0x10 [ 306.425891][ T274] irqentry_exit+0x12/0x40 [ 306.430295][ T274] exc_page_fault+0x5e/0xb0 [ 306.434785][ T274] asm_exc_page_fault+0x27/0x30 [ 306.439655][ T274] RIP: 0033:0x7f3975735dbf [ 306.444153][ T274] Code: Unable to access opcode bytes at RIP 0x7f3975735d95. [ 306.451524][ T274] RSP: 002b:00007ffc52ffbde0 EFLAGS: 00010206 [ 306.457596][ T274] RAX: 0000000000018b61 RBX: 0000000000008040 RCX: 0000555582c56470 [ 306.465559][ T274] RDX: 0000000000008041 RSI: 0000555582c5e4a0 RDI: 0000000000000004 [ 306.473521][ T274] RBP: 00007f397596cca0 R08: 0000000000000132 R09: 0000000000000000 [ 306.481479][ T274] R10: 0000000000001000 R11: 0000000000000802 R12: 0000000000008030 [ 306.489439][ T274] R13: 0000000000000076 R14: 00007f397596cd00 R15: 0000000000000000 [ 306.497421][ T274] [ 306.500427][ T274] Modules linked in: [ 307.101350][ T274] ---[ end trace a9ebea5341f16444 ]--- [ 307.106916][ T274] RIP: 0010:__rb_erase_color+0x1e6/0xaf0 [ 307.113374][ T274] Code: 00 fc ff df 48 89 4d c0 80 3c 01 00 74 08 48 89 df e8 8e 22 3b ff 4c 8b 2b 4d 89 ef 49 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 07 00 74 08 4c 89 ef e8 6b 22 3b ff 41 f6 45 00 01 48 89 [ 307.143241][ T274] RSP: 0000:ffffc900009c76c0 EFLAGS: 00010246 [ 307.159101][ T274] RAX: dffffc0000000000 RBX: ffff88810f9cabf8 RCX: 1ffff11021f3957f [ 307.173995][ T274] RDX: ffffffff819addd0 RSI: 1ffff1102132b410 RDI: ffff88810f9cabe8 [ 307.183140][ T274] RBP: ffffc900009c7720 R08: dffffc0000000000 R09: ffffed102132b414 [ 307.201267][ T274] R10: ffffed102132b414 R11: 1ffff1102132b413 R12: 1ffff11021f39580 [ 307.221453][ T274] R13: 0000000000000000 R14: ffff88810f9cabe8 R15: 0000000000000000 [ 307.229486][ T274] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 307.270483][ T274] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 307.287267][ T274] CR2: 0000000100000000 CR3: 0000000119390000 CR4: 00000000003506b0 [ 307.305586][ T274] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 307.323803][ T274] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 307.342349][ T274] Kernel panic - not syncing: Fatal exception [ 307.348813][ T274] Kernel Offset: disabled [ 307.353131][ T274] Rebooting in 86400 seconds..