last executing test programs: 10.747479975s ago: executing program 2 (id=3169): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000100b704000000000000850000005700000095a5376eb1c56942c9f0707767677b836c0e0020c6ba685560e44925bd44e00daab850a3755270c0f3794655b746b743572b5c89662ea761361dc305c85434f854a0381adc21a938841ed7ba"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x200}, 0x90) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000280)='cachefiles_mark_failed\x00', r2}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYRES8=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000000000000701000003ffffffb702000008000000b703000000000083"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) openat$cgroup_ro(r5, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) (async) socketpair(0x0, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x13, 0x10, 0x2}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r7}, &(0x7f0000000000), &(0x7f0000000040)='%pK \x00', 0x1000000}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8912, &(0x7f0000000080)) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) 8.498513058s ago: executing program 2 (id=3169): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000100b704000000000000850000005700000095a5376eb1c56942c9f0707767677b836c0e0020c6ba685560e44925bd44e00daab850a3755270c0f3794655b746b743572b5c89662ea761361dc305c85434f854a0381adc21a938841ed7ba"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x200}, 0x90) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000280)='cachefiles_mark_failed\x00', r2}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYRES8=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000000000000701000003ffffffb702000008000000b703000000000083"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) openat$cgroup_ro(r5, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) (async) socketpair(0x0, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x13, 0x10, 0x2}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r7}, &(0x7f0000000000), &(0x7f0000000040)='%pK \x00', 0x1000000}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8912, &(0x7f0000000080)) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) 6.528019508s ago: executing program 3 (id=3304): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x10, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x13}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000178500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r1, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x0, 0xee, &(0x7f0000000500)=[{}], 0x8, 0x10, &(0x7f0000000540), &(0x7f00000005c0), 0x8, 0x43, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000800)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000008c0)={r3, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xe, &(0x7f0000000180)=@raw=[@jmp={0x5, 0x0, 0x9, 0x0, 0x9, 0x4, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}], &(0x7f0000000080)='GPL\x00', 0xd40, 0xf2, &(0x7f00000002c0)=""/242, 0x40f00, 0x0, '\x00', r4, 0x0, r5, 0x8, &(0x7f0000000840)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x5, 0x1000, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000900)=[r0, r6], 0x0, 0x10, 0x8}, 0x90) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 6.520398559s ago: executing program 2 (id=3169): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000100b704000000000000850000005700000095a5376eb1c56942c9f0707767677b836c0e0020c6ba685560e44925bd44e00daab850a3755270c0f3794655b746b743572b5c89662ea761361dc305c85434f854a0381adc21a938841ed7ba"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x200}, 0x90) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000280)='cachefiles_mark_failed\x00', r2}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYRES8=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000000000000701000003ffffffb702000008000000b703000000000083"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) openat$cgroup_ro(r5, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) (async) socketpair(0x0, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x13, 0x10, 0x2}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r7}, &(0x7f0000000000), &(0x7f0000000040)='%pK \x00', 0x1000000}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8912, &(0x7f0000000080)) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.581027837s ago: executing program 1 (id=3306): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x9, 0xf, 0x10000, 0x2291, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x3, 0xf}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES16=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x39c, 0x6, 0x4, 0x880, r2, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r3}, &(0x7f0000000380), &(0x7f00000003c0)='%+9llu \x00'}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x47, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x25, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001000)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x2ae8736f49cb0f5b}, 0x18) bpf$MAP_CREATE(0x600, 0x0, 0xfffffffffffffdc9) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="8406fcfff0ffffff18590000000018180000", @ANYRES32, @ANYBLOB="00000000000000008520000003000000183000000500"/32], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) 4.579860497s ago: executing program 3 (id=3307): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000073013300000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x5, &(0x7f00000006c0)=ANY=[@ANYBLOB="18e0ffff140100000000000000000000950000003600000085000000080000009500020000000000cfd73af92076ba5e5e889a815c8e63756ec48a2ecf9246ac456d00000057f2aa798d24419ec20540334962d8d49a324ed0ea4c1ec774e6d941c9a431e62b6617eb83988a00da58346a1594ac8dd3705a81cfab37eff0aad2218bdeb8e516e0dbdf457a5d7db8763da6f20bf77437860463a77c9f102b1b731267fef64b742ffe26cb19873b5ca5cd6d43fb125bd869842b9a0cc0527bdd4a866d0e51cee0b5eec062a2d10fea7966a76f33da252832094b00"/230, @ANYRES8, @ANYRESHEX=r0], &(0x7f00000000c0)='syzkaller\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000600)='cachefiles_vfs_error\x00', r1}, 0x10) perf_event_open(&(0x7f00000010c0)={0x1, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x3}, 0x1004, 0x100, 0x0, 0x0, 0xa265, 0x0, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000240)='memory.pressure\x00', 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x4, 0x800, 0x3ff, 0x300, 0xffffffffffffffff, 0x7fff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000f2080d5c6bcc000300b70300000000000085000000040000001811000001517ce2dc690fb8e77154abdcc550d91aadf25664f147220cf0c77efc60ff0d7cf118e4c8a7114024dd7eb04740929adc75b33593ce4a0a36e47f4a83c9c41063d1bc339930190f5c910fb5b80c3429907a4fbd7d2682cddf856fdf9efc6e6ea430aca183107a598adce60153b5cd249b3f1fc322466fd5e576c826a4790907f06cec2ef50b5480278a5ec90d628dfd6e30d4fe3361d52c2e470d38c1a1d893e847770dfe3250450ebc498059525f5b36969a04be640c2bbbdf74572719552e201394d11cc4ebdd79954d0b31e69ae70257a4d53bb69440fb7b0a1d92d5237bb357810b2dd73cc62e076a6fe91b34af0e098eaff0212a235a50551d7687d1a6ecb4e4b388bb2252431343a5808fef4517cba5769a40db3de539cbf7d28feb33f642cf73421882a6d07eac91c158eaac6ed0562fee01cfff35e3e9b730ee143244fbe902dd8fcffb8ccedb6b52eb59e7eb39250f6b3a448bc35beba71159478c5217e175f2c8", @ANYRES32=r2, @ANYRES8=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x0, 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000680)='rseq_update\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r4, 0x0, 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r4, 0x0, 0x20000000}, 0x20) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x404401, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000ffff0018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4003, 0x1}, 0x48) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000000)={'geneve1\x00', 0x400}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xb, &(0x7f0000000640)=ANY=[@ANYRES16=r1, @ANYRES16=0x0, @ANYRES16=r6], &(0x7f0000000200)='GPL\x00', 0x100000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=@base={0x9, 0x5, 0x20009, 0x7}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r8, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r9, &(0x7f0000000000), 0x0}, 0x20) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESHEX=0x0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='ext4_writepages_result\x00', r11}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 4.532831251s ago: executing program 1 (id=3309): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x2, [@union={0xc, 0x8, 0x0, 0x5, 0x0, 0x3, [{0xb, 0x4, 0xffffffff}, {0x3, 0x1, 0x800}, {0x2, 0x3, 0x2}, {0x0, 0x1, 0x4}, {0x7, 0x1, 0x9}, {0x3, 0x1, 0x8000}, {0xa, 0x5, 0x4}, {0xb, 0x5, 0x800}]}, @volatile={0x5}, @func={0x1, 0x0, 0x0, 0xc, 0x5}, @func={0x5, 0x0, 0x0, 0xc, 0x2}]}}, &(0x7f00000005c0)=""/202, 0xaa, 0xca, 0x1}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x400, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x2}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480), 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='freezer.parent_freezing\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYRESOCT=r2, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_freezer_state(r5, &(0x7f0000000140), 0x2, 0x0) r7 = openat$cgroup_procs(r5, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f00000000c0), 0x12) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000400)='FROZEN\x00', 0x7) write$cgroup_freezer_state(r6, &(0x7f0000000200)='THAWED\x00', 0x7) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xee, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20224, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffe, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x19f2ebb1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000200000408000000000000000300000000000000000000000200000000000000000000000000000200000000000000000000000404"], 0x0, 0x56}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r8, 0x0, 0x1}, 0x48) 4.469788286s ago: executing program 3 (id=3310): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000bc0)={{r0}, &(0x7f0000000b40), &(0x7f0000000b80)='%pS \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0xffffffffffffff68, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) 4.466502537s ago: executing program 1 (id=3311): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x3a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000001811000029a20b678f261aaf7a6e0f00d4dae5321f73", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f00000004c0)='%ps \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={@ifindex, 0xffffffffffffffff, 0x1b, 0x8}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x1c, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000c50000008200000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000007d000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000340)='GPL\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0x1}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x24, 0x4, 0x9, 0x0, r6}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r7, &(0x7f0000000300), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r7, &(0x7f0000000240), &(0x7f0000000540)=""/32}, 0x20) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r8}, 0x10) r10 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r9}, 0x8) write$cgroup_int(r10, &(0x7f00000001c0), 0xfffffdef) 4.465422306s ago: executing program 0 (id=3312): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000feff17110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x0, 0x0, 0x9}, 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000006e370018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[], 0xe) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100000000c8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) 4.397109062s ago: executing program 0 (id=3313): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r4, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r5, &(0x7f0000000140)=ANY=[@ANYBLOB="1e03"], 0xffdd) 4.396118452s ago: executing program 2 (id=3169): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000100b704000000000000850000005700000095a5376eb1c56942c9f0707767677b836c0e0020c6ba685560e44925bd44e00daab850a3755270c0f3794655b746b743572b5c89662ea761361dc305c85434f854a0381adc21a938841ed7ba"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x200}, 0x90) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000280)='cachefiles_mark_failed\x00', r2}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYRES8=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000000000000701000003ffffffb702000008000000b703000000000083"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) openat$cgroup_ro(r5, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) (async) socketpair(0x0, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x13, 0x10, 0x2}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r7}, &(0x7f0000000000), &(0x7f0000000040)='%pK \x00', 0x1000000}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8912, &(0x7f0000000080)) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.531403644s ago: executing program 0 (id=3314): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000840)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000400)=ANY=[@ANYRES16], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000340)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)=0x8200000000000000, 0xfffffdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100032c"], 0xfdef) 2.529656674s ago: executing program 1 (id=3315): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x86, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000b00)=ANY=[@ANYBLOB="c4108bd7c4fa7c20609a6c3d77105c2ad93713a7b3f3edb9fc69c8168acfd9edd53badfcc73ebc6bffe571ddfedd296b90ac7d37f47d1b744d9c98048f8624a06276c2363824e5f2925d5a623f29b679e6497ecbec801714209d18df5dd57c1b3cbae82eeae04d417d20de6cd2acb20f9c72dfe052deef9ecd31e78edec0fcba88331a489932d06e73e06466046e277dd0af5e5f2566c748167c4fd8b2ca26ab614b533ae3eff30db715f2451ee52af5ce9f650fa0a6e39c1a4851db9bdeecc9fcc15442edada76dbde02e137c"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000400)=ANY=[@ANYRESHEX=r1, @ANYRESHEX=r2], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffffc6}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000400)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffde3, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) close(r4) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r7, &(0x7f00000006c0)="52e10cda96f99a001aa4634b47ab359d1f88f654aa6c5e6e03eaf4a546692f40cc43611a0c1985c6cf370b3e774f41e3114d914909b4df8cb04b82c200a5acd28eef56849442d4eba1bcd42c08cce3320dfb2c9e72435ea1b4be25b7cc290c68168171c96e30771ec37f0087aed19b893513ce0d9d0eff76a4", &(0x7f0000000740)=""/184, 0x4}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, 0x0, 0x0}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYRES8=r8, @ANYRESHEX=r3, @ANYRESOCT=r6, @ANYRES8=0x0, @ANYRES16=r4], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYRESOCT=r0], 0xffc0) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000280)={'bridge_slave_0\x00', 0x10}) ioctl$TUNSETVNETHDRSZ(r9, 0x400454d8, &(0x7f0000000140)=0x9cb) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r0], 0x0, 0x7, 0xffffffffffffff7d, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) 2.528783704s ago: executing program 3 (id=3316): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async, rerun: 64) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x7, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5e, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x31, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r0, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0], 0x0, 0x85, &(0x7f0000000780)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x38, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1b, 0x17, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000003000000000000000008000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000700b702000000000000850000008600000018290000", @ANYRES32=r0, @ANYBLOB="000000000b5e000018000000020000000000000001000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x8, 0xca, &(0x7f00000002c0)=""/202, 0x40f00, 0x1, '\x00', r1, 0xb, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x4, 0x4, 0x10000, 0x10}, 0x10, r2, 0xffffffffffffffff, 0x1, &(0x7f00000009c0)=[r0, r0], &(0x7f0000000a00)=[{0x5, 0x1, 0x5, 0x3}], 0x10, 0x3}, 0x90) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x44, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) sendmsg$tipc(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 64) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 64) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000c00)='\xec\xde_`d\xc8\xa9r:j\xab\x86\xb2\xa74\xb7i\xf0\xec\x19\xa4\x99\xc5XH\x03\xb6\xbdFxp@\x1e\xec\xe1\x9e\xd4\xf9\x81\xe2\xf9+\xc65\x97\xa7}q7\xe7\x10\xf5\xa3\t\x91s\x9e0}\x0f0\xa7nh\xa7\xb6\xf6K\x81\x85\r\xfc\xc1\xf7Nw\\O\xc5\xea\x91y\x04\x86\x01\x98\x99X\x92\x96\x9eT\x97o,\xa0:\xb13lU\x8c\x9d\xc7\x83\x15\x06\xd8\x99P=\xd1\xf5\x89\xfd\xce\x8e\xcd\xcb\xf5\xf4\xaf\xcax\xa2i\xc5y\x12\xbdx\xf3\xd3C\x98\xcfj\xad/\xc2\xab\x9b\xaf\xfaE-\xfc6\x11\x85\x9f\xfev\x03\x93^\x91_\xbf\xc8_pd\x8a\xd0O\x8bT\xcfq\xf2\xb977\xf45\x9a\x06\xac\x8a\x16\xdb\x81\x8e\x02\x00H\xfc\xdb\xd9D\xa6+HG\xce*(\r\bW\b\x1a\xb0\xcc\x87\xcb\xb5\xd4s\xf6\x13=m\x8alk\xb4^\xf0\x1e\xf2\xd1\xd2g/V\xa9\xfb\x84\xcf\xb7\n\xbakH\xdd\xaf\xb9\xf5/\xc0\n\xc7\xbb\xb8\xb7\x81Bj>\xf20\xa40\xa1q\xc0n\x7f\x8eE85_\xebv\x91g\x824\xc5ZT\xc9\xdai{\x19\x14D\x8d3\xa3\xe0\b \xaa<\xfe\xc87\x19-\xcb/l\x93\xee\xabE\xfb\xecf\xfd\x01\aUF\x1a\xd3]\x05\xf5\xd0\x91\xfb\x8f\x85\xe7N\xca\x88{\x14g2LP\xd3') recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 2.512163396s ago: executing program 3 (id=3318): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = gettid() perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001480)}, 0x0, 0x0, 0x0, 0x0, 0xc6b}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x80, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r4}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) close(r6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x20001400) write$cgroup_subtree(r6, &(0x7f00000000c0)=ANY=[], 0x2) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 2.440930111s ago: executing program 1 (id=3319): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x69, 0x0, @perf_config_ext={0x4, 0x7}, 0x10c, 0x7, 0xfffffffa, 0x9, 0x8, 0x80, 0x7f, 0x0, 0x9, 0x0, 0xb}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r2}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.stat\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.state\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8b26, &(0x7f0000000200)={'wlan1\x00', @random="ffffff8d0200"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='contention_end\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) openat$cgroup_ro(r4, &(0x7f0000000400)='cgroup.controllers\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, r4}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000faffffff0000000000000000850000002c00000085000000070000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x27, 0x8, 0x0, &(0x7f0000000180)="f9ad48cc429d29fc", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xfffffffffffffff8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x18000000000002a0, 0x7, 0x0, &(0x7f0000000180)="b9e40341342f0a", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) 2.439596611s ago: executing program 4 (id=3320): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f00000000c0), &(0x7f0000000140)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1c, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00'}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x6, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x3}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002a00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000900)=ANY=[@ANYBLOB="b400000000000000dd0a0000000000006301a4000000000095000000000000006681fabfa7afdea451352385fd277a26b1928972a90713774dee000000008abeded0f241d9e16380276de7f845fb77f3942b1b2f835d2704d284651cec42"], &(0x7f0000000340)='syzkaller\x00', 0x5, 0xcd, &(0x7f0000000a40)=""/205, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xf, 0x5, 0x10001, 0x5, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000f40)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRESOCT=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffff9503000008000000b70400000000000085000000349c23cd9c3101000000953cb20a7c8f717c711431b187e88db745ab291468f94c26e10567f5a03bf4cc51c1fb023881c166a93363d2047fef57c98d0292ab0424bb143d002f402e1319b4eabc3d4977cf18b1efef018a6beafbe9e85900"/166], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000840), 0x2, 0x0) r4 = openat$cgroup_freezer_state(r3, &(0x7f0000002b00), 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000800000deff9510000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) close(r4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x9, 0x0}, 0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0xfffffffffffffef6, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1801000000081000000000000000000085"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) 2.438599401s ago: executing program 0 (id=3321): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x6, 0x4, 0x7fe2, 0x1}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x6, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r4, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000380), 0xffffd6c0, r5}, 0x38) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 2.392828395s ago: executing program 4 (id=3322): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="8fed5d005355b1904a51ba9d1de7e91cd360a136ce6203c2008559ae7aa96920a523372325343c00fe800000000004050000000000"], 0xfe1b) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x9, 0x3, 0xf4, 0x7fff}, 0x48) r1 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='!(-\\).\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x20, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000001640)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0xa980, 0x0) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f00000001c0)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001400)={{r4}, &(0x7f0000001380), &(0x7f00000013c0)='%-010d \x00'}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r4, &(0x7f0000000080), 0x0}, 0x20) syz_clone(0x4000, &(0x7f0000000200)="4befb771c2cbd60cd499bdb8a6ce8fc9a17424b92f511e0ccade08144984178de77bdf61e7c5004842ba5c34ffa8a71c78e7588dbbee2844821f14cad1193dcc7227254c2e21ba3214345a31c6851f567a7ce6d9322949326d7c14257949dfe8e4d8579f7ca0a04319d0815d7f90bd92c70b91e15f", 0x75, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="b34a966994cc1964b3a66312aef621764e2f6c2e956b9d19684fe74ffc666627881968587ccfed14b24bb3694a8446a8957cb1ad05005badd3bb4a31440d52835652e5ee3a704235fddc6ff9a6f09addb4fe527f1409d8037ff3ddcfc5a9c0e0ceec5d05f8d42873c8442ed9bd36397fb98c7dd5efa85f07409e2fcbedfd3f1192ffc9d1") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x2e) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x8, 0x8, 0x8}, 0x48) 2.391179135s ago: executing program 2 (id=3169): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000100b704000000000000850000005700000095a5376eb1c56942c9f0707767677b836c0e0020c6ba685560e44925bd44e00daab850a3755270c0f3794655b746b743572b5c89662ea761361dc305c85434f854a0381adc21a938841ed7ba"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x200}, 0x90) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000280)='cachefiles_mark_failed\x00', r2}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYRES8=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000000000000701000003ffffffb702000008000000b703000000000083"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) openat$cgroup_ro(r5, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) (async) socketpair(0x0, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x13, 0x10, 0x2}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r7}, &(0x7f0000000000), &(0x7f0000000040)='%pK \x00', 0x1000000}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8912, &(0x7f0000000080)) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) 393.496788ms ago: executing program 0 (id=3323): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000000000007110250000000000950066559cf1ff3140a19f0a7eb60dbccf0971c1adcf643d9b4aa4ae0e8667948dc07f6686cb65b202afd5040000b358b3f4a0ef526ea28db0417f55f61fe1722d57d0de0cc13148422dd7b19975e2e3289534e52086966437dac596c2a3ac42b6908a803839d494944533918330c403133db1067815bc8b2fc01cfc8d5fde551a3be9d81c40dfcc8632bbfc6a931c32197dad36566cda18eb4d3d24e57c398e9c42d50d79a22de36753b6c800"/208], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@enum={0x0, 0x6, 0x0, 0x6, 0x4, [{0x7, 0x7}, {0x3, 0x5}, {0x10, 0x6}, {0xc, 0x6}, {0x7, 0x7}, {0x3, 0x8000}]}, @const={0x9}, @volatile={0x2, 0x0, 0x0, 0x9, 0x3}, @typedef={0x9, 0x0, 0x0, 0x8, 0x4}]}, {0x0, [0x2e]}}, &(0x7f00000000c0), 0x7b, 0x0, 0x0, 0xa9c3}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x100}, 0x10}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='mm_page_alloc\x00', r1}, 0x10) (async) syz_clone(0x4000001f, 0x0, 0x0, 0x0, 0x0, 0x0) 388.596708ms ago: executing program 1 (id=3324): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000001900"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000100), 0x48) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f00000001c0)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r5, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3e, &(0x7f0000000400)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x2f, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000740)=r7, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x20, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="180000000c0000000000000009000000183100000200"/48], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x2f, &(0x7f0000000bc0)=""/47, 0x41100, 0x7f, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000dc0)=[{0x2, 0x2, 0x0, 0x6}, {0x1, 0x1, 0xb, 0x4}, {0x2, 0x5, 0x9}, {0x3, 0x1, 0x6, 0x3}, {0x2, 0x2, 0xf}, {0x4, 0x1, 0xd, 0x6}, {0x0, 0x5, 0x3, 0x6}, {0x4, 0x1, 0x6}]}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) 387.173448ms ago: executing program 3 (id=3325): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000ecff0000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x7, 0xfff, 0x9}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x0, 0x4, 0x4}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0}, 0x10) syz_clone(0xa004000, &(0x7f0000001b80), 0x0, &(0x7f0000000000), &(0x7f00000001c0), &(0x7f0000002d00)="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") close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xa, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000026"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2674}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={0x0}, 0x10) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0}, 0x10) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 386.261908ms ago: executing program 4 (id=3326): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000001c0)='sched_kthread_stop_ret\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000540)=ANY=[@ANYRES8=r0, @ANYBLOB="7ad57d8e581d4874db45641dfce9b09b4780cda6172853c6b6f11fdb6b1707bc83f1ea756500c0bafefff0e22139bc594cb360b55220ada2dbaaa209f6cb915fd3", @ANYRES16=r2, @ANYRES64=r3, @ANYRESHEX=r2, @ANYRES16=r4, @ANYRES64, @ANYRES32=0x0, @ANYRESOCT=r2], &(0x7f0000000400)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, 0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x5, 0x3, 0x5, 0x1b0a, r0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000004c0)="fb6bba8839fe8bc048c0cdafd1428437b3c8026bdfeb6db47e2793b7b1811d40a203bf40b3a7da5a8a64db04ed6dd26eea2a37229c339b1f91201c2796a2238ca3769eb1d3b35474fb8785f38e1e615075334a21f6c6338e2d804fdcdbfba46d705ca4f86c124b724a", 0x69}], 0x1, 0x0, 0x0, 0x24000041}, 0x0) recvmsg(r8, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) close(r8) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x7ff, 0x15559f03, 0xf6, 0x40d, r6, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r11}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x1, 0x0, 0x8, 0x0, 0x1}, 0x48) 303.697696ms ago: executing program 4 (id=3327): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffcfa, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x0, 0x4, 0x8, 0x8}, 0x48) mkdir(&(0x7f0000000080)='./file0\x00', 0x109) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0xc0189436, 0x1ffffffe) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xbb, &(0x7f0000000180)=""/187, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x80) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={0xffffffffffffffff, 0x20, &(0x7f0000000b00)={&(0x7f0000000a40)=""/95, 0x5f, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000b80)=r3, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680), 0x0, 0xc9, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x29, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x26e1, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r4}, 0x10) 133.023409ms ago: executing program 4 (id=3328): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x0, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000840)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000400)=ANY=[@ANYRES16], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000340)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)=0x8200000000000000, 0xfffffdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100032c"], 0xfdef) 132.129519ms ago: executing program 0 (id=3329): ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454c9, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x10000000d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xfe, 0x60000004, &(0x7f0000000100)="b9ff03076044238cb89e14f008000de0ffff00184000633c77fbac141412e000002062079f4b4d2f87e5feca6aab845013f2325f1a3903050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f90931dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x2000, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB='\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_open_procfs$namespace(0x0, &(0x7f0000000a40)='ns/uts\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000200)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9}, 0x90) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xa, 0x3, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7eebd673}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) 64.064575ms ago: executing program 4 (id=3330): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x45, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000002c0)={'pim6reg0\x00', 0x8000}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 0s ago: executing program 2 (id=3169): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000100b704000000000000850000005700000095a5376eb1c56942c9f0707767677b836c0e0020c6ba685560e44925bd44e00daab850a3755270c0f3794655b746b743572b5c89662ea761361dc305c85434f854a0381adc21a938841ed7ba"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x200}, 0x90) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000280)='cachefiles_mark_failed\x00', r2}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYRES8=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000000000000701000003ffffffb702000008000000b703000000000083"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) openat$cgroup_ro(r5, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) (async) socketpair(0x0, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x13, 0x10, 0x2}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r7}, &(0x7f0000000000), &(0x7f0000000040)='%pK \x00', 0x1000000}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8912, &(0x7f0000000080)) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.162' (ED25519) to the list of known hosts. [ 21.506107][ T24] audit: type=1400 audit(1722405002.760:66): avc: denied { mounton } for pid=274 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.507178][ T274] cgroup: Unknown subsys name 'net' [ 21.528654][ T24] audit: type=1400 audit(1722405002.760:67): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.555520][ T24] audit: type=1400 audit(1722405002.790:68): avc: denied { unmount } for pid=274 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.555654][ T274] cgroup: Unknown subsys name 'devices' [ 21.669519][ T274] cgroup: Unknown subsys name 'hugetlb' [ 21.674918][ T274] cgroup: Unknown subsys name 'rlimit' [ 21.866607][ T24] audit: type=1400 audit(1722405003.120:69): avc: denied { setattr } for pid=274 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.889581][ T24] audit: type=1400 audit(1722405003.120:70): avc: denied { mounton } for pid=274 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.894701][ T277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.914065][ T24] audit: type=1400 audit(1722405003.120:71): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 21.945518][ T24] audit: type=1400 audit(1722405003.180:72): avc: denied { relabelto } for pid=277 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.970700][ T24] audit: type=1400 audit(1722405003.180:73): avc: denied { write } for pid=277 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.011431][ T24] audit: type=1400 audit(1722405003.270:74): avc: denied { read } for pid=274 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.036711][ T24] audit: type=1400 audit(1722405003.270:75): avc: denied { open } for pid=274 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.036746][ T274] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.565878][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.572843][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.580050][ T286] device bridge_slave_0 entered promiscuous mode [ 22.586527][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.593403][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.600485][ T284] device bridge_slave_0 entered promiscuous mode [ 22.616789][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.623658][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.630847][ T286] device bridge_slave_1 entered promiscuous mode [ 22.639127][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.645954][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.653201][ T284] device bridge_slave_1 entered promiscuous mode [ 22.676208][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.683048][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.690235][ T287] device bridge_slave_0 entered promiscuous mode [ 22.708125][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.714956][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.722167][ T287] device bridge_slave_1 entered promiscuous mode [ 22.738365][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.745193][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.752387][ T288] device bridge_slave_0 entered promiscuous mode [ 22.759028][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.765850][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.773084][ T288] device bridge_slave_1 entered promiscuous mode [ 22.783270][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.790306][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.797311][ T285] device bridge_slave_0 entered promiscuous mode [ 22.803964][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.810806][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.818017][ T285] device bridge_slave_1 entered promiscuous mode [ 22.948968][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.955806][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.962927][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.969716][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.991796][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.998752][ T288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.005811][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.012650][ T288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.020811][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.027661][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.034717][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.041548][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.049702][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.056532][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.063646][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.070428][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.080437][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.087269][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.094385][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.101165][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.137955][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.145037][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.152840][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.159972][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.166857][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.174345][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.182380][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.189310][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.196468][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.204130][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.211098][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.218155][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.248755][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.256855][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.264733][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.271968][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.280153][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.286963][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.294223][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.302188][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.309028][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.316118][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.324023][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.330844][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.338001][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.345907][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.352657][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.359773][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.367699][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.374518][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.381700][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.389643][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.396452][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.403612][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.411266][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.442914][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.451272][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.459770][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.470187][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.477007][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.484325][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.492002][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.499752][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.507382][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.515028][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.523094][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.530890][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.538143][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.546012][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.552790][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.560131][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.568121][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.574929][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.594206][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.602557][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.610256][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.624654][ T285] device veth0_vlan entered promiscuous mode [ 23.630778][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.639388][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.647386][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.655090][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.663141][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.670533][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.681175][ T284] device veth0_vlan entered promiscuous mode [ 23.691497][ T288] device veth0_vlan entered promiscuous mode [ 23.698339][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.705970][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.714062][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.721693][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.729455][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.736986][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.744858][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.752094][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.759289][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.766513][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.773948][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.781302][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.794701][ T285] device veth1_macvtap entered promiscuous mode [ 23.806690][ T284] device veth1_macvtap entered promiscuous mode [ 23.814494][ T286] device veth0_vlan entered promiscuous mode [ 23.821041][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.829372][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.837532][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.845432][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.853305][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.860667][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.868368][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.876032][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.884017][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.891876][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.899282][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.907141][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.915198][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.922456][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.930764][ T288] device veth1_macvtap entered promiscuous mode [ 23.939646][ T287] device veth0_vlan entered promiscuous mode [ 23.948800][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.956198][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.964612][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.982274][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.990356][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.998927][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.006840][ T289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.025305][ T287] device veth1_macvtap entered promiscuous mode [ 24.033119][ T285] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 24.034675][ T286] device veth1_macvtap entered promiscuous mode [ 24.053275][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.062870][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.075527][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.083799][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.092248][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.100416][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.108677][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.116114][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.124305][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.132540][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.148552][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.156542][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.190522][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.205003][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.214574][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.223080][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.231396][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.239696][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.247993][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.255991][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.317615][ C1] hrtimer: interrupt took 28735 ns [ 24.338367][ T320] device wg2 entered promiscuous mode [ 24.518522][ T336] device veth0_vlan left promiscuous mode [ 24.546472][ T336] device veth0_vlan entered promiscuous mode [ 25.385177][ T430] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.392287][ T430] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.476467][ T430] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.483454][ T430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.492872][ T430] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.499851][ T430] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.521904][ T430] device bridge0 entered promiscuous mode [ 25.725283][ T452] syz.0.34[452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.725353][ T452] syz.0.34[452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.317405][ T493] cgroup: syz.2.45 (493) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 26.378977][ T493] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 26.863341][ T534] device veth0_to_team entered promiscuous mode [ 26.963177][ T537] device veth0_vlan left promiscuous mode [ 26.989449][ T537] device veth0_vlan entered promiscuous mode [ 27.300159][ T24] kauditd_printk_skb: 46 callbacks suppressed [ 27.300174][ T24] audit: type=1400 audit(1722405008.560:122): avc: denied { create } for pid=577 comm="syz.2.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 27.682464][ T24] audit: type=1400 audit(1722405008.940:123): avc: denied { create } for pid=626 comm="syz.2.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 29.731702][ T758] device syzkaller0 entered promiscuous mode [ 29.933783][ T771] device sit0 entered promiscuous mode [ 30.085728][ T777] Â: renamed from pim6reg1 [ 30.788610][ T806] device syzkaller0 entered promiscuous mode [ 30.829055][ T814] device syzkaller0 entered promiscuous mode [ 31.031813][ T829] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.041743][ T829] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.168836][ T847] device veth0_vlan left promiscuous mode [ 31.200050][ T847] device veth0_vlan entered promiscuous mode [ 31.237723][ T851] device veth1_macvtap left promiscuous mode [ 31.243510][ T851] device macsec0 entered promiscuous mode [ 31.259755][ T854] device pim6reg1 entered promiscuous mode [ 31.475911][ T858] device syzkaller0 entered promiscuous mode [ 32.070325][ T884] device syzkaller0 entered promiscuous mode [ 32.364405][ T902] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.371387][ T902] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.544614][ T902] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.551489][ T902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.558581][ T902] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.565347][ T902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.699104][ T902] device bridge0 entered promiscuous mode [ 33.239236][ T929] ------------[ cut here ]------------ [ 33.244517][ T929] trace type BPF program uses run-time allocation [ 33.258008][ T929] WARNING: CPU: 1 PID: 929 at kernel/bpf/verifier.c:10493 check_map_prog_compatibility+0x65b/0x7c0 [ 33.375843][ T929] Modules linked in: [ 33.380188][ T929] CPU: 1 PID: 929 Comm: syz.0.142 Not tainted 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 33.386423][ T933] device syzkaller0 entered promiscuous mode [ 33.393760][ T929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 33.406214][ T929] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 33.412866][ T929] Code: c8 e9 84 fe ff ff e8 24 f5 ee ff 31 db e9 85 fe ff ff e8 18 f5 ee ff c6 05 2e 13 65 05 01 48 c7 c7 40 73 45 85 e8 d5 7b c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 33.432922][ T929] RSP: 0018:ffffc9000103ef90 EFLAGS: 00010246 [ 33.439157][ T929] RAX: 76425b794c9ddb00 RBX: ffff888107582800 RCX: 0000000000040000 [ 33.447154][ T929] RDX: ffffc9000132c000 RSI: 0000000000000809 RDI: 000000000000080a [ 33.456802][ T929] RBP: ffffc9000103efd0 R08: ffffffff81521b78 R09: ffffed103ee2a5f8 [ 33.480721][ T929] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 33.491077][ T937] bridge_slave_0: mtu greater than device maximum [ 33.516946][ T929] R13: 1ffff92000021204 R14: ffff8881237a0000 R15: ffffc90000109020 [ 33.544603][ T929] FS: 00007eff93be96c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 33.553856][ T929] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 33.560402][ T929] CR2: 00007eff93984d58 CR3: 00000001236e7000 CR4: 00000000003506a0 [ 33.568228][ T929] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 33.569951][ T24] audit: type=1400 audit(1722405014.830:124): avc: denied { create } for pid=943 comm="syz.1.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 33.576050][ T929] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 33.602833][ T929] Call Trace: [ 33.605915][ T929] ? show_regs+0x58/0x60 [ 33.610087][ T929] ? __warn+0x160/0x2f0 [ 33.614050][ T929] ? check_map_prog_compatibility+0x65b/0x7c0 [ 33.627294][ T929] ? report_bug+0x3d9/0x5b0 [ 33.631975][ T929] ? check_map_prog_compatibility+0x65b/0x7c0 [ 33.638232][ T929] ? handle_bug+0x41/0x70 [ 33.645174][ T929] ? exc_invalid_op+0x1b/0x50 [ 33.656679][ T929] ? asm_exc_invalid_op+0x12/0x20 [ 33.666705][ T929] ? wake_up_klogd+0xb8/0xf0 [ 33.671880][ T929] ? check_map_prog_compatibility+0x65b/0x7c0 [ 33.677827][ T929] ? __fdget+0x1bc/0x240 [ 33.681867][ T929] resolve_pseudo_ldimm64+0x586/0x1020 [ 33.687170][ T929] ? bpf_check+0xf2b0/0xf2b0 [ 33.691821][ T929] ? kvmalloc_node+0x82/0x130 [ 33.696274][ T929] bpf_check+0xaf21/0xf2b0 [ 33.700722][ T929] ? stack_depot_save+0xe/0x10 [ 33.709671][ T929] ? __se_sys_bpf+0x9856/0x11cb0 [ 33.714471][ T929] ? sched_clock+0x3a/0x40 [ 33.718759][ T929] ? 0xffffffffa0026000 [ 33.722816][ T929] ? bpf_get_btf_vmlinux+0x60/0x60 [ 33.727813][ T929] ? __kernel_text_address+0x9b/0x110 [ 33.734254][ T929] ? unwind_get_return_address+0x4d/0x90 [ 33.740377][ T24] audit: type=1400 audit(1722405015.000:125): avc: denied { read } for pid=75 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 33.755909][ T929] ? arch_stack_walk+0xf3/0x140 [ 33.767079][ T929] ? stack_trace_save+0x113/0x1c0 [ 33.772047][ T929] ? stack_trace_snprint+0xf0/0xf0 [ 33.777008][ T929] ? stack_trace_snprint+0xf0/0xf0 [ 33.782273][ T929] ? selinux_bpf_prog_alloc+0x51/0x140 [ 33.787901][ T929] ? selinux_bpf_prog_alloc+0x51/0x140 [ 33.793211][ T929] ? ____kasan_kmalloc+0xed/0x110 [ 33.800575][ T929] ? ____kasan_kmalloc+0xdb/0x110 [ 33.805481][ T929] ? __kasan_kmalloc+0x9/0x10 [ 33.810124][ T929] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 33.817636][ T24] audit: type=1400 audit(1722405015.070:126): avc: denied { create } for pid=959 comm="syz.2.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.842649][ T929] ? selinux_bpf_prog_alloc+0x51/0x140 [ 33.848230][ T929] ? security_bpf_prog_alloc+0x62/0x90 [ 33.863440][ T929] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 33.876108][ T24] audit: type=1400 audit(1722405015.100:127): avc: denied { create } for pid=959 comm="syz.2.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 33.896367][ T929] ? __x64_sys_bpf+0x7b/0x90 [ 33.901022][ T929] ? do_syscall_64+0x34/0x70 [ 33.910963][ T929] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 33.935177][ T929] ? __kasan_kmalloc+0x9/0x10 [ 33.941155][ T929] __se_sys_bpf+0x107a2/0x11cb0 [ 33.951251][ T24] audit: type=1400 audit(1722405015.200:128): avc: denied { write } for pid=961 comm="syz.2.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.977653][ T929] ? __kasan_check_write+0x14/0x20 [ 33.982665][ T929] ? __x64_sys_bpf+0x90/0x90 [ 34.072508][ T929] ? futex_wake+0x630/0x790 [ 34.101726][ T24] audit: type=1400 audit(1722405015.250:129): avc: denied { create } for pid=967 comm="syz.4.