last executing test programs: 7.271524014s ago: executing program 3 (id=2824): close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x3, 0x10004, 0x5}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r0}, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b7030000000000208500000073000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000085100000030000001800000000000000000000000000000095000000000000009500000000000000d5b2307878b6a5229917ebb4029a0bea3522c1f874a88524b8256e9616dc84ef9f539900f13815da3cbc479df45e1acd7454a155dd43645345f9a4cddab3d6d9d40e13de56bf656d77b7451f09e02bcb6cf96a4c0fce8ff74fe80460b51e50b4d8105ae605917a45734dbd377e5f99ad246b74853c2ec4862629a63ca0445673c32ad594e33b56f0d0fc6e3a6c84dcd0b6a6746ccfe43cab05ecc5c02583d24d43d968d74062c0f54d148107a22b928921fd"], &(0x7f0000000000)='GPL\x00'}, 0x1a) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000020000000000000000304000000bb7f1a004d00feff000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x4c) 6.42989693s ago: executing program 3 (id=2830): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000480)={{0x1, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f0000000440)='%pB \x00'}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x18, 0x1c, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x800003, 0x0, 0x0, 0x0, 0x4}, [@jmp={0x5, 0x0, 0x1, 0x6, 0x6, 0x8, 0x8}, @alu={0x15590104a1e89b9f, 0x1, 0x5, 0x5, 0x1, 0xc, 0xfffffffffffffffc}, @map_fd={0x18, 0x5, 0x1, 0x0, 0x1}, @cb_func={0x18, 0x2}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x8}, @map_val={0x18, 0x3, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x400}]}, &(0x7f0000000140)='GPL\x00', 0x7cf, 0xb4, &(0x7f00000001c0)=""/180, 0x41000, 0x17, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x0, 0x4, 0x9, 0x3ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0xa1000000, 0x0, '\x00', 0x0, @sk_skb}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='io_uring_task_add\x00', r1, 0x0, 0x100}, 0x59) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000180)="2f03", 0x2}], 0x1, 0x0, 0x0, 0x800}, 0x20004011) recvmsg$unix(r2, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="00ffffffff000000000000000000e80000000000e3c8fdf126c379b4e92cb1ab55d4a627f8a12d150e3a1f988f9a9cb4", @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x8}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008bd60000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x19, 0x0, 0x1, 0x8000}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0, 0x8}, 0x512b, 0x5, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x8, 0x1, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r6}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xf, 0x4, 0x4, 0x7}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r7, &(0x7f00000000c0)}, 0x20) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) 5.44111044s ago: executing program 3 (id=2841): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x2b, 'blkio'}, {0x2d, 'net_prio'}, {0x2b, 'hugetlb'}, {0x2b, 'devices'}, {0x2d, 'net_prio'}, {0x2d, 'rlimit'}]}, 0x35) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffffc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r2, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, &(0x7f0000000500)=[0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd2, &(0x7f0000000600)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x47, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) openat$cgroup_freezer_state(r1, &(0x7f00000005c0), 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r8 = openat$cgroup_freezer_state(r1, &(0x7f00000002c0), 0x2, 0x0) close(r8) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000380)=ANY=[@ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="0200000002"], 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000380)=ANY=[], 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r9}, 0x18) syz_clone(0x40089000, 0x0, 0x0, 0x0, 0x0, 0x0) 5.246462524s ago: executing program 3 (id=2844): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="005f00000000000002000000000000e1ffffff", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd824498949714ffaac8a6f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb5447000001000000008f2b9000f22425e4097ed62cbc891061017cfa6fa26fa7088c60897d4a6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe6b1b8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3540546bf636e3d"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x4}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0x0, r6}, 0x18) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r3, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)=[{0x0}, {&(0x7f0000001780)=""/4071, 0xfffe}], 0x2}, 0x0) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x5e, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0xfffe}], 0x1}, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000300009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x12, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x26c4}, 0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r7, 0x0, 0x94, 0x1000, &(0x7f0000000440)="d624dcbed154bc1e3eef4f72d08e986e36ed1f7feb120c5dc0e99fd5d3d83b96e43e32f20e4119ef930f3817e938ead1633439987ca8609ecdbfbe4db5a3fa4a7d2a3e26eada6bb223ebb3e705876c3e3af273e68bca4a6d1977ff209d87c00c5c13d55c7285e05a35a481ab14f0189fc56022799ffb12e1d4f2034b906e8ac67065217f82539e6c37ca3716fe0c3b5c3df7e81b", &(0x7f0000000b00)=""/4096, 0x7, 0x0, 0x18, 0x3c, &(0x7f0000000500)="c0ca628031f0ac2a56e93d240e074d5f67c6d17bfcc3c1b7", &(0x7f0000000540)="8bc849b14680197ded4169a02ca386801438a746c50c319ace963b394d37550e5a6c67b203e1827e20b6d02ea639ea21400dae94d0f156d978b87e0f", 0x2, 0x0, 0x1113}, 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 5.148863426s ago: executing program 3 (id=2845): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x800) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0xfdef) r5 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0600000004000000008000005c"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x709}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r5, 0x0, 0x200000}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffff5e) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x19) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) 3.073638598s ago: executing program 4 (id=2860): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="190000000400000004000000"], 0x48) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000240)='timer_start\x00', r0}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x201a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x5b}, 0xa002, 0x0, 0x0, 0x9, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x20008000, 0x0, 0x0, 0x0, &(0x7f0000000880), 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x2d) (async) bpf$MAP_CREATE(0x0, 0x0, 0x2d) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext, 0x110, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0500e6ff03000000040000000400000000000200", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0500e6ff03000000040000000400000000000200", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000200b703000000000000850000007d000000bf0900000000000066090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000200b703000000000000850000007d000000bf0900000000000066090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x2, 0x0, 0x18, 0x2, 0x0, 0x0, 0x34080, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x0, 0xc8, 0x0, 0x0, 0x9, 0x100, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) (async) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x2, 0x0, 0x18, 0x2, 0x0, 0x0, 0x34080, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x0, 0xc8, 0x0, 0x0, 0x9, 0x100, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000010000000800000008"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000010000000800000008"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYRES64=r1, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYRES64=r1, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r4, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f0000000300)=r5}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) unlink(0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000580)="213fbbd5e4a15b5fff69a8760693fe80fdfac886586c90d953a3abbb39cda6926005e7", &(0x7f0000000800), 0x23, r7}, 0x38) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYRESHEX=r6], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) 3.00356608s ago: executing program 0 (id=2861): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r3, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 2.913826032s ago: executing program 2 (id=2862): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00"/14, @ANYRES32=0x0, @ANYBLOB], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) (fail_nth: 7) 2.562559279s ago: executing program 2 (id=2865): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x14044, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x400, 0xc8, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x1e, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000b00)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, 0x0) (async) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000010000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='mm_page_alloc\x00', r2}, 0x10) close(0xffffffffffffffff) (async) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) (async) unlink(&(0x7f0000000040)='./file0\x00') (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1}, 0x48) 2.521904049s ago: executing program 2 (id=2866): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001bc0)=@bpf_lsm={0x1d, 0x1c, &(0x7f0000001640)=ANY=[@ANYBLOB="18230000", @ANYRES32, @ANYBLOB="0000000002000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000b000000850000000600000018100000", @ANYRES32, @ANYBLOB="000000000000000017400100f0ffffff182a0000", @ANYRES32, @ANYBLOB="000000004c0000007b080400fcffffff18110000", @ANYRES32, @ANYBLOB="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"], &(0x7f0000001600)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x49, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x2, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001b40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001b80)=[{0x4, 0x2, 0x1, 0xb}], 0x10, 0x81}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)='(pu&\"&\t&&') ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000007000000000000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x7f, &(0x7f00000002c0)=""/127, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x46}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000000000008100000081000000", @ANYRES32, @ANYBLOB="00000000000000f8bceb15977a73740000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x15) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001200)={r7, 0x58, &(0x7f0000001180)}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000001380)='cpu.pressure\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00607d0f85da472e0a00"/25], 0x48) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001040)=0xffffffffffffffff, 0x4) bpf$TOKEN_CREATE(0x24, &(0x7f0000001080)={0x0, r1}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x41000, 0x5, '\x00', 0x0, @flow_dissector, r9, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) ioctl$SIOCSIFHWADDR(r8, 0x8941, 0x0) 2.393254142s ago: executing program 4 (id=2868): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x800) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15"], 0xfdef) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0xfdef) r5 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0600000004000000008000005c"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x709}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r5, 0x0, 0x200000}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffff5e) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x19) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) 2.155096397s ago: executing program 0 (id=2870): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00"/14, @ANYRES32=0x0, @ANYBLOB], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1, 0x0, 0x0, 0x17000000}, 0x0) 1.619534227s ago: executing program 0 (id=2871): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x7fe2, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x7fe2, 0x4}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r2}, 0x10) (async) 1.596168098s ago: executing program 2 (id=2872): bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x0, 0xa, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00"], 0x0, 0x0, 0x0, 0x0, 0x61980, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], 0x0, 0x7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='percpu_free_percpu\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="06000000040000006d0000000006000000000000", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x4000000) ioctl$TUNDETACHFILTER(r5, 0x541b, 0x20000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) bpf$MAP_CREATE(0x8000000000000, &(0x7f0000000300)=@base={0x14, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x20000002}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000640)='xen_mmu_pte_clear\x00', 0xffffffffffffffff, 0x0, 0x4000ffffffff}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000002c0), 0x200df000, r3, 0x0, 0xf2}, 0x38) 1.556016349s ago: executing program 0 (id=2873): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x50) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r4, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 1.50220713s ago: executing program 2 (id=2875): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00"/14, @ANYRES32=0x0, @ANYBLOB], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) (fail_nth: 8) 1.123195307s ago: executing program 4 (id=2876): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000030000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000040018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) unlink(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r3, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], 0x0, 0xb5, &(0x7f0000000340)=[{}, {}], 0x10, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0xc8, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000980)={&(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000b80)=[{&(0x7f0000000640)="e2646bb2adbfd12938b50d04a852cd0b4523fe836b1c4cfcb04e7bbad7032af38140130a96a1e6173e36d96c19838dd55df1dd0b8d5aaa27b4acfdb93adb480b", 0x40}, {&(0x7f0000000680)="d6cad540ff57622a3440aa9eb6b6dc6ad82e423ec48ae7b38750fee3ebc109128898285823f40d35a63092c913897ddd1470398b6baa1968af689e4a4cf7c0f7bbf01c115145", 0x46}, {&(0x7f0000000700)="9b5ea8ae5678937cf2282b7b7bf2695c4dacb3c6cbeea813763401861f4c8aa57ae14da6b2d9b531d38441c1393a75e63d4550ea70126a59ba9c3209024dde8e81109ad4f0d5c6", 0x47}, {&(0x7f0000000780)="142b7a99214a398fa7ed2efe731cfed2b857fdf05662b2ad8abfdb90715bdb084a0bab4239a61f9f86aaed47ac863c2bd8ccab064cb18617698ace69bf9976c4c4e02c3a29a035556916ff03749efbb95df08e82d7e23ac0c8b2c7cadbdebeef5a66e67d3e74b001830aa8bfb9a423770b1c34a63d010a07fb8d58010ab9308ce0cfc446ca4c5bc5f66ed1b9e66cdbc2929e14871fb59051864d18fdf944eac887cee9071208e323d80e2e76179a1f5fb2f090d0914ab13245f21f", 0xbb}, {&(0x7f0000000840)="738c00e4c38254d210def01f047132f9bebbef6e54b85058b2e1290a7124f8f1c4a8de69c5e6d08278e36a54ac0907c23f8076f0695e8a310d1a7dc50f130ba6b57b885ef45bcf80d824ce19d80bbdeedbaf987c0011bdb0996499e7a1a58d17f66f4e68c4f086cbfaa45adbd1f899d6c27754edc59887cb68eabe79de49269510e9f26fdbb2f9d9f8544d1bed1e907a2741138bb0e242e722d4a5f548586f7aad12a4fa11233888be1296f24319ce86af4f9d563ab81ef9d89e02abbd458e1e", 0xc0}, {&(0x7f0000000c40)="764bfafabd44dc47def2c3b4b77901b61885d14a739f28d03b92cf3d528927be42ec8f424297ef585cb9a1e7518d3a199fb8ab004aada2a05dceb86e9fe382c6e111b0637982d26bdd9bcd2e9270337f909124a46a1b8a3720e2e620e12857d9273919fedbb33c8cb5827671a5d523c95433d82c836b8fc992c5969694546dfe8729ae811b4ab0e12970fe4c308f4d73", 0x90}, {&(0x7f0000000a00)="44088d2b0890e6d1dfc605c2732b8b70f835000b82a4f4c987679d8e89cb25f93e95e56555bc95b38b5846eeb6947dae94a6fc6f49603cfd807956083fa15796cdea1484ac91191ccbd377fa8d011441f6f3d18a1e78fccaec2109d20df3cf5867748607cffbc2c7cccdf0a7a26ade80d325916c88af16072a146f6a6e0a5c4c2b65d54ab8044cf8f56eb44f9600ac474b0db487296c5a04388d273b7ec410b8d42e8b48a3e13142f3f5bdb9407ae992283ef0b4c4ae363b6d8e", 0xba}, {&(0x7f0000000940)="7c77c9c1d3f4bb756d4c6569a1ea6885eb3649d27182b475a98ef95a4999735f3e995f48f0f269cbca491cd9d0", 0x2d}, {&(0x7f0000000ac0)="81d5ae671547b15c2a7c3de1e253ae727fc8083fd03f066e380ce6174dc5c3717cb7816d0bd2690ac77f4038c6434336242d0f7aa1f5bab0a51c00e6bc0eda8f93d321879696ef1f86487683509e103a1259731d6560e2db2422ce9b940176becff2dee4e6e80ec89659a1ebb5db89027024ec50256ae8243dd7afbb7cf19b1cbe25144a86f377c74387c3ab9050457ab349ce9fd797c365476b05767fccc0c321ec85579c89ce3b7cac2b61", 0xac}], 0x9}, 0xd4) syz_clone(0x40089000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.01988832s ago: executing