last executing test programs: 17.685101933s ago: executing program 1 (id=1119): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0xfffff000, 0xd, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b605", 0x0, 0x1bd0}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) gettid() bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x12, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f00000002c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f00000007c0)=ANY=[], 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xe, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000900000016010000000000005c000000000000009501000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x80000001, 0xffff, 0x3ff, 0x402, 0xffffffffffffffff, 0xda, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xd, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="18060000000000000006000000000000001200b3", @ANYRES32=r7, @ANYBLOB="0000000000000000b7030000000000008500000046000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_subtree(r6, &(0x7f0000000100)=ANY=[@ANYBLOB='N\n'], 0x6a) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x40001) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10003}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305829, &(0x7f0000000040)) 12.869039826s ago: executing program 1 (id=1119): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0xfffff000, 0xd, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b605", 0x0, 0x1bd0}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) gettid() bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x12, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f00000002c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f00000007c0)=ANY=[], 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xe, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000900000016010000000000005c000000000000009501000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x80000001, 0xffff, 0x3ff, 0x402, 0xffffffffffffffff, 0xda, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xd, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="18060000000000000006000000000000001200b3", @ANYRES32=r7, @ANYBLOB="0000000000000000b7030000000000008500000046000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_subtree(r6, &(0x7f0000000100)=ANY=[@ANYBLOB='N\n'], 0x6a) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x40001) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10003}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305829, &(0x7f0000000040)) 9.878727781s ago: executing program 1 (id=1119): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0xfffff000, 0xd, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b605", 0x0, 0x1bd0}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) gettid() bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x12, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f00000002c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f00000007c0)=ANY=[], 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xe, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000900000016010000000000005c000000000000009501000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x80000001, 0xffff, 0x3ff, 0x402, 0xffffffffffffffff, 0xda, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xd, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="18060000000000000006000000000000001200b3", @ANYRES32=r7, @ANYBLOB="0000000000000000b7030000000000008500000046000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_subtree(r6, &(0x7f0000000100)=ANY=[@ANYBLOB='N\n'], 0x6a) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x40001) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10003}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305829, &(0x7f0000000040)) 6.624195127s ago: executing program 1 (id=1119): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0xfffff000, 0xd, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b605", 0x0, 0x1bd0}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) gettid() bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x12, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f00000002c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f00000007c0)=ANY=[], 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xe, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000900000016010000000000005c000000000000009501000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x80000001, 0xffff, 0x3ff, 0x402, 0xffffffffffffffff, 0xda, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xd, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="18060000000000000006000000000000001200b3", @ANYRES32=r7, @ANYBLOB="0000000000000000b7030000000000008500000046000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_subtree(r6, &(0x7f0000000100)=ANY=[@ANYBLOB='N\n'], 0x6a) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x40001) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10003}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305829, &(0x7f0000000040)) 3.384463353s ago: executing program 4 (id=1297): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) openat$tun(0xffffffffffffff9c, 0x0, 0x80, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x7, 0x4, 0x8, 0x3, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0xfffffffd, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="190000000400000004000000020001", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffffffff00000000000000000000000000000000c437"], 0x48) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0xc, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r1, &(0x7f0000000380), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r1, &(0x7f0000000680)="d9", 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 3.356204143s ago: executing program 4 (id=1298): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x275a, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.sectors\x00', 0x26e1, 0x0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r1, 0x8b0f, &(0x7f0000000040)={'lo\x00', @random="6c090000068d"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='mm_lru_insertion\x00', r0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000009c6500001800000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000008000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r2, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r3}, 0x4) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x48) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r5, 0x400454cd, 0x300) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r7, 0x8004745a, 0x2000000c) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_subtree(r8, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) 3.129509754s ago: executing program 4 (id=1304): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000840), 0x2, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f0000002b00), 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1804000000000000000000000040", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) close(r1) 3.029566095s ago: executing program 1 (id=1119): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0xfffff000, 0xd, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b605", 0x0, 0x1bd0}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) gettid() bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x12, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f00000002c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f00000007c0)=ANY=[], 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xe, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000900000016010000000000005c000000000000009501000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x80000001, 0xffff, 0x3ff, 0x402, 0xffffffffffffffff, 0xda, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xd, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="18060000000000000006000000000000001200b3", @ANYRES32=r7, @ANYBLOB="0000000000000000b7030000000000008500000046000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_subtree(r6, &(0x7f0000000100)=ANY=[@ANYBLOB='N\n'], 0x6a) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x40001) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10003}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305829, &(0x7f0000000040)) 2.00745172s ago: executing program 0 (id=1305): bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000d80)={0xffffffffffffffff, 0x58, &(0x7f0000000d00)}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) (async) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000640), 0x4) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/32, 0x112, 0x20, 0x0, 0x4, 0x10000, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b1b, &(0x7f0000000000)={'wlan1\x00', @random='\x00\x00\\ \x00'}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x10, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000000f000000bf09000000000000550901000074f6967d00000000000000180100002020702500000000002020207baaf8ff00000000bda100000000000027010000f8ffffffb702000008000000b7030000000000002500000006000000be91000000000000b502ecffffff00008500000005000000b70000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 2.0066351s ago: executing program 4 (id=1308): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r3}, 0x8) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYRESHEX=r4, @ANYRESDEC=r3, @ANYBLOB="6261a7c3c7d70773b8088cdab6da1c9d3617e61da343060ea77a8def9ca26195594313d972f7edd56b62697950b78a2d8080719336173095a48c700556209fdcddeac54dee915f8c269d4a5efd8cdfab25e86a19a00ac21a9eb28cd0f2dd2d56859f1134b05e0e72d8b6a516c84ea69a4316cacadb615d5aa29deddd955c6c898dc103925b2a8ad05e7d322091d09b875be839fd2cf47517a900cdf537d8a1781f711e71e4499e8422a7f6d309100ba0344af773ffce3413a7b08f3ad93f8d8eb4ccba592bbca0b36ec7295f", @ANYRES64=0x0, @ANYRES16=r2, @ANYRESDEC, @ANYRES32=r4, @ANYRESHEX=r3, @ANYRESHEX=r0], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x36, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) (async) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r10, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1801000000001f00000000000000ea1f850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xff4d, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r11}, 0x10) recvmsg(r9, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) (async) recvmsg$unix(r8, &(0x7f0000000c00)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000ac0)=[{&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000840)=""/131, 0x83}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000900)=""/190, 0xbe}, {&(0x7f0000000580)=""/4, 0x4}, {&(0x7f00000009c0)=""/179, 0xb3}, {&(0x7f00000034c0)=""/4096, 0x1000}], 0x7, &(0x7f0000000b40)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x40002100) (async) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r12) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) ioctl$SIOCSIFHWADDR(r12, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r14}, 0x10) close(r7) 1.97468343s ago: executing program 0 (id=1310): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) close(r3) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1202, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) write$cgroup_subtree(r3, &(0x7f00000000c0)=ANY=[], 0x9) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r4, &(0x7f0000000400), &(0x7f0000000000)=""/5, 0x2}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r4, &(0x7f0000000300)='@', 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x4, &(0x7f0000000340)={r4, &(0x7f0000000400), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001080)=ANY=[@ANYBLOB="61106800000000006113740000000000bfa00000000000000700000008ffffffd503010017740040950000000000000069163a0000000000bf67000000000000350607000fff07201706000020190000160300000ee60060bf050000000000007b65f100000000006507f9ff01000000070700004d83dde4c375000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f17540faf80250aa20c669a5e12814cb1cea5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369226066812b8e007e733a9a48c9eaf3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000400c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71c206438b8ef4901fd03c16dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20ceddf4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10fd7ed6735154beb4000000000000000000000000004000bc00f6746a9709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c1d926a0f6a5480a55c22fe3a5ac00000000000000000000000500002000000000fb79ea00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e14d90deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b134000000000000000962895496d4f6e9cc54db6c7205a6b06ff7f0000000000007f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a1f37302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089e0b1c23c0f3cdad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a1a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631d22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e64316d1eab5d067a183f064b060a8ec12725d42ef832863d66bee966b1574f8e01b3f34a267ff0af1cb3f1f815f8989d78854ca4d3116dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4c6ea9604faf0453bedf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c29984864961a57ff52f657a67463d7dbf85ae9321fc2cc37dc4a29b9cba8ded5de8206c812439ab129ae818837ee155d0789c524b3baf49a09d8be0fc5beecf153236c19740be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b4dc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca87ddd9d064e081383409ed2912c811ae63f03212a5331c2a4ead000000000000000000000000000000000000000000000000001386866b311bd144bc32e059658c9f8342c90c1ade31b78072841b8b5a943d62a44cea6b050c42e3c205fad6a23fb43c93da0f49d911877265e6ee443e37397ecf89021e7f579e8d3a74c12b52938d91e9de07fc8eeeb9505f4a9c26266bf5449484ccc1317c7476", @ANYRESHEX], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0xfd9b, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x10, @void, @value}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xe, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xb}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f00000002c0)='GPL\x00', 0x1, 0x6, &(0x7f0000000380)=""/6, 0x41100, 0x10, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xc, 0x8}, 0x10, 0xefd5, r1, 0x3, &(0x7f0000000480)=[r0, r5, r2], &(0x7f00000004c0)=[{0x4, 0x5, 0x4, 0x2}, {0x2, 0x2, 0xd, 0x2}, {0x1, 0x5, 0x9, 0x1}], 0x10, 0x0, @void, @value}, 0x94) 1.717585581s ago: executing program 3 (id=1313): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x3, 0x10004, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010083f8ffffffb700000000000000b7030000000000fd850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r1}, 0x10) 1.717043671s ago: executing program 4 (id=1314): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="18800000000000000800ff00000000bb181100008d945695eb3e8b80c29405fae2d3fb12b9b5a85620c591a1ffbf2f93b81b2f430fc92557f0c25fc4f8fbcc60ea62606c55a608f490446a7f82c3ce15b2d4d9dd4248c03bcd58d045c8de07f699309407e967481a29a3bea52d4e41c22e2c48adaadd6fd7925ff0313045e22e245bd49caa270df5d05a278318d7a5300faf7f9dfd45a453a03124c0fece49b52a4b23a2cc3d971e84df988e7182d6dae7e7864b662456483bee4091b1e52a81d414ef19d08b244f8205a34512eca44d5131176a21e4a748223045", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)={'c', ' *:* ', 'w\x00'}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000240)={0x0, 0x0, 0xc}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10005, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)="ab", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r5, @ANYBLOB="00a38255bb7c28b1a98e0000"], 0x18}, 0x20040001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(0x3) close(r7) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r4, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r8}, 0xc) close(r9) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x108c02}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{}, &(0x7f0000000580), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000380000003800000007000000050000000000000700000000000000000000000402000000000000000000000a01000000000000000100000d000000000000000003000000000000000061"], 0x0, 0x57, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="901615cb9da51e7f21ceff00", @ANYRES32, @ANYBLOB="2000000000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000080)) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[], 0xffffffffffffff8f) 1.715842831s ago: executing program 3 (id=1315): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000fdffb6000000002000000018110b00", @ANYRES32, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={0xffffffffffffffff, 0x18000000000002a0, 0xe40, 0x2e, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@typedef={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x2e, 0x61, 0x2e]}}, 0x0, 0x2e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x8b}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x0, 0x4, 0x8, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r5, 0x40047440, 0x2000000c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) 1.504695562s ago: executing program 2 (id=1316): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) openat$tun(0xffffffffffffff9c, 0x0, 0x80, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x7, 0x4, 0x8, 0x3, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0xfffffffd, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="190000000400000004000000020001", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffffffff00000000000000000000000000000000c437"], 0x48) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0xc, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r1, &(0x7f0000000380), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r1, &(0x7f0000000680)="d9", 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 1.477008763s ago: executing program 2 (id=1317): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000011000000b703000000000000850000002d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000500)={r0, 0x0, 0x0}, 0x20) 1.431421083s ago: executing program 2 (id=1318): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000840), 0x2, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f0000002b00), 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1804000000000000000000000040", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) close(r1) 1.431212563s ago: executing program 2 (id=1319): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.429245733s ago: executing program 0 (id=1320): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00'}, 0x10) close(r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000004080)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r2, 0x58, &(0x7f0000003fc0)}, 0xe) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES32], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000600), &(0x7f0000000640)}, 0x1c) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xb9, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 1.411176503s ago: executing program 3 (id=1321): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) openat$tun(0xffffffffffffff9c, 0x0, 0x80, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x7, 0x4, 0x8, 0x3, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0xfffffffd, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="190000000400000004000000020001", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffffffff00000000000000000000000000000000c437"], 0x48) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0xc, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r1, &(0x7f0000000380), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r1, &(0x7f0000000680)="d9", 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 1.327400663s ago: executing program 2 (id=1322): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 1.187563654s ago: executing program 2 (id=1323): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) getpid() perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x9, 0x8, 0x4, 0x4009, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000f447333de39c7095758218a68bc5142f0cb2229fa6c8b0d7c8126aee6d3def94cd964218564fb1d255bce6cef9bea8322326039744a98eead8c59bc75bb5b42123eef53ae4bc331b0ad09a8efc4175c484ad74df9158ff1882cdd83c97c03a35e91c30a0"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1f, 0xf, &(0x7f00000004c0)=@ringbuf={{}, {}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000007290000000000000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.187223904s ago: executing program 3 (id=1324): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000079e02200850000006d00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYRES16, @ANYRESHEX=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000300), 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000380)={r2}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="14000000000000000000000000000000000000000000000000000000fedb118ec9657420b5a31ca6c5a72a0ae5b5dfd5fc50901ecc22305edf8266dc6082634b95adac8540702049c378cab3dc0ee9d813248bec684d1d5c04988e6829e2"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) (async) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r8) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x127) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r10) (async) setsockopt$sock_attach_bpf(r11, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) perf_event_open(&(0x7f0000000480)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000035"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 955.071335ms ago: executing program 3 (id=1325): r0 = perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x100800}, 0x2000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001401) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="9feb01001800000000000000600000006000000009000000060000000000001102000000030000000000000000000003000000000100000001000000060000000a00000000000009040000000e000000000000010000000076003f000c0000000000000803000000070000000000000e010000000100000000002e300061005f0026fd2c6235e5d83c79eb6791b798"], &(0x7f0000000780)=""/79, 0x81, 0x4f, 0x0, 0x8, 0x10000, @value}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x8, &(0x7f0000000100)=@raw=[@printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xb}}], &(0x7f0000000200)='GPL\x00', 0x8, 0xa9, &(0x7f0000000240)=""/169, 0x41000, 0x7c, '\x00', 0x0, 0x25, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x5, 0xf, 0x6, 0x4}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000840)=[r3, r3, r3], &(0x7f0000000880)=[{0x0, 0x5, 0x7, 0x5}, {0x5, 0x5, 0xf, 0x7}, {0x1, 0x3, 0x8, 0x1}, {0x0, 0x3, 0x5, 0xa}], 0x10, 0x7, @void, @value}, 0x94) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000940)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], 0x0, 0x52, &(0x7f00000003c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x2f, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@bloom_filter={0x1e, 0xfffffff2, 0x8, 0x7, 0x7000, r5, 0xe02, '\x00', r6, 0xffffffffffffffff, 0x2, 0x0, 0x4, 0x5, @void, @value, @void, @value}, 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001680)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x2e]}}, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) write$cgroup_subtree(r8, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r8, &(0x7f00000004c0)=ANY=[], 0xfdef) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={r0, 0x20, &(0x7f0000000340)={&(0x7f00000003c0)=""/104, 0x68, 0x0, &(0x7f0000000440)=""/214, 0xd6}}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r10}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{0x1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)={0x1b, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffff, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x16, 0x15, &(0x7f0000000100)=@raw=[@map_idx_val={0x18, 0x8, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffcf}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f00000001c0)='syzkaller\x00', 0x6, 0xaa, &(0x7f0000000200)=""/170, 0x41000, 0x21, '\x00', r6, @fallback=0x13, r8, 0x8, &(0x7f00000002c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0xf, 0x2, 0xd37e}, 0x10, r9, r10, 0x0, &(0x7f00000006c0)=[r11, 0xffffffffffffffff, r12], 0x0, 0x10, 0x6, @void, @value}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x40047451, 0x2000000c) 858.416286ms ago: executing program 4 (id=1326): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000c80)='kmem_cache_free\x00', r1}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB], 0x128}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000740), 0x4) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000000000000, 0x2}}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0xfffff004}]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x43, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r3}, 0x10) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) syz_clone(0x640c7006, 0x0, 0x0, 0x0, 0x0, 0x0) 728.935696ms ago: executing program 0 (id=1327): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r4}, 0x18) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000580)=ANY=[@ANYBLOB], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) r7 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000}, 0x0, 0x0, r7, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 384.123108ms ago: executing program 0 (id=1328): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000019000000b703000000000000850000002d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000500)={r0, 0x0, 0x0}, 0x20) 215.621409ms ago: executing program 0 (id=1329): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000001a4ae978df2279b792c45fa0a403d8b72fbcd9e777d35be914da930265fbaa9a8967824b7c43842ed94ff8a55381cccf530a5d857f9cc78ff186e149d9331f44cbfa5af5ef6699267d971b94a457efe48b86f85862961ca310e307791b38dbcb914f1f37347f6cc182b31b2d85c5"], 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r2}, 0x18) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8946, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000600)={&(0x7f00000002c0)=@id={0x1e, 0x3, 0x1, {0x4e24, 0x1}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a35e27e36e16795a9319aae92a9bedc6a3b1a3e4bfa4682f536bb89b4d3094175501c2a0abddd3abac251fca6443fb9d0676a01ca3045df2fee4", 0x3a}, {&(0x7f0000000540)="9ccefbaf81fa2cac5718c23c5051cb3a9928cf40b74215a07c5ad64f2e9d6af8afbb33e1ad8420ca95a753e40a24ef9e79abaf10625187097fc94804bc4608a5874dd782dc05db56ffa34265b6c89108212fde4d0613362f2522c6a38c", 0x5d}, {&(0x7f0000000780)="224352d05b9627046cc7601eae1755f68c51eb92ee85dc6526a58c149eb2ce2c9483dffffdce5cf9bcaf79d1b239c0b4049876213f0cae65b661a42d72b343d848bbc3d266fd47af905e9f4fb182b0e84d1fae214af5829fef56ea8658211857ca64d172a1eb40195454f2e6bedb88407791dcb43f09601e4214892a415d44cd9f5e3046b27e561ada1186508c6f4e40bd285ec243c016930d15f676fecedf0e20971c5859934130b0f795a874f3269ac5d493f82c9403d08fe4c677908df6d798fdf260f3f78a53a9930c1bbf9ce3457cad64380aee76ae2123", 0xda}, {&(0x7f00000009c0)="203ba12a887be6c5a5d5d52c45e62b309752979d76fc9defe84d3f2c24fa2cb70674e52d6259a1f1d89ede0413a34df690b8c6189a95ff0e0eba51611f2cf1ea2c18a46f27d12ee4b803e9d328c97f46dbd70f81988f1f1ddb2187c55556848bdf1c387ddb41bd66c08820331a8cfb0e52765c28ffd4699593efc34eda134d3f2acbff7f7ff2158550ed4c27f6dade7c90d0", 0x92}], 0x4, &(0x7f00000005c0)="43e8c4a924e21c233a66154c12137aee542f53949d2041013e0afb734e0bc7561305890445c9f758deb72c76e081db3fdc", 0x31, 0x4}, 0x40040) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r4}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb011f18"], &(0x7f0000000240)=""/252, 0x37, 0xfc, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="050000000000000000000b00", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40010) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000680), 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r7}, &(0x7f00000006c0), &(0x7f0000000700)=r6}, 0x20) sendmsg$inet(r5, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 8.41218ms ago: executing program 3 (id=1330): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000840), 0x2, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f0000002b00), 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1804000000000000000000000040", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) close(r1) 0s ago: executing program 1 (id=1119): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0xfffff000, 0xd, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b605", 0x0, 0x1bd0}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) gettid() bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x12, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000071140e00000000009500004000000000023884a558028bcef9572513e07c8730215bdea237c1a69596d7a681466416c556f9ac94da8e923f1988ef8e91800f3a917a5671cb63dba7112200400d6860ceb407ba1a99029801b3f5c9a1d81c5c49f814f91da271c9960b87903db3dcc35921ca7a5388e0e75bc9f70be59db3c3fab3360330b634b75b8e990abd7f26d64135e165dec18a1b3646a12883dbc259deb258e048cb2606db716446e7631746c3db242fc8bb8dc226781d41000009f0542a44b78902ccb44cb414cfd191af7ccda8abf326c19baaa6cee762a52beca573e631238369acf766d5e930fdd10b352d74ad44bfd2df5594b62ab74ce04df19af52a08218e9e"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f00000002c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f00000007c0)=ANY=[], 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xe, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000900000016010000000000005c000000000000009501000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x80000001, 0xffff, 0x3ff, 0x402, 0xffffffffffffffff, 0xda, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xd, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="18060000000000000006000000000000001200b3", @ANYRES32=r7, @ANYBLOB="0000000000000000b7030000000000008500000046000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_subtree(r6, &(0x7f0000000100)=ANY=[@ANYBLOB='N\n'], 0x6a) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x40001) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10003}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305829, &(0x7f0000000040)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.170' (ED25519) to the list of known hosts. [ 20.037575][ T30] audit: type=1400 audit(1732132696.285:66): avc: denied { integrity } for pid=278 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 20.061386][ T30] audit: type=1400 audit(1732132696.305:67): avc: denied { mounton } for pid=278 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.062767][ T278] cgroup: Unknown subsys name 'net' [ 20.083852][ T30] audit: type=1400 audit(1732132696.305:68): avc: denied { mount } for pid=278 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.111039][ T30] audit: type=1400 audit(1732132696.335:69): avc: denied { unmount } for pid=278 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.111263][ T278] cgroup: Unknown subsys name 'devices' [ 20.317924][ T278] cgroup: Unknown subsys name 'hugetlb' [ 20.323458][ T278] cgroup: Unknown subsys name 'rlimit' [ 20.463494][ T30] audit: type=1400 audit(1732132696.705:70): avc: denied { setattr } for pid=278 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.486558][ T30] audit: type=1400 audit(1732132696.705:71): avc: denied { mounton } for pid=278 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 20.493184][ T282] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.511767][ T30] audit: type=1400 audit(1732132696.705:72): avc: denied { mount } for pid=278 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.542589][ T30] audit: type=1400 audit(1732132696.765:73): avc: denied { relabelto } for pid=282 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.558310][ T278] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.568388][ T30] audit: type=1400 audit(1732132696.765:74): avc: denied { write } for pid=282 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.602104][ T30] audit: type=1400 audit(1732132696.805:75): avc: denied { read } for pid=278 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.123157][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.130073][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.137606][ T288] device bridge_slave_0 entered promiscuous mode [ 21.145364][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.152297][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.159466][ T288] device bridge_slave_1 entered promiscuous mode [ 21.198296][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.205146][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.212493][ T289] device bridge_slave_0 entered promiscuous mode [ 21.234274][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.241147][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.248416][ T289] device bridge_slave_1 entered promiscuous mode [ 21.257740][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.264594][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.271857][ T290] device bridge_slave_0 entered promiscuous mode [ 21.278560][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.285397][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.292718][ T290] device bridge_slave_1 entered promiscuous mode [ 21.382105][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.388983][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.396227][ T292] device bridge_slave_0 entered promiscuous mode [ 21.418968][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.425857][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.432993][ T292] device bridge_slave_1 entered promiscuous mode [ 21.458346][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.465201][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.472485][ T291] device bridge_slave_0 entered promiscuous mode [ 21.490002][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.496942][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.504035][ T291] device bridge_slave_1 entered promiscuous mode [ 21.574543][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.581417][ T288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.588532][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.595284][ T288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.636240][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.643085][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.650209][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.657084][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.699376][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.706251][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.713335][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.720278][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.731640][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.738527][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.745606][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.752479][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.782897][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.789775][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.796888][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.803639][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.818951][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.826059][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.832978][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.840969][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.848364][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.855375][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.862486][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.869788][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.876958][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.884072][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.891150][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.898567][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.905916][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.931070][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.939336][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.946218][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.954100][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.962187][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.969038][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.980654][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.988611][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.995445][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.002704][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.011053][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.017904][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.046414][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.054918][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.062542][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.070726][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.077591][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.084971][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.093017][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.099853][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.107232][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.114968][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.143154][ T288] device veth0_vlan entered promiscuous mode [ 22.158411][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.166390][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.174119][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.182305][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.190597][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.198080][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.205276][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.213493][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.221481][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.228327][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.235802][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.243899][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.251975][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.258814][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.266153][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.274261][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.282299][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.289144][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.296547][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.304643][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.312767][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.319610][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.326973][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.335130][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.343377][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.351176][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.359259][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.367394][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.375116][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.383052][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.390834][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.398804][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.406588][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.414781][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.423218][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.430574][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.443948][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.452419][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.465257][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.473433][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.482451][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.490403][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.499833][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.507322][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.519486][ T290] device veth0_vlan entered promiscuous mode [ 22.526325][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.534122][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.542877][ T289] device veth0_vlan entered promiscuous mode [ 22.551546][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.558977][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.566329][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.574240][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.590002][ T289] device veth1_macvtap entered promiscuous mode [ 22.604741][ T291] device veth0_vlan entered promiscuous mode [ 22.611156][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.620216][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.628279][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.635479][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.642868][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.650931][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.658985][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.666545][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.674640][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.682828][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.691024][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.698999][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.708500][ T288] device veth1_macvtap entered promiscuous mode [ 22.727059][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.734574][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.742710][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.751323][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.759708][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.774360][ T290] device veth1_macvtap entered promiscuous mode [ 22.785983][ T292] device veth0_vlan entered promiscuous mode [ 22.792278][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.800712][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.808992][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.817239][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.824896][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.832983][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.841126][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.849368][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.856764][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.868807][ T291] device veth1_macvtap entered promiscuous mode [ 22.894495][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.907572][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.916054][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.924259][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.932910][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.941177][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.955364][ T292] device veth1_macvtap entered promiscuous mode [ 22.968998][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.996135][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.045530][ C1] hrtimer: interrupt took 30377 ns [ 23.054704][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.066413][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.106116][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.172458][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.180782][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.195885][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.204125][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.222890][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.263754][ T338] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 24.322289][ T338] device syzkaller0 entered promiscuous mode [ 25.589702][ T30] kauditd_printk_skb: 37 callbacks suppressed [ 25.589718][ T30] audit: type=1400 audit(1732132701.835:113): avc: denied { create } for pid=360 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 25.901817][ T362] device syzkaller0 entered promiscuous mode [ 28.204018][ T30] audit: type=1400 audit(1732132704.445:114): avc: denied { confidentiality } for pid=380 comm="syz.4.21" lockdown_reason="use of bpf to read kernel RAM" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 28.730886][ T30] audit: type=1400 audit(1732132704.975:115): avc: denied { write } for pid=384 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.340889][ T419] device syzkaller0 entered promiscuous mode [ 31.788298][ T435] device syzkaller0 entered promiscuous mode [ 31.938717][ T447] syz.1.42[447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.938803][ T447] syz.1.42[447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.845954][ T477] device pim6reg1 entered promiscuous mode [ 34.078895][ T484] device pim6reg1 entered promiscuous mode [ 34.400000][ T499] syz.2.57[499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.400071][ T499] syz.2.57[499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.424040][ T30] audit: type=1400 audit(1732132710.665:116): avc: denied { read } for pid=500 comm="syz.0.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 37.198097][ T30] audit: type=1400 audit(1732132713.445:117): avc: denied { create } for pid=533 comm="syz.2.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 37.318738][ T534] device veth1_macvtap left promiscuous mode [ 37.387481][ T30] audit: type=1400 audit(1732132713.475:118): avc: denied { create } for pid=533 comm="syz.2.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 37.908258][ T30] audit: type=1400 audit(1732132714.155:119): avc: denied { create } for pid=546 comm="syz.2.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 38.028118][ T30] audit: type=1400 audit(1732132714.235:120): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 38.624261][ T567] bond_slave_1: mtu less than device minimum [ 39.246644][ T597] FAULT_INJECTION: forcing a failure. [ 39.246644][ T597] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 39.260434][ T597] CPU: 1 PID: 597 Comm: syz.0.85 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 39.269895][ T597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 39.279788][ T597] Call Trace: [ 39.282924][ T597] [ 39.285692][ T597] dump_stack_lvl+0x151/0x1c0 [ 39.290204][ T597] ? io_uring_drop_tctx_refs+0x190/0x190 [ 39.295667][ T597] ? __switch_to+0x62a/0x1190 [ 39.300184][ T597] dump_stack+0x15/0x20 [ 39.304176][ T597] should_fail+0x3c6/0x510 [ 39.308432][ T597] should_fail_alloc_page+0x5a/0x80 [ 39.313464][ T597] prepare_alloc_pages+0x15c/0x700 [ 39.318414][ T597] ? __alloc_pages+0x8f0/0x8f0 [ 39.323015][ T597] ? __alloc_pages_bulk+0xe40/0xe40 [ 39.328042][ T597] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 39.333512][ T597] __alloc_pages+0x18c/0x8f0 [ 39.337936][ T597] ? prep_new_page+0x110/0x110 [ 39.342543][ T597] ? pcpu_chunk_relocate+0x20a/0x430 [ 39.347663][ T597] pcpu_populate_chunk+0x18c/0xe30 [ 39.352609][ T597] pcpu_alloc+0x984/0x13e0 [ 39.356864][ T597] __alloc_percpu_gfp+0x27/0x30 [ 39.361546][ T597] bpf_map_alloc_percpu+0xe6/0x160 [ 39.366493][ T597] htab_map_alloc+0xcb8/0x1650 [ 39.371098][ T597] map_create+0x411/0x2050 [ 39.375349][ T597] __sys_bpf+0x296/0x760 [ 39.379425][ T597] ? fput_many+0x160/0x1b0 [ 39.383679][ T597] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 39.388890][ T597] ? debug_smp_processor_id+0x17/0x20 [ 39.394091][ T597] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 39.399994][ T597] __x64_sys_bpf+0x7c/0x90 [ 39.404246][ T597] x64_sys_call+0x87f/0x9a0 [ 39.408586][ T597] do_syscall_64+0x3b/0xb0 [ 39.412837][ T597] ? clear_bhb_loop+0x35/0x90 [ 39.417355][ T597] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 39.423083][ T597] RIP: 0033:0x7f8d008c4819 [ 39.427336][ T597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.446774][ T597] RSP: 002b:00007f8cfef3d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 39.455017][ T597] RAX: ffffffffffffffda RBX: 00007f8d00a7bfa0 RCX: 00007f8d008c4819 [ 39.462831][ T597] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 39.470640][ T597] RBP: 00007f8cfef3d090 R08: 0000000000000000 R09: 0000000000000000 [ 39.478450][ T597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 39.486262][ T597] R13: 0000000000000000 R14: 00007f8d00a7bfa0 R15: 00007fff716dd0f8 [ 39.494082][ T597] [ 40.160652][ T632] FAULT_INJECTION: forcing a failure. [ 40.160652][ T632] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 40.182244][ T632] CPU: 1 PID: 632 Comm: syz.0.97 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 40.191714][ T632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 40.201605][ T632] Call Trace: [ 40.204740][ T632] [ 40.207512][ T632] dump_stack_lvl+0x151/0x1c0 [ 40.212021][ T632] ? io_uring_drop_tctx_refs+0x190/0x190 [ 40.217496][ T632] ? __switch_to+0x62a/0x1190 [ 40.222016][ T632] dump_stack+0x15/0x20 [ 40.225995][ T632] should_fail+0x3c6/0x510 [ 40.230250][ T632] should_fail_alloc_page+0x5a/0x80 [ 40.235287][ T632] prepare_alloc_pages+0x15c/0x700 [ 40.240230][ T632] ? __alloc_pages+0x8f0/0x8f0 [ 40.244830][ T632] ? __alloc_pages_bulk+0xe40/0xe40 [ 40.249862][ T632] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 40.255341][ T632] __alloc_pages+0x18c/0x8f0 [ 40.259760][ T632] ? prep_new_page+0x110/0x110 [ 40.264357][ T632] ? pcpu_chunk_relocate+0x20a/0x430 [ 40.269483][ T632] pcpu_populate_chunk+0x18c/0xe30 [ 40.274430][ T632] pcpu_alloc+0x984/0x13e0 [ 40.278681][ T632] __alloc_percpu_gfp+0x27/0x30 [ 40.283368][ T632] bpf_map_alloc_percpu+0xe6/0x160 [ 40.288311][ T632] htab_map_alloc+0xcb8/0x1650 [ 40.292917][ T632] map_create+0x411/0x2050 [ 40.297167][ T632] __sys_bpf+0x296/0x760 [ 40.301255][ T632] ? fput_many+0x160/0x1b0 [ 40.305497][ T632] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 40.310716][ T632] ? debug_smp_processor_id+0x17/0x20 [ 40.315912][ T632] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 40.321814][ T632] __x64_sys_bpf+0x7c/0x90 [ 40.326066][ T632] x64_sys_call+0x87f/0x9a0 [ 40.330406][ T632] do_syscall_64+0x3b/0xb0 [ 40.334658][ T632] ? clear_bhb_loop+0x35/0x90 [ 40.339175][ T632] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 40.344898][ T632] RIP: 0033:0x7f8d008c4819 [ 40.349156][ T632] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.368594][ T632] RSP: 002b:00007f8cfef3d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 40.376836][ T632] RAX: ffffffffffffffda RBX: 00007f8d00a7bfa0 RCX: 00007f8d008c4819 [ 40.384647][ T632] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 40.392460][ T632] RBP: 00007f8cfef3d090 R08: 0000000000000000 R09: 0000000000000000 [ 40.400270][ T632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 40.408082][ T632] R13: 0000000000000000 R14: 00007f8d00a7bfa0 R15: 00007fff716dd0f8 [ 40.415907][ T632] [ 40.445342][ T30] audit: type=1400 audit(1732132716.685:121): avc: denied { relabelfrom } for pid=637 comm="syz.2.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 40.468039][ T638] device syzkaller0 entered promiscuous mode [ 40.498271][ T642] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.508223][ T642] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.535566][ T30] audit: type=1400 audit(1732132716.685:122): avc: denied { relabelto } for pid=637 comm="syz.2.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 40.633081][ T645] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.639981][ T645] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.647099][ T645] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.653947][ T645] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.661639][ T645] device bridge0 entered promiscuous mode [ 41.316358][ T677] FAULT_INJECTION: forcing a failure. [ 41.316358][ T677] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 41.354967][ T677] CPU: 0 PID: 677 Comm: syz.2.110 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 41.364538][ T677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 41.374431][ T677] Call Trace: [ 41.377554][ T677] [ 41.380333][ T677] dump_stack_lvl+0x151/0x1c0 [ 41.384850][ T677] ? io_uring_drop_tctx_refs+0x190/0x190 [ 41.390314][ T677] ? sched_clock+0x9/0x10 [ 41.394478][ T677] ? native_set_ldt+0x360/0x360 [ 41.399166][ T677] dump_stack+0x15/0x20 [ 41.403155][ T677] should_fail+0x3c6/0x510 [ 41.407416][ T677] should_fail_alloc_page+0x5a/0x80 [ 41.412532][ T677] prepare_alloc_pages+0x15c/0x700 [ 41.417481][ T677] ? __alloc_pages+0x8f0/0x8f0 [ 41.422079][ T677] ? __alloc_pages_bulk+0xe40/0xe40 [ 41.427117][ T677] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 41.432582][ T677] __alloc_pages+0x18c/0x8f0 [ 41.437011][ T677] ? prep_new_page+0x110/0x110 [ 41.441610][ T677] ? pcpu_chunk_relocate+0x20a/0x430 [ 41.446731][ T677] pcpu_populate_chunk+0x18c/0xe30 [ 41.451679][ T677] pcpu_alloc+0x984/0x13e0 [ 41.455932][ T677] __alloc_percpu_gfp+0x27/0x30 [ 41.460616][ T677] bpf_map_alloc_percpu+0xe6/0x160 [ 41.465561][ T677] htab_map_alloc+0xcb8/0x1650 [ 41.470170][ T677] map_create+0x411/0x2050 [ 41.474417][ T677] __sys_bpf+0x296/0x760 [ 41.478490][ T677] ? fput_many+0x160/0x1b0 [ 41.482751][ T677] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 41.488067][ T677] ? debug_smp_processor_id+0x17/0x20 [ 41.493268][ T677] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 41.499174][ T677] __x64_sys_bpf+0x7c/0x90 [ 41.503419][ T677] x64_sys_call+0x87f/0x9a0 [ 41.507763][ T677] do_syscall_64+0x3b/0xb0 [ 41.512019][ T677] ? clear_bhb_loop+0x35/0x90 [ 41.516528][ T677] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 41.522254][ T677] RIP: 0033:0x7f24beefd819 [ 41.526594][ T677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 41.546035][ T677] RSP: 002b:00007f24bd576038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 41.554287][ T677] RAX: ffffffffffffffda RBX: 00007f24bf0b4fa0 RCX: 00007f24beefd819 [ 41.562089][ T677] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 41.569988][ T677] RBP: 00007f24bd576090 R08: 0000000000000000 R09: 0000000000000000 [ 41.577802][ T677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 41.585610][ T677] R13: 0000000000000000 R14: 00007f24bf0b4fa0 R15: 00007ffe2d6a2a68 [ 41.593441][ T677] [ 41.709853][ T30] audit: type=1400 audit(1732132717.955:123): avc: denied { write } for pid=681 comm="syz.4.112" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 41.862527][ T688] syz.0.115[688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.862600][ T688] syz.0.115[688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.249230][ T705] device veth0_vlan left promiscuous mode [ 42.330410][ T705] device veth0_vlan entered promiscuous mode [ 42.341676][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 42.350434][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 42.358178][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 42.479803][ T716] FAULT_INJECTION: forcing a failure. [ 42.479803][ T716] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 42.494327][ T716] CPU: 1 PID: 716 Comm: syz.1.123 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 42.503881][ T716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 42.513787][ T716] Call Trace: [ 42.516900][ T716] [ 42.519687][ T716] dump_stack_lvl+0x151/0x1c0 [ 42.524192][ T716] ? io_uring_drop_tctx_refs+0x190/0x190 [ 42.529662][ T716] ? 