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 34.109254][ T929] ? memset+0x35/0x40 [ 34.157695][ T929] ? do_futex+0x13c5/0x17b0 [ 34.162185][ T929] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 34.192048][ T24] audit: type=1400 audit(1722405015.410:130): avc: denied { setopt } for pid=967 comm="syz.4.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 34.198087][ T929] ? __kasan_check_write+0x14/0x20 [ 34.260787][ T929] ? up_write+0x59/0x120 [ 34.265729][ T929] ? generic_file_write_iter+0x106/0x1c0 [ 34.274158][ T929] ? preempt_count_add+0x92/0x1a0 [ 34.307752][ T929] ? futex_exit_release+0x1e0/0x1e0 [ 34.330651][ T24] audit: type=1400 audit(1722405015.590:131): avc: denied { read } for pid=992 comm="syz.4.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 34.354044][ T929] ? kernel_write+0x3d0/0x3d0 [ 34.368104][ T929] ? mutex_trylock+0xa0/0xa0 [ 34.372517][ T929] ? __se_sys_futex+0x355/0x470 [ 34.397683][ T929] ? fpu__clear_all+0x20/0x20 [ 34.402225][ T929] ? __kasan_check_read+0x11/0x20 [ 34.410006][ T929] __x64_sys_bpf+0x7b/0x90 [ 34.470638][ T929] do_syscall_64+0x34/0x70 [ 34.504079][ T929] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 34.518194][ T929] RIP: 0033:0x7eff94f693b9 [ 34.551107][ T929] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.659786][ T929] RSP: 002b:00007eff93be9048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 34.668335][ T1006] bridge0: port 3(gretap0) entered blocking state [ 34.682493][ T1006] bridge0: port 3(gretap0) entered disabled state [ 34.690175][ T929] RAX: ffffffffffffffda RBX: 00007eff950f7f80 RCX: 00007eff94f693b9 [ 34.713865][ T1006] device gretap0 entered promiscuous mode [ 34.720667][ T929] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 34.752176][ T929] RBP: 00007eff94fd68e6 R08: 0000000000000000 R09: 0000000000000000 [ 34.784108][ T929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 34.853512][ T929] R13: 000000000000000b R14: 00007eff950f7f80 R15: 00007ffcea39c928 [ 34.911847][ T929] ---[ end trace ea7bb7aaaf112b4d ]--- [ 35.223761][ T24] audit: type=1400 audit(1722405016.480:132): avc: denied { write } for pid=1040 comm="syz.3.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 35.529226][ T1033] device syzkaller0 entered promiscuous mode [ 37.008380][ T1111] device syzkaller0 entered promiscuous mode [ 37.125866][ T1116] device syzkaller0 entered promiscuous mode [ 37.190211][ T24] audit: type=1400 audit(1722405018.450:133): avc: denied { create } for pid=1124 comm="syz.4.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 37.762025][ T1164] device pim6reg1 entered promiscuous mode [ 38.165895][ T1188] device syzkaller0 entered promiscuous mode [ 38.611393][ T24] kauditd_printk_skb: 1 callbacks suppressed [ 38.611404][ T24] audit: type=1400 audit(1722405019.870:135): avc: denied { create } for pid=1212 comm="syz.3.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 39.151917][ T1286] device wg2 entered promiscuous mode [ 39.175337][ T1291] device syzkaller0 entered promiscuous mode [ 40.173300][ T24] audit: type=1400 audit(1722405021.430:136): avc: denied { create } for pid=1344 comm="syz.4.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 40.220672][ T1340] device syzkaller0 entered promiscuous mode [ 40.549563][ T24] audit: type=1400 audit(1722405021.810:137): avc: denied { create } for pid=1406 comm="syz.4.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 40.620902][ T1419] syz.2.275[1419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.620942][ T1419] syz.2.275[1419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.917384][ T1507] device macsec0 entered promiscuous mode [ 42.679205][ T24] audit: type=1400 audit(1722405023.940:138): avc: denied { create } for pid=1542 comm="syz.1.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 45.269946][ T1690] device veth1_macvtap left promiscuous mode [ 45.276907][ T1690] device macsec0 left promiscuous mode [ 45.924193][ T1761] bridge_slave_0: mtu greater than device maximum [ 46.598659][ T1805] device syzkaller0 entered promiscuous mode [ 46.710124][ T1811] device syzkaller0 entered promiscuous mode [ 46.834457][ T24] audit: type=1400 audit(1722405028.090:139): avc: denied { write } for pid=1812 comm="syz.1.385" name="net" dev="proc" ino=17669 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 46.860146][ T24] audit: type=1400 audit(1722405028.090:140): avc: denied { add_name } for pid=1812 comm="syz.1.385" name="blkio.bfq.io_wait_time" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 46.881681][ T24] audit: type=1400 audit(1722405028.090:141): avc: denied { create } for pid=1812 comm="syz.1.385" name="blkio.bfq.io_wait_time" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 46.917846][ T24] audit: type=1400 audit(1722405028.090:142): avc: denied { associate } for pid=1812 comm="syz.1.385" name="blkio.bfq.io_wait_time" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 47.279265][ T1847] device vlan1 entered promiscuous mode [ 47.565023][ T1867] device syzkaller0 entered promiscuous mode [ 47.595644][ T1864] syz.4.397[1864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.595693][ T1864] syz.4.397[1864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.734985][ T1882] FAULT_INJECTION: forcing a failure. [ 47.734985][ T1882] name failslab, interval 1, probability 0, space 0, times 1 [ 47.776262][ T1882] CPU: 0 PID: 1882 Comm: syz.3.404 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 47.787412][ T1882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 47.797297][ T1882] Call Trace: [ 47.800441][ T1882] dump_stack_lvl+0x1e2/0x24b [ 47.804935][ T1882] ? panic+0x812/0x812 [ 47.808844][ T1882] ? bfq_pos_tree_add_move+0x43b/0x43b [ 47.814133][ T1882] ? selinux_capable+0x2f1/0x430 [ 47.818911][ T1882] ? selinux_capset+0xf0/0xf0 [ 47.823420][ T1882] dump_stack+0x15/0x17 [ 47.827415][ T1882] should_fail+0x3c6/0x510 [ 47.831668][ T1882] ? bpf_map_area_alloc+0x4c/0xf0 [ 47.836547][ T1882] __should_failslab+0xa4/0xe0 [ 47.841129][ T1882] should_failslab+0x9/0x20 [ 47.845467][ T1882] __kmalloc+0x60/0x330 [ 47.849461][ T1882] bpf_map_area_alloc+0x4c/0xf0 [ 47.854147][ T1882] array_map_alloc+0x319/0x7c0 [ 47.858761][ T1882] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 47.864215][ T1882] ? selinux_bpf+0xcb/0x100 [ 47.868558][ T1882] ? array_map_alloc_check+0x27b/0x350 [ 47.873850][ T1882] __se_sys_bpf+0x620f/0x11cb0 [ 47.878451][ T1882] ? stack_trace_save+0x113/0x1c0 [ 47.883308][ T1882] ? terminate_walk+0x407/0x4f0 [ 47.887994][ T1882] ? stack_trace_snprint+0xf0/0xf0 [ 47.892947][ T1882] ? kmem_cache_free+0xa9/0x1e0 [ 47.897658][ T1882] ? kmem_cache_free+0xa9/0x1e0 [ 47.902317][ T1882] ? kasan_set_track+0x5d/0x70 [ 47.906913][ T1882] ? __x64_sys_bpf+0x90/0x90 [ 47.911343][ T1882] ? __kasan_slab_free+0x11/0x20 [ 47.916121][ T1882] ? slab_free_freelist_hook+0xc0/0x190 [ 47.921510][ T1882] ? kmem_cache_free+0xa9/0x1e0 [ 47.926183][ T1882] ? putname+0xe7/0x140 [ 47.930176][ T1882] ? do_sys_openat2+0x1fc/0x710 [ 47.934876][ T1882] ? __x64_sys_openat+0x243/0x290 [ 47.939733][ T1882] ? do_syscall_64+0x34/0x70 [ 47.944153][ T1882] ? _kstrtoull+0x3a0/0x4a0 [ 47.948491][ T1882] ? kstrtouint_from_user+0x20a/0x2a0 [ 47.953707][ T1882] ? kstrtol_from_user+0x310/0x310 [ 47.958741][ T1882] ? memset+0x35/0x40 [ 47.962551][ T1882] ? __fsnotify_parent+0x4b9/0x6c0 [ 47.967499][ T1882] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 47.974090][ T1882] ? proc_fail_nth_write+0x20b/0x290 [ 47.979216][ T1882] ? proc_fail_nth_read+0x210/0x210 [ 47.984261][ T1882] ? security_file_permission+0x86/0xb0 [ 47.989633][ T1882] ? rw_verify_area+0x1c3/0x360 [ 47.994320][ T1882] ? preempt_count_add+0x92/0x1a0 [ 47.999176][ T1882] ? vfs_write+0x852/0xe70 [ 48.003431][ T1882] ? kmem_cache_free+0xa9/0x1e0 [ 48.008116][ T1882] ? kernel_write+0x3d0/0x3d0 [ 48.012630][ T1882] ? __kasan_check_write+0x14/0x20 [ 48.017575][ T1882] ? mutex_lock+0xa5/0x110 [ 48.021828][ T1882] ? mutex_trylock+0xa0/0xa0 [ 48.026282][ T1882] ? __kasan_check_write+0x14/0x20 [ 48.031203][ T1882] ? fput_many+0x160/0x1b0 [ 48.035548][ T1882] ? debug_smp_processor_id+0x17/0x20 [ 48.040836][ T1882] __x64_sys_bpf+0x7b/0x90 [ 48.045092][ T1882] do_syscall_64+0x34/0x70 [ 48.049345][ T1882] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 48.055067][ T1882] RIP: 0033:0x7f137caaa3b9 [ 48.059327][ T1882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 48.078766][ T1882] RSP: 002b:00007f137b72a048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 48.087006][ T1882] RAX: ffffffffffffffda RBX: 00007f137cc38f80 RCX: 00007f137caaa3b9 [ 48.094819][ T1882] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 48.102629][ T1882] RBP: 00007f137b72a0a0 R08: 0000000000000000 R09: 0000000000000000 [ 48.110439][ T1882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 48.118251][ T1882] R13: 000000000000000b R14: 00007f137cc38f80 R15: 00007fff619945e8 [ 48.179319][ T24] audit: type=1400 audit(1722405029.440:143): avc: denied { create } for pid=1908 comm="syz.1.409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 48.435793][ T1944] device pim6reg1 entered promiscuous mode [ 48.659859][ T1950] device veth0_vlan left promiscuous mode [ 48.685796][ T1950] device veth0_vlan entered promiscuous mode [ 48.852796][ T655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.901480][ T655] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.983898][ T655] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.343564][ T1975] FAULT_INJECTION: forcing a failure. [ 49.343564][ T1975] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 49.366227][ T1975] CPU: 1 PID: 1975 Comm: syz.2.427 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 49.377237][ T1975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 49.387114][ T1975] Call Trace: [ 49.390253][ T1975] dump_stack_lvl+0x1e2/0x24b [ 49.394789][ T1975] ? bfq_pos_tree_add_move+0x43b/0x43b [ 49.400055][ T1975] ? __update_idle_core+0x2a0/0x2a0 [ 49.405181][ T1975] dump_stack+0x15/0x17 [ 49.409183][ T1975] should_fail+0x3c6/0x510 [ 49.413428][ T1975] should_fail_alloc_page+0x52/0x60 [ 49.418465][ T1975] __alloc_pages_nodemask+0x1b3/0xaf0 [ 49.423674][ T1975] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 49.429056][ T1975] ? pcpu_block_update_hint_alloc+0x935/0xcf0 [ 49.434955][ T1975] pcpu_populate_chunk+0x190/0xe10 [ 49.439907][ T1975] pcpu_alloc+0xa81/0x1420 [ 49.444152][ T1975] __alloc_percpu_gfp+0x27/0x30 [ 49.448840][ T1975] array_map_alloc+0x486/0x7c0 [ 49.453436][ T1975] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 49.458905][ T1975] ? selinux_bpf+0xcb/0x100 [ 49.463241][ T1975] ? array_map_alloc_check+0x27b/0x350 [ 49.468537][ T1975] __se_sys_bpf+0x620f/0x11cb0 [ 49.473136][ T1975] ? stack_trace_save+0x113/0x1c0 [ 49.477999][ T1975] ? terminate_walk+0x407/0x4f0 [ 49.482686][ T1975] ? stack_trace_snprint+0xf0/0xf0 [ 49.487635][ T1975] ? kmem_cache_free+0xa9/0x1e0 [ 49.492317][ T1975] ? kmem_cache_free+0xa9/0x1e0 [ 49.497008][ T1975] ? kasan_set_track+0x5d/0x70 [ 49.501608][ T1975] ? __x64_sys_bpf+0x90/0x90 [ 49.506030][ T1975] ? __kasan_slab_free+0x11/0x20 [ 49.510805][ T1975] ? slab_free_freelist_hook+0xc0/0x190 [ 49.516184][ T1975] ? kmem_cache_free+0xa9/0x1e0 [ 49.520873][ T1975] ? putname+0xe7/0x140 [ 49.524864][ T1975] ? do_sys_openat2+0x1fc/0x710 [ 49.529553][ T1975] ? __x64_sys_openat+0x243/0x290 [ 49.534411][ T1975] ? do_syscall_64+0x34/0x70 [ 49.538844][ T1975] ? _kstrtoull+0x3a0/0x4a0 [ 49.543177][ T1975] ? kstrtouint_from_user+0x20a/0x2a0 [ 49.548386][ T1975] ? kstrtol_from_user+0x310/0x310 [ 49.553336][ T1975] ? memset+0x35/0x40 [ 49.557153][ T1975] ? __fsnotify_parent+0x4b9/0x6c0 [ 49.562104][ T1975] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 49.568725][ T1975] ? proc_fail_nth_write+0x20b/0x290 [ 49.573815][ T1975] ? proc_fail_nth_read+0x210/0x210 [ 49.578857][ T1975] ? security_file_permission+0x86/0xb0 [ 49.584231][ T1975] ? rw_verify_area+0x1c3/0x360 [ 49.588924][ T1975] ? preempt_count_add+0x92/0x1a0 [ 49.593788][ T1975] ? vfs_write+0x852/0xe70 [ 49.598045][ T1975] ? kmem_cache_free+0xa9/0x1e0 [ 49.602720][ T1975] ? kernel_write+0x3d0/0x3d0 [ 49.607232][ T1975] ? __kasan_check_write+0x14/0x20 [ 49.612179][ T1975] ? mutex_lock+0xa5/0x110 [ 49.616430][ T1975] ? mutex_trylock+0xa0/0xa0 [ 49.620863][ T1975] ? bpf_ringbuf_query+0xdd/0x130 [ 49.625734][ T1975] ? bpf_trace_run2+0xf4/0x280 [ 49.630338][ T1975] ? __bpf_trace_sys_enter+0x62/0x70 [ 49.635441][ T1975] __x64_sys_bpf+0x7b/0x90 [ 49.639698][ T1975] do_syscall_64+0x34/0x70 [ 49.643946][ T1975] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 49.649675][ T1975] RIP: 0033:0x7fef061233b9 [ 49.653926][ T1975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.673365][ T1975] RSP: 002b:00007fef04da3048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 49.681611][ T1975] RAX: ffffffffffffffda RBX: 00007fef062b1f80 RCX: 00007fef061233b9 [ 49.689424][ T1975] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 49.697232][ T1975] RBP: 00007fef04da30a0 R08: 0000000000000000 R09: 0000000000000000 [ 49.705054][ T1975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 49.712856][ T1975] R13: 000000000000000b R14: 00007fef062b1f80 R15: 00007ffc4d272dc8 [ 49.750271][ T1990] syz.2.433[1990] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.750330][ T1990] syz.2.433[1990] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.208752][ T24] audit: type=1400 audit(1722405031.470:144): avc: denied { create } for pid=2017 comm="syz.0.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 50.305070][ T2025] FAULT_INJECTION: forcing a failure. [ 50.305070][ T2025] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 50.371226][ T2025] CPU: 1 PID: 2025 Comm: syz.2.443 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 50.382229][ T2025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 50.392125][ T2025] Call Trace: [ 50.395258][ T2025] dump_stack_lvl+0x1e2/0x24b [ 50.399774][ T2025] ? bfq_pos_tree_add_move+0x43b/0x43b [ 50.405060][ T2025] dump_stack+0x15/0x17 [ 50.409056][ T2025] should_fail+0x3c6/0x510 [ 50.413307][ T2025] should_fail_alloc_page+0x52/0x60 [ 50.418339][ T2025] __alloc_pages_nodemask+0x1b3/0xaf0 [ 50.423557][ T2025] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 50.428938][ T2025] ? pcpu_block_update_hint_alloc+0x8f0/0xcf0 [ 50.434836][ T2025] pcpu_populate_chunk+0x190/0xe10 [ 50.439781][ T2025] pcpu_alloc+0xa81/0x1420 [ 50.444028][ T2025] __alloc_percpu_gfp+0x27/0x30 [ 50.448727][ T2025] array_map_alloc+0x486/0x7c0 [ 50.453312][ T2025] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 50.458788][ T2025] ? selinux_bpf+0xcb/0x100 [ 50.463118][ T2025] ? array_map_alloc_check+0x27b/0x350 [ 50.468413][ T2025] __se_sys_bpf+0x620f/0x11cb0 [ 50.473020][ T2025] ? stack_trace_save+0x113/0x1c0 [ 50.477882][ T2025] ? terminate_walk+0x407/0x4f0 [ 50.482564][ T2025] ? stack_trace_snprint+0xf0/0xf0 [ 50.487512][ T2025] ? kmem_cache_free+0xa9/0x1e0 [ 50.492194][ T2025] ? kmem_cache_free+0xa9/0x1e0 [ 50.496880][ T2025] ? kasan_set_track+0x5d/0x70 [ 50.501483][ T2025] ? __x64_sys_bpf+0x90/0x90 [ 50.505916][ T2025] ? __kasan_slab_free+0x11/0x20 [ 50.510684][ T2025] ? slab_free_freelist_hook+0xc0/0x190 [ 50.516062][ T2025] ? kmem_cache_free+0xa9/0x1e0 [ 50.520747][ T2025] ? putname+0xe7/0x140 [ 50.524738][ T2025] ? do_sys_openat2+0x1fc/0x710 [ 50.529431][ T2025] ? __x64_sys_openat+0x243/0x290 [ 50.534286][ T2025] ? do_syscall_64+0x34/0x70 [ 50.538717][ T2025] ? _kstrtoull+0x3a0/0x4a0 [ 50.543052][ T2025] ? kstrtouint_from_user+0x20a/0x2a0 [ 50.548261][ T2025] ? kstrtol_from_user+0x310/0x310 [ 50.553210][ T2025] ? memset+0x35/0x40 [ 50.557028][ T2025] ? __fsnotify_parent+0x4b9/0x6c0 [ 50.561977][ T2025] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 50.568571][ T2025] ? proc_fail_nth_write+0x20b/0x290 [ 50.573694][ T2025] ? proc_fail_nth_read+0x210/0x210 [ 50.578732][ T2025] ? security_file_permission+0x86/0xb0 [ 50.584107][ T2025] ? rw_verify_area+0x1c3/0x360 [ 50.588799][ T2025] ? preempt_count_add+0x92/0x1a0 [ 50.593655][ T2025] ? vfs_write+0x852/0xe70 [ 50.597910][ T2025] ? kmem_cache_free+0xa9/0x1e0 [ 50.602594][ T2025] ? kernel_write+0x3d0/0x3d0 [ 50.607197][ T2025] ? __kasan_check_write+0x14/0x20 [ 50.612140][ T2025] ? mutex_lock+0xa5/0x110 [ 50.616394][ T2025] ? mutex_trylock+0xa0/0xa0 [ 50.620826][ T2025] ? __kasan_check_write+0x14/0x20 [ 50.625775][ T2025] ? fput_many+0x160/0x1b0 [ 50.630027][ T2025] ? debug_smp_processor_id+0x17/0x20 [ 50.635230][ T2025] __x64_sys_bpf+0x7b/0x90 [ 50.639487][ T2025] do_syscall_64+0x34/0x70 [ 50.643738][ T2025] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 50.649467][ T2025] RIP: 0033:0x7fef061233b9 [ 50.653716][ T2025] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 50.673153][ T2025] RSP: 002b:00007fef04da3048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 50.681401][ T2025] RAX: ffffffffffffffda RBX: 00007fef062b1f80 RCX: 00007fef061233b9 [ 50.689213][ T2025] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 50.697021][ T2025] RBP: 00007fef04da30a0 R08: 0000000000000000 R09: 0000000000000000 [ 50.704832][ T2025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 50.712766][ T2025] R13: 000000000000000b R14: 00007fef062b1f80 R15: 00007ffc4d272dc8 [ 51.133724][ T2082] FAULT_INJECTION: forcing a failure. [ 51.133724][ T2082] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 51.274534][ T2082] CPU: 1 PID: 2082 Comm: syz.0.458 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 51.285544][ T2082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 51.295523][ T2082] Call Trace: [ 51.298679][ T2082] dump_stack_lvl+0x1e2/0x24b [ 51.303170][ T2082] ? bfq_pos_tree_add_move+0x43b/0x43b [ 51.308465][ T2082] dump_stack+0x15/0x17 [ 51.312452][ T2082] should_fail+0x3c6/0x510 [ 51.316710][ T2082] should_fail_alloc_page+0x52/0x60 [ 51.321741][ T2082] __alloc_pages_nodemask+0x1b3/0xaf0 [ 51.326952][ T2082] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 51.332330][ T2082] ? pcpu_block_update_hint_alloc+0x8f0/0xcf0 [ 51.338236][ T2082] pcpu_populate_chunk+0x190/0xe10 [ 51.343180][ T2082] pcpu_alloc+0xa81/0x1420 [ 51.347435][ T2082] __alloc_percpu_gfp+0x27/0x30 [ 51.352118][ T2082] array_map_alloc+0x486/0x7c0 [ 51.356814][ T2082] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 51.362273][ T2082] ? selinux_bpf+0xcb/0x100 [ 51.366615][ T2082] ? array_map_alloc_check+0x27b/0x350 [ 51.371911][ T2082] __se_sys_bpf+0x620f/0x11cb0 [ 51.376509][ T2082] ? stack_trace_save+0x113/0x1c0 [ 51.381377][ T2082] ? terminate_walk+0x407/0x4f0 [ 51.386054][ T2082] ? stack_trace_snprint+0xf0/0xf0 [ 51.391008][ T2082] ? kmem_cache_free+0xa9/0x1e0 [ 51.395692][ T2082] ? kmem_cache_free+0xa9/0x1e0 [ 51.400373][ T2082] ? kasan_set_track+0x5d/0x70 [ 51.404973][ T2082] ? __x64_sys_bpf+0x90/0x90 [ 51.409403][ T2082] ? __kasan_slab_free+0x11/0x20 [ 51.414176][ T2082] ? slab_free_freelist_hook+0xc0/0x190 [ 51.419563][ T2082] ? kmem_cache_free+0xa9/0x1e0 [ 51.424241][ T2082] ? putname+0xe7/0x140 [ 51.428233][ T2082] ? do_sys_openat2+0x1fc/0x710 [ 51.432920][ T2082] ? __x64_sys_openat+0x243/0x290 [ 51.437781][ T2082] ? do_syscall_64+0x34/0x70 [ 51.442207][ T2082] ? _kstrtoull+0x3a0/0x4a0 [ 51.446650][ T2082] ? kstrtouint_from_user+0x20a/0x2a0 [ 51.451860][ T2082] ? kstrtol_from_user+0x310/0x310 [ 51.456806][ T2082] ? memset+0x35/0x40 [ 51.460714][ T2082] ? __fsnotify_parent+0x4b9/0x6c0 [ 51.465666][ T2082] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 51.472256][ T2082] ? proc_fail_nth_write+0x20b/0x290 [ 51.477375][ T2082] ? proc_fail_nth_read+0x210/0x210 [ 51.482412][ T2082] ? security_file_permission+0x86/0xb0 [ 51.487788][ T2082] ? rw_verify_area+0x1c3/0x360 [ 51.492486][ T2082] ? preempt_count_add+0x92/0x1a0 [ 51.497353][ T2082] ? vfs_write+0x852/0xe70 [ 51.501591][ T2082] ? putname+0xe7/0x140 [ 51.505584][ T2082] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 51.511229][ T2082] ? kmem_cache_free+0x1c0/0x1e0 [ 51.515998][ T2082] ? kernel_write+0x3d0/0x3d0 [ 51.520511][ T2082] ? __kasan_check_write+0x14/0x20 [ 51.525480][ T2082] ? mutex_lock+0xa5/0x110 [ 51.529715][ T2082] ? mutex_trylock+0xa0/0xa0 [ 51.534140][ T2082] ? __kasan_check_write+0x14/0x20 [ 51.539091][ T2082] ? fput_many+0x160/0x1b0 [ 51.543357][ T2082] ? debug_smp_processor_id+0x17/0x20 [ 51.548550][ T2082] __x64_sys_bpf+0x7b/0x90 [ 51.552800][ T2082] do_syscall_64+0x34/0x70 [ 51.557053][ T2082] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 51.562777][ T2082] RIP: 0033:0x7eff94f693b9 [ 51.567033][ T2082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.586480][ T2082] RSP: 002b:00007eff93be9048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 51.594717][ T2082] RAX: ffffffffffffffda RBX: 00007eff950f7f80 RCX: 00007eff94f693b9 [ 51.602528][ T2082] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 51.610352][ T2082] RBP: 00007eff93be90a0 R08: 0000000000000000 R09: 0000000000000000 [ 51.618150][ T2082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 51.625968][ T2082] R13: 000000000000000b R14: 00007eff950f7f80 R15: 00007ffcea39c928 [ 52.003784][ T2126] FAULT_INJECTION: forcing a failure. [ 52.003784][ T2126] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 52.019033][ T2126] CPU: 1 PID: 2126 Comm: syz.3.471 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 52.030016][ T2126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 52.039909][ T2126] Call Trace: [ 52.043051][ T2126] dump_stack_lvl+0x1e2/0x24b [ 52.047559][ T2126] ? bfq_pos_tree_add_move+0x43b/0x43b [ 52.052846][ T2126] ? stack_trace_save+0x113/0x1c0 [ 52.057707][ T2126] ? stack_trace_snprint+0xf0/0xf0 [ 52.062653][ T2126] dump_stack+0x15/0x17 [ 52.066643][ T2126] should_fail+0x3c6/0x510 [ 52.070901][ T2126] should_fail_alloc_page+0x52/0x60 [ 52.075932][ T2126] __alloc_pages_nodemask+0x1b3/0xaf0 [ 52.081141][ T2126] ? __get_vm_area_node+0x156/0x470 [ 52.086173][ T2126] ? __vmalloc_node_range+0xdc/0x7c0 [ 52.091295][ T2126] ? __alloc_percpu_gfp+0x27/0x30 [ 52.096153][ T2126] ? do_syscall_64+0x34/0x70 [ 52.100582][ T2126] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 52.105965][ T2126] __get_free_pages+0xe/0x30 [ 52.110393][ T2126] kasan_populate_vmalloc_pte+0x39/0x130 [ 52.115858][ T2126] ? __apply_to_page_range+0x710/0x9e0 [ 52.121151][ T2126] __apply_to_page_range+0x720/0x9e0 [ 52.126271][ T2126] ? kasan_populate_vmalloc+0x70/0x70 [ 52.131484][ T2126] ? kasan_populate_vmalloc+0x70/0x70 [ 52.136686][ T2126] apply_to_page_range+0x3b/0x50 [ 52.141464][ T2126] kasan_populate_vmalloc+0x65/0x70 [ 52.146504][ T2126] alloc_vmap_area+0x1944/0x1a90 [ 52.151272][ T2126] ? vm_map_ram+0x9d0/0x9d0 [ 52.155608][ T2126] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 52.160995][ T2126] ? __get_vm_area_node+0x116/0x470 [ 52.166023][ T2126] __get_vm_area_node+0x156/0x470 [ 52.170885][ T2126] __vmalloc_node_range+0xdc/0x7c0 [ 52.175830][ T2126] ? pcpu_create_chunk+0x146/0xb80 [ 52.180779][ T2126] ? pcpu_create_chunk+0x146/0xb80 [ 52.185723][ T2126] __vmalloc+0x7a/0x90 [ 52.189634][ T2126] ? pcpu_create_chunk+0x146/0xb80 [ 52.194576][ T2126] pcpu_create_chunk+0x146/0xb80 [ 52.199356][ T2126] ? cpumask_next+0x11/0x30 [ 52.203691][ T2126] pcpu_alloc+0x802/0x1420 [ 52.207947][ T2126] __alloc_percpu_gfp+0x27/0x30 [ 52.212637][ T2126] array_map_alloc+0x486/0x7c0 [ 52.217233][ T2126] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 52.222697][ T2126] ? selinux_bpf+0xcb/0x100 [ 52.227037][ T2126] ? array_map_alloc_check+0x27b/0x350 [ 52.232335][ T2126] __se_sys_bpf+0x620f/0x11cb0 [ 52.236933][ T2126] ? stack_trace_save+0x113/0x1c0 [ 52.241792][ T2126] ? terminate_walk+0x407/0x4f0 [ 52.246483][ T2126] ? stack_trace_snprint+0xf0/0xf0 [ 52.251433][ T2126] ? kmem_cache_free+0xa9/0x1e0 [ 52.256124][ T2126] ? kmem_cache_free+0xa9/0x1e0 [ 52.260800][ T2126] ? kasan_set_track+0x5d/0x70 [ 52.265402][ T2126] ? __x64_sys_bpf+0x90/0x90 [ 52.269828][ T2126] ? __kasan_slab_free+0x11/0x20 [ 52.274610][ T2126] ? slab_free_freelist_hook+0xc0/0x190 [ 52.279981][ T2126] ? kmem_cache_free+0xa9/0x1e0 [ 52.284667][ T2126] ? putname+0xe7/0x140 [ 52.288699][ T2126] ? do_sys_openat2+0x1fc/0x710 [ 52.293347][ T2126] ? __x64_sys_openat+0x243/0x290 [ 52.298207][ T2126] ? do_syscall_64+0x34/0x70 [ 52.302635][ T2126] ? _kstrtoull+0x3a0/0x4a0 [ 52.306989][ T2126] ? kstrtouint_from_user+0x20a/0x2a0 [ 52.312184][ T2126] ? kstrtol_from_user+0x310/0x310 [ 52.317131][ T2126] ? memset+0x35/0x40 [ 52.320952][ T2126] ? __fsnotify_parent+0x4b9/0x6c0 [ 52.325899][ T2126] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 52.332498][ T2126] ? proc_fail_nth_write+0x20b/0x290 [ 52.337616][ T2126] ? proc_fail_nth_read+0x210/0x210 [ 52.342648][ T2126] ? security_file_permission+0x86/0xb0 [ 52.348029][ T2126] ? rw_verify_area+0x1c3/0x360 [ 52.352716][ T2126] ? preempt_count_add+0x92/0x1a0 [ 52.357574][ T2126] ? vfs_write+0x852/0xe70 [ 52.361827][ T2126] ? kmem_cache_free+0xa9/0x1e0 [ 52.366517][ T2126] ? kernel_write+0x3d0/0x3d0 [ 52.371030][ T2126] ? __kasan_check_write+0x14/0x20 [ 52.375973][ T2126] ? mutex_lock+0xa5/0x110 [ 52.380227][ T2126] ? mutex_trylock+0xa0/0xa0 [ 52.384655][ T2126] ? __kasan_check_write+0x14/0x20 [ 52.389609][ T2126] ? fput_many+0x160/0x1b0 [ 52.393861][ T2126] ? debug_smp_processor_id+0x17/0x20 [ 52.399070][ T2126] __x64_sys_bpf+0x7b/0x90 [ 52.403314][ T2126] do_syscall_64+0x34/0x70 [ 52.407568][ T2126] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 52.413295][ T2126] RIP: 0033:0x7f137caaa3b9 [ 52.417550][ T2126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.437170][ T2126] RSP: 002b:00007f137b72a048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 52.445413][ T2126] RAX: ffffffffffffffda RBX: 00007f137cc38f80 RCX: 00007f137caaa3b9 [ 52.453224][ T2126] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 52.461034][ T2126] RBP: 00007f137b72a0a0 R08: 0000000000000000 R09: 0000000000000000 [ 52.468850][ T2126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 52.476659][ T2126] R13: 000000000000000b R14: 00007f137cc38f80 R15: 00007fff619945e8 [ 52.562362][ T2106] device syzkaller0 entered promiscuous mode [ 52.588513][ T2124] device syzkaller0 entered promiscuous mode [ 53.971116][ T2184] syz.2.487 uses obsolete (PF_INET,SOCK_PACKET) [ 54.142067][ T2192] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.149080][ T2192] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.333463][ T2192] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.340852][ T2192] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.349344][ T2192] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.356362][ T2192] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.388788][ T2192] device bridge0 entered promiscuous mode [ 54.934803][ T24] audit: type=1400 audit(1722405036.190:145): avc: denied { ioctl } for pid=2228 comm="syz.2.501" path="socket:[18273]" dev="sockfs" ino=18273 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 55.112715][ T2237] syz.1.503[2237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.112762][ T2237] syz.1.503[2237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.228054][ T2265] device pim6reg1 entered promiscuous mode [ 56.540835][ T2282] device pim6reg1 entered promiscuous mode [ 58.126096][ T2356] device syzkaller0 entered promiscuous mode [ 58.126218][ T24] audit: type=1400 audit(1722405039.380:146): avc: denied { ioctl } for pid=2351 comm="syz.2.533" path="pid:[4026532395]" dev="nsfs" ino=4026532395 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 58.159459][ T2350] device sit0 entered promiscuous mode [ 58.531718][ T2367] device pim6reg1 entered promiscuous mode [ 59.396209][ T24] audit: type=1400 audit(1722405040.650:147): avc: denied { create } for pid=2457 comm="syz.3.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 59.458639][ T24] audit: type=1400 audit(1722405040.670:148): avc: denied { create } for pid=2457 comm="syz.3.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 60.483628][ T2483] syz.3.572[2483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.487929][ T2483] syz.3.572[2483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.027519][ T2559] ªªªªªª: renamed from vlan0 [ 62.044651][ T2557] device pim6reg1 entered promiscuous mode [ 63.892759][ T2643] device syzkaller0 entered promiscuous mode [ 65.376580][ T2747] device syzkaller0 entered promiscuous mode [ 65.727498][ T24] audit: type=1400 audit(1722405046.970:149): avc: denied { create } for pid=2775 comm="syz.4.654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 66.140789][ T2811] bridge_slave_0: mtu greater than device maximum [ 66.405804][ T2818] device syzkaller0 entered promiscuous mode [ 66.472555][ T2823] syz.3.667 (2823) used obsolete PPPIOCDETACH ioctl [ 67.107393][ T2860] device syzkaller0 entered promiscuous mode [ 68.140361][ T2956] device pim6reg1 entered promiscuous mode [ 69.733591][ T3039] bridge0: port 3(veth0_to_batadv) entered blocking state [ 69.741028][ T3039] bridge0: port 3(veth0_to_batadv) entered disabled state [ 69.798601][ T3039] device veth0_to_batadv entered promiscuous mode [ 69.806420][ T3039] bridge0: port 3(veth0_to_batadv) entered blocking state [ 69.813647][ T3039] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 69.889733][ T3057] device pim6reg1 entered promiscuous mode [ 70.320428][ T3067] device pim6reg1 entered promiscuous mode [ 70.773842][ T3099] bridge0: port 3(veth0_to_batadv) entered blocking state [ 70.793359][ T3099] bridge0: port 3(veth0_to_batadv) entered disabled state [ 70.829149][ T3099] device veth0_to_batadv entered promiscuous mode [ 70.838363][ T3099] bridge0: port 3(veth0_to_batadv) entered blocking state [ 70.845703][ T3099] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 70.918814][ T3115] device veth0_to_batadv left promiscuous mode [ 70.924982][ T3115] bridge0: port 3(veth0_to_batadv) entered disabled state [ 70.954248][ T3112] device pim6reg1 entered promiscuous mode [ 71.054634][ T3124] device syzkaller0 entered promiscuous mode [ 73.279162][ T3189] device macsec0 left promiscuous mode [ 73.426365][ T24] audit: type=1400 audit(1722405054.680:150): avc: denied { create } for pid=3193 comm="syz.1.768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 74.983522][ T3233] cgroup: fork rejected by pids controller in /syz4 [ 76.694669][ T3357] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.723670][ T3357] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.748959][ T3357] device bridge_slave_0 entered promiscuous mode [ 76.837807][ T3357] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.844653][ T3357] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.894949][ T3357] device bridge_slave_1 entered promiscuous mode [ 77.076377][ T24] audit: type=1400 audit(1722405058.330:151): avc: denied { create } for pid=3357 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.237748][ T110] device bridge_slave_1 left promiscuous mode [ 77.243709][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.301309][ T24] audit: type=1400 audit(1722405058.410:152): avc: denied { write } for pid=3357 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.335810][ T110] device bridge_slave_0 left promiscuous mode [ 77.358280][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.496606][ T24] audit: type=1400 audit(1722405058.410:153): avc: denied { read } for pid=3357 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.185343][ T3357] device veth0_vlan entered promiscuous mode [ 78.206834][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.232923][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.240801][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 78.249668][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.265147][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.272108][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.279810][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 78.293792][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 78.309398][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.316252][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.330586][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 78.338851][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 78.348292][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 78.356167][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 78.364190][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 78.372452][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 78.392299][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 78.400351][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 78.409776][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.417223][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 78.424609][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 78.443439][ T3357] device veth1_macvtap entered promiscuous mode [ 78.505873][ T3422] device veth1_macvtap left promiscuous mode [ 78.533581][ T684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 78.545950][ T684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 78.553991][ T684] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 78.609458][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 78.644214][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 78.726969][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 78.811245][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 78.907775][ T24] audit: type=1400 audit(1722405060.150:154): avc: denied { mounton } for pid=3357 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 79.209270][ T24] audit: type=1400 audit(1722405060.470:155): avc: denied { create } for pid=3474 comm="syz.2.807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 80.018772][ T3522] device pim6reg1 entered promiscuous mode [ 80.037399][ T3532] device pim6reg1 entered promiscuous mode [ 81.152682][ T3641] device sit0 left promiscuous mode [ 81.883232][ T3694] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.890241][ T3694] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.966409][ T3698] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.973417][ T3698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 81.983439][ T3698] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.990689][ T3698] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.055901][ T3698] device bridge0 entered promiscuous mode [ 82.259919][ T3699] bridge0: port 3(veth0_to_batadv) entered blocking state [ 82.319258][ T3699] bridge0: port 3(veth0_to_batadv) entered disabled state [ 82.409743][ T3699] device veth0_to_batadv entered promiscuous mode [ 82.426545][ T3699] bridge0: port 3(veth0_to_batadv) entered blocking state [ 82.433783][ T3699] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 82.468199][ T3727] device pim6reg1 entered promiscuous mode [ 82.901353][ T3752] device syzkaller0 entered promiscuous mode [ 83.448932][ T3793] device pim6reg1 entered promiscuous mode [ 83.599741][ T3813] device veth0_vlan left promiscuous mode [ 83.614224][ T3813] device veth0_vlan entered promiscuous mode [ 83.668607][ T3346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.712955][ T3346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.768017][ T3346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 83.810948][ T3833] device veth0_vlan left promiscuous mode [ 83.841974][ T3833] device veth0_vlan entered promiscuous mode [ 84.734661][ T3867] syz.1.909[3867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.734709][ T3867] syz.1.909[3867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.206265][ T3936] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 85.511367][ T24] audit: type=1400 audit(1722405066.770:156): avc: denied { remove_name } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 85.647200][ T24] audit: type=1400 audit(1722405066.770:157): avc: denied { rename } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 85.921103][ T3974] bridge0: port 3(veth0_to_batadv) entered disabled state [ 85.928137][ T3974] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.935002][ T3974] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.958239][ T3974] device bridge0 left promiscuous mode [ 85.970519][ T3974] bridge0: port 3(veth0_to_batadv) entered blocking state [ 85.977465][ T3974] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 85.984639][ T3974] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.991425][ T3974] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.998511][ T3974] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.005298][ T3974] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.032844][ T3974] device bridge0 entered promiscuous mode [ 86.508747][ T4018] device macsec0 entered promiscuous mode [ 86.666479][ T4035] device veth0_vlan left promiscuous mode [ 86.673232][ T4035] device veth0_vlan entered promiscuous mode [ 87.183424][ T24] audit: type=1400 audit(1722405068.440:158): avc: denied { create } for pid=4080 comm="syz.0.961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 90.227274][ T4246] device macsec0 entered promiscuous mode [ 90.553041][ T4238] device syzkaller0 entered promiscuous mode [ 90.702455][ T4266] device macsec0 left promiscuous mode [ 92.203721][ T4316] device syzkaller0 entered promiscuous mode [ 92.487187][ T4331] bridge0: port 3(gretap0) entered blocking state [ 92.493454][ T4331] bridge0: port 3(gretap0) entered forwarding state [ 92.499968][ T4331] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.506719][ T4331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.513802][ T4331] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.520696][ T4331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.528275][ T4331] device bridge0 entered promiscuous mode [ 93.507640][ T3343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 93.704106][ T4406] device sit0 entered promiscuous mode [ 94.596060][ T24] audit: type=1400 audit(1722405075.850:159): avc: denied { create } for pid=4465 comm="syz.3.1073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 94.957987][ T4497] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.964904][ T4497] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.149141][ T4497] device bridge0 left promiscuous mode [ 95.202026][ T4503] device bridge_slave_1 left promiscuous mode [ 95.237797][ T4503] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.264786][ T4503] device bridge_slave_0 left promiscuous mode [ 95.281040][ T4503] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.434881][ T4519] device syzkaller0 entered promiscuous mode [ 96.724533][ T4613] device syzkaller0 entered promiscuous mode [ 97.053503][ T4625] device pim6reg1 entered promiscuous mode [ 100.560029][ T4770] bridge0: port 3(veth0_to_batadv) entered disabled state [ 100.567235][ T4770] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.574315][ T4770] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.777879][ T4770] device bridge0 left promiscuous mode [ 101.243573][ T4789] device syzkaller0 entered promiscuous mode [ 101.280339][ T4797] bridge_slave_0: mtu greater than device maximum [ 101.988636][ T4820] device veth1_macvtap left promiscuous mode [ 101.994495][ T4820] device macsec0 entered promiscuous mode [ 102.566010][ T24] audit: type=1400 audit(1722405083.820:160): avc: denied { create } for pid=4862 comm="syz.2.1187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 102.984003][ T4869] device syzkaller0 entered promiscuous mode [ 103.411645][ T4886] device veth0_to_batadv left promiscuous mode [ 103.479043][ T4886] bridge0: port 3(veth0_to_batadv) entered disabled state [ 103.541067][ T4886] device bridge_slave_1 left promiscuous mode [ 103.617665][ T4886] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.625842][ T4886] device bridge_slave_0 left promiscuous mode [ 103.635105][ T4886] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.307844][ T4927] device syzkaller0 entered promiscuous mode [ 104.526101][ T4945] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 104.597886][ T4945] bridge0: port 3(veth0_to_batadv) entered disabled state [ 104.604872][ T4945] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.611744][ T4945] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.623209][ T4961] syz.3.1215[4961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.623252][ T4961] syz.3.1215[4961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.673529][ T4945] device bridge0 left promiscuous mode [ 104.786656][ T4970] device pim6reg1 entered promiscuous mode [ 105.062493][ T4976] device pim6reg1 entered promiscuous mode [ 106.089249][ T5062] device pim6reg1 entered promiscuous mode [ 106.095869][ T5062] device pim6reg1 left promiscuous mode [ 106.456418][ T5105] device veth1_macvtap left promiscuous mode [ 106.463764][ T5105] device veth1_macvtap entered promiscuous mode [ 106.469974][ T5105] device macsec0 entered promiscuous mode [ 106.506899][ T5111] device wg2 left promiscuous mode [ 106.568604][ T5122] device veth0_vlan left promiscuous mode [ 106.575240][ T5122] device veth0_vlan entered promiscuous mode [ 106.737532][ T5131] device syzkaller0 entered promiscuous mode [ 106.806850][ T5134] device pim6reg1 entered promiscuous mode [ 107.074474][ T5149] device macsec0 entered promiscuous mode [ 107.093711][ T5149] device veth1_macvtap entered promiscuous mode [ 107.111055][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 108.841897][ T5244] device wg2 entered promiscuous mode [ 109.701679][ T5287] bridge0: port 3(gretap0) entered disabled state [ 109.707976][ T5287] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.714826][ T5287] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.722811][ T5287] device bridge0 left promiscuous mode [ 110.325788][ T5332] device sit0 entered promiscuous mode [ 110.452535][ T5319] syz.0.1313[5319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.484427][ T5319] syz.0.1313[5319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.727122][ T5348] device syzkaller0 entered promiscuous mode [ 111.957274][ T5414] device veth1_macvtap left promiscuous mode [ 111.963454][ T5414] device macsec0 left promiscuous mode [ 111.971757][ T5416] device pim6reg1 entered promiscuous mode [ 112.099675][ T5431] device pim6reg1 entered promiscuous mode [ 112.208060][ T5443] syz.4.1350[5443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.208106][ T5443] syz.4.1350[5443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.222208][ T5441] ªªªªª@: renamed from pim6reg1 [ 112.242377][ T24] audit: type=1400 audit(1722405093.500:161): avc: denied { create } for pid=5442 comm="syz.4.1350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 112.409339][ T5464] syz.4.1356[5464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.410384][ T5464] syz.4.1356[5464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.628321][ T5505] ªªªªª@: renamed from pim6reg1 [ 113.096697][ T5544] syz.3.1380[5544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.096765][ T5544] syz.3.1380[5544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.357671][ T5552] ªªªªª@: renamed from pim6reg1 [ 113.971825][ T5611] ªªªªª@: renamed from pim6reg1 [ 115.659984][ T5738] syz.2.1433[5738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.660032][ T5738] syz.2.1433[5738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.931586][ T5809] device wg2 entered promiscuous mode [ 121.777315][ T5900] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.784282][ T5900] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.839885][ T5900] device bridge0 left promiscuous mode [ 122.100361][ T5906] device pim6reg1 entered promiscuous mode [ 122.576271][ T5924] : renamed from ipvlan1 [ 122.630829][ T24] audit: type=1400 audit(1722405103.890:162): avc: denied { append } for pid=5932 comm="syz.0.1490" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 122.673807][ T5931] device veth1_macvtap left promiscuous mode [ 123.809432][ T6021] device pim6reg1 entered promiscuous mode [ 124.180098][ T6035] bridge0: port 3(veth0_to_batadv) entered blocking state [ 124.187047][ T6035] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 124.194258][ T6035] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.201031][ T6035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 124.208105][ T6035] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.214898][ T6035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 124.490422][ T6035] device bridge0 entered promiscuous mode [ 124.552210][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 125.432760][ T6069] device pim6reg1 entered promiscuous mode [ 126.272447][ T6093] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 126.280306][ T6093] device syzkaller0 entered promiscuous mode [ 126.351965][ T6107] device pim6reg1 entered promiscuous mode [ 126.449438][ T24] audit: type=1400 audit(1722405107.700:163): avc: denied { create } for pid=6125 comm="syz.4.1537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 127.213269][ T6152] device sit0 left promiscuous mode [ 127.348626][ T6163] device pim6reg1 entered promiscuous mode [ 127.991233][ T24] audit: type=1400 audit(1722405109.250:164): avc: denied { create } for pid=6215 comm="syz.1.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 128.372742][ T6260] device pim6reg1 entered promiscuous mode [ 128.475251][ T6264] device syzkaller0 entered promiscuous mode [ 128.560261][ T6274] device pim6reg1 entered promiscuous mode [ 129.012316][ T24] audit: type=1400 audit(1722405110.270:165): avc: denied { append } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 129.176342][ T24] audit: type=1400 audit(1722405110.270:166): avc: denied { open } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 129.201285][ T24] audit: type=1400 audit(1722405110.270:167): avc: denied { getattr } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 129.368171][ T6329] device pim6reg1 entered promiscuous mode [ 129.584167][ T6343] device sit0 left promiscuous mode [ 129.592529][ T6344] device sit0 entered promiscuous mode [ 130.021569][ T6385] syz.1.1605[6385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.446598][ T6408] device syzkaller0 entered promiscuous mode [ 130.591949][ T6410] device pim6reg1 entered promiscuous mode [ 131.019607][ T6425] device syzkaller0 entered promiscuous mode [ 131.451839][ T6452] device syzkaller0 entered promiscuous mode [ 132.790065][ T6513] device pim6reg1 entered promiscuous mode [ 133.355785][ T6549] device syzkaller0 entered promiscuous mode [ 133.838926][ T6572] device pim6reg1 entered promiscuous mode [ 134.085064][ T6585] ªªªªªª: renamed from vlan0 [ 134.967323][ T6602] device syzkaller0 entered promiscuous mode [ 135.231584][ T6617] device pim6reg1 entered promiscuous mode [ 136.339841][ T6674] device wg2 entered promiscuous mode [ 136.684355][ T6696] device veth0_vlan left promiscuous mode [ 136.729135][ T6696] device veth0_vlan entered promiscuous mode [ 136.872063][ T671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 136.880486][ T671] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 136.888183][ T671] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 136.898149][ T6702] ªªªªªª: renamed from vlan0 [ 137.232416][ T6722] device veth0_vlan left promiscuous mode [ 137.313323][ T6722] device veth0_vlan entered promiscuous mode [ 137.470350][ T24] audit: type=1400 audit(1722405118.730:168): avc: denied { create } for pid=6766 comm="syz.1.1710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 137.581247][ T6771] device veth0_vlan left promiscuous mode [ 137.602967][ T6771] device veth0_vlan entered promiscuous mode [ 137.749176][ T3345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 137.759974][ T3345] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 137.767502][ T3345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 137.809941][ T6780] device syzkaller0 entered promiscuous mode [ 138.334367][ T6817] device sit0 entered promiscuous mode [ 138.616710][ T6825] device macsec0 entered promiscuous mode [ 138.884523][ T6844] device pim6reg1 entered promiscuous mode [ 139.323061][ T6920] device syzkaller0 entered promiscuous mode [ 139.389175][ T6927] device syzkaller0 entered promiscuous mode [ 140.645010][ T6985] device syzkaller0 entered promiscuous mode [ 140.981366][ T24] audit: type=1400 audit(1722405122.240:169): avc: denied { create } for pid=7028 comm="syz.3.1783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 141.002222][ T7025] device pim6reg1 entered promiscuous mode [ 141.086347][ T7018] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.176828][ T7018] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.198330][ T7018] device bridge_slave_0 entered promiscuous mode [ 141.236016][ T7018] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.269318][ T7055] syz.0.1789[7055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.269367][ T7055] syz.0.1789[7055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.280758][ T7018] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.316938][ T7018] device bridge_slave_1 entered promiscuous mode [ 141.376090][ T7055] syz.0.1789[7055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.376139][ T7055] syz.0.1789[7055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.678268][ T9] device bridge_slave_1 left promiscuous mode [ 141.741544][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.805514][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.907159][ T7090] device veth0_to_team entered promiscuous mode [ 142.038437][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 142.046487][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 142.054741][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 142.062128][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 142.070438][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 142.078722][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 142.086716][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.093563][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.103296][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 142.111496][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 142.119720][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.126571][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.213826][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 142.233545][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 142.242852][ T7018] device veth0_vlan entered promiscuous mode [ 142.253581][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 142.261484][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 142.269846][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 142.277097][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 142.331223][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 142.339146][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 142.375421][ T7104] device syzkaller0 entered promiscuous mode [ 142.413411][ T7018] device veth1_macvtap entered promiscuous mode [ 142.442686][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 142.452952][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 142.464277][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 142.484165][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 142.567864][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 142.865995][ T7135] device syzkaller0 entered promiscuous mode [ 143.057230][ T7139] device bridge0 entered promiscuous mode [ 146.037487][ T7337] device sit0 entered promiscuous mode [ 146.313331][ T7358] device pim6reg1 entered promiscuous mode [ 146.409153][ T7363] syz.1.1873[7363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.409200][ T7363] syz.1.1873[7363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.048767][ T7400] device wg2 left promiscuous mode [ 147.918542][ T7434] device syzkaller0 entered promiscuous mode [ 148.212916][ T7437] device syzkaller0 entered promiscuous mode [ 148.567287][ T7472] device syzkaller0 entered promiscuous mode [ 148.780846][ T7502] device pim6reg1 entered promiscuous mode [ 149.066292][ T7528] device syzkaller0 entered promiscuous mode [ 150.293302][ T7609] tap0: tun_chr_ioctl cmd 1074025677 [ 150.324452][ T7609] tap0: linktype set to 804 [ 150.383378][ T7609] tap0: tun_chr_ioctl cmd 1074025694 [ 150.453059][ T7619] device sit0 left promiscuous mode [ 150.568488][ T7631] syz.1.1949[7631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.568537][ T7631] syz.1.1949[7631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.987506][ T7650] : renamed from ipvlan1 [ 151.789290][ T7699] device macsec0 left