program 0 (id=2877): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r5, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 957.442451ms ago: executing program 4 (id=2878): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x4004743d, 0x110e22fff6) close(r0) write$cgroup_type(r2, &(0x7f0000000280), 0x9) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x88, 0x0, 0x0) 946.354881ms ago: executing program 2 (id=2879): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x34000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2, 0x6}, 0x0, 0xc8, 0xfffffffe, 0x0, 0x9, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r3}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) (async, rerun: 32) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) (rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r6, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000580)=[0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x0, 0xa7, &(0x7f0000000600)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x3d, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a00)=@bpf_tracing={0x1a, 0x17, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0xfffffff8}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x294}, @alu={0x7, 0x1, 0xa0605f138efc1e6b, 0xb, 0xa, 0x0, 0xfffffffffffffff0}]}, &(0x7f0000000200)='GPL\x00', 0x1f36, 0xbd, &(0x7f00000004c0)=""/189, 0x0, 0x10, '\x00', r7, 0x17, r6, 0x8, &(0x7f0000000840)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000880)={0x1, 0xc, 0x2, 0xdf28}, 0x10, 0x3072d, r6, 0x2, &(0x7f00000008c0)=[r0, r1], &(0x7f0000000900)=[{0x0, 0x2, 0x9, 0x5}, {0x5, 0x1, 0xb, 0x5}], 0x10, 0x8000}, 0x94) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) (async, rerun: 64) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r8}, 0x10) (async, rerun: 32) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) 900.410562ms ago: executing program 3 (id=2845): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x800) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0xfdef) r5 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0600000004000000008000005c"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x709}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r5, 0x0, 0x200000}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffff5e) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x19) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) 571.599089ms ago: executing program 1 (id=2882): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff2300000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001011404000011000000b7030000000000006a0a00fe000000008500000032000000b700000001000000950000000000000075cdc4b57b0c65752a3ad50000007ddd0000cb450063dedba767ade51f7f1f66acd19100002000000000000000ff7f0000b52f17cee19d0001000000000000000000cb04fcbb4e4d0b9bafe3ba431351a58a885ba9918d37b056b9bbd11b6b9f6cf7db6d574620260000000000008062d77e85cef4a2ab938f65aac33c4d620de2c9b7dc10d7d313f9f57606b83b994fc4051ade12f41deff6df6a936b4ec3827c739bb39aad16cc75fe369258673b5df11cc2afb53611cc32a790bc0b80e80eae8f5e64be2c9d2d29db3d36dd0cf8f79a015c7bd3f15aa6aadbeab2a01685108e61aa00000000000000000000000000c67c6c6a06e828e5216f601b19db1af1b5d356d0f062137d866d11be4ba3f0151fdbbd4e97d62ecc645e143a60f10800000000000000826151e3b42bcae95239ef5ca2a730a00c87c493db0300e63fda97a296820000000001000000eecc952a3fd2c46f3c1cde71a19d1a2982492a210e00d2bfea3b8d188df2eff8d56aaae7d32a2e180022537395019f02ec4b85f6aad7faca088de9b26797a8446b16c28d85f225992dbdd5bb01ba51508951c7a7d6ca0916c3a12912715649c2b1c7192a4251b59d378d3f00000000000000665c8b7e89eddfc3783f6c9129a7c5f8ee5f50579e2f638f7eb12f63be72a3d81ab324d6e417b1c2cbfdcada0a16e31790e26cf19588a7e0496ee2782224cf30f810da86cf1a3204f4c9404f5d7321a4fefc4d1c9139ca4b65b99909950000006b42077ca60fdecb2717e21f8f187b1866108b6e8c71e2603217606637ece1fa89917e131f4034a8383e99c3568fd04201b37cd92ca6ebf94a2d8310f7032775cfd75652f87b039d5430b3c6643e9146d2478ce31344b554aca7670000000000000010c65608fda6ed5d08e7a796042aa127d874105787d0347aa37801faff5b9050803a19ff6205aa5c263e407a2f7de56f7a0000e094fa4e3f05528caab5a430c08dd810bc97204b767dd969721a26aa740000000000bc433fe2d0a6ef2a8a91cd3cb305aa80dadef8b0caca780000000000000000863e21db415a222bb1a7ab94bfe4a74157d794f9d0430c2c0eb563350559829865a3dd08fb31bd0801e09aa3ee45e61a56fc83076451cff7632e49a41eadb5044a0d5f73d6932161ae5e9ce218a35cd8e7b747887b1a74798982d0b492c3f0ff53189d80733eb04f8124877b648ff438f7d66c7efcc09a8f3330b6c22d14e80db8e5608bdeab9388b758a15f4ce70390c214bc6838798f5b9b0b500d4e8b5174f329b8501c6feb7a6982bcea74a0f2ced7fa2059234a8d10b7f0597151d5c9067d57d85f4ae933eaf5174ba122f3f702ef8695578d3c08562c9fc185f0f65d11b4c58ae52500cbe99cde3758a5cbe6093dd328ac820e2de309d25a324647aadffcecf0f3bbaeda7af4436d9ffbce1b240a2f5e346eba8812e6329e01b087bde7da4a6448f478102e90c8134f531de08d4cf4f6f35b15a202544c0ced0c1715fd3a90099f785a13a2412bedba2981dd22bd9d736c00000000000000000000000000000000eb6fec8d7d2f77f4d470a9caa5b1bfc00cd1d40830ac35f229f8ffe1c02a63d3c2d9"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0xfffffe3d}, 0x57) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x702, 0xe, 0xff0f, &(0x7f0000000540)="e460334470b8d480eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4], 0x18}, 0x0) (async) sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000500)=ANY=[@ANYRESHEX=r3, @ANYRES16=r6, @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@bloom_filter={0x1e, 0x6, 0x5ad, 0x4, 0x10000, r5, 0xdd93, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3, 0xe}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r7}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r7, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r8, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r9], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r10}, 0x10) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r11}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) 350.686713ms ago: executing program 1 (id=2883): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/153}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 303.273454ms ago: executing program 1 (id=2884): close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x3, 0x10004, 0x5}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r0}, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b7030000000000208500000073000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000085100000030000001800000000000000000000000000000095000000000000009500000000000000d5b2307878b6a5229917ebb4029a0bea3522c1f874a88524b8256e9616dc84ef9f539900f13815da3cbc479df45e1acd7454a155dd43645345f9a4cddab3d6d9d40e13de56bf656d77b7451f09e02bcb6cf96a4c0fce8ff74fe80460b51e50b4d8105ae605917a45734dbd377e5f99ad246b74853c2ec4862629a63ca0445673c32ad594e33b56f0d0fc6e3a6c84dcd0b6a6746ccfe43cab05ecc5c02583d24d43d968d74062c0f54d148107a22b928921fd"], &(0x7f0000000000)='GPL\x00'}, 0x1a) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 302.425254ms ago: executing program 1 (id=2885): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000100000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x19, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x47845287495d7c0a}}, @call={0x85, 0x0, 0x0, 0x50}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r1}, 0x10) 301.078494ms ago: executing program 1 (id=2886): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0b00000005000000000005002c745d4ab729bc3e450000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000340)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)='%+9llu \x00'}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000069000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b70400000000925e85"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000340)='workqueue_activate_work\x00', r4}, 0x18) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0500000000f01f00810000007f00000001"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r7, 0x0, 0x0}, 0x20) 175.560927ms ago: executing program 0 (id=2887): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x50) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r4, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 169.452027ms ago: executing program 1 (id=2888): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000feffffff00"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000300)={'sit0\x00', @local}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/17], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x18) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r7}, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a03f0fff0ffffff79a4f0ff00000000b7060000ffffffff2e64050000000000750afaff07cd02020404000000247d60b7030000030a00006a0a00fe0000000c8500000027000000b70000000000002995000000000000001da5ad3548ebb63d18c5071c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f0e5eb09d38ac46e99e7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8ef534b93dcb34e1da2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa380700000000000000c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f29f8bb35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8cea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82e3568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000500000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac64d9c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccfd8b129258bb0a93cee1d44f8665172c06933d20f184b78b435462c52a85149451ffd564c56a7cbf11a1127c77242915e43b2bc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000000}, 0x143}, 0x48) 27.136639ms ago: executing program 4 (id=2889): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x14, 0x25, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffff8}, {}, {}, [@generic={0x2, 0x3, 0x2, 0xf, 0xfffffff7}, @call={0x85, 0x0, 0x0, 0x48}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @map_fd={0x18, 0x8, 0x1, 0x0, 0x1}, @generic={0x3, 0xb, 0x8, 0xffc0, 0x4}, @generic={0x1, 0x1, 0xd, 0xff, 0xfff}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xf48dc2ab3fc0c11a}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='GPL\x00', 0x3, 0x5f, &(0x7f0000000180)=""/95, 0x41000, 0xc, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x1, 0x101, 0x10000}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000280)=[{0x3, 0x4, 0x10, 0x6}, {0x5, 0x5, 0x10, 0xc}, {0x0, 0x4, 0xd, 0x2}, {0x3, 0x3, 0xf, 0x9}], 0x10, 0xa}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r0, 0x0, 0x69, 0x90, &(0x7f0000000380)="f4c52782bda233dfc38a451bcac0ecec49725c3560ad62dd33b667f4fb92d36783185a9de83166de81cb0955f6716bb09a3c8360a28fb412761b64ab0196900db1e2b57a661f07f64ab9450335b17a913b92b8f2c81d821098f06f71bc7b4057c5d7dd64bb2322249b", &(0x7f0000000400)=""/144, 0x8, 0x0, 0x67, 0xd2, &(0x7f00000004c0)="2131ddfb858d7c8e2b9509b0ce22137271ab51cdcd1352da5d1b402bbbc9b1247956ed88a1e1b925ad17b20bc9cd0fcc18aac99b9a73bc5621e45794d26fae648d2f50e16b524c18ee51e4fa63e18b439064c297127991fdfed84c53d29d143450d875c3cbade0", &(0x7f0000000540)="3813cbc34a9ea9209e0ea54e26e6a2d258c0e3f7f7d9014a5fcc25fdfd8a30f3b8facbbe193244fffae6a8ab883086e14e5f497ea97a9b71da373254ce6873fb180871929bf9f1451b74c9b7c637a0ad256aa0f34055952427cadc11599d75ae105d2642de2b7c54327b16c7c9df5f464efaed5640fc294de2cd9eeb618000d8c2bf3facb4df2e128cd4ddd6333112f68e7d0ce4ee923badd9610d00b172358555b8a9cca776d9c9a528b1c8c838eec2ed07c05f296be48ff8bbf0d24b6b643e6c78ad8b2cc28e9e92990fb89ad8967e00fe", 0x6, 0x0, 0x1000}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r0, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0], 0x0, 0x27, &(0x7f0000000780)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0xc5, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000bc0)={&(0x7f00000009c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x4, [@var={0x2, 0x0, 0x0, 0xe, 0x2}, @const={0x8}, @typedef={0x9, 0x0, 0x0, 0x8, 0x5}, @func={0xe, 0x0, 0x0, 0xc, 0x2}, @volatile={0x2, 0x0, 0x0, 0x9, 0x1}, @enum64={0x10, 0x6, 0x0, 0x13, 0x1, 0x2, [{0x3, 0x4, 0x4}, {0xd, 0x7, 0x4}, {0x1, 0x5, 0x13}, {0xd, 0x10000, 0x9}, {0x10, 0x7, 0x6}, {0x6, 0xfffffc01, 0x5}]}, @decl_tag={0x7, 0x0, 0x0, 0x11, 0x2, 0x8}, @func={0x4, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x2e, 0x0]}}, &(0x7f0000000ac0)=""/207, 0xcc, 0xcf, 0x0, 0x80, 0x10000}, 0x28) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, '\x00', r1, r3, 0x5, 0x3, 0x2}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000f00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000e80), &(0x7f0000000ec0)=r0}, 0x20) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000f80)=@o_path={&(0x7f0000000f40)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x1f, 0x4, &(0x7f0000000cc0)=@raw=[@call={0x85, 0x0, 0x0, 0x88}, @generic={0x4, 0x6, 0x2, 0x7, 0x4}, @map_fd={0x18, 0x9, 0x1, 0x0, r4}], &(0x7f0000000d00)='syzkaller\x00', 0x6, 0xa5, &(0x7f0000000d40)=""/165, 0x41000, 0x60, '\x00', r1, @fallback=0x36, r4, 0x8, &(0x7f0000000e00)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000e40)={0x3, 0xb, 0x1, 0x4}, 0x10, r2, r0, 0x5, &(0x7f0000000fc0)=[r4, r5, r6], &(0x7f0000001000)=[{0x5, 0x2, 0xd, 0x5}, {0x0, 0x3, 0x10, 0x6}, {0x1, 0x4, 0xd}, {0x5, 0x4, 0x3, 0xc}, {0x1, 0x4, 0x0, 0x9}], 0x10, 0x64}, 0x94) r7 = syz_clone(0x40000, &(0x7f0000001140)="3f6ff3cfbb580b7277625e0ae475daec12", 0x11, &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000001200)="4fa7828891b78c5ddecb1890ef7b3f11cf03dd3c1a4975534f8d21d68e465634d3c7c8615dabeae5eab5f6876e60d6f14bed6e19ce889c9860231a49098c66b3cdf06754495552d0bf3ad9ae5a41328d607e8e0433987234bb1e956ae9d04092") r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001680)={&(0x7f0000001540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x4, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0x0, 0x1}, {0x3, 0x3}, {0xb, 0x1}, {0xd, 0x4}, {0x6}, {0x1, 0x2}, {0x5, 0x4}, {0x4, 0x5}]}]}, {0x0, [0x61, 0x30]}}, &(0x7f00000015c0)=""/158, 0x68, 0x9e, 0x1, 0x1}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x8, 0x2a, &(0x7f0000001280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe6c7, 0x0, 0x0, 0x0, 0x7fffffff}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@call={0x85, 0x0, 0x0, 0x52}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xe}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xe}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001400)='syzkaller\x00', 0x9, 0xef, &(0x7f0000001440)=""/239, 0x40f00, 0x4, '\x00', r1, @fallback=0x23, r8, 0x8, &(0x7f00000016c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000001700)={0x5, 0x6, 0x5, 0x6}, 0x10, r2, 0xffffffffffffffff, 0x1, &(0x7f0000001740)=[r6, r4, r4, r4], &(0x7f0000001780)=[{0x1, 0x3, 0x9, 0xc}], 0x10, 0x22}, 0x94) unlink(&(0x7f0000001880)='./file0/file0\x00') r9 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000018c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000001900)=r7, 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000001940)=@base={0xc, 0x9, 0xffffff31, 0xbb8d, 0x1000, r4, 0x7954, '\x00', 0x0, r8, 0x1, 0x3, 0x5}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000019c0)={0xffffffffffffffff}) sendmsg$unix(r10, &(0x7f0000001b80)={&(0x7f0000001a00)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001b40)=[{&(0x7f0000001a80)="09af0e634c042fe51c47d5a973b06625196626054df1563fe02a5f7354d0949032e22900aa479d6a17dfe10d79f31327dc6720e20b002b53b861ac416f02c34820d4639a1d228546ed25f02cdb30a8875c550cb15de090b8781a396f6ce1123ce442db1ef6e4c3b7c7aeb236a88ec97744459abadf61d5c01e313290fec765af667eaa42b857cd456bb510d6003a5ae09ab2abbf44179ee63086f69452203557dbdf827934ae83f8", 0xa8}], 0x1, 0x0, 0x0, 0x4040411}, 0x40000) socketpair(0x15, 0x6, 0x40, &(0x7f0000001bc0)) r11 = perf_event_open$cgroup(&(0x7f0000001cc0)={0x0, 0x80, 0x5, 0xc, 0x7, 0x4, 0x0, 0xfffffffffffffffd, 0x8c010, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x3, @perf_bp={&(0x7f0000001c80), 0xa}, 0x693f9fd233e176ba, 0x2, 0x5, 0x2, 0x10000, 0xff, 0x59d, 0x0, 0x81, 0x0, 0x10001}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000001c00)={0x5, 0x80, 0xfc, 0xf9, 0x4a, 0x10, 0x0, 0x1e, 0x80317, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffff4, 0x0, @perf_config_ext={0xffff, 0x80000000}, 0x1530, 0x6, 0xfa, 0x1, 0x11b5, 0x10000, 0x4, 0x0, 0x2, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, r11, 0x1) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001d40)='./cgroup.net/syz0\x00', 0x200002, 0x0) r13 = openat$cgroup_ro(r12, &(0x7f0000001d80)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_ro(r13, &(0x7f0000001dc0)='net_prio.prioidx\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001e00)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001f80)={&(0x7f0000001e40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd3, 0xd3, 0xa, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x1, 0xe}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0x6}}, @typedef={0x5, 0x0, 0x0, 0x8, 0x2}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x25, 0x0, 0x42, 0x2}, @datasec={0xf, 0xa, 0x0, 0xf, 0x3, [{0x2, 0x1, 0xee53}, {0x3, 0x6966, 0x3}, {0x3, 0x0, 0x4}, {0x4, 0x800, 0x7ff}, {0x2, 0x0, 0xef}, {0x3, 0x8, 0x101}, {0x4, 0xfffffffc, 