0xffffffffa0016df0 [ 42.533657][ T716] dump_stack+0x15/0x20 [ 42.537640][ T716] should_fail+0x3c6/0x510 [ 42.542211][ T716] should_fail_alloc_page+0x5a/0x80 [ 42.547244][ T716] prepare_alloc_pages+0x15c/0x700 [ 42.552185][ T716] ? __alloc_pages+0x8f0/0x8f0 [ 42.556782][ T716] ? __alloc_pages_bulk+0xe40/0xe40 [ 42.561816][ T716] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 42.567284][ T716] __alloc_pages+0x18c/0x8f0 [ 42.571719][ T716] ? prep_new_page+0x110/0x110 [ 42.576313][ T716] ? pcpu_chunk_relocate+0x20a/0x430 [ 42.581439][ T716] pcpu_populate_chunk+0x18c/0xe30 [ 42.586380][ T716] pcpu_alloc+0x984/0x13e0 [ 42.590637][ T716] __alloc_percpu_gfp+0x27/0x30 [ 42.595316][ T716] bpf_map_alloc_percpu+0xe6/0x160 [ 42.600263][ T716] htab_map_alloc+0xcb8/0x1650 [ 42.604878][ T716] map_create+0x411/0x2050 [ 42.609125][ T716] __sys_bpf+0x296/0x760 [ 42.613209][ T716] ? fput_many+0x160/0x1b0 [ 42.617451][ T716] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 42.622662][ T716] ? debug_smp_processor_id+0x17/0x20 [ 42.627863][ T716] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 42.633764][ T716] __x64_sys_bpf+0x7c/0x90 [ 42.638018][ T716] x64_sys_call+0x87f/0x9a0 [ 42.642354][ T716] do_syscall_64+0x3b/0xb0 [ 42.646609][ T716] ? clear_bhb_loop+0x35/0x90 [ 42.651129][ T716] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 42.656851][ T716] RIP: 0033:0x7fa378976819 [ 42.661104][ T716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.680630][ T716] RSP: 002b:00007fa376fef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 42.688878][ T716] RAX: ffffffffffffffda RBX: 00007fa378b2dfa0 RCX: 00007fa378976819 [ 42.696689][ T716] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 42.704496][ T716] RBP: 00007fa376fef090 R08: 0000000000000000 R09: 0000000000000000 [ 42.712310][ T716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 42.720130][ T716] R13: 0000000000000000 R14: 00007fa378b2dfa0 R15: 00007ffeb6276858 [ 42.727939][ T716] [ 43.400425][ T743] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 43.547675][ T739] device veth0_vlan left promiscuous mode [ 43.561347][ T739] device veth0_vlan entered promiscuous mode [ 45.316822][ T30] audit: type=1400 audit(1732132721.565:124): avc: denied { create } for pid=792 comm="syz.1.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 45.647717][ T800] device wg2 entered promiscuous mode [ 46.585932][ T827] FAULT_INJECTION: forcing a failure. [ 46.585932][ T827] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 46.702607][ T827] CPU: 0 PID: 827 Comm: syz.0.159 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 46.712170][ T827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 46.722065][ T827] Call Trace: [ 46.725230][ T827] [ 46.727964][ T827] dump_stack_lvl+0x151/0x1c0 [ 46.732489][ T827] ? io_uring_drop_tctx_refs+0x190/0x190 [ 46.737952][ T827] ? __kasan_check_write+0x14/0x20 [ 46.742900][ T827] ? proc_fail_nth_write+0x20b/0x290 [ 46.748026][ T827] ? selinux_file_permission+0x2c4/0x570 [ 46.753494][ T827] dump_stack+0x15/0x20 [ 46.757478][ T827] should_fail+0x3c6/0x510 [ 46.761731][ T827] should_fail_usercopy+0x1a/0x20 [ 46.766590][ T827] _copy_from_user+0x20/0xd0 [ 46.771018][ T827] perf_copy_attr+0x163/0x880 [ 46.775540][ T827] __se_sys_perf_event_open+0xd7/0x3ce0 [ 46.780914][ T827] ? __kasan_check_write+0x14/0x20 [ 46.785863][ T827] ? mutex_unlock+0xb2/0x260 [ 46.790283][ T827] ? __mutex_lock_slowpath+0x10/0x10 [ 46.795406][ T827] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 46.800966][ T827] ? __ia32_sys_read+0x90/0x90 [ 46.805565][ T827] ? debug_smp_processor_id+0x17/0x20 [ 46.810768][ T827] __x64_sys_perf_event_open+0xbf/0xd0 [ 46.816068][ T827] x64_sys_call+0x7de/0x9a0 [ 46.820408][ T827] do_syscall_64+0x3b/0xb0 [ 46.824651][ T827] ? clear_bhb_loop+0x35/0x90 [ 46.829166][ T827] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 46.834903][ T827] RIP: 0033:0x7f8d008c4819 [ 46.839149][ T827] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.858591][ T827] RSP: 002b:00007f8cfef3d038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 46.866827][ T827] RAX: ffffffffffffffda RBX: 00007f8d00a7bfa0 RCX: 00007f8d008c4819 [ 46.874648][ T827] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000780 [ 46.882455][ T827] RBP: 00007f8cfef3d090 R08: 0000000000000003 R09: 0000000000000000 [ 46.890265][ T827] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 46.898074][ T827] R13: 0000000000000000 R14: 00007f8d00a7bfa0 R15: 00007fff716dd0f8 [ 46.905986][ T827] [ 46.959721][ T30] audit: type=1400 audit(1732132723.205:125): avc: denied { setopt } for pid=832 comm="syz.4.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 47.093780][ T853] syz.0.168[853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.093854][ T853] syz.0.168[853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.232327][ T857] FAULT_INJECTION: forcing a failure. [ 47.232327][ T857] name failslab, interval 1, probability 0, space 0, times 1 [ 47.298477][ T30] audit: type=1400 audit(1732132723.545:126): avc: denied { tracepoint } for pid=858 comm="syz.0.170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 47.328054][ T857] CPU: 0 PID: 857 Comm: syz.1.169 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 47.337619][ T857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 47.347513][ T857] Call Trace: [ 47.350664][ T857] [ 47.353414][ T857] dump_stack_lvl+0x151/0x1c0 [ 47.357926][ T857] ? io_uring_drop_tctx_refs+0x190/0x190 [ 47.363489][ T857] dump_stack+0x15/0x20 [ 47.367473][ T857] should_fail+0x3c6/0x510 [ 47.371728][ T857] __should_failslab+0xa4/0xe0 [ 47.376326][ T857] should_failslab+0x9/0x20 [ 47.380667][ T857] slab_pre_alloc_hook+0x37/0xd0 [ 47.385463][ T857] kmem_cache_alloc_trace+0x48/0x210 [ 47.390560][ T857] ? __kthread_create_on_node+0x135/0x560 [ 47.396117][ T857] ? put_cpu_map_entry+0x750/0x750 [ 47.401062][ T857] __kthread_create_on_node+0x135/0x560 [ 47.406451][ T857] ? kthread_create_on_node+0x120/0x120 [ 47.411829][ T857] ? put_cpu_map_entry+0x750/0x750 [ 47.416796][ T857] kthread_create_on_node+0xda/0x120 [ 47.421897][ T857] ? tsk_fork_get_node+0x10/0x10 [ 47.426667][ T857] ? __kmalloc+0x13a/0x270 [ 47.430922][ T857] ? bpf_map_kmalloc_node+0x118/0x160 [ 47.436127][ T857] cpu_map_update_elem+0x9d6/0xea0 [ 47.441075][ T857] ? cpu_map_lookup_elem+0x100/0x100 [ 47.446195][ T857] ? kvmalloc_node+0x281/0x4d0 [ 47.450799][ T857] bpf_map_update_value+0x1a3/0x3c0 [ 47.455833][ T857] map_update_elem+0x644/0x770 [ 47.460444][ T857] __sys_bpf+0x405/0x760 [ 47.464510][ T857] ? fput_many+0x160/0x1b0 [ 47.468763][ T857] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 47.473972][ T857] ? debug_smp_processor_id+0x17/0x20 [ 47.479265][ T857] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 47.485168][ T857] __x64_sys_bpf+0x7c/0x90 [ 47.489418][ T857] x64_sys_call+0x87f/0x9a0 [ 47.493762][ T857] do_syscall_64+0x3b/0xb0 [ 47.498008][ T857] ? clear_bhb_loop+0x35/0x90 [ 47.502528][ T857] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 47.508255][ T857] RIP: 0033:0x7fa378976819 [ 47.512512][ T857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.531951][ T857] RSP: 002b:00007fa376fef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 47.540207][ T857] RAX: ffffffffffffffda RBX: 00007fa378b2dfa0 RCX: 00007fa378976819 [ 47.548003][ T857] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000002 [ 47.555814][ T857] RBP: 00007fa376fef090 R08: 0000000000000000 R09: 0000000000000000 [ 47.563623][ T857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 47.571435][ T857] R13: 0000000000000000 R14: 00007fa378b2dfa0 R15: 00007ffeb6276858 [ 47.579262][ T857] [ 47.684858][ T859] device syzkaller0 entered promiscuous mode [ 49.075500][ C0] sched: RT throttling activated [ 50.578531][ T926] device veth0_vlan left promiscuous mode [ 50.611592][ T926] device veth0_vlan entered promiscuous mode [ 52.798890][ T776] syz.4.135 (776) used greatest stack depth: 21560 bytes left [ 53.387823][ T30] audit: type=1400 audit(1732132729.635:127): avc: denied { create } for pid=985 comm="syz.3.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 56.600171][ T1052] device syzkaller0 entered promiscuous mode [ 56.880362][ T30] audit: type=1400 audit(1732132733.125:128): avc: denied { create } for pid=1058 comm="syz.2.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 57.028509][ T30] audit: type=1400 audit(1732132733.125:129): avc: denied { create } for pid=1058 comm="syz.2.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 58.942868][ T1085] device veth0_vlan left promiscuous mode [ 59.031460][ T1085] device veth0_vlan entered promiscuous mode [ 59.186510][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.196383][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.240180][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 61.949310][ T1158] device veth0_vlan left promiscuous mode [ 61.997189][ T1158] device veth0_vlan entered promiscuous mode [ 62.233557][ T1156] device syzkaller0 entered promiscuous mode [ 62.266175][ T1165] device pim6reg1 entered promiscuous mode [ 62.578248][ T30] audit: type=1400 audit(1732132738.815:130): avc: denied { ioctl } for pid=1176 comm="syz.0.271" path="socket:[18427]" dev="sockfs" ino=18427 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 65.069206][ T1210] device pim6reg1 entered promiscuous mode [ 65.770040][ T1240] device sit0 entered promiscuous mode [ 66.288519][ T1259] FAULT_INJECTION: forcing a failure. [ 66.288519][ T1259] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 66.301990][ T1259] CPU: 1 PID: 1259 Comm: syz.4.295 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 66.312073][ T1259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 66.321969][ T1259] Call Trace: [ 66.325097][ T1259] [ 66.327873][ T1259] dump_stack_lvl+0x151/0x1c0 [ 66.332389][ T1259] ? io_uring_drop_tctx_refs+0x190/0x190 [ 66.337856][ T1259] ? 0xffffffffa0016154 [ 66.341855][ T1259] dump_stack+0x15/0x20 [ 66.345833][ T1259] should_fail+0x3c6/0x510 [ 66.350095][ T1259] should_fail_alloc_page+0x5a/0x80 [ 66.355121][ T1259] prepare_alloc_pages+0x15c/0x700 [ 66.360081][ T1259] ? __alloc_pages+0x8f0/0x8f0 [ 66.364673][ T1259] ? __alloc_pages_bulk+0xe40/0xe40 [ 66.369792][ T1259] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 66.375258][ T1259] __alloc_pages+0x18c/0x8f0 [ 66.379684][ T1259] ? prep_new_page+0x110/0x110 [ 66.384289][ T1259] ? pcpu_chunk_relocate+0x20a/0x430 [ 66.389409][ T1259] pcpu_populate_chunk+0x18c/0xe30 [ 66.394357][ T1259] pcpu_alloc+0x984/0x13e0 [ 66.398609][ T1259] __alloc_percpu_gfp+0x27/0x30 [ 66.403297][ T1259] bpf_map_alloc_percpu+0xe6/0x160 [ 66.408246][ T1259] htab_map_alloc+0xcb8/0x1650 [ 66.412852][ T1259] map_create+0x411/0x2050 [ 66.417097][ T1259] __sys_bpf+0x296/0x760 [ 66.421169][ T1259] ? fput_many+0x160/0x1b0 [ 66.425423][ T1259] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 66.430636][ T1259] ? debug_smp_processor_id+0x17/0x20 [ 66.435842][ T1259] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 66.441835][ T1259] __x64_sys_bpf+0x7c/0x90 [ 66.446080][ T1259] x64_sys_call+0x87f/0x9a0 [ 66.450446][ T1259] do_syscall_64+0x3b/0xb0 [ 66.454672][ T1259] ? clear_bhb_loop+0x35/0x90 [ 66.459185][ T1259] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 66.464915][ T1259] RIP: 0033:0x7f6221f03819 [ 66.469166][ T1259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 66.488609][ T1259] RSP: 002b:00007f622057c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 66.496855][ T1259] RAX: ffffffffffffffda RBX: 00007f62220bafa0 RCX: 00007f6221f03819 [ 66.504881][ T1259] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 66.512698][ T1259] RBP: 00007f622057c090 R08: 0000000000000000 R09: 0000000000000000 [ 66.520498][ T1259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 66.528329][ T1259] R13: 0000000000000000 R14: 00007f62220bafa0 R15: 00007ffd92d9e768 [ 66.536128][ T1259] [ 66.995123][ T1256] device pim6reg1 entered promiscuous mode [ 68.313345][ T1336] device veth0_vlan left promiscuous mode [ 68.327626][ T1336] device veth0_vlan entered promiscuous mode [ 68.394871][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.406300][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.441935][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.760495][ T30] audit: type=1400 audit(1732132746.005:131): avc: denied { create } for pid=1387 comm="syz.1.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 69.828400][ T30] audit: type=1400 audit(1732132746.005:132): avc: denied { create } for pid=1387 comm="syz.1.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 69.945303][ T30] audit: type=1400 audit(1732132746.185:133): avc: denied { create } for pid=1397 comm="syz.3.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 70.348406][ T1416] FAULT_INJECTION: forcing a failure. [ 70.348406][ T1416] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 70.431840][ T1416] CPU: 1 PID: 1416 Comm: syz.4.340 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 70.441492][ T1416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 70.451381][ T1416] Call Trace: [ 70.454512][ T1416] [ 70.457292][ T1416] dump_stack_lvl+0x151/0x1c0 [ 70.461807][ T1416] ? io_uring_drop_tctx_refs+0x190/0x190 [ 70.467263][ T1416] ? 0xffffffffa001642c [ 70.471262][ T1416] dump_stack+0x15/0x20 [ 70.475269][ T1416] should_fail+0x3c6/0x510 [ 70.479503][ T1416] should_fail_alloc_page+0x5a/0x80 [ 70.484541][ T1416] prepare_alloc_pages+0x15c/0x700 [ 70.489604][ T1416] ? __alloc_pages_bulk+0xe40/0xe40 [ 70.494613][ T1416] __alloc_pages+0x18c/0x8f0 [ 70.499036][ T1416] ? prep_new_page+0x110/0x110 [ 70.503636][ T1416] ? pcpu_chunk_relocate+0x20a/0x430 [ 70.508844][ T1416] pcpu_populate_chunk+0x18c/0xe30 [ 70.513796][ T1416] pcpu_alloc+0x984/0x13e0 [ 70.518045][ T1416] __alloc_percpu_gfp+0x27/0x30 [ 70.522726][ T1416] bpf_map_alloc_percpu+0xe6/0x160 [ 70.527672][ T1416] htab_map_alloc+0xcb8/0x1650 [ 70.532284][ T1416] map_create+0x411/0x2050 [ 70.536527][ T1416] __sys_bpf+0x296/0x760 [ 70.540710][ T1416] ? fput_many+0x160/0x1b0 [ 70.544957][ T1416] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 70.550174][ T1416] ? debug_smp_processor_id+0x17/0x20 [ 70.555373][ T1416] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 70.561284][ T1416] __x64_sys_bpf+0x7c/0x90 [ 70.565527][ T1416] x64_sys_call+0x87f/0x9a0 [ 70.569868][ T1416] do_syscall_64+0x3b/0xb0 [ 70.574116][ T1416] ? clear_bhb_loop+0x35/0x90 [ 70.578630][ T1416] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 70.584365][ T1416] RIP: 0033:0x7f6221f03819 [ 70.588618][ T1416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 70.608058][ T1416] RSP: 002b:00007f622057c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 70.616302][ T1416] RAX: ffffffffffffffda RBX: 00007f62220bafa0 RCX: 00007f6221f03819 [ 70.624110][ T1416] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 70.631920][ T1416] RBP: 00007f622057c090 R08: 0000000000000000 R09: 0000000000000000 [ 70.639733][ T1416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 70.647544][ T1416] R13: 0000000000000000 R14: 00007f62220bafa0 R15: 00007ffd92d9e768 [ 70.655361][ T1416] [ 72.459184][ T1454] FAULT_INJECTION: forcing a failure. [ 72.459184][ T1454] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 72.497152][ T1454] CPU: 0 PID: 1454 Comm: syz.4.354 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 72.506818][ T1454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 72.516704][ T1454] Call Trace: [ 72.519825][ T1454] [ 72.522602][ T1454] dump_stack_lvl+0x151/0x1c0 [ 72.527122][ T1454] ? io_uring_drop_tctx_refs+0x190/0x190 [ 72.532585][ T1454] ? asm_sysvec_call_function_single+0x1b/0x20 [ 72.538575][ T1454] dump_stack+0x15/0x20 [ 72.542564][ T1454] should_fail+0x3c6/0x510 [ 72.546823][ T1454] should_fail_alloc_page+0x5a/0x80 [ 72.551852][ T1454] prepare_alloc_pages+0x15c/0x700 [ 72.556801][ T1454] ? __alloc_pages_bulk+0xe40/0xe40 [ 72.561836][ T1454] __alloc_pages+0x18c/0x8f0 [ 72.566258][ T1454] ? prep_new_page+0x110/0x110 [ 72.570859][ T1454] ? pcpu_chunk_relocate+0x20a/0x430 [ 72.575985][ T1454] pcpu_populate_chunk+0x18c/0xe30 [ 72.580934][ T1454] pcpu_alloc+0x984/0x13e0 [ 72.585184][ T1454] __alloc_percpu_gfp+0x27/0x30 [ 72.589892][ T1454] bpf_map_alloc_percpu+0xe6/0x160 [ 72.594903][ T1454] htab_map_alloc+0xcb8/0x1650 [ 72.599519][ T1454] map_create+0x411/0x2050 [ 72.603763][ T1454] __sys_bpf+0x296/0x760 [ 72.607923][ T1454] ? fput_many+0x160/0x1b0 [ 72.612181][ T1454] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 72.617473][ T1454] ? debug_smp_processor_id+0x17/0x20 [ 72.622673][ T1454] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 72.628577][ T1454] __x64_sys_bpf+0x7c/0x90 [ 72.632828][ T1454] x64_sys_call+0x87f/0x9a0 [ 72.637258][ T1454] do_syscall_64+0x3b/0xb0 [ 72.641590][ T1454] ? clear_bhb_loop+0x35/0x90 [ 72.646121][ T1454] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 72.651839][ T1454] RIP: 0033:0x7f6221f03819 [ 72.656101][ T1454] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 72.675903][ T1454] RSP: 002b:00007f622057c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 72.684128][ T1454] RAX: ffffffffffffffda RBX: 00007f62220bafa0 RCX: 00007f6221f03819 [ 72.691938][ T1454] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 72.699839][ T1454] RBP: 00007f622057c090 R08: 0000000000000000 R09: 0000000000000000 [ 72.707649][ T1454] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 72.715460][ T1454] R13: 0000000000000000 R14: 00007f62220bafa0 R15: 00007ffd92d9e768 [ 72.723408][ T1454] [ 72.728535][ T30] audit: type=1400 audit(1732132748.975:134): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 72.934664][ T30] audit: type=1400 audit(1732132748.975:135): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 73.299462][ T1479] device veth0_vlan left promiscuous mode [ 73.322119][ T1479] device veth0_vlan entered promiscuous mode [ 74.565659][ T30] audit: type=1400 audit(1732132750.805:136): avc: denied { create } for pid=1514 comm="syz.4.