last executing test programs: 10.790820825s ago: executing program 0 (id=462): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000007000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 9.176004154s ago: executing program 3 (id=543): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1802000001000000000000000000000085000000440000008500000005000000950000000000000000a232d5e1f59f18f845f82e9a7bde9e8f4b9197701b547edf612a03f1737d951d7a617558b674e1c4fdfd591ebe7c33af3e4917be59ac67f0bbabcb8f41c23ba8f91633a8b9c70e70e28b18b04a800600dc081ac69cfea08e4e5a06f70c6792f2888d6fd95f20202866b18c3c3771bc3f325a6386a9d49e3c13b32461acf0be4b31638c29187d748841f439548addac15e52a4b6a2981eb4afadbbdc4cf2e44e2129dc6b9e909df1a5110f61f9eb41062532a6270fed17111fd9857b1d44a6daf4b2dfbd816f6b965c15fd6c6eac9e9c14d7b185b38514f87c95717f94433000000000000000000000000000000000000007c4f5b3670a7a4d1b2423bd24405a30cda3d1933843574a5f52b12df8a00ed4a926d76cc009df31a2bbe1fd858f8182a3b85c3a129d660c7e83c433e9465e281f4535e7d1113fca925425c0537cda27b3e80667ca80037e89e0795d822878d31282e0d66863a16aa1e9030c647c9b8d562523f1a307f4d3bc16e6006d1f7e19869cdbed58901fa50000000000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000000140)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000006c0)={0x1, &(0x7f00000004c0)=[{0x5, 0xd2, 0x2, 0x1}]}) sendmsg$tipc(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000000)="1c24cf74db974bcce44ddde9f8d7d9de1383ca62f44686352bc01901fae881d9cf1d40b062bfd2d2d5f1e71503300a11383ed8ad87b17652dd2b010fbc1705d8e40598965e4b17b26fb3", 0x4a}, {&(0x7f0000000200)="f800075124ef654ce9407d6f5b59f0befd69df8685a2f573ad6158066a4ec51b250b4a45d539d2fc559750ebddf96d756c3548948be5bd545b6cdf6d730ed3d6326e0a1f278458b44c123c8853b1a378684f55016c7e33074b74680d6757b5d1929dbcec2357237840dc920171f705a9ebf84d33f35e3332bf6fe177328ef687c7a2848bac8377c658e05e5e45007f9245994e352bf58983a2aa6515d530ddf4acc0032ce68ba030e67968bf", 0xac}, {&(0x7f00000002c0)="783a7b6ef1b459fa54089b24a961da1061eeb29918a6fbc4ab184220522afa0bfe1bc702de13fbb82230563a589b3fee778e3822255d2100cde530354bc4b8dd2932ffe89a7590e892fb6768817a9513596ab460a91bbef2e1521bff615c2c575e2561bd2903f26e47fec48299fecda115d197b8651abc1f41e30d41dd2d9e59c3b2b375d7290118ceafe098441a1b1737af0f57bd4d9b7ab6a27781d26332e3c1731f6b93155b5174fba6b330fad2c8d132b84fdbc7f33bc04f43ebdfbab47c461acb687251b96233eb67b955aa", 0xce}, {&(0x7f00000000c0)="463db2daac8f38c1b79d6b858f538462ddb4a61b9f473c98dbe830c0cacd7bb88e41d6a2bf162b33d9a405f503d804b9083ee43b867f8351cd06480d713aa252802bc15a23e65fbca2e56c79e3b1b65fa13ece010038e5238b03803662377eefaa9a5d8caf037d28664d681903f7f871", 0x70}, {&(0x7f00000003c0)="fefd80580bad9e5ad1fba681d50f2f94b9937eee34e661f54fd42efbb1f2b5d085799099892d1e004d3e46252f38037540f365e6b4ce33ef43b200c78996ab66d6a6cb1fde14b6e233c542a289cec3ecb4b0d789ca4401bec34629d82f3d88f35c56e4f9c6cd54e63550a5dedcc27a718f827aa73bb478150e8aea91c53b113ed57dbc66e922a849", 0x88}, {&(0x7f0000000480)="cfa15165113eac24b6b7ca3b53964f17d56ba58ed23dc06ae4932d970adf946329b6d1e8d4cda0f7fb89aa177084726e46e408e3434220f21d77a842b26c4db8a99657c42b0792aaf7c42e5f08b90477e48d4bce5eb4b956191f2c845d9e08da397e0226ca7b8478ff3e03ea62c537e2c9c489f8d0888238871fd2cb623d49", 0x7f}], 0x6, &(0x7f0000000580)="18126e899eb13e84165d1d5aca1fbb517d2049128dd3f6d00a0a5629e48fea638bcd77803d3bb1cc4e702a474a4440f63b", 0x31, 0x40041}, 0x880) 9.054748446s ago: executing program 4 (id=548): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180), 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESOCT=r0, @ANYRES32=r0, @ANYRESDEC=r0, @ANYRES64=r0, @ANYRES8, @ANYRES8=r0, @ANYRESHEX=r0, @ANYRESDEC=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x429}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000940)={0xffffffffffffffff, 0x5, 0x10}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000c00)={r3, &(0x7f0000000b00)="d37cd12c424092d0e964cdc4193009436a618339bf9f44fd0ce2b92c3764950101f7ad405f", &(0x7f0000000b40)=""/149}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000340)={{0x1, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000280)='%pB \x00'}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f00000003c0)=[0x0, 0x0], &(0x7f0000000400)=[0x0], 0x0, 0x86, &(0x7f00000004c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000600), &(0x7f00000006c0), 0x8, 