0x69}, {0x4, 0x0, 0x9}, {0x2, 0xa, 0x80000001}, {0x5, 0x81, 0x7}], "03b695"}]}, {0x0, [0x2e, 0x61, 0x61, 0x61, 0x0, 0x5f, 0x61, 0x30]}}, &(0x7f0000001f40), 0xf6, 0x0, 0x1, 0x8}, 0x28) syz_open_procfs$namespace(r7, &(0x7f0000001fc0)='ns/time_for_children\x00') bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002180)={&(0x7f0000002000)="e126774f85bf4447d97db3aa2e39fc96303dad9f418d833a8ec68e138344c870452ad36b42ee0c00492ee872e2c7c0bc280f61be96bf0185d1fb7e2be24271d81c1e801e62692b5c12e1ad7503a5", &(0x7f0000002080), &(0x7f00000020c0)="bcee0e96", &(0x7f0000002100)="4cd7f0751fa45d1bf38db1c2b3c63d2e038190ffad0172f5cffb4463a136f0dbce05234363e3c21869ae7ba6eeee1cf9bceece6341d0d1e00d4972e67cd1361ba96c52c3e8b53a90d6f47b94227f55268794b17f8735e07e5c4fa3a880a384f8cd34b4018c661267", 0xde, r8}, 0x38) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) sendmsg$unix(r10, &(0x7f0000002640)={&(0x7f00000021c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000002500)=[{&(0x7f0000002240)="03fd555cc09da6384bec5131ba4c594f6cfedaa5e1b74e750310e30e05255bd2077b0189e320a13939238f01496ea886588ee2acf48c64b1fd58a4c9691dba2d406d62ad6af389378894be6453cdd3004ee0d6a1285024f06d937c645a040f4ec7ea21b97882cf79a247ada34ccb94bcb447ec064d4a49638ed4dbd6222989a0565b8f50b7c1b232759b5fbadbe7fccb269df3ef8b4268b007d0ce63d1051e49f407627a97dab68f6fd13b95c21b5f6edcfe53721586414cdfcc6105507557c5fe98bdac5b57fca6392a09f47c8c23b21dcd8b693f37ee1a2167fae91f67dad0fcbe0923a1d96c4aacf1510c74", 0xed}, {&(0x7f0000002340)="639e52a36153ad0fdca28281212ac2af9e78ea5444eb292d4a32f75291856c09d10c751b693385463991303b15437099b70f525e5d5da1812cfed4300cc75a350e79a50a0f98078ea2b999d49e965bded833d180d91b3da7330b7a478ce9ab983e", 0x61}, {&(0x7f00000023c0)="53d31cefced776e4dba253924495b95454d27f5ded03c4b912f9459dd10179e8478b051442138dd776b80d82c8b4911beebf2d", 0x33}, {&(0x7f0000002400)="fceb37e0bf49a2db2c8bcfe3a3f5a34eb87e3bf94966f683b0d49d01450d6bda665854d5c10c588ad545e2e4b2a6058e7599b0b6a810308fc491a01807d24c8dcdd4fa20709b28a0ceae", 0x4a}, {&(0x7f0000002480)="20ea9d0dcb0de53b9e590bbca862fb26bc7e6337ccca2db04cb6788f403e4a45be0e95a68c9d4a92a2f5851da8c9e9e85e8e63d763007e7a66581e1b6e4c111fdd2fd6990ab912a113fd5a563ba91a4468241e8028c23d904fb2cb8e", 0x5c}], 0x5, &(0x7f0000002600)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff}}}, @rights={{0x20, 0x1, 0x1, [r14, r3, r8, 0xffffffffffffffff]}}], 0x40, 0x44040}, 0x20000004) 0s ago: executing program 4 (id=2890): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00"/14, @ANYRES32=0x0, @ANYBLOB], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) (fail_nth: 9) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.221' (ED25519) to the list of known hosts. [ 21.928779][ T30] audit: type=1400 audit(1753293851.953:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.929932][ T273] cgroup: Unknown subsys name 'net' [ 21.954771][ T30] audit: type=1400 audit(1753293851.953:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.987204][ T30] audit: type=1400 audit(1753293851.983:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.987445][ T273] cgroup: Unknown subsys name 'devices' [ 22.196688][ T273] cgroup: Unknown subsys name 'hugetlb' [ 22.202550][ T273] cgroup: Unknown subsys name 'rlimit' [ 22.370166][ T30] audit: type=1400 audit(1753293852.393:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.395430][ T30] audit: type=1400 audit(1753293852.393:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.397735][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.423589][ T30] audit: type=1400 audit(1753293852.393:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 22.459998][ T30] audit: type=1400 audit(1753293852.463:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.477274][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.486687][ T30] audit: type=1400 audit(1753293852.463:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.521900][ T30] audit: type=1400 audit(1753293852.493:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.548840][ T30] audit: type=1400 audit(1753293852.493:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.207584][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.215793][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.223496][ T281] device bridge_slave_0 entered promiscuous mode [ 23.232533][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.240711][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.248781][ T281] device bridge_slave_1 entered promiscuous mode [ 23.367680][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.376097][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.383905][ T283] device bridge_slave_0 entered promiscuous mode [ 23.392179][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.399878][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.407844][ T283] device bridge_slave_1 entered promiscuous mode [ 23.414958][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.422729][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.431145][ T282] device bridge_slave_0 entered promiscuous mode [ 23.441629][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.450124][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.460880][ T282] device bridge_slave_1 entered promiscuous mode [ 23.508974][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.516719][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.524112][ T284] device bridge_slave_0 entered promiscuous mode [ 23.549466][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.557137][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.565836][ T284] device bridge_slave_1 entered promiscuous mode [ 23.572625][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.580266][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.590731][ T285] device bridge_slave_0 entered promiscuous mode [ 23.602034][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.609557][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.617598][ T285] device bridge_slave_1 entered promiscuous mode [ 23.776662][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.784179][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.791779][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.798867][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.827825][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.837117][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.845382][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.854516][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.908735][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.917849][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.925637][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.933618][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.941018][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.967043][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.975347][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.982478][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.017348][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.026574][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.035371][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.042555][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.050464][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.058348][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.066064][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.075500][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.083049][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.090896][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.099423][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.106564][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.114011][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.122249][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.129361][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.136811][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.145148][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.152166][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.159690][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.168090][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.176610][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.195246][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.203018][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.210773][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.219271][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.227460][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.235681][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.243583][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.252063][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.260680][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.268129][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.275707][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.284175][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.292963][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.300377][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.324570][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.332574][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.341720][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.352143][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.367211][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.376932][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.385513][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.396506][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.406918][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.415552][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.424649][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.433312][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.441709][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.450686][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.458326][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.471895][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.481386][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.493895][ T281] device veth0_vlan entered promiscuous mode [ 24.513136][ T282] device veth0_vlan entered promiscuous mode [ 24.522859][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.531984][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.543810][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.553665][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.572002][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.586478][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.596718][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.606911][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.620455][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.630145][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.641264][ T281] device veth1_macvtap entered promiscuous mode [ 24.658793][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.667937][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.676158][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.690359][ T283] device veth0_vlan entered promiscuous mode [ 24.698503][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.706759][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.714617][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.725513][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.733108][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.741081][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.751129][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.760254][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.768035][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.778634][ T285] device veth0_vlan entered promiscuous mode [ 24.796599][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.805835][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.813396][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.822731][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.832146][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.840938][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.849014][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.857952][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.867208][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.875880][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.884660][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.892942][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.902004][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.909671][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.919178][ T283] device veth1_macvtap entered promiscuous mode [ 24.929179][ T282] device veth1_macvtap entered promiscuous mode [ 24.949704][ T281] request_module fs-gadgetfs succeeded, but still no fs? [ 24.954918][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.967884][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.978274][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.992774][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.003400][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.019645][ T285] device veth1_macvtap entered promiscuous mode [ 25.034226][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.048373][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.063978][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.076391][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.085801][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.095861][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.104848][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.116194][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.145170][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.162846][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.208303][ T284] device veth0_vlan entered promiscuous mode [ 25.215684][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.225030][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.254201][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.266306][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.286371][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.298310][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.315883][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.324808][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.342993][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.374878][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.394342][ C0] hrtimer: interrupt took 27295 ns [ 25.404875][ T284] device veth1_macvtap entered promiscuous mode [ 25.457270][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.472576][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.504039][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.613619][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.633490][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.345146][ T467] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.352478][ T467] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.402165][ T453] syz.3.44 (453) used greatest stack depth: 21360 bytes left [ 33.413540][ T30] kauditd_printk_skb: 30 callbacks suppressed [ 33.413554][ T30] audit: type=1400 audit(1753293863.443:104): avc: denied { create } for pid=466 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 33.596618][ T30] audit: type=1400 audit(1753293863.543:105): avc: denied { write } for pid=469 comm="syz.3.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 33.734544][ T30] audit: type=1400 audit(1753293863.753:106): avc: denied { create } for pid=477 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 33.762192][ T30] audit: type=1400 audit(1753293863.753:107): avc: denied { create } for pid=477 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.821431][ T30] audit: type=1400 audit(1753293863.843:108): avc: denied { write } for pid=480 comm="syz.3.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.879332][ T483] device sit0 entered promiscuous mode [ 33.958780][ T30] audit: type=1400 audit(1753293863.983:109): avc: denied { relabelfrom } for pid=490 comm="syz.3.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.006972][ T30] audit: type=1400 audit(1753293863.983:110): avc: denied { relabelto } for pid=490 comm="syz.3.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 35.601866][ T30] audit: type=1400 audit(1753293865.623:111): avc: denied { read } for pid=515 comm="syz.2.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 41.117031][ T30] audit: type=1400 audit(1753293871.143:112): avc: denied { create } for pid=599 comm="syz.2.