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 75.096043][ T30] audit: type=1400 audit(1732132751.345:137): avc: denied { create } for pid=1527 comm="syz.1.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 75.211972][ T30] audit: type=1400 audit(1732132751.345:138): avc: denied { write } for pid=1527 comm="syz.1.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 75.276566][ T1535] device syzkaller0 entered promiscuous mode [ 75.789113][ T1563] device sit0 left promiscuous mode [ 75.898603][ T1563] device sit0 entered promiscuous mode [ 76.078814][ T1565] device sit0 entered promiscuous mode [ 76.353803][ T1583] device syzkaller0 entered promiscuous mode [ 77.082409][ T1632] device syzkaller0 entered promiscuous mode [ 77.684267][ T30] audit: type=1400 audit(1732132753.925:139): avc: denied { ioctl } for pid=1657 comm="syz.1.423" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.800767][ T1670] device sit0 entered promiscuous mode [ 78.261919][ T30] audit: type=1400 audit(1732132754.505:140): avc: denied { create } for pid=1686 comm="syz.0.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 78.401455][ T30] audit: type=1400 audit(1732132754.645:141): avc: denied { setopt } for pid=1707 comm="syz.3.441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 78.722481][ T1729] FAULT_INJECTION: forcing a failure. [ 78.722481][ T1729] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 78.735872][ T1729] CPU: 0 PID: 1729 Comm: syz.4.448 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 78.745498][ T1729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 78.755398][ T1729] Call Trace: [ 78.758514][ T1729] [ 78.761289][ T1729] dump_stack_lvl+0x151/0x1c0 [ 78.765802][ T1729] ? io_uring_drop_tctx_refs+0x190/0x190 [ 78.771269][ T1729] ? 0xffffffffa00165a8 [ 78.775264][ T1729] dump_stack+0x15/0x20 [ 78.779254][ T1729] should_fail+0x3c6/0x510 [ 78.783510][ T1729] should_fail_alloc_page+0x5a/0x80 [ 78.788544][ T1729] prepare_alloc_pages+0x15c/0x700 [ 78.793494][ T1729] ? __alloc_pages+0x8f0/0x8f0 [ 78.798094][ T1729] ? __alloc_pages_bulk+0xe40/0xe40 [ 78.803131][ T1729] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 78.808598][ T1729] __alloc_pages+0x18c/0x8f0 [ 78.813137][ T1729] ? prep_new_page+0x110/0x110 [ 78.817732][ T1729] ? pcpu_chunk_relocate+0x20a/0x430 [ 78.822854][ T1729] pcpu_populate_chunk+0x18c/0xe30 [ 78.827799][ T1729] pcpu_alloc+0x984/0x13e0 [ 78.832053][ T1729] __alloc_percpu_gfp+0x27/0x30 [ 78.836736][ T1729] bpf_map_alloc_percpu+0xe6/0x160 [ 78.841683][ T1729] htab_map_alloc+0xcb8/0x1650 [ 78.846288][ T1729] map_create+0x411/0x2050 [ 78.850535][ T1729] __sys_bpf+0x296/0x760 [ 78.854612][ T1729] ? fput_many+0x160/0x1b0 [ 78.858866][ T1729] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 78.864078][ T1729] ? debug_smp_processor_id+0x17/0x20 [ 78.869279][ T1729] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 78.875186][ T1729] __x64_sys_bpf+0x7c/0x90 [ 78.879532][ T1729] x64_sys_call+0x87f/0x9a0 [ 78.883872][ T1729] do_syscall_64+0x3b/0xb0 [ 78.888123][ T1729] ? clear_bhb_loop+0x35/0x90 [ 78.892636][ T1729] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 78.898367][ T1729] RIP: 0033:0x7f6221f03819 [ 78.902620][ T1729] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.922059][ T1729] RSP: 002b:00007f622057c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 78.930331][ T1729] RAX: ffffffffffffffda RBX: 00007f62220bafa0 RCX: 00007f6221f03819 [ 78.938116][ T1729] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 78.945930][ T1729] RBP: 00007f622057c090 R08: 0000000000000000 R09: 0000000000000000 [ 78.953738][ T1729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 78.961550][ T1729] R13: 0000000000000000 R14: 00007f62220bafa0 R15: 00007ffd92d9e768 [ 78.969365][ T1729] [ 80.248653][ T30] audit: type=1400 audit(1732132756.495:142): avc: denied { read } for pid=1781 comm="syz.2.468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 85.629803][ T30] audit: type=1400 audit(1732132761.875:143): avc: denied { create } for pid=1877 comm="syz.4.499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 85.813779][ T1876] device pim6reg1 entered promiscuous mode [ 86.265614][ T1910] device bridge0 entered promiscuous mode [ 86.637098][ T30] audit: type=1400 audit(1732132762.875:144): avc: denied { ioctl } for pid=1921 comm="syz.4.515" path="socket:[21824]" dev="sockfs" ino=21824 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 90.193506][ T1996] syzkaller: port 1(erspan0) entered blocking state [ 90.271079][ T1996] syzkaller: port 1(erspan0) entered disabled state [ 90.278097][ T1996] device erspan0 entered promiscuous mode [ 90.300900][ T2001] device veth0_vlan left promiscuous mode [ 90.339480][ T2001] device veth0_vlan entered promiscuous mode [ 90.420741][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 90.464141][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 90.472764][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 90.590369][ T2005] syzkaller: port 1(erspan0) entered blocking state [ 90.596833][ T2005] syzkaller: port 1(erspan0) entered forwarding state [ 91.108914][ T2033] device sit0 entered promiscuous mode [ 91.457407][ T2047] ip6_vti0: mtu greater than device maximum [ 91.816813][ T2062] syz.2.561[2062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.816901][ T2062] syz.2.561[2062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.907171][ T2062] device wg2 entered promiscuous mode [ 92.233103][ T2076] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.240913][ T2076] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.289756][ T2076] device bridge0 left promiscuous mode [ 92.947472][ T2103] syz.1.574[2103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.948673][ T2103] syz.1.574[2103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.969925][ T2095] device pim6reg1 entered promiscuous mode [ 94.632599][ T30] audit: type=1400 audit(1732132770.875:145): avc: denied { create } for pid=2170 comm="syz.0.594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 95.029150][ T2185] FAULT_INJECTION: forcing a failure. [ 95.029150][ T2185] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 95.067022][ T2185] CPU: 1 PID: 2185 Comm: syz.3.601 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 95.076674][ T2185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 95.086567][ T2185] Call Trace: [ 95.089688][ T2185] [ 95.092468][ T2185] dump_stack_lvl+0x151/0x1c0 [ 95.096981][ T2185] ? io_uring_drop_tctx_refs+0x190/0x190 [ 95.102451][ T2185] dump_stack+0x15/0x20 [ 95.106447][ T2185] should_fail+0x3c6/0x510 [ 95.110695][ T2185] should_fail_usercopy+0x1a/0x20 [ 95.115552][ T2185] _copy_to_user+0x20/0x90 [ 95.119807][ T2185] simple_read_from_buffer+0xc7/0x150 [ 95.125014][ T2185] proc_fail_nth_read+0x1a3/0x210 [ 95.129875][ T2185] ? proc_fault_inject_write+0x390/0x390 [ 95.135340][ T2185] ? fsnotify_perm+0x269/0x5b0 [ 95.139945][ T2185] ? security_file_permission+0x86/0xb0 [ 95.145323][ T2185] ? proc_fault_inject_write+0x390/0x390 [ 95.150793][ T2185] vfs_read+0x27d/0xd40 [ 95.154784][ T2185] ? kernel_read+0x1f0/0x1f0 [ 95.159211][ T2185] ? __kasan_check_write+0x14/0x20 [ 95.164155][ T2185] ? mutex_lock+0xb6/0x1e0 [ 95.168413][ T2185] ? wait_for_completion_killable_timeout+0x10/0x10 [ 95.174837][ T2185] ? __fdget_pos+0x2e7/0x3a0 [ 95.179258][ T2185] ? ksys_read+0x77/0x2c0 [ 95.183426][ T2185] ksys_read+0x199/0x2c0 [ 95.187506][ T2185] ? vfs_write+0x1110/0x1110 [ 95.191931][ T2185] __x64_sys_read+0x7b/0x90 [ 95.196268][ T2185] x64_sys_call+0x28/0x9a0 [ 95.200524][ T2185] do_syscall_64+0x3b/0xb0 [ 95.204773][ T2185] ? clear_bhb_loop+0x35/0x90 [ 95.209287][ T2185] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 95.215013][ T2185] RIP: 0033:0x7fc1c34ba25c [ 95.219272][ T2185] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 95.238709][ T2185] RSP: 002b:00007fc1c1b34030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 95.246956][ T2185] RAX: ffffffffffffffda RBX: 00007fc1c3672fa0 RCX: 00007fc1c34ba25c [ 95.254764][ T2185] RDX: 000000000000000f RSI: 00007fc1c1b340a0 RDI: 0000000000000007 [ 95.262578][ T2185] RBP: 00007fc1c1b34090 R08: 0000000000000000 R09: 0000000000000000 [ 95.270384][ T2185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.278208][ T2185] R13: 0000000000000000 R14: 00007fc1c3672fa0 R15: 00007ffd81057f38 [ 95.286019][ T2185] [ 95.310069][ T2190] device veth0_vlan left promiscuous mode [ 95.335811][ T2190] device veth0_vlan entered promiscuous mode [ 95.354284][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 95.380266][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 95.392012][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.722736][ T2248] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.729820][ T2248] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.482473][ T2275] device pim6reg1 entered promiscuous mode [ 98.277452][ T2307] FAULT_INJECTION: forcing a failure. [ 98.277452][ T2307] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 98.391998][ T2307] CPU: 0 PID: 2307 Comm: syz.0.640 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 98.401644][ T2307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 98.411541][ T2307] Call Trace: [ 98.414662][ T2307] [ 98.417438][ T2307] dump_stack_lvl+0x151/0x1c0 [ 98.421954][ T2307] ? io_uring_drop_tctx_refs+0x190/0x190 [ 98.427421][ T2307] dump_stack+0x15/0x20 [ 98.431411][ T2307] should_fail+0x3c6/0x510 [ 98.435705][ T2307] should_fail_alloc_page+0x5a/0x80 [ 98.440704][ T2307] prepare_alloc_pages+0x15c/0x700 [ 98.445679][ T2307] ? __alloc_pages+0x8f0/0x8f0 [ 98.450251][ T2307] ? __alloc_pages_bulk+0xe40/0xe40 [ 98.455283][ T2307] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 98.460748][ T2307] __alloc_pages+0x18c/0x8f0 [ 98.465174][ T2307] ? prep_new_page+0x110/0x110 [ 98.469781][ T2307] ? pcpu_chunk_relocate+0x20a/0x430 [ 98.474905][ T2307] pcpu_populate_chunk+0x18c/0xe30 [ 98.479848][ T2307] pcpu_alloc+0x984/0x13e0 [ 98.484101][ T2307] __alloc_percpu_gfp+0x27/0x30 [ 98.488782][ T2307] bpf_map_alloc_percpu+0xe6/0x160 [ 98.493734][ T2307] htab_map_alloc+0xcb8/0x1650 [ 98.498334][ T2307] map_create+0x411/0x2050 [ 98.502587][ T2307] __sys_bpf+0x296/0x760 [ 98.506661][ T2307] ? fput_many+0x160/0x1b0 [ 98.510913][ T2307] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 98.516289][ T2307] ? debug_smp_processor_id+0x17/0x20 [ 98.521496][ T2307] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 98.527388][ T2307] __x64_sys_bpf+0x7c/0x90 [ 98.531649][ T2307] x64_sys_call+0x87f/0x9a0 [ 98.535977][ T2307] do_syscall_64+0x3b/0xb0 [ 98.540230][ T2307] ? clear_bhb_loop+0x35/0x90 [ 98.544750][ T2307] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 98.550478][ T2307] RIP: 0033:0x7f8d008c4819 [ 98.554729][ T2307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 98.574170][ T2307] RSP: 002b:00007f8cfef3d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 98.582417][ T2307] RAX: ffffffffffffffda RBX: 00007f8d00a7bfa0 RCX: 00007f8d008c4819 [ 98.590228][ T2307] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 98.598034][ T2307] RBP: 00007f8cfef3d090 R08: 0000000000000000 R09: 0000000000000000 [ 98.605847][ T2307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 98.613662][ T2307] R13: 0000000000000000 R14: 00007f8d00a7bfa0 R15: 00007fff716dd0f8 [ 98.621476][ T2307] [ 99.302573][ T2338] FAULT_INJECTION: forcing a failure. [ 99.302573][ T2338] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 99.325311][ T2338] CPU: 1 PID: 2338 Comm: syz.0.652 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 99.334955][ T2338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 99.344851][ T2338] Call Trace: [ 99.347980][ T2338] [ 99.350752][ T2338] dump_stack_lvl+0x151/0x1c0 [ 99.355263][ T2338] ? io_uring_drop_tctx_refs+0x190/0x190 [ 99.360731][ T2338] ? 0xffffffffa00166ac [ 99.364727][ T2338] dump_stack+0x15/0x20 [ 99.368719][ T2338] should_fail+0x3c6/0x510 [ 99.372972][ T2338] should_fail_alloc_page+0x5a/0x80 [ 99.378006][ T2338] prepare_alloc_pages+0x15c/0x700 [ 99.382948][ T2338] ? __alloc_pages+0x8f0/0x8f0 [ 99.387546][ T2338] ? __alloc_pages_bulk+0xe40/0xe40 [ 99.392581][ T2338] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 99.398053][ T2338] __alloc_pages+0x18c/0x8f0 [ 99.402476][ T2338] ? prep_new_page+0x110/0x110 [ 99.407083][ T2338] ? pcpu_chunk_relocate+0x20a/0x430 [ 99.412199][ T2338] pcpu_populate_chunk+0x18c/0xe30 [ 99.417148][ T2338] pcpu_alloc+0x984/0x13e0 [ 99.421397][ T2338] __alloc_percpu_gfp+0x27/0x30 [ 99.426088][ T2338] bpf_map_alloc_percpu+0xe6/0x160 [ 99.431028][ T2338] htab_map_alloc+0xcb8/0x1650 [ 99.435643][ T2338] map_create+0x411/0x2050 [ 99.439883][ T2338] __sys_bpf+0x296/0x760 [ 99.443960][ T2338] ? fput_many+0x160/0x1b0 [ 99.448213][ T2338] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 99.453423][ T2338] ? debug_smp_processor_id+0x17/0x20 [ 99.458628][ T2338] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 99.464530][ T2338] __x64_sys_bpf+0x7c/0x90 [ 99.468783][ T2338] x64_sys_call+0x87f/0x9a0 [ 99.473123][ T2338] do_syscall_64+0x3b/0xb0 [ 99.477395][ T2338] ? clear_bhb_loop+0x35/0x90 [ 99.481896][ T2338] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 99.487618][ T2338] RIP: 0033:0x7f8d008c4819 [ 99.491872][ T2338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 99.511461][ T2338] RSP: 002b:00007f8cfef3d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 99.519889][ T2338] RAX: ffffffffffffffda RBX: 00007f8d00a7bfa0 RCX: 00007f8d008c4819 [ 99.527714][ T2338] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 99.535589][ T2338] RBP: 00007f8cfef3d090 R08: 0000000000000000 R09: 0000000000000000 [ 99.543422][ T2338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 99.551212][ T2338] R13: 0000000000000000 R14: 00007f8d00a7bfa0 R15: 00007fff716dd0f8 [ 99.559032][ T2338] [ 99.565203][ T2335] device syzkaller0 entered promiscuous mode [ 99.689482][ T2333] device syzkaller0 entered promiscuous mode [ 100.432364][ T2357] device syzkaller0 entered promiscuous mode [ 100.600144][ T2366] FAULT_INJECTION: forcing a failure. [ 100.600144][ T2366] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 100.613500][ T2366] CPU: 0 PID: 2366 Comm: syz.1.663 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 100.623138][ T2366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 100.633042][ T2366] Call Trace: [ 100.636156][ T2366] [ 100.638937][ T2366] dump_stack_lvl+0x151/0x1c0 [ 100.643451][ T2366] ? io_uring_drop_tctx_refs+0x190/0x190 [ 100.648915][ T2366] ? 