promiscuous mode [ 151.798356][ T7699] device veth1_macvtap entered promiscuous mode [ 151.804469][ T7699] device macsec0 entered promiscuous mode [ 151.812359][ T586] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 152.349182][ T7741] syz.0.1977[7741] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.349238][ T7741] syz.0.1977[7741] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.446635][ T7739] syz.0.1977[7739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.858253][ T7764] device macsec0 entered promiscuous mode [ 153.678181][ T7809] device syzkaller0 entered promiscuous mode [ 154.002356][ T7844] ªªªªªª: renamed from vlan0 [ 154.091742][ T7854] device syzkaller0 entered promiscuous mode [ 154.119227][ T7858] device pim6reg1 entered promiscuous mode [ 155.384045][ T7933] device veth0_vlan left promiscuous mode [ 155.390875][ T7933] device veth0_vlan entered promiscuous mode [ 155.435750][ T590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.445127][ T590] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 155.458124][ T590] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.476019][ T7935] device veth0_vlan left promiscuous mode [ 155.489555][ T7935] device veth0_vlan entered promiscuous mode [ 155.524913][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.534203][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.541712][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.906894][ T7983] syz.2.2046[7983] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.906930][ T7983] syz.2.2046[7983] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.059427][ T7994] device pim6reg1 entered promiscuous mode [ 156.406619][ T8025] device veth1_macvtap left promiscuous mode [ 156.413455][ T8025] device macsec0 entered promiscuous mode [ 156.631097][ T8043] device macsec0 left promiscuous mode [ 156.699356][ T8039] device syzkaller0 entered promiscuous mode [ 156.786762][ T8047] device veth1_macvtap entered promiscuous mode [ 156.857388][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 158.293040][ T8179] device syzkaller0 entered promiscuous mode [ 158.943406][ T8206] syz.0.2109[8206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.944551][ T8206] syz.0.2109[8206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.990058][ T8207] syz.0.2109[8207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.117734][ T8207] syz.0.2109[8207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.311947][ T93] udevd[93]: worker [312] terminated by signal 33 (Unknown signal 33) [ 159.433694][ T93] udevd[93]: worker [312] failed while handling '/devices/virtual/block/loop4' [ 159.607084][ T93] udevd[93]: worker [732] terminated by signal 33 (Unknown signal 33) [ 159.693231][ T93] udevd[93]: worker [732] failed while handling '/devices/virtual/block/loop0' [ 159.770002][ T93] udevd[93]: worker [8229] terminated by signal 33 (Unknown signal 33) [ 159.829541][ T93] udevd[93]: worker [8229] failed while handling '/devices/virtual/block/loop3' [ 159.982540][ T8248] device syzkaller0 entered promiscuous mode [ 161.062512][ T8309] device veth1_macvtap left promiscuous mode [ 161.286428][ T8315] device veth1_macvtap entered promiscuous mode [ 162.071969][ T8368] device sit0 left promiscuous mode [ 162.111728][ T8373] device sit0 entered promiscuous mode [ 162.631736][ T8397] syz.4.2157[8397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.631812][ T8397] syz.4.2157[8397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.877787][ T8402] device syzkaller0 entered promiscuous mode [ 163.548705][ T8448] device pim6reg1 entered promiscuous mode [ 163.710100][ T8483] device macsec0 left promiscuous mode [ 164.134003][ T8506] lo: mtu less than device minimum [ 164.894289][ T8558] device vlan1 entered promiscuous mode [ 166.629573][ T8671] device vxcan1 entered promiscuous mode [ 167.183911][ T93] udevd[93]: worker [8242] terminated by signal 33 (Unknown signal 33) [ 167.203329][ T93] udevd[93]: worker [8242] failed while handling '/devices/virtual/block/loop3' [ 169.512853][ T8808] device veth1_macvtap left promiscuous mode [ 169.524152][ T8808] device macsec0 left promiscuous mode [ 170.822832][ T8882] device pim6reg1 entered promiscuous mode [ 171.010794][ T8904] device syzkaller0 entered promiscuous mode [ 171.073938][ T8907] device pim6reg1 entered promiscuous mode [ 171.149019][ T8924] syz.4.2303[8924] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.149074][ T8924] syz.4.2303[8924] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.442544][ T8943] syz.2.2306[8943] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.511846][ T8943] syz.2.2306[8943] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.190187][ T8974] device syzkaller0 entered promiscuous mode [ 172.208829][ T8972] : renamed from ipvlan1 [ 172.994076][ T9075] bridge0: port 3(veth0_to_batadv) entered disabled state [ 173.001125][ T9075] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.007952][ T9075] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.015392][ T9075] device bridge0 left promiscuous mode [ 173.548471][ T9096] cgroup: fork rejected by pids controller in /syz0 [ 173.561231][ T9183] device veth1_macvtap entered promiscuous mode [ 173.618224][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 173.746952][ T9191] Â: renamed from pim6reg1 [ 174.346543][ T9209] device veth0_to_team entered promiscuous mode [ 174.433393][ T9225] syz.2.2380[9225] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.433442][ T9225] syz.2.2380[9225] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.688922][ T9277] syz.0.2397[9277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.727717][ T9277] syz.0.2397[9277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.907722][ T9340] device veth1_macvtap left promiscuous mode [ 177.000866][ T9351] device pim6reg1 entered promiscuous mode [ 177.316516][ T9379] tap0: tun_chr_ioctl cmd 1074025677 [ 177.382594][ T9379] tap0: linktype set to 774 [ 177.423044][ T9385] tap0: tun_chr_ioctl cmd 1074812117 [ 178.890079][ T9462] device syzkaller0 entered promiscuous mode [ 179.383005][ T9490] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.390105][ T9490] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.397395][ T9490] device bridge_slave_0 entered promiscuous mode [ 179.404631][ T9490] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.411647][ T9490] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.418949][ T9490] device bridge_slave_1 entered promiscuous mode [ 179.547722][ T9490] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.554699][ T9490] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.561801][ T9490] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.568596][ T9490] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.812157][ T589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 179.867969][ T589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.888989][ T589] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.927395][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.935845][ T583] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.942846][ T583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.950966][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.959044][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.094509][ T589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 180.125700][ T9545] device vxcan1 entered promiscuous mode [ 180.179005][ T9490] device veth0_vlan entered promiscuous mode [ 180.267712][ T589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 180.275382][ T589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 180.367456][ T9490] device veth1_macvtap entered promiscuous mode [ 180.476260][ T589] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 180.495385][ T589] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 180.502759][ T589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 180.517784][ T589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 180.525625][ T589] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 180.658504][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 180.681794][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 180.733619][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 180.772114][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 180.854395][ T9575] device veth0_vlan left promiscuous mode [ 180.868517][ T9575] device veth0_vlan entered promiscuous mode [ 180.896527][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 180.918202][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 180.925479][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 181.147787][ T9590] device veth0_vlan left promiscuous mode [ 181.175497][ T9590] device veth0_vlan entered promiscuous mode [ 181.198378][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.206415][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 181.214067][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 181.502689][ T9647] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.511909][ T9647] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.683930][ T9664] FAULT_INJECTION: forcing a failure. [ 181.683930][ T9664] name failslab, interval 1, probability 0, space 0, times 0 [ 181.762454][ T9] device veth0_vlan left promiscuous mode [ 181.797619][ T9664] CPU: 1 PID: 9664 Comm: syz.4.2501 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 181.808724][ T9664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 181.818603][ T9664] Call Trace: [ 181.821742][ T9664] dump_stack_lvl+0x1e2/0x24b [ 181.826238][ T9664] ? bfq_pos_tree_add_move+0x43b/0x43b [ 181.831536][ T9664] ? selinux_capable+0x2f1/0x430 [ 181.836305][ T9664] dump_stack+0x15/0x17 [ 181.840296][ T9664] should_fail+0x3c6/0x510 [ 181.844557][ T9664] ? btf_new_fd+0x112/0x9c0 [ 181.848895][ T9664] __should_failslab+0xa4/0xe0 [ 181.853491][ T9664] should_failslab+0x9/0x20 [ 181.857831][ T9664] kmem_cache_alloc_trace+0x3a/0x2e0 [ 181.862954][ T9664] btf_new_fd+0x112/0x9c0 [ 181.867118][ T9664] __se_sys_bpf+0x1aed/0x11cb0 [ 181.871720][ T9664] ? stack_trace_save+0x113/0x1c0 [ 181.876578][ T9664] ? terminate_walk+0x407/0x4f0 [ 181.881266][ T9664] ? stack_trace_snprint+0xf0/0xf0 [ 181.886213][ T9664] ? kmem_cache_free+0xa9/0x1e0 [ 181.890901][ T9664] ? kmem_cache_free+0xa9/0x1e0 [ 181.895586][ T9664] ? kasan_set_track+0x5d/0x70 [ 181.900187][ T9664] ? __x64_sys_bpf+0x90/0x90 [ 181.904612][ T9664] ? __kasan_slab_free+0x11/0x20 [ 181.909391][ T9664] ? slab_free_freelist_hook+0xc0/0x190 [ 181.914768][ T9664] ? kmem_cache_free+0xa9/0x1e0 [ 181.919460][ T9664] ? putname+0xe7/0x140 [ 181.923455][ T9664] ? do_sys_openat2+0x1fc/0x710 [ 181.928133][ T9664] ? __x64_sys_openat+0x243/0x290 [ 181.932993][ T9664] ? do_syscall_64+0x34/0x70 [ 181.937424][ T9664] ? _kstrtoull+0x3a0/0x4a0 [ 181.941762][ T9664] ? kstrtouint_from_user+0x20a/0x2a0 [ 181.946970][ T9664] ? kstrtol_from_user+0x310/0x310 [ 181.951918][ T9664] ? memset+0x35/0x40 [ 181.955739][ T9664] ? __fsnotify_parent+0x4b9/0x6c0 [ 181.960684][ T9664] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 181.967278][ T9664] ? proc_fail_nth_write+0x20b/0x290 [ 181.972398][ T9664] ? proc_fail_nth_read+0x210/0x210 [ 181.977435][ T9664] ? security_file_permission+0x86/0xb0 [ 181.982815][ T9664] ? rw_verify_area+0x1c3/0x360 [ 181.987501][ T9664] ? preempt_count_add+0x92/0x1a0 [ 181.992372][ T9664] ? vfs_write+0x852/0xe70 [ 181.996617][ T9664] ? kmem_cache_free+0xa9/0x1e0 [ 182.001303][ T9664] ? kernel_write+0x3d0/0x3d0 [ 182.005817][ T9664] ? __kasan_check_write+0x14/0x20 [ 182.010766][ T9664] ? mutex_lock+0xa5/0x110 [ 182.015013][ T9664] ? mutex_trylock+0xa0/0xa0 [ 182.019444][ T9664] ? __kasan_check_write+0x14/0x20 [ 182.024384][ T9664] ? fput_many+0x160/0x1b0 [ 182.028647][ T9664] ? debug_smp_processor_id+0x17/0x20 [ 182.033846][ T9664] __x64_sys_bpf+0x7b/0x90 [ 182.038100][ T9664] do_syscall_64+0x34/0x70 [ 182.042360][ T9664] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 182.048080][ T9664] RIP: 0033:0x7f6ea72793b9 [ 182.052343][ T9664] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 182.071771][ T9664] RSP: 002b:00007f6ea5ef9048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 182.080019][ T9664] RAX: ffffffffffffffda RBX: 00007f6ea7407f80 RCX: 00007f6ea72793b9 [ 182.087830][ T9664] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 182.095638][ T9664] RBP: 00007f6ea5ef90a0 R08: 0000000000000000 R09: 0000000000000000 [ 182.103451][ T9664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 182.111260][ T9664] R13: 000000000000000b R14: 00007f6ea7407f80 R15: 00007ffff1210ce8 [ 182.264253][ T9662] device syzkaller0 entered promiscuous mode [ 182.315770][ T9691] FAULT_INJECTION: forcing a failure. [ 182.315770][ T9691] name failslab, interval 1, probability 0, space 0, times 0 [ 182.344129][ T9691] CPU: 0 PID: 9691 Comm: syz.3.2512 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 182.355318][ T9691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 182.365200][ T9691] Call Trace: [ 182.368343][ T9691] dump_stack_lvl+0x1e2/0x24b [ 182.372846][ T9691] ? bfq_pos_tree_add_move+0x43b/0x43b [ 182.378146][ T9691] dump_stack+0x15/0x17 [ 182.382130][ T9691] should_fail+0x3c6/0x510 [ 182.386384][ T9691] ? btf_new_fd+0x287/0x9c0 [ 182.390725][ T9691] __should_failslab+0xa4/0xe0 [ 182.395325][ T9691] should_failslab+0x9/0x20 [ 182.399667][ T9691] kmem_cache_alloc_trace+0x3a/0x2e0 [ 182.404785][ T9691] ? btf_new_fd+0x112/0x9c0 [ 182.409128][ T9691] btf_new_fd+0x287/0x9c0 [ 182.413291][ T9691] __se_sys_bpf+0x1aed/0x11cb0 [ 182.417893][ T9691] ? stack_trace_save+0x113/0x1c0 [ 182.422751][ T9691] ? terminate_walk+0x407/0x4f0 [ 182.427439][ T9691] ? stack_trace_snprint+0xf0/0xf0 [ 182.432394][ T9691] ? kmem_cache_free+0xa9/0x1e0 [ 182.437078][ T9691] ? kmem_cache_free+0xa9/0x1e0 [ 182.441767][ T9691] ? kasan_set_track+0x5d/0x70 [ 182.446361][ T9691] ? __x64_sys_bpf+0x90/0x90 [ 182.450788][ T9691] ? __kasan_slab_free+0x11/0x20 [ 182.455559][ T9691] ? slab_free_freelist_hook+0xc0/0x190 [ 182.460941][ T9691] ? kmem_cache_free+0xa9/0x1e0 [ 182.465626][ T9691] ? putname+0xe7/0x140 [ 182.469621][ T9691] ? do_sys_openat2+0x1fc/0x710 [ 182.474309][ T9691] ? __x64_sys_openat+0x243/0x290 [ 182.479178][ T9691] ? do_syscall_64+0x34/0x70 [ 182.483595][ T9691] ? _kstrtoull+0x3a0/0x4a0 [ 182.487933][ T9691] ? kstrtouint_from_user+0x20a/0x2a0 [ 182.493141][ T9691] ? kstrtol_from_user+0x310/0x310 [ 182.498096][ T9691] ? memset+0x35/0x40 [ 182.501908][ T9691] ? __fsnotify_parent+0x4b9/0x6c0 [ 182.506857][ T9691] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 182.513447][ T9691] ? proc_fail_nth_write+0x20b/0x290 [ 182.518574][ T9691] ? proc_fail_nth_read+0x210/0x210 [ 182.523605][ T9691] ? security_file_permission+0x86/0xb0 [ 182.528988][ T9691] ? rw_verify_area+0x1c3/0x360 [ 182.533672][ T9691] ? preempt_count_add+0x92/0x1a0 [ 182.538531][ T9691] ? vfs_write+0x852/0xe70 [ 182.542783][ T9691] ? kmem_cache_free+0xa9/0x1e0 [ 182.547490][ T9691] ? kernel_write+0x3d0/0x3d0 [ 182.551986][ T9691] ? __kasan_check_write+0x14/0x20 [ 182.556930][ T9691] ? mutex_lock+0xa5/0x110 [ 182.561183][ T9691] ? mutex_trylock+0xa0/0xa0 [ 182.565613][ T9691] ? __kasan_check_write+0x14/0x20 [ 182.570556][ T9691] ? fput_many+0x160/0x1b0 [ 182.574820][ T9691] ? debug_smp_processor_id+0x17/0x20 [ 182.580020][ T9691] __x64_sys_bpf+0x7b/0x90 [ 182.584273][ T9691] do_syscall_64+0x34/0x70 [ 182.588532][ T9691] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 182.594253][ T9691] RIP: 0033:0x7f137caaa3b9 [ 182.598506][ T9691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 182.617943][ T9691] RSP: 002b:00007f137b72a048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 182.626190][ T9691] RAX: ffffffffffffffda RBX: 00007f137cc38f80 RCX: 00007f137caaa3b9 [ 182.634006][ T9691] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 182.641812][ T9691] RBP: 00007f137b72a0a0 R08: 0000000000000000 R09: 0000000000000000 [ 182.649626][ T9691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 182.657434][ T9691] R13: 000000000000000b R14: 00007f137cc38f80 R15: 00007fff619945e8 [ 185.587040][T10047] syz.3.2610[10047] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.587218][T10047] syz.3.2610[10047] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.681886][T10056] device syzkaller0 entered promiscuous mode [ 187.104170][T10130] device wg2 left promiscuous mode [ 187.373224][T10146] FAULT_INJECTION: forcing a failure. [ 187.373224][T10146] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 187.567671][T10146] CPU: 1 PID: 10146 Comm: syz.2.2640 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 187.578856][T10146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 187.588762][T10146] Call Trace: [ 187.591882][T10146] dump_stack_lvl+0x1e2/0x24b [ 187.596389][T10146] ? panic+0x812/0x812 [ 187.600292][T10146] ? bfq_pos_tree_add_move+0x43b/0x43b [ 187.605587][T10146] ? vsnprintf+0x1b96/0x1c70 [ 187.610021][T10146] dump_stack+0x15/0x17 [ 187.614011][T10146] should_fail+0x3c6/0x510 [ 187.618269][T10146] should_fail_usercopy+0x1a/0x20 [ 187.623122][T10146] _copy_to_user+0x20/0x90 [ 187.627376][T10146] bpf_verifier_vlog+0x1ab/0x330 [ 187.632149][T10146] __btf_verifier_log+0xd1/0x120 [ 187.636916][T10146] ? bpf_verifier_vlog+0x1b8/0x330 [ 187.641887][T10146] ? btf_check_sec_info+0x4f0/0x4f0 [ 187.646989][T10146] ? btf_parse_hdr+0x1d5/0x770 [ 187.651590][T10146] ? memcpy+0x56/0x70 [ 187.655408][T10146] btf_parse_hdr+0x36d/0x770 [ 187.659834][T10146] btf_new_fd+0x487/0x9c0 [ 187.664003][T10146] __se_sys_bpf+0x1aed/0x11cb0 [ 187.668603][T10146] ? stack_trace_save+0x113/0x1c0 [ 187.673463][T10146] ? terminate_walk+0x407/0x4f0 [ 187.678146][T10146] ? stack_trace_snprint+0xf0/0xf0 [ 187.683096][T10146] ? kmem_cache_free+0xa9/0x1e0 [ 187.687778][T10146] ? kmem_cache_free+0xa9/0x1e0 [ 187.692463][T10146] ? kasan_set_track+0x5d/0x70 [ 187.697075][T10146] ? __x64_sys_bpf+0x90/0x90 [ 187.701493][T10146] ? __kasan_slab_free+0x11/0x20 [ 187.706270][T10146] ? slab_free_freelist_hook+0xc0/0x190 [ 187.711647][T10146] ? kmem_cache_free+0xa9/0x1e0 [ 187.716332][T10146] ? putname+0xe7/0x140 [ 187.720322][T10146] ? do_sys_openat2+0x1fc/0x710 [ 187.725011][T10146] ? __x64_sys_openat+0x243/0x290 [ 187.729896][T10146] ? do_syscall_64+0x34/0x70 [ 187.734303][T10146] ? _kstrtoull+0x3a0/0x4a0 [ 187.738643][T10146] ? kstrtouint_from_user+0x20a/0x2a0 [ 187.743857][T10146] ? kstrtol_from_user+0x310/0x310 [ 187.748798][T10146] ? memset+0x35/0x40 [ 187.752618][T10146] ? __fsnotify_parent+0x4b9/0x6c0 [ 187.757571][T10146] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 187.764156][T10146] ? proc_fail_nth_write+0x20b/0x290 [ 187.769279][T10146] ? proc_fail_nth_read+0x210/0x210 [ 187.774316][T10146] ? security_file_permission+0x86/0xb0 [ 187.779694][T10146] ? rw_verify_area+0x1c3/0x360 [ 187.784379][T10146] ? preempt_count_add+0x92/0x1a0 [ 187.789240][T10146] ? vfs_write+0x852/0xe70 [ 187.793496][T10146] ? kmem_cache_free+0xa9/0x1e0 [ 187.798181][T10146] ? kernel_write+0x3d0/0x3d0 [ 187.802711][T10146] ? __kasan_check_write+0x14/0x20 [ 187.807641][T10146] ? mutex_lock+0xa5/0x110 [ 187.811893][T10146] ? mutex_trylock+0xa0/0xa0 [ 187.816321][T10146] ? __kasan_check_write+0x14/0x20 [ 187.821265][T10146] ? fput_many+0x160/0x1b0 [ 187.825527][T10146] ? debug_smp_processor_id+0x17/0x20 [ 187.830738][T10146] __x64_sys_bpf+0x7b/0x90 [ 187.834981][T10146] do_syscall_64+0x34/0x70 [ 187.839235][T10146] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 187.844960][T10146] RIP: 0033:0x7fef061233b9 [ 187.849216][T10146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 187.868651][T10146] RSP: 002b:00007fef04da3048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 187.876896][T10146] RAX: ffffffffffffffda RBX: 00007fef062b1f80 RCX: 00007fef061233b9 [ 187.884706][T10146] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 187.892519][T10146] RBP: 00007fef04da30a0 R08: 0000000000000000 R09: 0000000000000000 [ 187.900329][T10146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 187.908141][T10146] R13: 000000000000000b R14: 00007fef062b1f80 R15: 00007ffc4d272dc8 [ 188.659702][T10184] syz.4.2648[10184] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.659755][T10184] syz.4.2648[10184] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.777775][T10185] syz.4.2648[10185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.404457][T10231] device sit0 entered promiscuous mode [ 190.250499][T10276] device syzkaller0 entered promiscuous mode [ 191.305112][T10320] device syzkaller0 entered promiscuous mode [ 191.386829][T10325] device pim6reg1 entered promiscuous mode [ 192.119061][T10354] device xfrm0 entered promiscuous mode [ 192.402030][T10363] syz.1.2702[10363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.402072][T10363] syz.1.2702[10363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.928846][T10430] device pim6reg1 entered promiscuous mode [ 195.043354][T10467] device pim6reg1 entered promiscuous mode [ 195.905572][T10501] device syzkaller0 entered promiscuous mode [ 196.984123][T10553] device macsec0 entered promiscuous mode [ 197.145219][T10564] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 197.531277][T10596] device syzkaller0 entered promiscuous mode [ 197.570601][T10601] device sit0 left promiscuous mode [ 197.594162][T10601] device sit0 entered promiscuous mode [ 198.155649][T10618] device syzkaller0 entered promiscuous mode [ 200.388698][T10772] device pim6reg1 entered promiscuous mode [ 200.905682][T10785] device syzkaller0 entered promiscuous mode [ 201.161363][T10804] device pim6reg1 entered promiscuous mode [ 201.361729][T10813] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.368589][T10813] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.375658][T10813] device bridge_slave_0 entered promiscuous mode [ 201.382277][T10813] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.389210][T10813] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.396357][T10813] device bridge_slave_1 entered promiscuous mode [ 201.433136][T10813] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.439993][T10813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.447035][T10813] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.453866][T10813] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.471277][ T589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.478682][ T589] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.485622][ T589] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.498499][ T3349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.506633][ T3349] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.513485][ T3349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.521048][ T3349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.529022][ T3349] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.535856][ T3349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.548267][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.557471][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.572515][T10813] device veth0_vlan entered promiscuous mode [ 201.579447][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 201.587500][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 201.595555][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 201.602744][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 201.613782][ T590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 201.622567][T10813] device veth1_macvtap entered promiscuous mode [ 201.632509][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 201.641749][ T590] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 201.650003][ T590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 202.376269][T10843] device pim6reg1 entered promiscuous mode [ 202.617564][T10856] tap0: tun_chr_ioctl cmd 1074025677 [ 202.626571][T10856] tap0: linktype set to 774 [ 202.684630][T10861] tap0: tun_chr_ioctl cmd 1074812117 [ 203.270453][T10886] device veth1_macvtap left promiscuous mode [ 203.341288][T10891] device pim6reg1 entered promiscuous mode [ 203.392034][T10893] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.399141][T10893] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.406373][T10893] device bridge_slave_0 entered promiscuous mode [ 203.426969][T10893] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.434431][T10893] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.444864][T10893] device bridge_slave_1 entered promiscuous mode [ 203.506324][T10893] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.513183][T10893] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.520281][T10893] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.527053][T10893] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.636269][ T3349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.654136][ T3349] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.672081][ T3349] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.729064][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.757055][ T3342] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.764004][ T3342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.895855][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.974929][ T3342] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.981795][ T3342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.108923][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 204.141887][T10943] tap0: tun_chr_ioctl cmd 1074025677 [ 204.146986][T10943] tap0: linktype set to 65534 [ 204.152686][T10922] device veth1_macvtap left promiscuous mode [ 204.165035][T10922] device macsec0 left promiscuous mode [ 204.172273][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 204.180545][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 204.199316][ T590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 204.207336][ T590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 204.220499][T10893] device veth0_vlan entered promiscuous mode [ 204.232736][T10893] device veth1_macvtap entered promiscuous mode [ 204.251273][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 204.259323][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.267225][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 204.277425][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 204.285847][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 204.318108][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 204.368976][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 204.376182][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 204.497893][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 204.506092][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 204.637890][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 204.739278][T10960] device pim6reg1 entered promiscuous mode [ 205.395460][T11000] device pim6reg1 entered promiscuous mode [ 205.420722][T10975] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.428144][T10975] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.435562][T10975] device bridge_slave_0 entered promiscuous mode [ 205.442722][T10975] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.458064][T10975] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.473155][T10975] device bridge_slave_1 entered promiscuous mode [ 205.508393][T10989] device pim6reg1 entered promiscuous mode [ 205.539355][ T7] device bridge_slave_1 left promiscuous mode [ 205.545293][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.553147][ T7] device bridge_slave_0 left promiscuous mode [ 205.559178][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.570751][ T7] device veth0_vlan left promiscuous mode [ 205.900170][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.909618][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.928208][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.944521][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.953243][ T666] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.960088][ T666] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.968927][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.977030][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.985222][ T666] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.992073][ T666] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.999493][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 206.007319][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.015354][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 206.023335][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.091059][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.098578][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 206.111797][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 206.123732][T10975] device veth0_vlan entered promiscuous mode [ 206.152355][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.166825][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.174437][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.187240][T10975] device veth1_macvtap entered promiscuous mode [ 206.199094][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.211336][ T586] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 206.220896][ T586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 206.239618][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 206.248339][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 206.535752][T11056] device syzkaller0 entered promiscuous mode [ 206.602144][T11047] device veth0_vlan left promiscuous mode [ 206.638355][T11047] device veth0_vlan entered promiscuous mode [ 207.047961][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 207.077221][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 207.158027][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 207.252674][T11092] device veth0_vlan left promiscuous mode [ 207.259248][T11092] device veth0_vlan entered promiscuous mode [ 208.181972][T11144] device syzkaller0 entered promiscuous mode [ 208.188800][T11145] device syzkaller0 left promiscuous mode [ 208.298370][T11165] device sit0 left promiscuous mode [ 208.480645][T11171] device sit0 entered promiscuous mode [ 208.704497][T11175] device syzkaller0 entered promiscuous mode [ 209.124731][T11353] syz.4.2942[11353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.124778][T11353] syz.4.2942[11353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.527647][T11421] device veth1_macvtap left promiscuous mode [ 210.579777][T11422] device veth1_macvtap entered promiscuous mode [ 210.591977][T11422] device macsec0 entered promiscuous mode [ 210.682927][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 210.779409][T11432] device veth1_macvtap left promiscuous mode [ 211.235878][T11450] device sit0 entered promiscuous mode [ 213.459416][T11510] syz.3.2986[11510] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.459467][T11510] syz.3.2986[11510] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.634109][T11510] syz.3.2986[11510] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.751798][T11575] device sit0 entered promiscuous mode [ 214.782821][T11575] syz.2.3012[11575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.782864][T11575] syz.2.3012[11575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.440614][T11616] device macsec0 entered promiscuous mode [ 215.884624][T11654] syz.3.3035[11654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.884669][T11654] syz.3.3035[11654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.047792][T11684] syz.3.3035[11684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.060876][T11684] syz.3.3035[11684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.781036][T11762] device sit0 left promiscuous mode [ 217.838016][T11763] device sit0 entered promiscuous mode [ 219.814952][T11861] device sit0 left promiscuous mode [ 220.448832][T11891] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.455713][T11891] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.462816][T11891] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.469603][T11891] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.476854][T11891] device bridge0 entered promiscuous mode [ 220.483629][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.226126][T11939] device veth0_vlan left promiscuous mode [ 222.259171][T11939] device veth0_vlan entered promiscuous mode [ 222.331207][ T589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.354815][ T589] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.373685][ T589] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.013558][T12023] device veth1_macvtap left promiscuous mode [ 225.219696][T12103] syz.3.3158[12103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.219747][T12103] syz.3.3158[12103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.689168][T12240] device team_slave_1 entered promiscuous mode [ 227.718519][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.726575][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 227.988550][ T424] device veth0_to_batadv left promiscuous mode [ 227.994559][ T424] bridge0: port 3(veth0_to_batadv) entered disabled state [ 228.001814][ T424] device bridge_slave_1 left promiscuous mode [ 228.007748][ T424] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.014742][ T424] device bridge_slave_0 left promiscuous mode [ 228.020746][ T424] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.371438][T12260] device sit0 left promiscuous mode [ 228.425590][T12271] device wg2 entered promiscuous mode [ 239.238735][T12492] ªªªªªª: renamed from vlan0 [ 242.911346][T12563] device sit0 left promiscuous mode [ 242.943663][T12563] device sit0 entered promiscuous mode [ 243.555539][T12589] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.562520][T12589] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.656598][T12693] syz.3.3325[12693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=3169 state=3 status=67 (errno 32: Broken pipe) [ 251.656647][T12693] syz.3.3325[12693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.708579][ T7] device bridge_slave_1 left promiscuous mode [ 253.725690][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.732895][ T7] device bridge_slave_0 left promiscuous mode [ 253.738899][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.746261][ T7] device bridge_slave_1 left promiscuous mode [ 253.752247][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.759404][ T7] device bridge_slave_0 left promiscuous mode [ 253.765294][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.773567][ T7] device bridge_slave_1 left promiscuous mode [ 253.779523][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.786543][ T7] device bridge_slave_0 left promiscuous mode [ 253.792623][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.800823][ T7] device veth1_macvtap left promiscuous mode [ 253.806736][ T7] device veth0_vlan left promiscuous mode [ 253.812419][ T7] device veth0_vlan left promiscuous mode