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 41.455167][ T606] device sit0 left promiscuous mode [ 41.499914][ T607] device sit0 entered promiscuous mode [ 43.897226][ T685] tap0: tun_chr_ioctl cmd 1074025677 [ 43.951295][ T685] tap0: linktype set to 769 [ 45.344126][ T724] device sit0 entered promiscuous mode [ 46.617510][ T763] device pim6reg1 entered promiscuous mode [ 47.013281][ T777] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 47.039667][ T777] device syzkaller0 entered promiscuous mode [ 48.813349][ T827] device sit0 left promiscuous mode [ 49.034158][ T826] device sit0 entered promiscuous mode [ 49.085812][ T30] audit: type=1400 audit(1753293879.113:113): avc: denied { create } for pid=825 comm="syz.3.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 49.250192][ T30] audit: type=1400 audit(1753293879.263:114): avc: denied { create } for pid=835 comm="syz.1.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 49.351271][ T837] device sit0 entered promiscuous mode [ 50.670453][ T858] device pim6reg1 entered promiscuous mode [ 50.991471][ T875] device sit0 left promiscuous mode [ 51.000399][ T877] syz.0.181[877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.000479][ T877] syz.0.181[877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.092195][ T878] syz.0.181[878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.222925][ T875] device sit0 entered promiscuous mode [ 51.665491][ T891] device sit0 left promiscuous mode [ 51.722120][ T891] device sit0 entered promiscuous mode [ 51.964464][ T30] audit: type=1400 audit(1753293881.983:115): avc: denied { cpu } for pid=876 comm="syz.0.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 52.305011][ T30] audit: type=1400 audit(1753293882.333:116): avc: denied { create } for pid=898 comm="syz.3.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 52.579679][ T910] ip6_vti0: mtu greater than device maximum [ 52.770733][ T924] device sit0 left promiscuous mode [ 53.479270][ T934] syz.3.198[934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.479345][ T934] syz.3.198[934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.645028][ T934] syz.3.198[934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.208192][ T30] audit: type=1400 audit(1753293884.233:117): avc: denied { create } for pid=955 comm="syz.4.206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 55.955480][ T987] syz.4.215[987] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.955572][ T987] syz.4.215[987] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.525748][ T987] syz.4.215[987] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.465587][ T30] audit: type=1400 audit(1753293887.493:118): avc: denied { read } for pid=1008 comm="syz.2.221" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 57.995049][ T30] audit: type=1400 audit(1753293887.643:119): avc: denied { open } for pid=1008 comm="syz.2.221" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 58.048656][ T30] audit: type=1400 audit(1753293887.643:120): avc: denied { ioctl } for pid=1008 comm="syz.2.221" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x7452 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 58.297889][ T30] audit: type=1400 audit(1753293887.643:121): avc: denied { write } for pid=1008 comm="syz.2.221" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 60.883797][ T1065] device pim6reg1 entered promiscuous mode [ 62.615111][ T30] audit: type=1400 audit(1753293892.643:122): avc: denied { setopt } for pid=1079 comm="syz.1.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 62.768710][ T1084] GPL: port 1(veth0_to_team) entered blocking state [ 62.894731][ T1084] GPL: port 1(veth0_to_team) entered disabled state [ 62.975165][ T1084] device veth0_to_team entered promiscuous mode [ 64.488448][ T1123] device veth1_macvtap left promiscuous mode [ 64.996311][ T30] audit: type=1400 audit(1753293895.023:123): avc: denied { create } for pid=1132 comm="syz.3.257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 65.525105][ T1144] device sit0 entered promiscuous mode [ 66.190552][ T30] audit: type=1400 audit(1753293896.203:124): avc: denied { ioctl } for pid=1151 comm="syz.0.266" path="socket:[18711]" dev="sockfs" ino=18711 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 66.958897][ T1182] device pim6reg1 entered promiscuous mode [ 67.103464][ T1194] device sit0 left promiscuous mode [ 67.693976][ T1197] device sit0 entered promiscuous mode [ 69.152499][ T30] audit: type=1400 audit(1753293899.173:125): avc: denied { create } for pid=1244 comm="syz.4.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 69.946151][ T1255] device sit0 left promiscuous mode [ 70.119054][ T1253] device sit0 entered promiscuous mode [ 70.791982][ T1273] device pim6reg1 entered promiscuous mode [ 71.059596][ T1289] device vlan1 entered promiscuous mode [ 71.940543][ T1310] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 73.037056][ T101] udevd[101]: worker [334] terminated by signal 33 (Unknown signal 33) [ 73.110343][ T101] udevd[101]: worker [334] failed while handling '/devices/virtual/block/loop3' [ 74.965316][ T30] audit: type=1400 audit(1753293904.993:126): avc: denied { create } for pid=1353 comm="syz.1.327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 85.697975][ T30] audit: type=1400 audit(1753293915.723:127): avc: denied { create } for pid=1563 comm="syz.3.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 86.762846][ T1587] device syzkaller0 entered promiscuous mode [ 87.118720][ T1604] device sit0 entered promiscuous mode [ 87.610027][ T1618] device syzkaller0 entered promiscuous mode [ 92.165138][ T1704] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 92.217723][ T1704] device syzkaller0 entered promiscuous mode [ 92.466816][ T1711] device syzkaller0 entered promiscuous mode [ 94.047875][ T30] audit: type=1400 audit(1753293924.073:128): avc: denied { create } for pid=1752 comm="syz.1.459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 95.313653][ T1784] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 95.941121][ T1794] device syzkaller0 entered promiscuous mode [ 101.826222][ T1881] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.833830][ T1881] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.122427][ T1881] device bridge_slave_1 left promiscuous mode [ 102.248987][ T1881] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.316222][ T1881] device bridge_slave_0 left promiscuous mode [ 102.322805][ T1881] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.933491][ T1895] device syzkaller0 entered promiscuous mode [ 105.919571][ T1970] device syzkaller0 entered promiscuous mode [ 106.472236][ T1984] device pim6reg1 entered promiscuous mode [ 111.393186][ T2113] device pim6reg1 entered promiscuous mode [ 117.653078][ T30] audit: type=1400 audit(1753293947.613:129): avc: denied { create } for pid=2226 comm="syz.2.632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 118.994739][ T2263] device syzkaller0 entered promiscuous mode [ 119.611643][ T30] audit: type=1400 audit(1753293949.633:130): avc: denied { create } for pid=2273 comm="syz.2.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 119.802481][ T30] audit: type=1400 audit(1753293949.663:131): avc: denied { create } for pid=2273 comm="syz.2.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 120.116974][ T30] audit: type=1400 audit(1753293950.143:132): avc: denied { create } for pid=2287 comm="syz.2.654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 121.161721][ T30] audit: type=1400 audit(1753293951.183:133): avc: denied { create } for pid=2314 comm="syz.0.664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 126.788188][ T2441] FAULT_INJECTION: forcing a failure. [ 126.788188][ T2441] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 126.968578][ T2441] CPU: 1 PID: 2441 Comm: syz.0.712 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 126.978414][ T2441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 126.988867][ T2441] Call Trace: [ 126.992240][ T2441] [ 126.995180][ T2441] __dump_stack+0x21/0x30 [ 126.999540][ T2441] dump_stack_lvl+0xee/0x150 [ 127.004330][ T2441] ? show_regs_print_info+0x20/0x20 [ 127.009721][ T2441] ? vfs_write+0xc17/0xf70 [ 127.014208][ T2441] dump_stack+0x15/0x20 [ 127.018396][ T2441] should_fail+0x3c1/0x510 [ 127.022819][ T2441] should_fail_usercopy+0x1a/0x20 [ 127.027953][ T2441] _copy_from_user+0x20/0xd0 [ 127.032556][ T2441] __sys_bpf+0x233/0x730 [ 127.036802][ T2441] ? bpf_link_show_fdinfo+0x310/0x310 [ 127.042175][ T2441] ? debug_smp_processor_id+0x17/0x20 [ 127.047557][ T2441] __x64_sys_bpf+0x7c/0x90 [ 127.051982][ T2441] x64_sys_call+0x4b9/0x9a0 [ 127.056493][ T2441] do_syscall_64+0x4c/0xa0 [ 127.060918][ T2441] ? clear_bhb_loop+0x50/0xa0 [ 127.065613][ T2441] ? clear_bhb_loop+0x50/0xa0 [ 127.070290][ T2441] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 127.078587][ T2441] RIP: 0033:0x7fe3fcbc49a9 [ 127.083196][ T2441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 127.102925][ T2441] RSP: 002b:00007fe3fb20c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 127.111728][ T2441] RAX: ffffffffffffffda RBX: 00007fe3fcdec080 RCX: 00007fe3fcbc49a9 [ 127.119834][ T2441] RDX: 0000000000000080 RSI: 0000200000000040 RDI: 0000000000000005 [ 127.127820][ T2441] RBP: 00007fe3fb20c090 R08: 0000000000000000 R09: 0000000000000000 [ 127.135796][ T2441] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 127.143883][ T2441] R13: 0000000000000000 R14: 00007fe3fcdec080 R15: 00007ffd3f1b5b08 [ 127.151868][ T2441] [ 127.426666][ T30] audit: type=1400 audit(1753293957.443:134): avc: denied { create } for pid=2444 comm="syz.3.714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 129.134032][ T2490] FAULT_INJECTION: forcing a failure. [ 129.134032][ T2490] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 129.265383][ T2490] CPU: 0 PID: 2490 Comm: syz.1.728 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 129.275670][ T2490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 129.285735][ T2490] Call Trace: [ 129.289019][ T2490] [ 129.292120][ T2490] __dump_stack+0x21/0x30 [ 129.296477][ T2490] dump_stack_lvl+0xee/0x150 [ 129.301179][ T2490] ? show_regs_print_info+0x20/0x20 [ 129.306378][ T2490] dump_stack+0x15/0x20 [ 129.310541][ T2490] should_fail+0x3c1/0x510 [ 129.314960][ T2490] should_fail_usercopy+0x1a/0x20 [ 129.320437][ T2490] strncpy_from_user+0x24/0x2e0 [ 129.325306][ T2490] bpf_prog_load+0x1b8/0x1550 [ 129.330086][ T2490] ? __kasan_check_write+0x14/0x20 [ 129.335206][ T2490] ? proc_fail_nth_write+0x17a/0x1f0 [ 129.340784][ T2490] ? map_freeze+0x360/0x360 [ 129.345468][ T2490] ? selinux_bpf+0xc7/0xf0 [ 129.350090][ T2490] ? security_bpf+0x82/0xa0 [ 129.354793][ T2490] __sys_bpf+0x4c3/0x730 [ 129.359275][ T2490] ? bpf_link_show_fdinfo+0x310/0x310 [ 129.364658][ T2490] ? debug_smp_processor_id+0x17/0x20 [ 129.370049][ T2490] __x64_sys_bpf+0x7c/0x90 [ 129.374495][ T2490] x64_sys_call+0x4b9/0x9a0 [ 129.379037][ T2490] do_syscall_64+0x4c/0xa0 [ 129.383457][ T2490] ? clear_bhb_loop+0x50/0xa0 [ 129.388232][ T2490] ? clear_bhb_loop+0x50/0xa0 [ 129.392914][ T2490] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 129.398851][ T2490] RIP: 0033:0x7fb688ff89a9 [ 129.403269][ T2490] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 129.422968][ T2490] RSP: 002b:00007fb687640038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 129.431397][ T2490] RAX: ffffffffffffffda RBX: 00007fb689220080 RCX: 00007fb688ff89a9 [ 129.439463][ T2490] RDX: 0000000000000080 RSI: 0000200000000040 RDI: 0000000000000005 [ 129.447610][ T2490] RBP: 00007fb687640090 R08: 0000000000000000 R09: 0000000000000000 [ 129.455594][ T2490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 129.463584][ T2490] R13: 0000000000000000 R14: 00007fb689220080 R15: 00007ffdefd3f5a8 [ 129.471565][ T2490] [ 130.975468][ T2534] FAULT_INJECTION: forcing a failure. [ 130.975468][ T2534] name failslab, interval 1, probability 0, space 0, times 1 [ 131.115020][ T2534] CPU: 1 PID: 2534 Comm: syz.2.747 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 131.125234][ T2534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 131.136709][ T2534] Call Trace: [ 131.140105][ T2534] [ 131.143236][ T2534] __dump_stack+0x21/0x30 [ 131.147788][ T2534] dump_stack_lvl+0xee/0x150 [ 131.152893][ T2534] ? show_regs_print_info+0x20/0x20 [ 131.158233][ T2534] dump_stack+0x15/0x20 [ 131.162434][ T2534] should_fail+0x3c1/0x510 [ 131.167215][ T2534] __should_failslab+0xa4/0xe0 [ 131.172139][ T2534] should_failslab+0x9/0x20 [ 131.176754][ T2534] slab_pre_alloc_hook+0x3b/0xe0 [ 131.182771][ T2534] kmem_cache_alloc_trace+0x48/0x270 [ 131.188126][ T2534] ? __get_vm_area_node+0x11d/0x350 [ 131.193537][ T2534] ? irqentry_exit+0x37/0x40 [ 131.198657][ T2534] __get_vm_area_node+0x11d/0x350 [ 131.204239][ T2534] __vmalloc_node_range+0xe8/0x840 [ 131.209379][ T2534] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 131.216029][ T2534] ? selinux_capset+0xf0/0xf0 [ 131.220753][ T2534] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 131.226320][ T2534] __vmalloc+0x79/0x90 [ 131.230427][ T2534] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 131.235994][ T2534] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 131.241616][ T2534] bpf_prog_alloc+0x1f/0x1e0 [ 131.246231][ T2534] bpf_prog_load+0x7c3/0x1550 [ 131.250942][ T2534] ? __kasan_check_write+0x14/0x20 [ 131.256119][ T2534] ? map_freeze+0x360/0x360 [ 131.260645][ T2534] ? selinux_bpf+0xc7/0xf0 [ 131.265082][ T2534] ? security_bpf+0x82/0xa0 [ 131.269592][ T2534] __sys_bpf+0x4c3/0x730 [ 131.273957][ T2534] ? bpf_link_show_fdinfo+0x310/0x310 [ 131.279796][ T2534] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 131.286096][ T2534] __x64_sys_bpf+0x7c/0x90 [ 131.290614][ T2534] x64_sys_call+0x4b9/0x9a0 [ 131.295259][ T2534] do_syscall_64+0x4c/0xa0 [ 131.299781][ T2534] ? clear_bhb_loop+0x50/0xa0 [ 131.305609][ T2534] ? clear_bhb_loop+0x50/0xa0 [ 131.310373][ T2534] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 131.316277][ T2534] RIP: 0033:0x7f47267ad9a9 [ 131.320843][ T2534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 131.341375][ T2534] RSP: 002b:00007f4724e16038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 131.350495][ T2534] RAX: ffffffffffffffda RBX: 00007f47269d4fa0 RCX: 00007f47267ad9a9 [ 131.359718][ T2534] RDX: 0000000000000080 RSI: 0000200000000040 RDI: 0000000000000005 [ 131.368247][ T2534] RBP: 00007f4724e16090 R08: 0000000000000000 R09: 0000000000000000 [ 131.376374][ T2534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 131.384530][ T2534] R13: 0000000000000000 R14: 00007f47269d4fa0 R15: 00007ffccd393468 [ 131.392639][ T2534] [ 131.458001][ T2534] syz.2.747: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 131.484912][ T2534] CPU: 0 PID: 2534 Comm: syz.2.747 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 131.495157][ T2534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 131.505845][ T2534] Call Trace: [ 131.509377][ T2534] [ 131.512756][ T2534] __dump_stack+0x21/0x30 [ 131.517414][ T2534] dump_stack_lvl+0xee/0x150 [ 131.522105][ T2534] ? show_regs_print_info+0x20/0x20 [ 131.527603][ T2534] dump_stack+0x15/0x20 [ 131.532015][ T2534] warn_alloc+0x1b0/0x1d0 [ 131.536531][ T2534] ? __should_failslab+0xa4/0xe0 [ 131.541568][ T2534] ? zone_watermark_ok_safe+0x270/0x270 [ 131.547471][ T2534] ? kmem_cache_alloc_trace+0x119/0x270 [ 131.553041][ T2534] __vmalloc_node_range+0x2c4/0x840 [ 131.558603][ T2534] ? selinux_capset+0xf0/0xf0 [ 131.563308][ T2534] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 131.569091][ T2534] __vmalloc+0x79/0x90 [ 131.573205][ T2534] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 131.578942][ T2534] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 131.584368][ T2534] bpf_prog_alloc+0x1f/0x1e0 [ 131.589154][ T2534] bpf_prog_load+0x7c3/0x1550 [ 131.594262][ T2534] ? __kasan_check_write+0x14/0x20 [ 131.599566][ T2534] ? map_freeze+0x360/0x360 [ 131.604358][ T2534] ? selinux_bpf+0xc7/0xf0 [ 131.609156][ T2534] ? security_bpf+0x82/0xa0 [ 131.613835][ T2534] __sys_bpf+0x4c3/0x730 [ 131.618176][ T2534] ? bpf_link_show_fdinfo+0x310/0x310 [ 131.623698][ T2534] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 131.630345][ T2534] __x64_sys_bpf+0x7c/0x90 [ 131.634792][ T2534] x64_sys_call+0x4b9/0x9a0 [ 131.639423][ T2534] do_syscall_64+0x4c/0xa0 [ 131.643899][ T2534] ? clear_bhb_loop+0x50/0xa0 [ 131.648786][ T2534] ? clear_bhb_loop+0x50/0xa0 [ 131.653833][ T2534] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 131.659903][ T2534] RIP: 0033:0x7f47267ad9a9 [ 131.664614][ T2534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 131.685217][ T2534] RSP: 002b:00007f4724e16038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 131.693817][ T2534] RAX: ffffffffffffffda RBX: 00007f47269d4fa0 RCX: 00007f47267ad9a9 [ 131.702038][ T2534] RDX: 0000000000000080 RSI: 0000200000000040 RDI: 0000000000000005 [ 131.710280][ T2534] RBP: 00007f4724e16090 R08: 0000000000000000 R09: 0000000000000000 [ 131.718693][ T2534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 131.727097][ T2534] R13: 0000000000000000 R14: 00007f47269d4fa0 R15: 00007ffccd393468 [ 131.735167][ T2534] [ 131.775990][ T2534] Mem-Info: [ 131.780533][ T2534] active_anon:37 inactive_anon:3693 isolated_anon:0 [ 131.780533][ T2534] active_file:16062 inactive_file:8849 isolated_file:0 [ 131.780533][ T2534] unevictable:0 dirty:149 writeback:0 [ 131.780533][ T2534] slab_reclaimable:7675 slab_unreclaimable:72299 [ 131.780533][ T2534] mapped:28926 shmem:162 pagetables:551 bounce:0 [ 131.780533][ T2534] kernel_misc_reclaimable:0 [ 131.780533][ T2534] free:1540835 free_pcp:25868 free_cma:0 [ 131.847439][ T2534] Node 0 active_anon:148kB inactive_anon:14772kB active_file:64248kB inactive_file:35496kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:115604kB dirty:596kB writeback:0kB shmem:648kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5092kB pagetables:2304kB all_unreclaimable? no [ 131.886558][ T2534] DMA32 free:2978772kB min:62612kB low:78264kB high:93916kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2983000kB mlocked:0kB bounce:0kB free_pcp:4228kB local_pcp:0kB free_cma:0kB [ 131.944894][ T2534] lowmem_reserve[]: 0 3941 3941 [ 131.953100][ T2534] Normal free:3138584kB min:84840kB low:106048kB high:127256kB reserved_highatomic:0KB active_anon:148kB inactive_anon:14772kB active_file:64248kB inactive_file:35496kB unevictable:0kB writepending:596kB present:5242880kB managed:4036096kB mlocked:0kB bounce:0kB free_pcp:97764kB local_pcp:50820kB free_cma:0kB [ 132.012184][ T2534] lowmem_reserve[]: 0 0 0 [ 132.016975][ T2534] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2978772kB [ 132.033271][ T2534] Normal: 932*4kB (UME) 217*8kB (UME) 194*16kB (UM) 116*32kB (UME) 125*64kB (UM) 38*128kB (UM) 19*256kB (UME) 17*512kB (UM) 7*1024kB (UE) 5*2048kB (UM) 756*4096kB (UM) = 3152696kB [ 132.053756][ T2534] 25105 total pagecache pages [ 132.058850][ T2534] 0 pages in swap cache [ 132.081143][ T2534] Swap cache stats: add 0, delete 0, find 0/0 [ 132.087887][ T2534] Free swap = 124996kB [ 132.094445][ T2534] Total swap = 124996kB [ 132.098617][ T2534] 2097051 pages RAM [ 132.102424][ T2534] 0 pages HighMem/MovableOnly [ 132.107326][ T2534] 342277 pages reserved [ 132.111478][ T2534] 0 pages cma reserved [ 133.170886][ T2584] tun0: tun_chr_ioctl cmd 1074025677 [ 133.214447][ T2584] tun0: linktype set to 776 [ 133.519684][ T30] audit: type=1400 audit(1753293963.533:135): avc: denied { create } for pid=2599 comm="syz.3.769" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 137.067458][ T2679] device sit0 left promiscuous mode [ 141.354387][ T2766] device syzkaller0 entered promiscuous mode [ 142.421355][ T2806] device pim6reg1 entered promiscuous mode [ 143.222330][ T2838] device syzkaller0 entered promiscuous mode [ 144.160927][ T2858] device syzkaller0 entered promiscuous mode [ 144.326058][ T2865] bond_slave_1: mtu less than device minimum [ 145.168982][ T2888] device pim6reg1 entered promiscuous mode [ 145.512524][ T2894] device syzkaller0 entered promiscuous mode [ 147.704866][ T30] audit: type=1400 audit(1753293977.693:136): avc: denied { create } for pid=2964 comm="syz.3.901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 148.760289][ T3001] device syzkaller0 entered promiscuous mode [ 148.766564][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 148.921781][ T30] audit: type=1400 audit(1753293978.943:137): avc: denied { tracepoint } for pid=3003 comm="syz.1.915" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 157.623399][ T3167] device bridge_slave_1 left promiscuous mode [ 157.688044][ T3167] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.764840][ T3167] device bridge_slave_0 left promiscuous mode [ 157.773218][ T3167] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.627652][ T3219] device syzkaller0 entered promiscuous mode [ 189.040267][ T3771] device veth1_macvtap left promiscuous mode [ 201.036152][ T4021] device sit0 left promiscuous mode [ 204.012847][ T4089] device sit0 left promiscuous mode [ 230.422464][ T4565] @ÿ: renamed from bond_slave_0 [ 246.343478][ T4924] device wg2 entered promiscuous mode [ 248.183972][ T4966] device syzkaller0 entered promiscuous mode [ 250.618058][ T5019] device veth0_vlan left promiscuous mode [ 250.630702][ T5019] device veth0_vlan entered promiscuous mode [ 250.674795][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.682832][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 250.703513][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 253.477297][ T5062] device syzkaller0 entered promiscuous mode [ 256.197326][ T30] audit: type=1400 audit(1753294086.223:138): avc: denied { create } for pid=5109 comm="syz.3.1730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 261.343120][ T5178] device syzkaller0 entered promiscuous mode [ 265.510978][ T5261] FAULT_INJECTION: forcing a failure. [ 265.510978][ T5261] name failslab, interval 1, probability 0, space 0, times 0 [ 265.602769][ T5261] CPU: 1 PID: 5261 Comm: syz.3.1787 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 265.612900][ T5261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 265.623327][ T5261] Call Trace: [ 265.626620][ T5261] [ 265.629600][ T5261] __dump_stack+0x21/0x30 [ 265.634542][ T5261] dump_stack_lvl+0xee/0x150 [ 265.639583][ T5261] ? show_regs_print_info+0x20/0x20 [ 265.644969][ T5261] ? __this_cpu_preempt_check+0x13/0x20 [ 265.650620][ T5261] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 265.657073][ T5261] dump_stack+0x15/0x20 [ 265.661447][ T5261] should_fail+0x3c1/0x510 [ 265.665998][ T5261] __should_failslab+0xa4/0xe0 [ 265.670865][ T5261] should_failslab+0x9/0x20 [ 265.675375][ T5261] slab_pre_alloc_hook+0x3b/0xe0 [ 265.680333][ T5261] __kmalloc+0x6d/0x2c0 [ 265.684504][ T5261] ? kvmalloc_node+0x242/0x330 [ 265.689281][ T5261] kvmalloc_node+0x242/0x330 [ 265.693882][ T5261] ? vm_mmap+0xb0/0xb0 [ 265.698029][ T5261] ? irqentry_exit+0x20/0x40 [ 265.702638][ T5261] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 265.708807][ T5261] generic_map_lookup_batch+0x424/0xa70 [ 265.714891][ T5261] ? __fget_files+0x71/0x320 [ 265.719506][ T5261] ? bpf_map_update_value+0x3e0/0x3e0 [ 265.724981][ T5261] ? __fdget+0x1a1/0x230 [ 265.729321][ T5261] ? bpf_map_update_value+0x3e0/0x3e0 [ 265.734704][ T5261] bpf_map_do_batch+0x2d4/0x5f0 [ 265.739583][ T5261] ? security_bpf+0x82/0xa0 [ 265.744093][ T5261] __sys_bpf+0x5e3/0x730 [ 265.748339][ T5261] ? bpf_link_show_fdinfo+0x310/0x310 [ 265.753723][ T5261] __x64_sys_bpf+0x7c/0x90 [ 265.758144][ T5261] x64_sys_call+0x4b9/0x9a0 [ 265.762661][ T5261] do_syscall_64+0x4c/0xa0 [ 265.767089][ T5261] ? clear_bhb_loop+0x50/0xa0 [ 265.772035][ T5261] ? clear_bhb_loop+0x50/0xa0 [ 265.776719][ T5261] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 265.782629][ T5261] RIP: 0033:0x7f8b13ab79a9 [ 265.787258][ T5261] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 265.807159][ T5261] RSP: 002b:00007f8b12120038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 265.815599][ T5261] RAX: ffffffffffffffda RBX: 00007f8b13cdefa0 RCX: 00007f8b13ab79a9 [ 265.823857][ T5261] RDX: 0000000000000038 RSI: 00002000000003c0 RDI: 0000000000000018 [ 265.831924][ T5261] RBP: 00007f8b12120090 R08: 0000000000000000 R09: 0000000000000000 [ 265.839902][ T5261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 265.847881][ T5261] R13: 0000000000000000 R14: 00007f8b13cdefa0 R15: 00007ffe35f4f288 [ 265.855857][ T5261] [ 267.112924][ T5313] FAULT_INJECTION: forcing a failure. [ 267.112924][ T5313] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 267.270372][ T5313] CPU: 1 PID: 5313 Comm: syz.3.1802 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 267.280309][ T5313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 267.290459][ T5313] Call Trace: [ 267.293736][ T5313] [ 267.296668][ T5313] __dump_stack+0x21/0x30 [ 267.301005][ T5313] dump_stack_lvl+0xee/0x150 [ 267.305606][ T5313] ? show_regs_print_info+0x20/0x20 [ 267.311073][ T5313] dump_stack+0x15/0x20 [ 267.315268][ T5313] should_fail+0x3c1/0x510 [ 267.319757][ T5313] should_fail_usercopy+0x1a/0x20 [ 267.324772][ T5313] _copy_from_user+0x20/0xd0 [ 267.329372][ T5313] kstrtouint_from_user+0xbe/0x200 [ 267.334491][ T5313] ? kstrtol_from_user+0x260/0x260 [ 267.339701][ T5313] proc_fail_nth_write+0x85/0x1f0 [ 267.344732][ T5313] ? proc_fail_nth_read+0x210/0x210 [ 267.349964][ T5313] ? security_file_permission+0x79/0xa0 [ 267.355519][ T5313] ? security_file_permission+0x83/0xa0 [ 267.361080][ T5313] ? proc_fail_nth_read+0x210/0x210 [ 267.366287][ T5313] vfs_write+0x3ee/0xf70 [ 267.370708][ T5313] ? irqentry_exit+0x37/0x40 [ 267.375392][ T5313] ? file_end_write+0x1b0/0x1b0 [ 267.380272][ T5313] ? __kasan_check_write+0x14/0x20 [ 267.385392][ T5313] ? mutex_lock+0x95/0x1a0 [ 267.389814][ T5313] ? wait_for_completion_killable_timeout+0x10/0x10 [ 267.396412][ T5313] ? __fget_files+0x2c4/0x320 [ 267.401104][ T5313] ? __fdget_pos+0x2d2/0x380 [ 267.405699][ T5313] ? ksys_write+0x71/0x240 [ 267.410120][ T5313] ksys_write+0x140/0x240 [ 267.414450][ T5313] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 267.420616][ T5313] ? __ia32_sys_read+0x90/0x90 [ 267.425385][ T5313] ? debug_smp_processor_id+0x17/0x20 [ 267.430781][ T5313] ? perf_trace_sys_enter+0x30/0x150 [ 267.436070][ T5313] __x64_sys_write+0x7b/0x90 [ 267.440829][ T5313] x64_sys_call+0x8ef/0x9a0 [ 267.445348][ T5313] do_syscall_64+0x4c/0xa0 [ 267.449772][ T5313] ? clear_bhb_loop+0x50/0xa0 [ 267.454456][ T5313] ? clear_bhb_loop+0x50/0xa0 [ 267.459146][ T5313] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 267.465042][ T5313] RIP: 0033:0x7f8b13ab645f [ 267.469465][ T5313] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 267.489156][ T5313] RSP: 002b:00007f8b120de030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 267.497565][ T5313] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8b13ab645f [ 267.505755][ T5313] RDX: 0000000000000001 RSI: 00007f8b120de0a0 RDI: 0000000000000004 [ 267.513724][ T5313] RBP: 00007f8b120de090 R08: 0000000000000000 R09: 0000000000000000 [ 267.521862][ T5313] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 267.529829][ T5313] R13: 0000000000000000 R14: 00007f8b13cdf160 R15: 00007ffe35f4f288 [ 267.537844][ T5313] [ 273.876347][ T5442] device pim6reg1 entered promiscuous mode [ 278.323578][ T5527] device sit0 entered promiscuous mode [ 283.131407][ T5616] device veth0_vlan left promiscuous mode [ 283.237119][ T5616] device veth0_vlan entered promiscuous mode [ 283.430140][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 283.463070][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 283.513342][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 289.364043][ T5731] device sit0 entered promiscuous mode [ 290.899196][ T5757] device wg2 entered promiscuous mode [ 301.112901][ T30] audit: type=1400 audit(1753294131.133:139): avc: denied { ioctl } for pid=6014 comm="syz.2.2059" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 304.776344][ T6089] FAULT_INJECTION: forcing a failure. [ 304.776344][ T6089] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 304.824301][ T6089] CPU: 0 PID: 6089 Comm: syz.3.2086 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 304.834237][ T6089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 304.844305][ T6089] Call Trace: [ 304.847590][ T6089] [ 304.850520][ T6089] __dump_stack+0x21/0x30 [ 304.854856][ T6089] dump_stack_lvl+0xee/0x150 [ 304.859465][ T6089] ? show_regs_print_info+0x20/0x20 [ 304.864662][ T6089] ? __kasan_kmalloc+0xec/0x110 [ 304.869523][ T6089] ? __kmalloc_track_caller+0x13c/0x2c0 [ 304.875075][ T6089] ? __alloc_skb+0x21a/0x740 [ 304.879664][ T6089] ? alloc_skb_with_frags+0xa8/0x620 [ 304.884952][ T6089] ? unix_stream_sendmsg+0x41b/0xc80 [ 304.890247][ T6089] ? ____sys_sendmsg+0x5a2/0x8c0 [ 304.895325][ T6089] ? ___sys_sendmsg+0x1f0/0x260 [ 304.900187][ T6089] ? __x64_sys_sendmsg+0x1e2/0x2a0 [ 304.905313][ T6089] dump_stack+0x15/0x20 [ 304.909470][ T6089] should_fail+0x3c1/0x510 [ 304.913889][ T6089] should_fail_alloc_page+0x55/0x80 [ 304.919103][ T6089] prepare_alloc_pages+0x156/0x600 [ 304.924225][ T6089] ? __alloc_pages_bulk+0xab0/0xab0 [ 304.929427][ T6089] __alloc_pages+0x10a/0x440 [ 304.934108][ T6089] ? prep_new_page+0x110/0x110 [ 304.938877][ T6089] ? __alloc_skb+0x463/0x740 [ 304.943477][ T6089] alloc_skb_with_frags+0x1c5/0x620 [ 304.948684][ T6089] sock_alloc_send_pskb+0x853/0x980 [ 304.953893][ T6089] ? sock_kzfree_s+0x60/0x60 [ 304.958489][ T6089] ? avc_has_perm+0x158/0x240 [ 304.963180][ T6089] ? security_socket_getpeersec_dgram+0xaa/0xc0 [ 304.969427][ T6089] unix_stream_sendmsg+0x41b/0xc80 [ 304.974556][ T6089] ? unix_show_fdinfo+0xa0/0xa0 [ 304.979602][ T6089] ? security_socket_sendmsg+0x82/0xa0 [ 304.985071][ T6089] ? unix_show_fdinfo+0xa0/0xa0 [ 304.989936][ T6089] ____sys_sendmsg+0x5a2/0x8c0 [ 304.994794][ T6089] ? __sys_sendmsg_sock+0x40/0x40 [ 304.999925][ T6089] ? import_iovec+0x7c/0xb0 [ 305.004439][ T6089] ___sys_sendmsg+0x1f0/0x260 [ 305.009129][ T6089] ? __sys_sendmsg+0x250/0x250 [ 305.013996][ T6089] ? __fdget+0x1a1/0x230 [ 305.018251][ T6089] __x64_sys_sendmsg+0x1e2/0x2a0 [ 305.023190][ T6089] ? ___sys_sendmsg+0x260/0x260 [ 305.028052][ T6089] ? ksys_write+0x1eb/0x240 [ 305.032561][ T6089] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 305.038645][ T6089] x64_sys_call+0x4b/0x9a0 [ 305.043068][ T6089] do_syscall_64+0x4c/0xa0 [ 305.047536][ T6089] ? clear_bhb_loop+0x50/0xa0 [ 305.052216][ T6089] ? clear_bhb_loop+0x50/0xa0 [ 305.056908][ T6089] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 305.062803][ T6089] RIP: 0033:0x7f8b13ab79a9 [ 305.067224][ T6089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 305.086840][ T6089] RSP: 002b:00007f8b12120038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 305.095269][ T6089] RAX: ffffffffffffffda RBX: 00007f8b13cdefa0 RCX: 00007f8b13ab79a9 [ 305.103244][ T6089] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000004 [ 305.111217][ T6089] RBP: 00007f8b12120090 R08: 0000000000000000 R09: 0000000000000000 [ 305.119193][ T6089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 305.127167][ T6089] R13: 0000000000000000 R14: 00007f8b13cdefa0 R15: 00007ffe35f4f288 [ 305.135146][ T6089] [ 306.069392][ T6113] FAULT_INJECTION: forcing a failure. [ 306.069392][ T6113] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 306.257257][ T6113] CPU: 0 PID: 6113 Comm: syz.0.2095 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 306.267288][ T6113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 306.277525][ T6113] Call Trace: [ 306.280811][ T6113] [ 306.283750][ T6113] __dump_stack+0x21/0x30 [ 306.288099][ T6113] dump_stack_lvl+0xee/0x150 [ 306.292781][ T6113] ? show_regs_print_info+0x20/0x20 [ 306.297987][ T6113] ? vfs_write+0xc17/0xf70 [ 306.302412][ T6113] dump_stack+0x15/0x20 [ 306.306578][ T6113] should_fail+0x3c1/0x510 [ 306.311003][ T6113] should_fail_usercopy+0x1a/0x20 [ 306.316042][ T6113] _copy_from_user+0x20/0xd0 [ 306.320644][ T6113] __sys_bpf+0x233/0x730 [ 306.324889][ T6113] ? bpf_link_show_fdinfo+0x310/0x310 [ 306.330268][ T6113] ? debug_smp_processor_id+0x17/0x20 [ 306.335645][ T6113] __x64_sys_bpf+0x7c/0x90 [ 306.340061][ T6113] x64_sys_call+0x4b9/0x9a0 [ 306.344573][ T6113] do_syscall_64+0x4c/0xa0 [ 306.349081][ T6113] ? clear_bhb_loop+0x50/0xa0 [ 306.353771][ T6113] ? clear_bhb_loop+0x50/0xa0 [ 306.358456][ T6113] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 306.364357][ T6113] RIP: 0033:0x7fe3fcbc49a9 [ 306.368882][ T6113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 306.388494][ T6113] RSP: 002b:00007fe3fb20c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 306.396902][ T6113] RAX: ffffffffffffffda RBX: 00007fe3fcdec080 RCX: 00007fe3fcbc49a9 [ 306.404862][ T6113] RDX: 0000000000000080 RSI: 0000200000000040 RDI: 0000000000000005 [ 306.413082][ T6113] RBP: 00007fe3fb20c090 R08: 0000000000000000 R09: 0000000000000000 [ 306.421066][ T6113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 306.429026][ T6113] R13: 0000000000000000 R14: 00007fe3fcdec080 R15: 00007ffd3f1b5b08 [ 306.436995][ T6113] [ 308.160072][ T6148] device pim6reg1 entered promiscuous mode [ 308.280783][ T6152] FAULT_INJECTION: forcing a failure. [ 308.280783][ T6152] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 308.374280][ T6152] CPU: 0 PID: 6152 Comm: syz.1.2109 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 308.384250][ T6152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 308.394310][ T6152] Call Trace: [ 308.397705][ T6152] [ 308.400655][ T6152] __dump_stack+0x21/0x30 [ 308.404999][ T6152] dump_stack_lvl+0xee/0x150 [ 308.409586][ T6152] ? show_regs_print_info+0x20/0x20 [ 308.414786][ T6152] dump_stack+0x15/0x20 [ 308.418939][ T6152] should_fail+0x3c1/0x510 [ 308.423359][ T6152] should_fail_usercopy+0x1a/0x20 [ 308.428384][ T6152] _copy_from_iter+0x21a/0x1050 [ 308.433243][ T6152] ? __kasan_check_write+0x14/0x20 [ 308.438353][ T6152] ? skb_set_owner_w+0x24d/0x370 [ 308.443291][ T6152] ? copy_mc_pipe_to_iter+0x770/0x770 [ 308.448663][ T6152] ? check_stack_object+0x81/0x140 [ 308.453786][ T6152] ? __check_object_size+0x2f4/0x3c0 [ 308.459069][ T6152] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 