0xffffffffa0016348 [ 100.652916][ T2366] dump_stack+0x15/0x20 [ 100.656897][ T2366] should_fail+0x3c6/0x510 [ 100.661156][ T2366] should_fail_alloc_page+0x5a/0x80 [ 100.666189][ T2366] prepare_alloc_pages+0x15c/0x700 [ 100.671143][ T2366] ? __alloc_pages+0x8f0/0x8f0 [ 100.675740][ T2366] ? __alloc_pages_bulk+0xe40/0xe40 [ 100.680769][ T2366] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 100.686242][ T2366] __alloc_pages+0x18c/0x8f0 [ 100.690664][ T2366] ? prep_new_page+0x110/0x110 [ 100.695261][ T2366] ? pcpu_chunk_relocate+0x20a/0x430 [ 100.700394][ T2366] pcpu_populate_chunk+0x18c/0xe30 [ 100.705335][ T2366] pcpu_alloc+0x984/0x13e0 [ 100.709592][ T2366] __alloc_percpu_gfp+0x27/0x30 [ 100.714270][ T2366] bpf_map_alloc_percpu+0xe6/0x160 [ 100.719215][ T2366] htab_map_alloc+0xcb8/0x1650 [ 100.723817][ T2366] map_create+0x411/0x2050 [ 100.728068][ T2366] __sys_bpf+0x296/0x760 [ 100.732159][ T2366] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 100.737361][ T2366] __x64_sys_bpf+0x7c/0x90 [ 100.741608][ T2366] x64_sys_call+0x87f/0x9a0 [ 100.745943][ T2366] do_syscall_64+0x3b/0xb0 [ 100.750197][ T2366] ? clear_bhb_loop+0x35/0x90 [ 100.754711][ T2366] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 100.760441][ T2366] RIP: 0033:0x7fa378976819 [ 100.764693][ T2366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.784133][ T2366] RSP: 002b:00007fa376fef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 100.792380][ T2366] RAX: ffffffffffffffda RBX: 00007fa378b2dfa0 RCX: 00007fa378976819 [ 100.800188][ T2366] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 100.808000][ T2366] RBP: 00007fa376fef090 R08: 0000000000000000 R09: 0000000000000000 [ 100.815810][ T2366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 100.823623][ T2366] R13: 0000000000000000 R14: 00007fa378b2dfa0 R15: 00007ffeb6276858 [ 100.831441][ T2366] [ 100.900604][ T2361] syz.3.661 (2361) used greatest stack depth: 20096 bytes left [ 100.924739][ T30] audit: type=1400 audit(1732132777.165:146): avc: denied { append } for pid=2375 comm="syz.1.668" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 101.004442][ T30] audit: type=1400 audit(1732132777.165:147): avc: denied { create } for pid=2375 comm="syz.1.668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 101.481843][ T2407] FAULT_INJECTION: forcing a failure. [ 101.481843][ T2407] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 101.497467][ T2407] CPU: 0 PID: 2407 Comm: syz.0.679 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 101.507109][ T2407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 101.517004][ T2407] Call Trace: [ 101.520129][ T2407] [ 101.522903][ T2407] dump_stack_lvl+0x151/0x1c0 [ 101.527426][ T2407] ? io_uring_drop_tctx_refs+0x190/0x190 [ 101.532893][ T2407] dump_stack+0x15/0x20 [ 101.536879][ T2407] should_fail+0x3c6/0x510 [ 101.541135][ T2407] should_fail_alloc_page+0x5a/0x80 [ 101.546172][ T2407] prepare_alloc_pages+0x15c/0x700 [ 101.551117][ T2407] ? __alloc_pages+0x8f0/0x8f0 [ 101.555716][ T2407] ? __alloc_pages_bulk+0xe40/0xe40 [ 101.560745][ T2407] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 101.566217][ T2407] __alloc_pages+0x18c/0x8f0 [ 101.570639][ T2407] ? prep_new_page+0x110/0x110 [ 101.575241][ T2407] ? pcpu_chunk_relocate+0x20a/0x430 [ 101.580362][ T2407] pcpu_populate_chunk+0x18c/0xe30 [ 101.585410][ T2407] pcpu_alloc+0x984/0x13e0 [ 101.589659][ T2407] __alloc_percpu_gfp+0x27/0x30 [ 101.594346][ T2407] bpf_map_alloc_percpu+0xe6/0x160 [ 101.599292][ T2407] htab_map_alloc+0xcb8/0x1650 [ 101.603895][ T2407] map_create+0x411/0x2050 [ 101.608142][ T2407] __sys_bpf+0x296/0x760 [ 101.612219][ T2407] ? fput_many+0x160/0x1b0 [ 101.616471][ T2407] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 101.621684][ T2407] ? debug_smp_processor_id+0x17/0x20 [ 101.626892][ T2407] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 101.632794][ T2407] __x64_sys_bpf+0x7c/0x90 [ 101.637044][ T2407] x64_sys_call+0x87f/0x9a0 [ 101.641388][ T2407] do_syscall_64+0x3b/0xb0 [ 101.645634][ T2407] ? clear_bhb_loop+0x35/0x90 [ 101.650151][ T2407] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 101.655883][ T2407] RIP: 0033:0x7f8d008c4819 [ 101.660131][ T2407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 101.679657][ T2407] RSP: 002b:00007f8cfef3d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 101.687907][ T2407] RAX: ffffffffffffffda RBX: 00007f8d00a7bfa0 RCX: 00007f8d008c4819 [ 101.695713][ T2407] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 101.703526][ T2407] RBP: 00007f8cfef3d090 R08: 0000000000000000 R09: 0000000000000000 [ 101.711337][ T2407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 101.719150][ T2407] R13: 0000000000000000 R14: 00007f8d00a7bfa0 R15: 00007fff716dd0f8 [ 101.726965][ T2407] [ 101.926857][ T2432] device veth0_vlan left promiscuous mode [ 101.937396][ T2432] device veth0_vlan entered promiscuous mode [ 101.953420][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.982876][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 102.022764][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 102.125736][ T2433] device veth0_vlan left promiscuous mode [ 102.207736][ T2433] device veth0_vlan entered promiscuous mode [ 102.217551][ T2456] FAULT_INJECTION: forcing a failure. [ 102.217551][ T2456] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 102.231694][ T2456] CPU: 0 PID: 2456 Comm: syz.1.695 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 102.241337][ T2456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 102.251357][ T2456] Call Trace: [ 102.254480][ T2456] [ 102.257253][ T2456] dump_stack_lvl+0x151/0x1c0 [ 102.261767][ T2456] ? io_uring_drop_tctx_refs+0x190/0x190 [ 102.267270][ T2456] dump_stack+0x15/0x20 [ 102.271243][ T2456] should_fail+0x3c6/0x510 [ 102.275484][ T2456] should_fail_alloc_page+0x5a/0x80 [ 102.280517][ T2456] prepare_alloc_pages+0x15c/0x700 [ 102.285459][ T2456] ? __alloc_pages+0x8f0/0x8f0 [ 102.290058][ T2456] ? __alloc_pages_bulk+0xe40/0xe40 [ 102.295184][ T2456] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 102.300655][ T2456] __alloc_pages+0x18c/0x8f0 [ 102.305083][ T2456] ? prep_new_page+0x110/0x110 [ 102.309683][ T2456] ? pcpu_chunk_relocate+0x20a/0x430 [ 102.314811][ T2456] pcpu_populate_chunk+0x18c/0xe30 [ 102.319753][ T2456] pcpu_alloc+0x984/0x13e0 [ 102.324006][ T2456] __alloc_percpu_gfp+0x27/0x30 [ 102.328691][ T2456] bpf_map_alloc_percpu+0xe6/0x160 [ 102.333655][ T2456] htab_map_alloc+0xcb8/0x1650 [ 102.338244][ T2456] map_create+0x411/0x2050 [ 102.342489][ T2456] __sys_bpf+0x296/0x760 [ 102.346567][ T2456] ? fput_many+0x160/0x1b0 [ 102.350834][ T2456] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 102.356030][ T2456] ? debug_smp_processor_id+0x17/0x20 [ 102.361234][ T2456] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 102.367136][ T2456] __x64_sys_bpf+0x7c/0x90 [ 102.371391][ T2456] x64_sys_call+0x87f/0x9a0 [ 102.375728][ T2456] do_syscall_64+0x3b/0xb0 [ 102.379979][ T2456] ? clear_bhb_loop+0x35/0x90 [ 102.384493][ T2456] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 102.390222][ T2456] RIP: 0033:0x7fa378976819 [ 102.394479][ T2456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 102.413922][ T2456] RSP: 002b:00007fa376fef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 102.422164][ T2456] RAX: ffffffffffffffda RBX: 00007fa378b2dfa0 RCX: 00007fa378976819 [ 102.429973][ T2456] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 102.437786][ T2456] RBP: 00007fa376fef090 R08: 0000000000000000 R09: 0000000000000000 [ 102.445597][ T2456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 102.453406][ T2456] R13: 0000000000000000 R14: 00007fa378b2dfa0 R15: 00007ffeb6276858 [ 102.461223][ T2456] [ 102.622197][ T2467] device syzkaller0 entered promiscuous mode [ 102.948449][ T2490] FAULT_INJECTION: forcing a failure. [ 102.948449][ T2490] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 102.987029][ T2490] CPU: 1 PID: 2490 Comm: syz.2.708 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 102.996694][ T2490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 103.006586][ T2490] Call Trace: [ 103.009707][ T2490] [ 103.012488][ T2490] dump_stack_lvl+0x151/0x1c0 [ 103.016998][ T2490] ? io_uring_drop_tctx_refs+0x190/0x190 [ 103.022472][ T2490] dump_stack+0x15/0x20 [ 103.026457][ T2490] should_fail+0x3c6/0x510 [ 103.030714][ T2490] should_fail_alloc_page+0x5a/0x80 [ 103.035745][ T2490] prepare_alloc_pages+0x15c/0x700 [ 103.040697][ T2490] ? __alloc_pages_bulk+0xe40/0xe40 [ 103.045730][ T2490] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 103.051195][ T2490] __alloc_pages+0x18c/0x8f0 [ 103.055623][ T2490] ? prep_new_page+0x110/0x110 [ 103.060247][ T2490] ? pcpu_chunk_relocate+0x20a/0x430 [ 103.065343][ T2490] pcpu_populate_chunk+0x18c/0xe30 [ 103.070291][ T2490] pcpu_alloc+0x984/0x13e0 [ 103.074549][ T2490] __alloc_percpu_gfp+0x27/0x30 [ 103.079231][ T2490] bpf_map_alloc_percpu+0xe6/0x160 [ 103.084174][ T2490] htab_map_alloc+0xcb8/0x1650 [ 103.088781][ T2490] map_create+0x411/0x2050 [ 103.093038][ T2490] __sys_bpf+0x296/0x760 [ 103.097107][ T2490] ? fput_many+0x160/0x1b0 [ 103.101360][ T2490] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 103.106571][ T2490] ? debug_smp_processor_id+0x17/0x20 [ 103.111777][ T2490] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 103.117680][ T2490] __x64_sys_bpf+0x7c/0x90 [ 103.121933][ T2490] x64_sys_call+0x87f/0x9a0 [ 103.126269][ T2490] do_syscall_64+0x3b/0xb0 [ 103.130522][ T2490] ? clear_bhb_loop+0x35/0x90 [ 103.135037][ T2490] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 103.140767][ T2490] RIP: 0033:0x7f24beefd819 [ 103.145020][ T2490] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 103.164461][ T2490] RSP: 002b:00007f24bd576038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 103.172707][ T2490] RAX: ffffffffffffffda RBX: 00007f24bf0b4fa0 RCX: 00007f24beefd819 [ 103.180526][ T2490] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 103.188327][ T2490] RBP: 00007f24bd576090 R08: 0000000000000000 R09: 0000000000000000 [ 103.196135][ T2490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 103.203948][ T2490] R13: 0000000000000000 R14: 00007f24bf0b4fa0 R15: 00007ffe2d6a2a68 [ 103.211768][ T2490] [ 103.237779][ T2489] device syzkaller0 entered promiscuous mode [ 103.612232][ T2523] device syzkaller0 entered promiscuous mode [ 103.812695][ T2534] FAULT_INJECTION: forcing a failure. [ 103.812695][ T2534] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 103.847896][ T2534] CPU: 1 PID: 2534 Comm: syz.1.722 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 103.857553][ T2534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 103.867448][ T2534] Call Trace: [ 103.870571][ T2534] [ 103.873348][ T2534] dump_stack_lvl+0x151/0x1c0 [ 103.877859][ T2534] ? io_uring_drop_tctx_refs+0x190/0x190 [ 103.883325][ T2534] ? __switch_to+0x62a/0x1190 [ 103.887846][ T2534] dump_stack+0x15/0x20 [ 103.891834][ T2534] should_fail+0x3c6/0x510 [ 103.896086][ T2534] should_fail_alloc_page+0x5a/0x80 [ 103.901124][ T2534] prepare_alloc_pages+0x15c/0x700 [ 103.906068][ T2534] ? __alloc_pages+0x8f0/0x8f0 [ 103.910670][ T2534] ? __alloc_pages_bulk+0xe40/0xe40 [ 103.915709][ T2534] ? __schedule+0xcd4/0x1590 [ 103.920131][ T2534] __alloc_pages+0x18c/0x8f0 [ 103.924644][ T2534] ? prep_new_page+0x110/0x110 [ 103.929244][ T2534] ? preempt_schedule+0xd9/0xe0 [ 103.933926][ T2534] ? preempt_schedule+0xd9/0xe0 [ 103.938612][ T2534] ? schedule_preempt_disabled+0x20/0x20 [ 103.944084][ T2534] pcpu_populate_chunk+0x18c/0xe30 [ 103.949027][ T2534] ? preempt_schedule_thunk+0x16/0x18 [ 103.954241][ T2534] pcpu_alloc+0x984/0x13e0 [ 103.958493][ T2534] __alloc_percpu_gfp+0x27/0x30 [ 103.963176][ T2534] bpf_map_alloc_percpu+0xe6/0x160 [ 103.968125][ T2534] htab_map_alloc+0xcb8/0x1650 [ 103.972731][ T2534] map_create+0x411/0x2050 [ 103.976977][ T2534] __sys_bpf+0x296/0x760 [ 103.981142][ T2534] ? fput_many+0x160/0x1b0 [ 103.985393][ T2534] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 103.990606][ T2534] ? debug_smp_processor_id+0x17/0x20 [ 103.995808][ T2534] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 104.001711][ T2534] __x64_sys_bpf+0x7c/0x90 [ 104.005967][ T2534] x64_sys_call+0x87f/0x9a0 [ 104.010298][ T2534] do_syscall_64+0x3b/0xb0 [ 104.014550][ T2534] ? clear_bhb_loop+0x35/0x90 [ 104.019064][ T2534] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 104.024881][ T2534] RIP: 0033:0x7fa378976819 [ 104.029134][ T2534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 104.048573][ T2534] RSP: 002b:00007fa376fef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 104.056905][ T2534] RAX: ffffffffffffffda RBX: 00007fa378b2dfa0 RCX: 00007fa378976819 [ 104.064718][ T2534] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 104.072616][ T2534] RBP: 00007fa376fef090 R08: 0000000000000000 R09: 0000000000000000 [ 104.080434][ T2534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 104.088238][ T2534] R13: 0000000000000000 R14: 00007fa378b2dfa0 R15: 00007ffeb6276858 [ 104.096057][ T2534] [ 104.290738][ T30] audit: type=1400 audit(1732132780.535:148): avc: denied { create } for pid=2550 comm="syz.3.727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 105.193283][ T2584] FAULT_INJECTION: forcing a failure. [ 105.193283][ T2584] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 105.222710][ T2584] CPU: 1 PID: 2584 Comm: syz.2.737 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 105.232362][ T2584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 105.242255][ T2584] Call Trace: [ 105.245379][ T2584] [ 105.248156][ T2584] dump_stack_lvl+0x151/0x1c0 [ 105.252668][ T2584] ? io_uring_drop_tctx_refs+0x190/0x190 [ 105.258136][ T2584] ? 0xffffffffa002ad60 [ 105.262126][ T2584] dump_stack+0x15/0x20 [ 105.266119][ T2584] should_fail+0x3c6/0x510 [ 105.270377][ T2584] should_fail_alloc_page+0x5a/0x80 [ 105.275406][ T2584] prepare_alloc_pages+0x15c/0x700 [ 105.280354][ T2584] ? __alloc_pages+0x8f0/0x8f0 [ 105.284955][ T2584] ? __alloc_pages_bulk+0xe40/0xe40 [ 105.289986][ T2584] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 105.295456][ T2584] __alloc_pages+0x18c/0x8f0 [ 105.299882][ T2584] ? prep_new_page+0x110/0x110 [ 105.304490][ T2584] ? pcpu_chunk_relocate+0x20a/0x430 [ 105.309604][ T2584] pcpu_populate_chunk+0x18c/0xe30 [ 105.314551][ T2584] pcpu_alloc+0x984/0x13e0 [ 105.318814][ T2584] __alloc_percpu_gfp+0x27/0x30 [ 105.323491][ T2584] bpf_map_alloc_percpu+0xe6/0x160 [ 105.328441][ T2584] htab_map_alloc+0xcb8/0x1650 [ 105.333041][ T2584] map_create+0x411/0x2050 [ 105.337290][ T2584] __sys_bpf+0x296/0x760 [ 105.341369][ T2584] ? fput_many+0x160/0x1b0 [ 105.345622][ T2584] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 105.350833][ T2584] ? debug_smp_processor_id+0x17/0x20 [ 105.356049][ T2584] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 105.361939][ T2584] __x64_sys_bpf+0x7c/0x90 [ 105.366194][ T2584] x64_sys_call+0x87f/0x9a0 [ 105.370531][ T2584] do_syscall_64+0x3b/0xb0 [ 105.374790][ T2584] ? clear_bhb_loop+0x35/0x90 [ 105.379299][ T2584] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 105.385024][ T2584] RIP: 0033:0x7f24beefd819 [ 105.389278][ T2584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 105.408722][ T2584] RSP: 002b:00007f24bd576038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 105.416971][ T2584] RAX: ffffffffffffffda RBX: 00007f24bf0b4fa0 RCX: 00007f24beefd819 [ 105.424780][ T2584] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 105.432585][ T2584] RBP: 00007f24bd576090 R08: 0000000000000000 R09: 0000000000000000 [ 105.440394][ T2584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 105.448207][ T2584] R13: 0000000000000000 R14: 00007f24bf0b4fa0 R15: 00007ffe2d6a2a68 [ 105.456028][ T2584] [ 106.018277][ T2624] FAULT_INJECTION: forcing a failure. [ 106.018277][ T2624] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 106.045582][ T2624] CPU: 1 PID: 2624 Comm: syz.1.752 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 106.055228][ T2624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 106.065126][ T2624] Call Trace: [ 106.068249][ T2624] [ 106.071022][ T2624] dump_stack_lvl+0x151/0x1c0 [ 106.075540][ T2624] ? io_uring_drop_tctx_refs+0x190/0x190 [ 106.081009][ T2624] dump_stack+0x15/0x20 [ 106.084995][ T2624] should_fail+0x3c6/0x510 [ 106.089245][ T2624] should_fail_alloc_page+0x5a/0x80 [ 106.094279][ T2624] prepare_alloc_pages+0x15c/0x700 [ 106.099311][ T2624] ? __alloc_pages+0x8f0/0x8f0 [ 106.103913][ T2624] ? __alloc_pages_bulk+0xe40/0xe40 [ 106.108948][ T2624] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 106.114432][ T2624] __alloc_pages+0x18c/0x8f0 [ 106.118840][ T2624] ? prep_new_page+0x110/0x110 [ 106.123446][ T2624] ? pcpu_chunk_relocate+0x20a/0x430 [ 106.128565][ T2624] pcpu_populate_chunk+0x18c/0xe30 [ 106.133547][ T2624] pcpu_alloc+0x984/0x13e0 [ 106.137765][ T2624] __alloc_percpu_gfp+0x27/0x30 [ 106.142448][ T2624] bpf_map_alloc_percpu+0xe6/0x160 [ 106.147396][ T2624] htab_map_alloc+0xcb8/0x1650 [ 106.151998][ T2624] map_create+0x411/0x2050 [ 106.156252][ T2624] __sys_bpf+0x296/0x760 [ 106.160325][ T2624] ? fput_many+0x160/0x1b0 [ 106.164586][ T2624] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 106.169792][ T2624] ? debug_smp_processor_id+0x17/0x20 [ 106.174997][ T2624] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 106.180897][ T2624] __x64_sys_bpf+0x7c/0x90 [ 106.185150][ T2624] x64_sys_call+0x87f/0x9a0 [ 106.189488][ T2624] do_syscall_64+0x3b/0xb0 [ 106.193739][ T2624] ? clear_bhb_loop+0x35/0x90 [ 106.198255][ T2624] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 106.203983][ T2624] RIP: 0033:0x7fa378976819 [ 106.208238][ T2624] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 106.227679][ T2624] RSP: 002b:00007fa376fef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 106.235922][ T2624] RAX: ffffffffffffffda RBX: 00007fa378b2dfa0 RCX: 00007fa378976819 [ 106.243735][ T2624] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 106.251543][ T2624] RBP: 00007fa376fef090 R08: 0000000000000000 R09: 0000000000000000 [ 106.259357][ T2624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 106.267169][ T2624] R13: 0000000000000000 R14: 00007fa378b2dfa0 R15: 00007ffeb6276858 [ 106.274988][ T2624] [ 106.317612][ T2626] device veth0_vlan left promiscuous mode [ 106.372072][ T2626] device veth0_vlan entered promiscuous mode [ 106.443480][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 106.462194][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 106.522605][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 107.370001][ T2650] device syzkaller0 entered promiscuous mode [ 107.399206][ T2655] device pim6reg1 entered promiscuous mode [ 107.463810][ T2661] syz.1.761[2661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.463887][ T2661] syz.1.761[2661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.484225][ T2691] device sit0 entered promiscuous mode [ 109.756417][ T30] audit: type=1400 audit(1732132786.005:149): avc: denied { create } for pid=2738 comm="syz.1.791" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 112.649202][ T2846] device pim6reg1 entered promiscuous mode [ 112.854047][ T2857] FAULT_INJECTION: forcing a failure. [ 112.854047][ T2857] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 112.900825][ T2857] CPU: 1 PID: 2857 Comm: syz.1.831 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 112.910484][ T2857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 112.920370][ T2857] Call Trace: [ 112.923498][ T2857] [ 112.926273][ T2857] dump_stack_lvl+0x151/0x1c0 [ 112.930786][ T2857] ? io_uring_drop_tctx_refs+0x190/0x190 [ 112.936253][ T2857] ? 