308.464790][ T6152] ? skb_put+0x10e/0x1f0 [ 308.469050][ T6152] unix_stream_sendmsg+0x66b/0xc80 [ 308.474253][ T6152] ? unix_show_fdinfo+0xa0/0xa0 [ 308.479110][ T6152] ? security_socket_sendmsg+0x82/0xa0 [ 308.484573][ T6152] ? unix_show_fdinfo+0xa0/0xa0 [ 308.489423][ T6152] ____sys_sendmsg+0x5a2/0x8c0 [ 308.494187][ T6152] ? __sys_sendmsg_sock+0x40/0x40 [ 308.499213][ T6152] ? import_iovec+0x7c/0xb0 [ 308.503724][ T6152] ___sys_sendmsg+0x1f0/0x260 [ 308.508410][ T6152] ? __sys_sendmsg+0x250/0x250 [ 308.513182][ T6152] ? __fdget+0x1a1/0x230 [ 308.517426][ T6152] __x64_sys_sendmsg+0x1e2/0x2a0 [ 308.522365][ T6152] ? ___sys_sendmsg+0x260/0x260 [ 308.527223][ T6152] ? ksys_write+0x1eb/0x240 [ 308.531739][ T6152] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 308.537816][ T6152] x64_sys_call+0x4b/0x9a0 [ 308.542238][ T6152] do_syscall_64+0x4c/0xa0 [ 308.546656][ T6152] ? clear_bhb_loop+0x50/0xa0 [ 308.551340][ T6152] ? clear_bhb_loop+0x50/0xa0 [ 308.556020][ T6152] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 308.561916][ T6152] RIP: 0033:0x7fb688ff89a9 [ 308.566342][ T6152] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 308.585949][ T6152] RSP: 002b:00007fb687661038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 308.594368][ T6152] RAX: ffffffffffffffda RBX: 00007fb68921ffa0 RCX: 00007fb688ff89a9 [ 308.602340][ T6152] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000004 [ 308.610316][ T6152] RBP: 00007fb687661090 R08: 0000000000000000 R09: 0000000000000000 [ 308.618292][ T6152] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 308.626367][ T6152] R13: 0000000000000000 R14: 00007fb68921ffa0 R15: 00007ffdefd3f5a8 [ 308.634349][ T6152] [ 310.327385][ T6198] FAULT_INJECTION: forcing a failure. [ 310.327385][ T6198] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 310.383091][ T6198] CPU: 0 PID: 6198 Comm: syz.3.2129 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 310.393016][ T6198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 310.403062][ T6198] Call Trace: [ 310.406328][ T6198] [ 310.409244][ T6198] __dump_stack+0x21/0x30 [ 310.413571][ T6198] dump_stack_lvl+0xee/0x150 [ 310.418151][ T6198] ? show_regs_print_info+0x20/0x20 [ 310.423336][ T6198] ? _copy_from_iter+0x2e2/0x1050 [ 310.428349][ T6198] ? __kasan_check_write+0x14/0x20 [ 310.433457][ T6198] dump_stack+0x15/0x20 [ 310.437598][ T6198] should_fail+0x3c1/0x510 [ 310.442007][ T6198] should_fail_usercopy+0x1a/0x20 [ 310.447107][ T6198] copy_page_from_iter+0x2f6/0x680 [ 310.452207][ T6198] skb_copy_datagram_from_iter+0x2d0/0x6b0 [ 310.458007][ T6198] unix_stream_sendmsg+0x66b/0xc80 [ 310.463117][ T6198] ? unix_show_fdinfo+0xa0/0xa0 [ 310.467961][ T6198] ? security_socket_sendmsg+0x82/0xa0 [ 310.473415][ T6198] ? unix_show_fdinfo+0xa0/0xa0 [ 310.478262][ T6198] ____sys_sendmsg+0x5a2/0x8c0 [ 310.483019][ T6198] ? __sys_sendmsg_sock+0x40/0x40 [ 310.488030][ T6198] ? import_iovec+0x7c/0xb0 [ 310.492523][ T6198] ___sys_sendmsg+0x1f0/0x260 [ 310.497197][ T6198] ? __sys_sendmsg+0x250/0x250 [ 310.501955][ T6198] ? __fdget+0x1a1/0x230 [ 310.506190][ T6198] __x64_sys_sendmsg+0x1e2/0x2a0 [ 310.511120][ T6198] ? ___sys_sendmsg+0x260/0x260 [ 310.515967][ T6198] ? ksys_write+0x1eb/0x240 [ 310.520492][ T6198] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 310.526554][ T6198] x64_sys_call+0x4b/0x9a0 [ 310.530963][ T6198] do_syscall_64+0x4c/0xa0 [ 310.535367][ T6198] ? clear_bhb_loop+0x50/0xa0 [ 310.540031][ T6198] ? clear_bhb_loop+0x50/0xa0 [ 310.544693][ T6198] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 310.550582][ T6198] RIP: 0033:0x7f8b13ab79a9 [ 310.554993][ T6198] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 310.574794][ T6198] RSP: 002b:00007f8b12120038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 310.583207][ T6198] RAX: ffffffffffffffda RBX: 00007f8b13cdefa0 RCX: 00007f8b13ab79a9 [ 310.591169][ T6198] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000004 [ 310.599130][ T6198] RBP: 00007f8b12120090 R08: 0000000000000000 R09: 0000000000000000 [ 310.607091][ T6198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 310.615052][ T6198] R13: 0000000000000000 R14: 00007f8b13cdefa0 R15: 00007ffe35f4f288 [ 310.623019][ T6198] [ 311.240642][ T6222] bond_slave_1: mtu less than device minimum [ 312.896223][ T6242] FAULT_INJECTION: forcing a failure. [ 312.896223][ T6242] name failslab, interval 1, probability 0, space 0, times 0 [ 313.034436][ T6242] CPU: 0 PID: 6242 Comm: syz.3.2145 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 313.044368][ T6242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 313.054437][ T6242] Call Trace: [ 313.057716][ T6242] [ 313.060640][ T6242] __dump_stack+0x21/0x30 [ 313.064971][ T6242] dump_stack_lvl+0xee/0x150 [ 313.069564][ T6242] ? show_regs_print_info+0x20/0x20 [ 313.074858][ T6242] ? do_user_addr_fault+0xa64/0x1180 [ 313.080146][ T6242] ? __kasan_check_write+0x14/0x20 [ 313.085257][ T6242] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 313.090727][ T6242] dump_stack+0x15/0x20 [ 313.094885][ T6242] should_fail+0x3c1/0x510 [ 313.099321][ T6242] __should_failslab+0xa4/0xe0 [ 313.104084][ T6242] should_failslab+0x9/0x20 [ 313.108589][ T6242] slab_pre_alloc_hook+0x3b/0xe0 [ 313.113532][ T6242] ? skb_clone+0x1cf/0x360 [ 313.117948][ T6242] kmem_cache_alloc+0x44/0x260 [ 313.122714][ T6242] skb_clone+0x1cf/0x360 [ 313.126956][ T6242] ? __kasan_check_write+0x14/0x20 [ 313.132071][ T6242] sk_psock_verdict_recv+0x53/0x800 [ 313.137276][ T6242] unix_read_sock+0x10a/0x2c0 [ 313.141958][ T6242] ? sk_psock_skb_redirect+0x440/0x440 [ 313.147416][ T6242] ? unix_stream_splice_actor+0x120/0x120 [ 313.153140][ T6242] ? copy_page_from_iter+0x261/0x680 [ 313.158429][ T6242] ? copy_user_enhanced_fast_string+0xe/0x40 [ 313.164410][ T6242] ? sk_psock_skb_redirect+0x440/0x440 [ 313.169876][ T6242] ? unix_set_peek_off+0xa0/0xa0 [ 313.174823][ T6242] unix_stream_read_sock+0x61/0x90 [ 313.179939][ T6242] sk_psock_verdict_data_ready+0x115/0x170 [ 313.185837][ T6242] ? sk_psock_start_verdict+0xc0/0xc0 [ 313.191213][ T6242] ? _raw_spin_lock+0x8e/0xe0 [ 313.195889][ T6242] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 313.201698][ T6242] ? skb_queue_tail+0xcb/0xf0 [ 313.206385][ T6242] unix_stream_sendmsg+0x7c4/0xc80 [ 313.211512][ T6242] ? unix_show_fdinfo+0xa0/0xa0 [ 313.216373][ T6242] ? security_socket_sendmsg+0x82/0xa0 [ 313.221836][ T6242] ? unix_show_fdinfo+0xa0/0xa0 [ 313.226690][ T6242] ____sys_sendmsg+0x5a2/0x8c0 [ 313.231461][ T6242] ? __sys_sendmsg_sock+0x40/0x40 [ 313.236491][ T6242] ? import_iovec+0x7c/0xb0 [ 313.240998][ T6242] ___sys_sendmsg+0x1f0/0x260 [ 313.245675][ T6242] ? __sys_sendmsg+0x250/0x250 [ 313.250448][ T6242] ? __fdget+0x1a1/0x230 [ 313.254694][ T6242] __x64_sys_sendmsg+0x1e2/0x2a0 [ 313.259635][ T6242] ? ___sys_sendmsg+0x260/0x260 [ 313.264627][ T6242] ? ksys_write+0x1eb/0x240 [ 313.269149][ T6242] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 313.275224][ T6242] x64_sys_call+0x4b/0x9a0 [ 313.279655][ T6242] do_syscall_64+0x4c/0xa0 [ 313.284073][ T6242] ? clear_bhb_loop+0x50/0xa0 [ 313.288753][ T6242] ? clear_bhb_loop+0x50/0xa0 [ 313.293443][ T6242] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 313.299336][ T6242] RIP: 0033:0x7f8b13ab79a9 [ 313.303758][ T6242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 313.323382][ T6242] RSP: 002b:00007f8b12120038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 313.331819][ T6242] RAX: ffffffffffffffda RBX: 00007f8b13cdefa0 RCX: 00007f8b13ab79a9 [ 313.339804][ T6242] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000004 [ 313.347781][ T6242] RBP: 00007f8b12120090 R08: 0000000000000000 R09: 0000000000000000 [ 313.355756][ T6242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 313.363732][ T6242] R13: 0000000000000000 R14: 00007f8b13cdefa0 R15: 00007ffe35f4f288 [ 313.371717][ T6242] [ 315.289686][ T6274] device sit0 left promiscuous mode [ 315.335617][ T6275] device sit0 entered promiscuous mode [ 315.673709][ T6294] device sit0 entered promiscuous mode [ 322.274927][ T6452] FAULT_INJECTION: forcing a failure. [ 322.274927][ T6452] name failslab, interval 1, probability 0, space 0, times 0 [ 322.292205][ T6452] CPU: 1 PID: 6452 Comm: syz.0.2222 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 322.302131][ T6452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 322.312241][ T6452] Call Trace: [ 322.315611][ T6452] [ 322.318627][ T6452] __dump_stack+0x21/0x30 [ 322.322961][ T6452] dump_stack_lvl+0xee/0x150 [ 322.327551][ T6452] ? show_regs_print_info+0x20/0x20 [ 322.332782][ T6452] ? avc_has_perm_noaudit+0x2f4/0x460 [ 322.338164][ T6452] dump_stack+0x15/0x20 [ 322.342356][ T6452] should_fail+0x3c1/0x510 [ 322.346783][ T6452] __should_failslab+0xa4/0xe0 [ 322.351720][ T6452] should_failslab+0x9/0x20 [ 322.356241][ T6452] slab_pre_alloc_hook+0x3b/0xe0 [ 322.361181][ T6452] ? __alloc_skb+0xe0/0x740 [ 322.365681][ T6452] kmem_cache_alloc+0x44/0x260 [ 322.370445][ T6452] __alloc_skb+0xe0/0x740 [ 322.374778][ T6452] alloc_skb_with_frags+0xa8/0x620 [ 322.379909][ T6452] sock_alloc_send_pskb+0x853/0x980 [ 322.385113][ T6452] ? is_bpf_text_address+0x177/0x190 [ 322.390405][ T6452] ? __kernel_text_address+0xa0/0x100 [ 322.395788][ T6452] ? sock_kzfree_s+0x60/0x60 [ 322.400384][ T6452] ? stack_trace_save+0x98/0xe0 [ 322.405237][ T6452] tun_get_user+0x4e6/0x33c0 [ 322.409831][ T6452] ? _raw_spin_lock+0xe0/0xe0 [ 322.414530][ T6452] ? x64_sys_call+0x219/0x9a0 [ 322.419219][ T6452] ? tun_do_read+0x1c40/0x1c40 [ 322.423996][ T6452] ? kstrtouint_from_user+0x1a0/0x200 [ 322.429369][ T6452] ? kstrtol_from_user+0x260/0x260 [ 322.434483][ T6452] ? putname+0x111/0x160 [ 322.438729][ T6452] ? avc_policy_seqno+0x1b/0x70 [ 322.443585][ T6452] ? selinux_file_permission+0x2aa/0x510 [ 322.449227][ T6452] tun_chr_write_iter+0x1eb/0x2e0 [ 322.454255][ T6452] vfs_write+0x802/0xf70 [ 322.458500][ T6452] ? file_end_write+0x1b0/0x1b0 [ 322.463355][ T6452] ? __fget_files+0x2c4/0x320 [ 322.468041][ T6452] ? __fdget_pos+0x1f7/0x380 [ 322.472633][ T6452] ? ksys_write+0x71/0x240 [ 322.477053][ T6452] ksys_write+0x140/0x240 [ 322.481363][ T6452] ? __ia32_sys_read+0x90/0x90 [ 322.486110][ T6452] ? debug_smp_processor_id+0x17/0x20 [ 322.491463][ T6452] __x64_sys_write+0x7b/0x90 [ 322.496035][ T6452] x64_sys_call+0x8ef/0x9a0 [ 322.500523][ T6452] do_syscall_64+0x4c/0xa0 [ 322.504930][ T6452] ? clear_bhb_loop+0x50/0xa0 [ 322.509608][ T6452] ? clear_bhb_loop+0x50/0xa0 [ 322.514282][ T6452] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 322.520205][ T6452] RIP: 0033:0x7fe3fcbc49a9 [ 322.524617][ T6452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 322.544210][ T6452] RSP: 002b:00007fe3fb22d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 322.552613][ T6452] RAX: ffffffffffffffda RBX: 00007fe3fcdebfa0 RCX: 00007fe3fcbc49a9 [ 322.560745][ T6452] RDX: 000000000000fdef RSI: 0000200000000140 RDI: 00000000000000c8 [ 322.568705][ T6452] RBP: 00007fe3fb22d090 R08: 0000000000000000 R09: 0000000000000000 [ 322.576880][ T6452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 322.584955][ T6452] R13: 0000000000000000 R14: 00007fe3fcdebfa0 R15: 00007ffd3f1b5b08 [ 322.592924][ T6452] [ 324.028410][ T6487] sock: sock_set_timeout: `syz.0.2237' (pid 6487) tries to set negative timeout [ 324.324349][ T6498] FAULT_INJECTION: forcing a failure. [ 324.324349][ T6498] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 324.514693][ T6498] CPU: 0 PID: 6498 Comm: syz.1.2240 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 324.524620][ T6498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 324.534692][ T6498] Call Trace: [ 324.537968][ T6498] [ 324.540893][ T6498] __dump_stack+0x21/0x30 [ 324.545226][ T6498] dump_stack_lvl+0xee/0x150 [ 324.549824][ T6498] ? show_regs_print_info+0x20/0x20 [ 324.555118][ T6498] ? stack_trace_save+0x98/0xe0 [ 324.559980][ T6498] dump_stack+0x15/0x20 [ 324.564223][ T6498] should_fail+0x3c1/0x510 [ 324.568640][ T6498] should_fail_alloc_page+0x55/0x80 [ 324.573844][ T6498] prepare_alloc_pages+0x156/0x600 [ 324.578964][ T6498] ? __alloc_pages_bulk+0xab0/0xab0 [ 324.584178][ T6498] __alloc_pages+0x10a/0x440 [ 324.588765][ T6498] ? prep_new_page+0x110/0x110 [ 324.593533][ T6498] kmalloc_order+0x4c/0x160 [ 324.598033][ T6498] ? alloc_skb_with_frags+0xa8/0x620 [ 324.603320][ T6498] kmalloc_order_trace+0x18/0xb0 [ 324.608278][ T6498] __kmalloc_track_caller+0x198/0x2c0 [ 324.613838][ T6498] ? kmem_cache_alloc+0xf7/0x260 [ 324.618881][ T6498] ? alloc_skb_with_frags+0xa8/0x620 [ 324.624170][ T6498] __alloc_skb+0x21a/0x740 [ 324.628593][ T6498] alloc_skb_with_frags+0xa8/0x620 [ 324.633709][ T6498] sock_alloc_send_pskb+0x853/0x980 [ 324.638913][ T6498] ? is_bpf_text_address+0x177/0x190 [ 324.644204][ T6498] ? __kernel_text_address+0xa0/0x100 [ 324.649577][ T6498] ? sock_kzfree_s+0x60/0x60 [ 324.654180][ T6498] ? stack_trace_save+0x98/0xe0 [ 324.659043][ T6498] tun_get_user+0x4e6/0x33c0 [ 324.663638][ T6498] ? _raw_spin_lock+0xe0/0xe0 [ 324.668522][ T6498] ? x64_sys_call+0x219/0x9a0 [ 324.673200][ T6498] ? tun_do_read+0x1c40/0x1c40 [ 324.677970][ T6498] ? kstrtouint_from_user+0x1a0/0x200 [ 324.683343][ T6498] ? kstrtol_from_user+0x260/0x260 [ 324.688558][ T6498] ? putname+0x111/0x160 [ 324.692842][ T6498] ? avc_policy_seqno+0x1b/0x70 [ 324.697985][ T6498] ? selinux_file_permission+0x2aa/0x510 [ 324.703630][ T6498] tun_chr_write_iter+0x1eb/0x2e0 [ 324.708888][ T6498] vfs_write+0x802/0xf70 [ 324.713137][ T6498] ? file_end_write+0x1b0/0x1b0 [ 324.718071][ T6498] ? __fget_files+0x2c4/0x320 [ 324.722752][ T6498] ? __fdget_pos+0x1f7/0x380 [ 324.727425][ T6498] ? ksys_write+0x71/0x240 [ 324.731835][ T6498] ksys_write+0x140/0x240 [ 324.736162][ T6498] ? __ia32_sys_read+0x90/0x90 [ 324.740926][ T6498] ? debug_smp_processor_id+0x17/0x20 [ 324.746299][ T6498] __x64_sys_write+0x7b/0x90 [ 324.751178][ T6498] x64_sys_call+0x8ef/0x9a0 [ 324.755691][ T6498] do_syscall_64+0x4c/0xa0 [ 324.760104][ T6498] ? clear_bhb_loop+0x50/0xa0 [ 324.764776][ T6498] ? clear_bhb_loop+0x50/0xa0 [ 324.769450][ T6498] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 324.775342][ T6498] RIP: 0033:0x7fb688ff89a9 [ 324.779756][ T6498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 324.799495][ T6498] RSP: 002b:00007fb687661038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 324.808001][ T6498] RAX: ffffffffffffffda RBX: 00007fb68921ffa0 RCX: 00007fb688ff89a9 [ 324.816675][ T6498] RDX: 000000000000fdef RSI: 0000200000000140 RDI: 00000000000000c8 [ 324.824906][ T6498] RBP: 00007fb687661090 R08: 0000000000000000 R09: 0000000000000000 [ 324.832873][ T6498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 324.840842][ T6498] R13: 0000000000000000 R14: 00007fb68921ffa0 R15: 00007ffdefd3f5a8 [ 324.848821][ T6498] [ 325.946433][ T6520] syz.2.2249[6520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.946534][ T6520] syz.2.2249[6520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.223562][ T6531] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 326.247022][ T6531] device syzkaller0 entered promiscuous mode [ 326.763938][ T6552] bond_slave_1: mtu less than device minimum [ 327.755490][ T6567] device sit0 left promiscuous mode [ 328.702350][ T6584] bond_slave_1: mtu less than device minimum [ 333.743096][ T6690] device wg2 left promiscuous mode [ 334.182978][ T6690] device wg2 entered promiscuous mode [ 334.529109][ T6713] device pim6reg1 entered promiscuous mode [ 335.063290][ T6724] device syzkaller0 entered promiscuous mode [ 336.244004][ T6736] device wg2 entered promiscuous mode [ 340.029427][ T6841] device pim6reg1 entered promiscuous mode [ 341.216166][ T6865] device sit0 entered promiscuous mode [ 341.968408][ T6871] device pim6reg1 entered promiscuous mode [ 342.581868][ T6894] device pim6reg1 entered promiscuous mode [ 343.213962][ T6905] FAULT_INJECTION: forcing a failure. [ 343.213962][ T6905] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 343.354656][ T6905] CPU: 0 PID: 6905 Comm: syz.3.2391 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 343.364676][ T6905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 343.374733][ T6905] Call Trace: [ 343.378008][ T6905] [ 343.380932][ T6905] __dump_stack+0x21/0x30 [ 343.385270][ T6905] dump_stack_lvl+0xee/0x150 [ 343.389860][ T6905] ? show_regs_print_info+0x20/0x20 [ 343.395064][ T6905] dump_stack+0x15/0x20 [ 343.399221][ T6905] should_fail+0x3c1/0x510 [ 343.403638][ T6905] should_fail_usercopy+0x1a/0x20 [ 343.408692][ T6905] _copy_from_user+0x20/0xd0 [ 343.413284][ T6905] __sys_bpf+0x233/0x730 [ 343.417526][ T6905] ? bpf_link_show_fdinfo+0x310/0x310 [ 343.422911][ T6905] __x64_sys_bpf+0x7c/0x90 [ 343.427506][ T6905] x64_sys_call+0x4b9/0x9a0 [ 343.432362][ T6905] do_syscall_64+0x4c/0xa0 [ 343.436779][ T6905] ? clear_bhb_loop+0x50/0xa0 [ 343.441457][ T6905] ? clear_bhb_loop+0x50/0xa0 [ 343.446134][ T6905] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 343.452026][ T6905] RIP: 0033:0x7f8b13ab79a9 [ 343.456454][ T6905] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 343.476061][ T6905] RSP: 002b:00007f8b12120038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 343.484487][ T6905] RAX: ffffffffffffffda RBX: 00007f8b13cdefa0 RCX: 00007f8b13ab79a9 [ 343.492559][ T6905] RDX: 000000000000004c RSI: 0000200000000900 RDI: 0000000000000005 [ 343.500553][ T6905] RBP: 00007f8b12120090 R08: 0000000000000000 R09: 0000000000000000 [ 343.508525][ T6905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 343.516503][ T6905] R13: 0000000000000000 R14: 00007f8b13cdefa0 R15: 00007ffe35f4f288 [ 343.524569][ T6905] [ 345.142889][ T6960] FAULT_INJECTION: forcing a failure. [ 345.142889][ T6960] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 345.265049][ T6960] CPU: 0 PID: 6960 Comm: syz.3.2407 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 345.275088][ T6960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 345.285330][ T6960] Call Trace: [ 345.288615][ T6960] [ 345.291551][ T6960] __dump_stack+0x21/0x30 [ 345.295897][ T6960] dump_stack_lvl+0xee/0x150 [ 345.300499][ T6960] ? show_regs_print_info+0x20/0x20 [ 345.305696][ T6960] dump_stack+0x15/0x20 [ 345.309841][ T6960] should_fail+0x3c1/0x510 [ 345.314420][ T6960] should_fail_usercopy+0x1a/0x20 [ 345.319441][ T6960] strncpy_from_user+0x24/0x2e0 [ 345.324297][ T6960] bpf_prog_load+0x1b8/0x1550 [ 345.328976][ T6960] ? map_freeze+0x360/0x360 [ 345.333469][ T6960] ? selinux_bpf+0xc7/0xf0 [ 345.337880][ T6960] ? security_bpf+0x82/0xa0 [ 345.342370][ T6960] __sys_bpf+0x4c3/0x730 [ 345.346602][ T6960] ? bpf_link_show_fdinfo+0x310/0x310 [ 345.351965][ T6960] __x64_sys_bpf+0x7c/0x90 [ 345.356369][ T6960] x64_sys_call+0x4b9/0x9a0 [ 345.361107][ T6960] do_syscall_64+0x4c/0xa0 [ 345.365521][ T6960] ? clear_bhb_loop+0x50/0xa0 [ 345.370199][ T6960] ? clear_bhb_loop+0x50/0xa0 [ 345.374880][ T6960] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 345.380759][ T6960] RIP: 0033:0x7f8b13ab79a9 [ 345.385177][ T6960] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 345.405112][ T6960] RSP: 002b:00007f8b12120038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 345.413523][ T6960] RAX: ffffffffffffffda RBX: 00007f8b13cdefa0 RCX: 00007f8b13ab79a9 [ 345.421658][ T6960] RDX: 000000000000004c RSI: 0000200000000900 RDI: 0000000000000005 [ 345.429617][ T6960] RBP: 00007f8b12120090 R08: 0000000000000000 R09: 0000000000000000 [ 345.437586][ T6960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 345.446069][ T6960] R13: 0000000000000000 R14: 00007f8b13cdefa0 R15: 00007ffe35f4f288 [ 345.454039][ T6960] [ 346.750715][ T7003] FAULT_INJECTION: forcing a failure. [ 346.750715][ T7003] name failslab, interval 1, probability 0, space 0, times 0 [ 346.856188][ T7003] CPU: 0 PID: 7003 Comm: syz.4.2423 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 346.866113][ T7003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 346.876168][ T7003] Call Trace: [ 346.879443][ T7003] [ 346.882378][ T7003] __dump_stack+0x21/0x30 [ 346.886713][ T7003] dump_stack_lvl+0xee/0x150 [ 346.891302][ T7003] ? show_regs_print_info+0x20/0x20 [ 346.896520][ T7003] ? finish_task_switch+0x16b/0x780 [ 346.901719][ T7003] dump_stack+0x15/0x20 [ 346.905869][ T7003] should_fail+0x3c1/0x510 [ 346.910271][ T7003] __should_failslab+0xa4/0xe0 [ 346.915025][ T7003] should_failslab+0x9/0x20 [ 346.919521][ T7003] slab_pre_alloc_hook+0x3b/0xe0 [ 346.924449][ T7003] kmem_cache_alloc_trace+0x48/0x270 [ 346.929730][ T7003] ? __get_vm_area_node+0x11d/0x350 [ 346.934917][ T7003] __get_vm_area_node+0x11d/0x350 [ 346.939928][ T7003] __vmalloc_node_range+0xe8/0x840 [ 346.945024][ T7003] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 346.950558][ T7003] ? selinux_capset+0xf0/0xf0 [ 346.955226][ T7003] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 346.960768][ T7003] __vmalloc+0x79/0x90 [ 346.964827][ T7003] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 346.970362][ T7003] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 346.975722][ T7003] bpf_prog_alloc+0x1f/0x1e0 [ 346.980312][ T7003] bpf_prog_load+0x7c3/0x1550 [ 346.984978][ T7003] ? map_freeze+0x360/0x360 [ 346.989482][ T7003] ? selinux_bpf+0xc7/0xf0 [ 346.993890][ T7003] ? security_bpf+0x82/0xa0 [ 346.998382][ T7003] __sys_bpf+0x4c3/0x730 [ 347.002615][ T7003] ? bpf_link_show_fdinfo+0x310/0x310 [ 347.007980][ T7003] __x64_sys_bpf+0x7c/0x90 [ 347.012387][ T7003] x64_sys_call+0x4b9/0x9a0 [ 347.016880][ T7003] do_syscall_64+0x4c/0xa0 [ 347.021284][ T7003] ? clear_bhb_loop+0x50/0xa0 [ 347.025949][ T7003] ? clear_bhb_loop+0x50/0xa0 [ 347.030615][ T7003] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 347.036498][ T7003] RIP: 0033:0x7fb3732f09a9 [ 347.040901][ T7003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 347.060842][ T7003] RSP: 002b:00007fb371959038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 347.069251][ T7003] RAX: ffffffffffffffda RBX: 00007fb373517fa0 RCX: 00007fb3732f09a9 [ 347.077215][ T7003] RDX: 000000000000004c RSI: 0000200000000900 RDI: 0000000000000005 [ 347.085181][ T7003] RBP: 00007fb371959090 R08: 0000000000000000 R09: 0000000000000000 [ 347.093921][ T7003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 347.101885][ T7003] R13: 0000000000000000 R14: 00007fb373517fa0 R15: 00007ffe5091ce48 [ 347.109944][ T7003] [ 347.364407][ T7003] syz.4.2423: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 347.533868][ T7003] CPU: 1 PID: 7003 Comm: syz.4.2423 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 347.543889][ T7003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 347.553948][ T7003] Call Trace: [ 347.557226][ T7003] [ 347.560152][ T7003] __dump_stack+0x21/0x30 [ 347.564487][ T7003] dump_stack_lvl+0xee/0x150 [ 347.569077][ T7003] ? show_regs_print_info+0x20/0x20 [ 347.574276][ T7003] ? pr_cont_kernfs_name+0xe3/0xf0 [ 347.579400][ T7003] dump_stack+0x15/0x20 [ 347.583566][ T7003] warn_alloc+0x1b0/0x1d0 [ 347.587907][ T7003] ? zone_watermark_ok_safe+0x270/0x270 [ 347.593472][ T7003] ? kmem_cache_alloc_trace+0x119/0x270 [ 347.599029][ T7003] __vmalloc_node_range+0x2c4/0x840 [ 347.604237][ T7003] ? selinux_capset+0xf0/0xf0 [ 347.608921][ T7003] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 347.614479][ T7003] __vmalloc+0x79/0x90 [ 347.618558][ T7003] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 347.624109][ T7003] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 347.629488][ T7003] bpf_prog_alloc+0x1f/0x1e0 [ 347.634082][ T7003] bpf_prog_load+0x7c3/0x1550 [ 347.638768][ T7003] ? map_freeze+0x360/0x360 [ 347.643281][ T7003] ? selinux_bpf+0xc7/0xf0 [ 347.647701][ T7003] ? security_bpf+0x82/0xa0 [ 347.652205][ T7003] __sys_bpf+0x4c3/0x730 [ 347.656449][ T7003] ? bpf_link_show_fdinfo+0x310/0x310 [ 347.661928][ T7003] __x64_sys_bpf+0x7c/0x90 [ 347.666544][ T7003] x64_sys_call+0x4b9/0x9a0 [ 347.671243][ T7003] do_syscall_64+0x4c/0xa0 [ 347.675673][ T7003] ? clear_bhb_loop+0x50/0xa0 [ 347.680359][ T7003] ? clear_bhb_loop+0x50/0xa0 [ 347.685133][ T7003] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 347.691038][ T7003] RIP: 0033:0x7fb3732f09a9 [ 347.695455][ T7003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 347.715061][ T7003] RSP: 002b:00007fb371959038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 347.723483][ T7003] RAX: ffffffffffffffda RBX: 00007fb373517fa0 RCX: 00007fb3732f09a9 [ 347.731458][ T7003] RDX: 000000000000004c RSI: 0000200000000900 RDI: 0000000000000005 [ 347.739432][ T7003] RBP: 00007fb371959090 R08: 0000000000000000 R09: 0000000000000000 [ 347.747403][ T7003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 347.755377][ T7003] R13: 0000000000000000 R14: 00007fb373517fa0 R15: 00007ffe5091ce48 [ 347.763355][ T7003] [ 347.894591][ T7003] Mem-Info: [ 347.897856][ T7003] active_anon:37 inactive_anon:7404 isolated_anon:0 [ 347.897856][ T7003] active_file:20636 inactive_file:6361 isolated_file:0 [ 347.897856][ T7003] unevictable:0 dirty:206 writeback:0 [ 347.897856][ T7003] slab_reclaimable:7857 slab_unreclaimable:73058 [ 347.897856][ T7003] mapped:29269 shmem:162 pagetables:586 bounce:0 [ 347.897856][ T7003] kernel_misc_reclaimable:0 [ 347.897856][ T7003] free:1537041 free_pcp:23640 free_cma:0 [ 347.940451][ T7003] Node 0 active_anon:148kB inactive_anon:29616kB active_file:82544kB inactive_file:25444kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:117076kB dirty:824kB writeback:0kB shmem:648kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5040kB pagetables:2344kB all_unreclaimable? no [ 347.984312][ T7003] DMA32 free:2978772kB min:62612kB low:78264kB high:93916kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2983000kB mlocked:0kB bounce:0kB free_pcp:4228kB local_pcp:4228kB free_cma:0kB [ 348.012170][ T7003] lowmem_reserve[]: 0 3941 3941 [ 348.017320][ T7003] Normal free:3169892kB min:84840kB low:106048kB high:127256kB reserved_highatomic:0KB active_anon:148kB inactive_anon:29344kB active_file:82544kB inactive_file:25444kB unevictable:0kB writepending:824kB present:5242880kB managed:4036096kB mlocked:0kB bounce:0kB free_pcp:88380kB local_pcp:52864kB free_cma:0kB [ 348.047358][ T7003] lowmem_reserve[]: 0 0 0 [ 348.052764][ T7003] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2978772kB [ 348.123863][ T7003] Normal: 755*4kB (UME) 478*8kB (UME) 217*16kB (UME) 199*32kB (UM) 233*64kB (UME) 65*128kB (UME) 32*256kB (UM) 14*512kB (U) 1*1024kB (U) 2*2048kB (U) 759*4096kB (UM) = 3169260kB [ 348.260296][ T7003] 27159 total pagecache pages [ 348.297622][ T7003] 0 pages in swap cache [ 348.331730][ T7003] Swap cache stats: add 0, delete 0, find 0/0 [ 348.378400][ T7003] Free swap = 124996kB [ 348.421532][ T7003] Total swap = 124996kB [ 348.464870][ T7003] 2097051 pages RAM [ 348.503841][ T7003] 0 pages HighMem/MovableOnly [ 348.508646][ T7003] 342277 pages reserved [ 348.512904][ T7003] 0 pages cma reserved [ 349.688311][ T7059] device wg2 left promiscuous mode [ 349.696328][ T7059] device wg2 entered promiscuous mode [ 359.177622][ T7268] device sit0 left promiscuous mode [ 363.708523][ T7368] GPL: port 2(erspan0) entered blocking state [ 363.734247][ T7368] GPL: port 2(erspan0) entered disabled state [ 363.740936][ T7368] device erspan0 entered promiscuous mode [ 365.644684][ T7394] sock: sock_timestamping_bind_phc: sock not bind to device [ 373.498312][ T7521] device syzkaller0 entered promiscuous mode [ 375.219472][ T7573] device sit0 entered promiscuous mode [ 376.148408][ T7592] GPL: port 1(veth0_to_team) entered blocking state [ 376.186481][ T7592] GPL: port 1(veth0_to_team) entered disabled state [ 376.310712][ T7592] device veth0_to_team entered promiscuous mode [ 379.135627][ T7677] device sit0 left promiscuous mode [ 379.258514][ T7677] device sit0 entered promiscuous mode [ 381.440148][ T7729] device pim6reg1 entered promiscuous mode [ 381.922201][ T7747] device veth1_macvtap left promiscuous mode [ 381.952791][ T7747] device macsec0 entered promiscuous mode [ 383.624741][ T7794] syz.3.2710[7794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.643932][ T7794] syz.3.2710[7794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.201801][ T7808] bond_slave_1: mtu less than device minimum [ 389.719546][ T7923] device pim6reg1 entered promiscuous mode [ 393.998933][ T8012] device sit0 left promiscuous mode [ 394.026952][ T8012] device sit0 entered promiscuous mode [ 398.059649][ T8117] device pim6reg1 entered promiscuous mode [ 400.641594][ T8176] FAULT_INJECTION: forcing a failure. [ 400.641594][ T8176] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 400.801960][ T8176] CPU: 0 PID: 8176 Comm: syz.0.2847 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 400.812057][ T8176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 400.822114][ T8176] Call Trace: [ 400.825389][ T8176] [ 400.828310][ T8176] __dump_stack+0x21/0x30 [ 400.832634][ T8176] dump_stack_lvl+0xee/0x150 [ 400.837305][ T8176] ? show_regs_print_info+0x20/0x20 [ 400.842496][ T8176] dump_stack+0x15/0x20 [ 400.846643][ T8176] should_fail+0x3c1/0x510 [ 400.851057][ T8176] should_fail_usercopy+0x1a/0x20 [ 400.856080][ T8176] _copy_from_iter+0x21a/0x1050 [ 400.860929][ T8176] ? __kasan_check_write+0x14/0x20 [ 400.866040][ T8176] ? skb_set_owner_w+0x24d/0x370 [ 400.870977][ T8176] ? copy_mc_pipe_to_iter+0x770/0x770 [ 400.876345][ T8176] ? check_stack_object+0x81/0x140 [ 400.881455][ T8176] ? __check_object_size+0x2f4/0x3c0 [ 400.886737][ T8176] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 400.892464][ T8176] ? skb_put+0x10e/0x1f0 [ 400.896705][ T8176] unix_stream_sendmsg+0x66b/0xc80 [ 400.901821][ T8176] ? unix_show_fdinfo+0xa0/0xa0 [ 400.906674][ T8176] ? security_socket_sendmsg+0x82/0xa0 [ 400.912133][ T8176] ? unix_show_fdinfo+0xa0/0xa0 [ 400.916982][ T8176] ____sys_sendmsg+0x5a2/0x8c0 [ 400.921743][ T8176] ? __sys_sendmsg_sock+0x40/0x40 [ 400.926859][ T8176] ? import_iovec+0x7c/0xb0 [ 400.931361][ T8176] ___sys_sendmsg+0x1f0/0x260 [ 400.936033][ T8176] ? __sys_sendmsg+0x250/0x250 [ 400.940891][ T8176] ? __fdget+0x1a1/0x230 [ 400.945135][ T8176] __x64_sys_sendmsg+0x1e2/0x2a0 [ 400.950074][ T8176] ? ___sys_sendmsg+0x260/0x260 [ 400.954932][ T8176] ? ksys_write+0x1eb/0x240 [ 400.959427][ T8176] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 400.965485][ T8176] x64_sys_call+0x4b/0x9a0 [ 400.969890][ T8176] do_syscall_64+0x4c/0xa0 [ 400.974285][ T8176] ? clear_bhb_loop+0x50/0xa0 [ 400.978941][ T8176] ? clear_bhb_loop+0x50/0xa0 [ 400.983594][ T8176] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 400.989480][ T8176] RIP: 0033:0x7fe3fcbc49a9 [ 400.993875][ T8176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 401.013457][ T8176] RSP: 002b:00007fe3fb22d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 401.021853][ T8176] RAX: ffffffffffffffda RBX: 00007fe3fcdebfa0 RCX: 00007fe3fcbc49a9 [ 401.029805][ T8176] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000004 [ 401.037755][ T8176] RBP: 00007fe3fb22d090 R08: 0000000000000000 R09: 0000000000000000 [ 401.045710][ T8176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 401.053661][ T8176] R13: 0000000000000000 R14: 00007fe3fcdebfa0 R15: 00007ffd3f1b5b08 [ 401.061623][ T8176] [ 401.149777][ T8177] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.156859][ T8177] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.164861][ T8177] device bridge_slave_0 entered promiscuous mode [ 401.177462][ T8177] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.184589][ T8177] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.192054][ T8177] device bridge_slave_1 entered promiscuous mode [ 401.330978][ T30] audit: type=1400 audit(1753294231.353:140): avc: denied { create } for pid=8177 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 401.367447][ T30] audit: type=1400 audit(1753294231.393:141): avc: denied { write } for pid=8177 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 401.404348][ T30] audit: type=1400 audit(1753294231.393:142): avc: denied { read } for pid=8177 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 401.428359][ T8200] device sit0 left promiscuous mode [ 401.551429][ T8200] device sit0 entered promiscuous mode [ 402.105312][ T8177] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.112390][ T8177] bridge0: port 2(bridge_slave_1) entered forwarding state [ 402.119686][ T8177] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.126727][ T8177] bridge0: port 1(bridge_slave_0) entered forwarding state [ 402.208889][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 402.226794][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 402.324361][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 402.360910][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 402.401939][ T8235] FAULT_INJECTION: forcing a failure. [ 402.401939][ T8235] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 402.433944][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 402.464260][ T8235] CPU: 0 PID: 8235 Comm: syz.2.2862 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 402.474178][ T8235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 402.484232][ T8235] Call Trace: [ 402.487504][ T8235] [ 402.490430][ T8235] __dump_stack+0x21/0x30 [ 402.494751][ T8235] dump_stack_lvl+0xee/0x150 [ 402.499325][ T8235] ? show_regs_print_info+0x20/0x20 [ 402.504506][ T8235] ? _copy_from_iter+0x2e2/0x1050 [ 402.509510][ T8235] ? __kasan_check_write+0x14/0x20 [ 402.514604][ T8235] dump_stack+0x15/0x20 [ 402.518738][ T8235] should_fail+0x3c1/0x510 [ 402.523133][ T8235] should_fail_usercopy+0x1a/0x20 [ 402.528134][ T8235] copy_page_from_iter+0x2f6/0x680 [ 402.533227][ T8235] skb_copy_datagram_from_iter+0x2d0/0x6b0 [ 402.539013][ T8235] unix_stream_sendmsg+0x66b/0xc80 [ 402.544108][ T8235] ? unix_show_fdinfo+0xa0/0xa0 [ 402.548939][ T8235] ? handle_pte_fault+0x1b7f/0x2680 [ 402.554126][ T8235] ? security_socket_sendmsg+0x82/0xa0 [ 402.559583][ T8235] ? unix_show_fdinfo+0xa0/0xa0 [ 402.564425][ T8235] ____sys_sendmsg+0x5a2/0x8c0 [ 402.569175][ T8235] ? __sys_sendmsg_sock+0x40/0x40 [ 402.574182][ T8235] ? import_iovec+0x7c/0xb0 [ 402.578672][ T8235] ___sys_sendmsg+0x1f0/0x260 [ 402.583332][ T8235] ? __sys_sendmsg+0x250/0x250 [ 402.588081][ T8235] ? __fdget+0x1a1/0x230 [ 402.592305][ T8235] __x64_sys_sendmsg+0x1e2/0x2a0 [ 402.597220][ T8235] ? ___sys_sendmsg+0x260/0x260 [ 402.602050][ T8235] ? ksys_write+0x1eb/0x240 [ 402.606546][ T8235] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 402.612595][ T8235] x64_sys_call+0x4b/0x9a0 [ 402.616991][ T8235] do_syscall_64+0x4c/0xa0 [ 402.621386][ T8235] ? clear_bhb_loop+0x50/0xa0 [ 402.626040][ T8235] ? clear_bhb_loop+0x50/0xa0 [ 402.630699][ T8235] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 402.636569][ T8235] RIP: 0033:0x7f47267ad9a9 [ 402.640961][ T8235] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 402.660545][ T8235] RSP: 002b:00007f4724e16038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 402.668938][ T8235] RAX: ffffffffffffffda RBX: 00007f47269d4fa0 RCX: 00007f47267ad9a9 [ 402.676891][ T8235] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000004 [ 402.684846][ T8235] RBP: 00007f4724e16090 R08: 0000000000000000 R09: 0000000000000000 [ 402.692796][ T8235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 402.700744][ T8235] R13: 0000000000000000 R14: 00007f47269d4fa0 R15: 00007ffccd393468 [ 402.708700][ T8235] [ 402.721248][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 402.737380][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.744482][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 402.755457][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 402.763983][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 402.789518][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.796614][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 402.815073][ T8] device bridge_slave_1 left promiscuous mode [ 402.821247][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 402.829234][ T8] device bridge_slave_0 left promiscuous mode [ 402.835460][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 402.844515][ T8] device veth0_vlan left promiscuous mode [ 403.128253][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 403.161366][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 403.212341][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 403.262732][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 403.317209][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 403.396433][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 403.470184][ T8177] device veth0_vlan entered promiscuous mode [ 403.492694][ T8245] device sit0 entered promiscuous mode [ 403.651768][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 403.668968][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 403.761634][ T8177] device veth1_macvtap entered promiscuous mode [ 403.780031][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 403.794065][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 403.803465][ T8267] FAULT_INJECTION: forcing a failure. [ 403.803465][ T8267] name failslab, interval 1, probability 0, space 0, times 0 [ 403.817473][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 403.825765][ T8267] CPU: 0 PID: 8267 Comm: syz.2.2875 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 403.835653][ T8267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 403.845689][ T8267] Call Trace: [ 403.848950][ T8267] [ 403.851864][ T8267] __dump_stack+0x21/0x30 [ 403.856178][ T8267] dump_stack_lvl+0xee/0x150 [ 403.860746][ T8267] ? show_regs_print_info+0x20/0x20 [ 403.865923][ T8267] ? do_user_addr_fault+0xa64/0x1180 [ 403.871190][ T8267] ? __kasan_check_write+0x14/0x20 [ 403.876277][ T8267] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 403.881715][ T8267] dump_stack+0x15/0x20 [ 403.885890][ T8267] should_fail+0x3c1/0x510 [ 403.890284][ T8267] __should_failslab+0xa4/0xe0 [ 403.895025][ T8267] should_failslab+0x9/0x20 [ 403.899505][ T8267] slab_pre_alloc_hook+0x3b/0xe0 [ 403.904422][ T8267] ? skb_clone+0x1cf/0x360 [ 403.908816][ T8267] kmem_cache_alloc+0x44/0x260 [ 403.913562][ T8267] skb_clone+0x1cf/0x360 [ 403.917779][ T8267] ? __kasan_check_write+0x14/0x20 [ 403.922873][ T8267] sk_psock_verdict_recv+0x53/0x800 [ 403.928049][ T8267] unix_read_sock+0x10a/0x2c0 [ 403.932707][ T8267] ? sk_psock_skb_redirect+0x440/0x440 [ 403.938143][ T8267] ? unix_stream_splice_actor+0x120/0x120 [ 403.943840][ T8267] ? copy_page_from_iter+0x261/0x680 [ 403.949108][ T8267] ? copy_user_enhanced_fast_string+0xe/0x40 [ 403.955067][ T8267] ? sk_psock_skb_redirect+0x440/0x440 [ 403.960506][ T8267] ? unix_set_peek_off+0xa0/0xa0 [ 403.965432][ T8267] unix_stream_read_sock+0x61/0x90 [ 403.970523][ T8267] sk_psock_verdict_data_ready+0x115/0x170 [ 403.976308][ T8267] ? sk_psock_start_verdict+0xc0/0xc0 [ 403.981656][ T8267] ? _raw_spin_lock+0x8e/0xe0 [ 403.986312][ T8267] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 403.992094][ T8267] ? skb_queue_tail+0xcb/0xf0 [ 403.996749][ T8267] unix_stream_sendmsg+0x7c4/0xc80 [ 404.001850][ T8267] ? unix_show_fdinfo+0xa0/0xa0 [ 404.006682][ T8267] ? handle_pte_fault+0x1b7f/0x2680 [ 404.011859][ T8267] ? security_socket_sendmsg+0x82/0xa0 [ 404.017297][ T8267] ? unix_show_fdinfo+0xa0/0xa0 [ 404.022124][ T8267] ____sys_sendmsg+0x5a2/0x8c0 [ 404.026869][ T8267] ? __sys_sendmsg_sock+0x40/0x40 [ 404.031872][ T8267] ? import_iovec+0x7c/0xb0 [ 404.036355][ T8267] ___sys_sendmsg+0x1f0/0x260 [ 404.041009][ T8267] ? __sys_sendmsg+0x250/0x250 [ 404.045756][ T8267] ? __fdget+0x1a1/0x230 [ 404.049978][ T8267] __x64_sys_sendmsg+0x1e2/0x2a0 [ 404.054895][ T8267] ? ___sys_sendmsg+0x260/0x260 [ 404.059723][ T8267] ? ksys_write+0x1eb/0x240 [ 404.064204][ T8267] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 404.070252][ T8267] x64_sys_call+0x4b/0x9a0 [ 404.074645][ T8267] do_syscall_64+0x4c/0xa0 [ 404.079039][ T8267] ? clear_bhb_loop+0x50/0xa0 [ 404.083695][ T8267] ? clear_bhb_loop+0x50/0xa0 [ 404.088346][ T8267] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 404.094217][ T8267] RIP: 0033:0x7f47267ad9a9 [ 404.098612][ T8267] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 404.118195][ T8267] RSP: 002b:00007f4724e16038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 404.126584][ T8267] RAX: ffffffffffffffda RBX: 00007f47269d4fa0 RCX: 00007f47267ad9a9 [ 404.134532][ T8267] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000004 [ 404.142481][ T8267] RBP: 00007f4724e16090 R08: 0000000000000000 R09: 0000000000000000 [ 404.150428][ T8267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 404.158378][ T8267] R13: 0000000000000000 R14: 00007f47269d4fa0 R15: 00007ffccd393468 [ 404.166332][ T8267] [ 404.174942][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 404.183089][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 404.243462][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 404.256254][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 404.282992][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 404.301251][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 404.537956][ T8288] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.547247][ T8288] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.554758][ T8288] device bridge_slave_0 entered promiscuous mode [ 404.563593][ T8288] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.570686][ T8288] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.578505][ T8288] device bridge_slave_1 entered promiscuous mode [ 404.758904][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 404.770186][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 404.791578][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 404.800294][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 404.808559][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.815608][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 404.823063][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 404.831594][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 404.839927][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.846964][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 404.854643][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 404.862627][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 404.870606][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 404.880165][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 404.888414][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 404.928798][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 404.937604][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 404.955283][ T8288] device veth0_vlan entered promiscuous mode [ 404.962077][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 404.970319][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 404.995230][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 405.003840][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 405.018008][ T8288] device veth1_macvtap entered promiscuous mode [ 405.029500][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 405.054124][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 405.067418][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 405.076293][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 405.084667][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 405.142423][ T8327] device sit0 left promiscuous mode [ 405.199197][ T8] device bridge_slave_1 left promiscuous mode [ 405.205839][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.213373][ T8] device bridge_slave_0 left promiscuous mode [ 405.219687][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.228103][ T8] device veth1_macvtap left promiscuous mode [ 405.234542][ T8] device veth0_vlan left promiscuous mode [ 405.301204][ T8336] FAULT_INJECTION: forcing a failure. [ 405.301204][ T8336] name failslab, interval 1, probability 0, space 0, times 0 [ 405.314065][ T8336] CPU: 0 PID: 8336 Comm: syz.4.2890 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 405.323957][ T8336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 405.334009][ T8336] Call Trace: [ 405.337280][ T8336] [ 405.340204][ T8336] __dump_stack+0x21/0x30 [ 405.344532][ T8336] dump_stack_lvl+0xee/0x150 [ 405.349118][ T8336] ? show_regs_print_info+0x20/0x20 [ 405.354309][ T8336] dump_stack+0x15/0x20 [ 405.358458][ T8336] should_fail+0x3c1/0x510 [ 405.362875][ T8336] __should_failslab+0xa4/0xe0 [ 405.367635][ T8336] should_failslab+0x9/0x20 [ 405.372131][ T8336] slab_pre_alloc_hook+0x3b/0xe0 [ 405.377064][ T8336] kmem_cache_alloc_trace+0x48/0x270 [ 405.382341][ T8336] ? sk_psock_skb_ingress_self+0x5f/0x330 [ 405.388052][ T8336] ? migrate_disable+0x180/0x180 [ 405.392986][ T8336] sk_psock_skb_ingress_self+0x5f/0x330 [ 405.398534][ T8336] ? migrate_disable+0xd6/0x180 [ 405.403384][ T8336] sk_psock_verdict_recv+0x636/0x800 [ 405.408673][ T8336] unix_read_sock+0x10a/0x2c0 [ 405.413353][ T8336] ? sk_psock_skb_redirect+0x440/0x440 [ 405.418817][ T8336] ? unix_stream_splice_actor+0x120/0x120 [ 405.424546][ T8336] ? copy_page_from_iter+0x261/0x680 [ 405.429839][ T8336] ? copy_user_enhanced_fast_string+0xe/0x40 [ 405.435814][ T8336] ? sk_psock_skb_redirect+0x440/0x440 [ 405.441274][ T8336] ? unix_set_peek_off+0xa0/0xa0 [ 405.446205][ T8336] unix_stream_read_sock+0x61/0x90 [ 405.451316][ T8336] sk_psock_verdict_data_ready+0x115/0x170 [ 405.457115][ T8336] ? sk_psock_start_verdict+0xc0/0xc0 [ 405.462489][ T8336] ? _raw_spin_lock+0x8e/0xe0 [ 405.467165][ T8336] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 405.472967][ T8336] ? skb_queue_tail+0xcb/0xf0 [ 405.477638][ T8336] unix_stream_sendmsg+0x7c4/0xc80 [ 405.482749][ T8336] ? unix_show_fdinfo+0xa0/0xa0 [ 405.487601][ T8336] ? security_socket_sendmsg+0x82/0xa0 [ 405.493052][ T8336] ? unix_show_fdinfo+0xa0/0xa0 [ 405.497897][ T8336] ____sys_sendmsg+0x5a2/0x8c0 [ 405.502655][ T8336] ? __sys_sendmsg_sock+0x40/0x40 [ 405.507677][ T8336] ? import_iovec+0x7c/0xb0 [ 405.512176][ T8336] ___sys_sendmsg+0x1f0/0x260 [ 405.516856][ T8336] ? __sys_sendmsg+0x250/0x250 [ 405.521625][ T8336] ? __fdget+0x1a1/0x230 [ 405.525865][ T8336] __x64_sys_sendmsg+0x1e2/0x2a0 [ 405.530798][ T8336] ? ___sys_sendmsg+0x260/0x260 [ 405.535637][ T8336] ? ksys_write+0x1eb/0x240 [ 405.540133][ T8336] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 405.546193][ T8336] x64_sys_call+0x4b/0x9a0 [ 405.550600][ T8336] do_syscall_64+0x4c/0xa0 [ 405.555005][ T8336] ? clear_bhb_loop+0x50/0xa0 [ 405.560106][ T8336] ? clear_bhb_loop+0x50/0xa0 [ 405.564773][ T8336] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 405.570670][ T8336] RIP: 0033:0x7fb3732f09a9 [ 405.575075][ T8336] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 405.594673][ T8336] RSP: 002b:00007fb371959038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 405.603081][ T8336] RAX: ffffffffffffffda RBX: 00007fb373517fa0 RCX: 00007fb3732f09a9 [ 405.611045][ T8336] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000004 [ 405.619009][ T8336] RBP: 00007fb371959090 R08: 0000000000000000 R09: 0000000000000000 [ 405.626972][ T8336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 405.634936][ T8336] R13: 0000000000000000 R14: 00007fb373517fa0 R15: 00007ffe5091ce48 [ 405.642911][ T8336] [ 405.658986][ T60] ------------[ cut here ]------------ [ 405.664551][ T60] kernel BUG at net/core/skbuff.c:1727! [ 405.682154][ T60] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 405.682727][ T8327] device sit0 entered promiscuous mode [ 405.688675][ T60] CPU: 0 PID: 60 Comm: kworker/0:2 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 405.688695][ T60] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 405.688705][ T60] Workqueue: events sk_psock_backlog [ 405.688728][ T60] RIP: 0010:pskb_expand_head+0x11a5/0x11d0 [ 405.688750][ T60] Code: 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c de f3 ff ff 4c 89 e7 e8 8c 9a f6 fd e9 d1 f3 ff ff e8 42 22 b8 fd 0f 0b e8 3b 22 b8 fd <0f> 0b 48 8b 4d d0 80 e1 07 80 c1 03 38 c1 0f 8c b2 fa ff ff 48 8b [ 405.688764][ T60] RSP: 0018:ffffc90000907a08 EFLAGS: 00010293 [ 405.688779][ T60] RAX: ffffffff83b08d95 RBX: dffffc0000000000 RCX: ffff888109c062c0 [ 405.688792][ T60] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 405.688803][ T60] RBP: ffffc90000907aa8 R08: dffffc0000000000 R09: ffffed102396b936 [ 405.688817][ T60] R10: ffffed102396b936 R11: 1ffff1102396b935 R12: 0000000000000e80 [ 405.688829][ T60] R13: 0000000000000000 R14: 0000000000000002 R15: 0000000000008080 [ 405.688840][ T60] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 405.688855][ T60] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 405.688867][ T60] CR2: 000020000025d000 CR3: 0000000114bc6000 CR4: 00000000003506b0 [ 405.688883][ T60] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 405.688895][ T60] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 405.688907][ T60] Call Trace: [ 405.688911][ T60] [ 405.688922][ T60] __pskb_pull_tail+0xb1/0x1480 [ 405.688944][ T60] sk_psock_skb_ingress_enqueue+0x67/0x410 [ 405.688961][ T60] ? kmem_cache_alloc_trace+0x119/0x270 [ 405.688981][ T60] ? sk_psock_backlog+0x876/0x1230 [ 405.688999][ T60] sk_psock_backlog+0xa72/0x1230 [ 405.689020][ T60] ? sk_psock_init+0x6f0/0x6f0 [ 405.689036][ T60] ? __schedule+0xb76/0x14c0 [ 405.689057][ T60] process_one_work+0x6be/0xba0 [ 405.689080][ T60] worker_thread+0xa59/0x1200 [ 405.689098][ T60] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 405.689119][ T60] ? __kthread_parkme+0xac/0x200 [ 405.689137][ T60] kthread+0x411/0x500 [ 405.689152][ T60] ? worker_clr_flags+0x190/0x190 [ 405.689170][ T60] ? kthread_blkcg+0xd0/0xd0 [ 405.689187][ T60] ret_from_fork+0x1f/0x30 [ 405.689208][ T60] [ 405.689213][ T60] Modules linked in: [ 405.698162][ T60] ---[ end trace cb1e68be824619f4 ]--- [ 406.090932][ T60] RIP: 0010:pskb_expand_head+0x11a5/0x11d0 [ 406.097017][ T60] Code: 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c de f3 ff ff 4c 89 e7 e8 8c 9a f6 fd e9 d1 f3 ff ff e8 42 22 b8 fd 0f 0b e8 3b 22 b8 fd <0f> 0b 48 8b 4d d0 80 e1 07 80 c1 03 38 c1 0f 8c b2 fa ff ff 48 8b [ 406.116896][ T60] RSP: 0018:ffffc90000907a08 EFLAGS: 00010293 [ 406.123006][ T60] RAX: ffffffff83b08d95 RBX: dffffc0000000000 RCX: ffff888109c062c0 [ 406.131232][ T60] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 406.155880][ T60] RBP: ffffc90000907aa8 R08: dffffc0000000000 R09: ffffed102396b936 [ 406.174402][ T60] R10: ffffed102396b936 R11: 1ffff1102396b935 R12: 0000000000000e80 [ 406.182544][ T60] R13: 0000000000000000 R14: 0000000000000002 R15: 0000000000008080 [ 406.190640][ T60] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 406.199750][ T60] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 406.206421][ T60] CR2: 00007fe207bf9710 CR3: 0000000125a74000 CR4: 00000000003506b0 [ 406.214812][ T60] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 406.222888][ T60] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 406.230898][ T60] Kernel panic - not syncing: Fatal exception [ 406.237136][ T60] Kernel Offset: disabled [ 406.241442][ T60] Rebooting in 86400 seconds..