0xffffffffa0016584 [ 112.940256][ T2857] dump_stack+0x15/0x20 [ 112.944240][ T2857] should_fail+0x3c6/0x510 [ 112.948491][ T2857] should_fail_alloc_page+0x5a/0x80 [ 112.953527][ T2857] prepare_alloc_pages+0x15c/0x700 [ 112.958474][ T2857] ? __alloc_pages+0x8f0/0x8f0 [ 112.963073][ T2857] ? __alloc_pages_bulk+0xe40/0xe40 [ 112.968109][ T2857] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 112.973577][ T2857] __alloc_pages+0x18c/0x8f0 [ 112.978000][ T2857] ? prep_new_page+0x110/0x110 [ 112.982601][ T2857] ? pcpu_chunk_relocate+0x20a/0x430 [ 112.987727][ T2857] pcpu_populate_chunk+0x18c/0xe30 [ 112.992671][ T2857] pcpu_alloc+0x984/0x13e0 [ 112.996927][ T2857] __alloc_percpu_gfp+0x27/0x30 [ 113.001608][ T2857] bpf_map_alloc_percpu+0xe6/0x160 [ 113.006556][ T2857] htab_map_alloc+0xcb8/0x1650 [ 113.011164][ T2857] map_create+0x411/0x2050 [ 113.015423][ T2857] __sys_bpf+0x296/0x760 [ 113.019489][ T2857] ? fput_many+0x160/0x1b0 [ 113.023740][ T2857] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 113.028955][ T2857] ? debug_smp_processor_id+0x17/0x20 [ 113.034155][ T2857] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 113.040058][ T2857] __x64_sys_bpf+0x7c/0x90 [ 113.044312][ T2857] x64_sys_call+0x87f/0x9a0 [ 113.048647][ T2857] do_syscall_64+0x3b/0xb0 [ 113.052903][ T2857] ? clear_bhb_loop+0x35/0x90 [ 113.057421][ T2857] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 113.063144][ T2857] RIP: 0033:0x7fa378976819 [ 113.067394][ T2857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 113.086933][ T2857] RSP: 002b:00007fa376fef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 113.095178][ T2857] RAX: ffffffffffffffda RBX: 00007fa378b2dfa0 RCX: 00007fa378976819 [ 113.103097][ T2857] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 113.110911][ T2857] RBP: 00007fa376fef090 R08: 0000000000000000 R09: 0000000000000000 [ 113.118717][ T2857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 113.126527][ T2857] R13: 0000000000000000 R14: 00007fa378b2dfa0 R15: 00007ffeb6276858 [ 113.134345][ T2857] [ 113.569323][ T2892] device pim6reg1 entered promiscuous mode [ 114.365709][ T2934] device macsec0 entered promiscuous mode [ 115.297661][ T2977] device sit0 left promiscuous mode [ 117.355824][ T3070] Â: renamed from pim6reg1 [ 117.428600][ T3068] device pim6reg1 entered promiscuous mode [ 117.697984][ T3085] device pim6reg1 entered promiscuous mode [ 118.033865][ T3093] device syzkaller0 entered promiscuous mode [ 118.832473][ T3112] device syzkaller0 entered promiscuous mode [ 120.671434][ T3192] ÿÿÿÿÿÿ: renamed from vlan1 [ 120.953734][ T3213] device pim6reg1 entered promiscuous mode [ 121.082425][ T3215] syz.4.952[3215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.090685][ T3215] syz.4.952[3215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.252737][ T30] audit: type=1400 audit(1732132798.495:150): avc: denied { create } for pid=3267 comm="syz.3.970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 124.967475][ T30] audit: type=1400 audit(1732132801.215:151): avc: denied { setattr } for pid=3326 comm="syz.1.987" path="/net/tun" dev="devtmpfs" ino=148 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 127.877725][ T3461] device pim6reg1 entered promiscuous mode [ 128.045161][ T3485] device sit0 left promiscuous mode [ 128.695957][ T3531] device syzkaller0 entered promiscuous mode [ 130.243119][ T3602] device veth1_macvtap left promiscuous mode [ 130.728793][ T3633] FAULT_INJECTION: forcing a failure. [ 130.728793][ T3633] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 130.742090][ T3633] CPU: 1 PID: 3633 Comm: syz.1.1092 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 130.751807][ T3633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 130.761701][ T3633] Call Trace: [ 130.764916][ T3633] [ 130.767699][ T3633] dump_stack_lvl+0x151/0x1c0 [ 130.772222][ T3633] ? io_uring_drop_tctx_refs+0x190/0x190 [ 130.777665][ T3633] ? 0xffffffffa00169e4 [ 130.781658][ T3633] dump_stack+0x15/0x20 [ 130.785660][ T3633] should_fail+0x3c6/0x510 [ 130.789917][ T3633] should_fail_alloc_page+0x5a/0x80 [ 130.794939][ T3633] prepare_alloc_pages+0x15c/0x700 [ 130.799884][ T3633] ? __alloc_pages+0x8f0/0x8f0 [ 130.804488][ T3633] ? __alloc_pages_bulk+0xe40/0xe40 [ 130.809522][ T3633] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 130.814992][ T3633] __alloc_pages+0x18c/0x8f0 [ 130.819416][ T3633] ? prep_new_page+0x110/0x110 [ 130.824017][ T3633] ? pcpu_chunk_relocate+0x356/0x430 [ 130.829140][ T3633] pcpu_populate_chunk+0x18c/0xe30 [ 130.834088][ T3633] pcpu_alloc+0x984/0x13e0 [ 130.838341][ T3633] __alloc_percpu_gfp+0x27/0x30 [ 130.843023][ T3633] bpf_map_alloc_percpu+0xe6/0x160 [ 130.847966][ T3633] htab_map_alloc+0xcb8/0x1650 [ 130.852572][ T3633] map_create+0x411/0x2050 [ 130.856907][ T3633] __sys_bpf+0x296/0x760 [ 130.860987][ T3633] ? fput_many+0x160/0x1b0 [ 130.865239][ T3633] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 130.870537][ T3633] ? debug_smp_processor_id+0x17/0x20 [ 130.875741][ T3633] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 130.881642][ T3633] __x64_sys_bpf+0x7c/0x90 [ 130.885900][ T3633] x64_sys_call+0x87f/0x9a0 [ 130.890237][ T3633] do_syscall_64+0x3b/0xb0 [ 130.894486][ T3633] ? clear_bhb_loop+0x35/0x90 [ 130.899000][ T3633] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 130.904727][ T3633] RIP: 0033:0x7fa378976819 [ 130.908988][ T3633] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 130.928423][ T3633] RSP: 002b:00007fa376fef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 130.936665][ T3633] RAX: ffffffffffffffda RBX: 00007fa378b2dfa0 RCX: 00007fa378976819 [ 130.944477][ T3633] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 130.952291][ T3633] RBP: 00007fa376fef090 R08: 0000000000000000 R09: 0000000000000000 [ 130.960103][ T3633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 130.968007][ T3633] R13: 0000000000000000 R14: 00007fa378b2dfa0 R15: 00007ffeb6276858 [ 130.975818][ T3633] [ 131.517696][ T3672] syz.0.1108[3672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.517773][ T3672] syz.0.1108[3672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.909035][ T3715] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.927961][ T3715] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.935365][ T3715] device bridge_slave_0 entered promiscuous mode [ 133.009729][ T3715] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.019136][ T3715] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.026625][ T3715] device bridge_slave_1 entered promiscuous mode [ 133.349342][ T3748] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 133.494687][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 133.517898][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 133.542307][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 133.556182][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.579344][ T1827] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.586260][ T1827] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.700149][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 133.708524][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.716652][ T1827] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.723526][ T1827] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.731035][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 133.753056][ T3754] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.762164][ T3754] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.851090][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.867229][ T3761] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.874144][ T3761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.881296][ T3761] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.888208][ T3761] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.896319][ T3761] device bridge0 entered promiscuous mode [ 133.914296][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.962082][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 134.002934][ T3715] device veth0_vlan entered promiscuous mode [ 134.020398][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.055734][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.066014][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.091948][ T3715] device veth1_macvtap entered promiscuous mode [ 134.114196][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.131266][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 134.144562][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 134.203900][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 134.305934][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 134.340354][ T30] audit: type=1400 audit(1732132810.585:152): avc: denied { mounton } for pid=3715 comm="syz-executor" path="/root/syzkaller.6ky7rd/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 134.369559][ T30] audit: type=1400 audit(1732132810.585:153): avc: denied { mount } for pid=3715 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 134.391379][ T30] audit: type=1400 audit(1732132810.615:154): avc: denied { mounton } for pid=3715 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 134.420420][ T347] device bridge_slave_1 left promiscuous mode [ 134.426490][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.434731][ T347] device bridge_slave_0 left promiscuous mode [ 134.456169][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.140965][ T3793] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.157042][ T3793] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.166964][ T3793] device bridge_slave_0 entered promiscuous mode [ 135.174669][ T3793] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.181800][ T3793] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.189455][ T3793] device bridge_slave_1 entered promiscuous mode [ 135.331098][ T3793] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.338023][ T3793] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.345084][ T3793] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.351892][ T3793] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.373132][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 135.380559][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.389367][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.412447][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 135.427773][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.434653][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.443439][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 135.465816][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.472690][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.631014][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 135.709938][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.726609][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 135.776337][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.924880][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 135.955889][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 135.985706][ T3793] device veth0_vlan entered promiscuous mode [ 135.995591][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 136.059831][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 136.133551][ T3793] device veth1_macvtap entered promiscuous mode [ 136.202888][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 136.221050][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 136.230064][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 136.266914][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 136.282034][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 136.291813][ T347] device bridge_slave_1 left promiscuous mode [ 136.297974][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.305862][ T347] device bridge_slave_0 left promiscuous mode [ 136.311858][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.320184][ T347] device veth1_macvtap left promiscuous mode [ 136.326260][ T347] device veth0_vlan left promiscuous mode [ 136.562849][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 136.590921][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 136.652682][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 136.701212][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 136.778447][ T3825] ip6_vti0: mtu greater than device maximum [ 137.465836][ T3836] device sit0 left promiscuous mode [ 137.591615][ T3836] device sit0 entered promiscuous mode [ 138.073684][ T3835] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.111018][ T3835] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.196253][ T3835] device bridge_slave_0 entered promiscuous mode [ 138.273532][ T3835] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.370543][ T3835] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.461495][ T3835] device bridge_slave_1 entered promiscuous mode [ 138.931890][ T347] device bridge_slave_1 left promiscuous mode [ 138.942424][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.950482][ T347] device bridge_slave_0 left promiscuous mode [ 138.960885][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.969412][ T347] device veth1_macvtap left promiscuous mode [ 138.975376][ T347] device veth0_vlan left promiscuous mode [ 139.389459][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.423638][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.515581][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 139.523856][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.534391][ T1827] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.541296][ T1827] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.548922][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 139.557990][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.566115][ T1827] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.572956][ T1827] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.639052][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 139.689765][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 139.698087][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.847687][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 139.880102][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 139.890324][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.900938][ T3835] device veth0_vlan entered promiscuous mode [ 139.918706][ T3879] device veth1_macvtap left promiscuous mode [ 139.924677][ T3879] device macsec0 left promiscuous mode [ 139.992910][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.058340][ T3835] device veth1_macvtap entered promiscuous mode [ 140.136908][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 140.179414][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 140.284179][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.343776][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 140.402759][ T1827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 140.495202][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 140.531198][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 141.488575][ T3910] device sit0 entered promiscuous mode [ 141.942645][ T3925] FAULT_INJECTION: forcing a failure. [ 141.942645][ T3925] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 141.956934][ T3925] CPU: 1 PID: 3925 Comm: syz.3.1195 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 141.966666][ T3925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 141.976557][ T3925] Call Trace: [ 141.979684][ T3925] [ 141.982466][ T3925] dump_stack_lvl+0x151/0x1c0 [ 141.986977][ T3925] ? io_uring_drop_tctx_refs+0x190/0x190 [ 141.992440][ T3925] ? 0xffffffffa00163dc [ 141.996436][ T3925] dump_stack+0x15/0x20 [ 142.000608][ T3925] should_fail+0x3c6/0x510 [ 142.004856][ T3925] should_fail_alloc_page+0x5a/0x80 [ 142.009900][ T3925] prepare_alloc_pages+0x15c/0x700 [ 142.014837][ T3925] ? __alloc_pages+0x8f0/0x8f0 [ 142.019443][ T3925] ? __alloc_pages_bulk+0xe40/0xe40 [ 142.027946][ T3925] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 142.033410][ T3925] __alloc_pages+0x18c/0x8f0 [ 142.037838][ T3925] ? prep_new_page+0x110/0x110 [ 142.042439][ T3925] ? pcpu_chunk_relocate+0x20a/0x430 [ 142.047560][ T3925] pcpu_populate_chunk+0x18c/0xe30 [ 142.052596][ T3925] pcpu_alloc+0x984/0x13e0 [ 142.056852][ T3925] __alloc_percpu_gfp+0x27/0x30 [ 142.061533][ T3925] bpf_map_alloc_percpu+0xe6/0x160 [ 142.066488][ T3925] htab_map_alloc+0xcb8/0x1650 [ 142.071082][ T3925] map_create+0x411/0x2050 [ 142.075330][ T3925] __sys_bpf+0x296/0x760 [ 142.079409][ T3925] ? fput_many+0x160/0x1b0 [ 142.083662][ T3925] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 142.088909][ T3925] ? debug_smp_processor_id+0x17/0x20 [ 142.094075][ T3925] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 142.099988][ T3925] __x64_sys_bpf+0x7c/0x90 [ 142.104233][ T3925] x64_sys_call+0x87f/0x9a0 [ 142.108576][ T3925] do_syscall_64+0x3b/0xb0 [ 142.112825][ T3925] ? clear_bhb_loop+0x35/0x90 [ 142.117339][ T3925] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 142.123066][ T3925] RIP: 0033:0x7fc1c34bb819 [ 142.127322][ T3925] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 142.146762][ T3925] RSP: 002b:00007fc1c1b34038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 142.155004][ T3925] RAX: ffffffffffffffda RBX: 00007fc1c3672fa0 RCX: 00007fc1c34bb819 [ 142.162817][ T3925] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 142.170626][ T3925] RBP: 00007fc1c1b34090 R08: 0000000000000000 R09: 0000000000000000 [ 142.178437][ T3925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 142.186250][ T3925] R13: 0000000000000000 R14: 00007fc1c3672fa0 R15: 00007ffd81057f38 [ 142.194067][ T3925] [ 142.411754][ T3915] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.439963][ T3915] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.552985][ T3915] device bridge_slave_0 entered promiscuous mode [ 142.621653][ T3915] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.642437][ T3915] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.650037][ T3915] device bridge_slave_1 entered promiscuous mode [ 142.725781][ T3939] device veth0_vlan left promiscuous mode [ 142.818271][ T3939] device veth0_vlan entered promiscuous mode [ 143.060279][ T347] device bridge_slave_1 left promiscuous mode [ 143.069764][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.133878][ T347] device bridge_slave_0 left promiscuous mode [ 143.174835][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.196282][ T347] device veth1_macvtap left promiscuous mode [ 143.202174][ T347] device veth0_vlan left promiscuous mode [ 144.114123][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 144.138530][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.186253][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.256640][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.365810][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.375309][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.518215][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 144.526787][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.534947][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.541836][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.597027][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 144.729205][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 144.862521][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 144.956427][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 145.025745][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 145.095785][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 145.206177][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 145.230696][ T3915] device veth0_vlan entered promiscuous mode [ 145.247897][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 145.257560][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 145.293182][ T3915] device veth1_macvtap entered promiscuous mode [ 145.325021][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 145.333530][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 145.425635][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 145.450906][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 145.459212][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 145.494574][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 145.561037][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 145.632483][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 145.641256][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 146.527104][ T347] device bridge_slave_1 left promiscuous mode [ 146.533208][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.646474][ T347] device bridge_slave_0 left promiscuous mode [ 146.652439][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.729233][ T347] device veth1_macvtap left promiscuous mode [ 146.767211][ T347] device veth0_vlan left promiscuous mode [ 147.424823][ T4006] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.475065][ T4006] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.571075][ T4006] device bridge_slave_0 entered promiscuous mode [ 147.693752][ T4006] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.715360][ T4006] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.722828][ T4006] device bridge_slave_1 entered promiscuous mode [ 147.779041][ T4021] FAULT_INJECTION: forcing a failure. [ 147.779041][ T4021] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 147.794254][ T4021] CPU: 1 PID: 4021 Comm: syz.2.1229 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 147.803981][ T4021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 147.813878][ T4021] Call Trace: [ 147.816996][ T4021] [ 147.819952][ T4021] dump_stack_lvl+0x151/0x1c0 [ 147.824465][ T4021] ? io_uring_drop_tctx_refs+0x190/0x190 [ 147.830017][ T4021] ? 0xffffffffa001692c [ 147.834012][ T4021] dump_stack+0x15/0x20 [ 147.838001][ T4021] should_fail+0x3c6/0x510 [ 147.842255][ T4021] should_fail_alloc_page+0x5a/0x80 [ 147.847290][ T4021] prepare_alloc_pages+0x15c/0x700 [ 147.852245][ T4021] ? __alloc_pages+0x8f0/0x8f0 [ 147.856847][ T4021] ? __alloc_pages_bulk+0xe40/0xe40 [ 147.861874][ T4021] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 147.867341][ T4021] __alloc_pages+0x18c/0x8f0 [ 147.871767][ T4021] ? prep_new_page+0x110/0x110 [ 147.876469][ T4021] ? pcpu_chunk_relocate+0x20a/0x430 [ 147.881593][ T4021] pcpu_populate_chunk+0x18c/0xe30 [ 147.886537][ T4021] pcpu_alloc+0x984/0x13e0 [ 147.890787][ T4021] __alloc_percpu_gfp+0x27/0x30 [ 147.895470][ T4021] bpf_map_alloc_percpu+0xe6/0x160 [ 147.900417][ T4021] htab_map_alloc+0xcb8/0x1650 [ 147.905032][ T4021] map_create+0x411/0x2050 [ 147.909273][ T4021] __sys_bpf+0x296/0x760 [ 147.913348][ T4021] ? fput_many+0x160/0x1b0 [ 147.917601][ T4021] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 147.922812][ T4021] ? debug_smp_processor_id+0x17/0x20 [ 147.928014][ T4021] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 147.933917][ T4021] __x64_sys_bpf+0x7c/0x90 [ 147.938170][ T4021] x64_sys_call+0x87f/0x9a0 [ 147.942509][ T4021] do_syscall_64+0x3b/0xb0 [ 147.946761][ T4021] ? clear_bhb_loop+0x35/0x90 [ 147.951277][ T4021] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 147.957007][ T4021] RIP: 0033:0x7f24beefd819 [ 147.961278][ T4021] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 147.980783][ T4021] RSP: 002b:00007f24bd576038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 147.989031][ T4021] RAX: ffffffffffffffda RBX: 00007f24bf0b4fa0 RCX: 00007f24beefd819 [ 147.996841][ T4021] RDX: 0000000000000050 RSI: 0000000020000840 RDI: 0000000000000000 [ 148.004650][ T4021] RBP: 00007f24bd576090 R08: 0000000000000000 R09: 0000000000000000 [ 148.012462][ T4021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 148.020285][ T4021] R13: 0000000000000000 R14: 00007f24bf0b4fa0 R15: 00007ffe2d6a2a68 [ 148.028094][ T4021] [ 148.290937][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.300494][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.316056][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.324500][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.333068][ T421] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.339966][ T421] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.348502][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 148.356793][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.365107][ T421] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.371981][ T421] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.387984][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 148.396271][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 148.404114][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 148.425117][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 148.437540][ T4006] device veth0_vlan entered promiscuous mode [ 148.444008][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.453680][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.461205][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 148.474711][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 148.484465][ T4006] device veth1_macvtap entered promiscuous mode [ 148.494621][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 148.502810][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 148.612004][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 150.106644][ T4123] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.131187][ T4123] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.139165][ T4123] device bridge_slave_0 entered promiscuous mode [ 150.146396][ T4123] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.153336][ T4123] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.160876][ T4123] device bridge_slave_1 entered promiscuous mode [ 150.230476][ T4140] device wg2 left promiscuous mode [ 150.259971][ T4143] device wg2 entered promiscuous mode [ 150.408114][ T347] device bridge_slave_1 left promiscuous mode [ 150.414090][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.467246][ T347] device bridge_slave_0 left promiscuous mode [ 150.473275][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.481554][ T347] device veth1_macvtap left promiscuous mode [ 150.488782][ T347] device veth0_vlan left promiscuous mode [ 150.640608][ T4152] ÿÿÿÿÿÿ: renamed from vlan1 [ 150.965187][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 150.987970][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 151.079438][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 151.160314][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 151.248085][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.254973][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.338540][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 151.346826][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 151.354874][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.361758][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.369041][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 151.377309][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 151.385286][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 151.476811][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 151.498990][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 151.508481][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 151.518613][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 151.561783][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 151.580501][ T421] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 151.641698][ T4123] device veth0_vlan entered promiscuous mode [ 151.731601][ T4123] device veth1_macvtap entered promiscuous mode [ 151.761556][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 151.771156][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 151.779296][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 151.850318][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 151.864776][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 151.873380][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 151.883113][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 151.960330][ T4201] bond_slave_1: mtu less than device minimum [ 153.156986][ T4216] syz.4.1276[4216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.157058][ T4216] syz.4.1276[4216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.429314][ T347] device bridge_slave_1 left promiscuous mode [ 153.459988][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.476063][ T347] device bridge_slave_0 left promiscuous mode [ 153.516277][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.534159][ T347] device veth1_macvtap left promiscuous mode [ 153.540131][ T347] device veth0_vlan left promiscuous mode [ 153.756307][ T4220] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.763171][ T4220] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.771527][ T4220] device bridge_slave_0 entered promiscuous mode [ 153.810090][ T4220] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.817514][ T4220] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.824882][ T4220] device bridge_slave_1 entered promiscuous mode [ 154.488206][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.534047][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.586657][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.636354][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.696761][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.703643][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.787366][ T4266] device veth0_vlan left promiscuous mode [ 154.806952][ T4266] device veth0_vlan entered promiscuous mode [ 154.944160][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 154.986843][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.052133][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.082814][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.089725][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.129683][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.146622][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.179336][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.194255][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 155.202559][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.228338][ T4286] device pim6reg1 entered promiscuous mode [ 155.241961][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 155.252603][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.283492][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 155.291816][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 155.310362][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 155.318211][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.331989][ T4220] device veth0_vlan entered promiscuous mode [ 155.341512][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.349003][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.361621][ T30] audit: type=1400 audit(1732132831.605:155): avc: denied { attach_queue } for pid=4279 comm="syz.2.1294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 155.365353][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 155.390228][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 155.398900][ T4220] device veth1_macvtap entered promiscuous mode [ 155.419134][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 155.426756][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 155.434861][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 155.444901][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 155.453168][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 155.770066][ T4302] device syzkaller0 entered promiscuous mode [ 155.867721][ T4300] device pim6reg1 entered promiscuous mode [ 156.789140][ T4328] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.796148][ T4328] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.803620][ T4328] device bridge_slave_0 entered promiscuous mode [ 156.816607][ T4328] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.823611][ T4328] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.831494][ T4328] device bridge_slave_1 entered promiscuous mode [ 156.844223][ T347] device bridge_slave_1 left promiscuous mode [ 156.850260][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.868460][ T347] device bridge_slave_0 left promiscuous mode [ 156.874510][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.890415][ T347] device veth1_macvtap left promiscuous mode [ 156.896652][ T347] device veth0_vlan left promiscuous mode [ 157.203182][ T4328] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.210094][ T4328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.217199][ T4328] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.224072][ T4328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.261061][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 157.279452][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.316120][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.382393][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 157.404262][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.411177][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.450923][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 157.539142][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.546170][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.613139][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.672283][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 157.757647][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.900583][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 157.952443][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 158.099095][ T4328] device veth0_vlan entered promiscuous mode [ 158.163070][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 158.180216][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.188460][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.195842][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.232051][ T4328] device veth1_macvtap entered promiscuous mode [ 158.306886][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 158.375034][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 158.417571][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 158.448563][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 158.471539][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 158.481137][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 158.489529][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready Connection to 10.128.0.170 closed by remote host. [ 159.196848][ T288] syz-executor (288) used greatest stack depth: 19296 bytes left [ 159.827858][ T347] syzkaller: port 1(erspan0) entered disabled state [ 159.837374][ T347] device erspan0 left promiscuous mode [ 159.842670][ T347] syzkaller: port 1(erspan0) entered disabled state [ 160.106584][ T347] device bridge_slave_1 left promiscuous mode [ 160.112533][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.119750][ T347] device bridge_slave_0 left promiscuous mode [ 160.125700][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.133714][ T347] device bridge_slave_1 left promiscuous mode [ 160.139699][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.146793][ T347] device bridge_slave_0 left promiscuous mode [ 160.152731][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.160575][ T347] device bridge_slave_1 left promiscuous mode [ 160.166565][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.173750][ T347] device bridge_slave_0 left promiscuous mode [ 160.179778][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.189426][ T347] device veth1_macvtap left promiscuous mode [ 160.195373][ T347] device veth1_macvtap left promiscuous mode [ 160.201237][ T347] device veth0_vlan left promiscuous mode [ 160.206850][ T347] device veth1_macvtap left promiscuous mode [ 160.212652][ T347] device veth0_vlan left promiscuous mode [ 162.346742][ T347] device bridge_slave_1 left promiscuous mode [ 162.352691][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.360072][ T347] device bridge_slave_0 left promiscuous mode [ 162.366043][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.374633][ T347] device bridge_slave_1 left promiscuous mode [ 162.380662][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.388008][ T347] device bridge_slave_0 left promiscuous mode [ 162.393942][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.402110][ T347] device veth0_vlan left promiscuous mode [ 162.408250][ T347] device veth0_vlan left promiscuous mode