0xab, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=0xffffffffffffffff, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x8, 0x0, 0x8, 0x60000, r4, 0x10000004, '\x00', r5, r7, 0x2, 0x3, 0x2, 0x1, @void, @value, @void, @value}, 0x50) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r9}, 0x10) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=r8, @ANYRES8=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, @void, @value}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000d7c900000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000001600"/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r12, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r14}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r10}, &(0x7f0000000540), &(0x7f0000000580)=r11}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0xfff, 0xfff, 0x6, 0x480, r4, 0x9, '\x00', r5, r7, 0x3, 0x0, 0x0, 0xc, @void, @value, @void, @value}, 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r15) setsockopt$sock_attach_bpf(r16, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) 8.903523349s ago: executing program 0 (id=462): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000007000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 7.190863447s ago: executing program 3 (id=552): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="f4c4a800000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000"], 0xcfa4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1, 0x0, 0x8}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 7.189802917s ago: executing program 4 (id=553): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x11, &(0x7f00000013c0)=ANY=[@ANYBLOB="18000000010000000000000035a01a1818000000090000000000000000080000"], &(0x7f0000001340)='GPL\x00', 0x0, 0xdf, &(0x7f0000001480)=""/223, 0x40e00, 0x40, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000001580), 0x8, 0x10, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x60, &(0x7f00000002c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x56, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x52}, [@ldst={0x3, 0x0, 0xb}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000b00)={&(0x7f0000000680)={0x2, 0x4e20, @remote}, 0x10, 0x0, 0x0, &(0x7f00000008c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x101}}], 0x18}, 0x40000) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r2, r1}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_page_free_batched\x00'}, 0x10) syz_clone(0x6a300000, 0x0, 0x0, 0x0, 0x0, 0x0) 6.910804253s ago: executing program 0 (id=462): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000007000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 5.073188623s ago: executing program 3 (id=559): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="016c00201000"}) 5.072102263s ago: executing program 4 (id=560): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00"/20, @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000004000800"/28], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x200, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000080)='notify_on_release\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x1ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@volatile={0x0, 0x0, 0x0, 0x9, 0x4}, @int={0xd, 0x0, 0x0, 0x1, 0x0, 0x72, 0x0, 0x5, 0x1}, @ptr={0x1, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x30, 0x0]}}, &(0x7f00000008c0)=""/207, 0x44, 0xcf, 0x1, 0x8, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b0af8ff00000000bda107000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ff00000000bfa10000000000006948c863d976b864018af89207010000f8ffffffb702000008000000b70300000000000085000000060000009500000000000000"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x42008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x17}, 0x0, 0xc8, 0x0, 0x0, 0x34}, 0x0, 0x7, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000100)=r4, 0x4) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x4040040) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 5.047085555s ago: executing program 1 (id=561): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000900)) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 5.007846088s ago: executing program 1 (id=562): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYRES16=0x0, @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00@\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x2, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x36, 0x0, 0x0, 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'bridge0\x00', @random="000000000100"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='mm_lru_insertion\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000ffffffffffffffff0000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1, 0x0, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) 5.000479119s ago: executing program 0 (id=462): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000007000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 3.067849717s ago: executing program 3 (id=563): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) r1 = openat$tun(0xffffff9c, &(0x7f0000000000), 0x40800, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x8) ioctl$TUNSETOFFLOAD(r0, 0x40047440, 0x40b942b37d0000) 3.066610677s ago: executing program 1 (id=564): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000a50000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000e7000000000000001811000087849ddb196b6de351ec38cf8c28b3d4f1df556b73b60f2c2f8b6663bbb068f1acb058d8269acf93763499819737536db3193618eb21ca95f4289d93ab856047dac704570bf50cbbd0648dc9c62cb19bf3ea515002456b75237cd97990d595e7c59e2acd", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}, [@jmp={0x5, 0x0, 0x9, 0x7, 0x0, 0x10, 0xb}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x15, 0x8, 0x1002, 0x0, 0x1023, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000380)='timer_start\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 3.066083188s ago: executing program 2 (id=565): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000032c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000080)=""/238, 0x28, 0xee, 0x1, 0x0, 0x0, @void, @value}, 0x28) (fail_nth: 4) 3.064799608s ago: executing program 4 (id=566): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x2, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg(0xffffffffffffffff, &(0x7f0000006380)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xf6, 0x0, &(0x7f0000000980)="b0ff04c66b0d698cb89e2fe086dd1f74ffff06000000fe80000000000000ac14140746647b7954c4c06b580febc28eb143d0f6c0bad62c67a04402ba4125c7024f63fdb0b6c8ee826b4dfe6042a2f057c66cad677d850ea9928bcfcb47e585e427746ed3b27c40060cbd030a6d675c9926af53cd3085b24f9b7a486775c4f284f8c5a572ca115bce90c0ee9d4e7a07f5f1518092cb1f156694036f6618a59196631e6303fd5307d1112601d3641c9492f7dc3503416836b14590c53b1fc1ac149b70cc1142d6bc57fc3a76839fa2f96878b520fedfb9f64d81584a2e85ab4f6ec718b02d78f2ebf04e6b3b94610a21616181629a03c3", 0x0, 0x2f, 0xe8034000, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x0, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f00000006c0)={&(0x7f0000000800)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x18, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x4, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffe2c, 0x10, &(0x7f00000000c0), 0xfffffffffffffd00, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0xb}, {0x65}}, [@printk={@lld, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x4, 0x1, 0x4, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x15}}], {{0x7, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x76}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r7, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) 2.722710559s ago: executing program 2 (id=567): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000044700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000cf3c67ad9d7ba336dcc74535365341210ad860a96c085ebd334a41a5c9a14d8143a09a5857ef6668b48b0558fe0d28ee8d9567ede78491d8721673bbb561504778c2a19e898b8151b829a6c471e32937ff8d6d18b06c821c12b44b9ea3778b31d06a0bfee31726"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 2.651984096s ago: executing program 2 (id=568): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0500000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000eafffff70000000000007a3d075a86080a28e8f7d995f1dabcc67806a6d7141dc39b311e710ef9957b42855d0a561c6de744b5e74abc"], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB="000000006866d800"/23, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r5, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYRES64=r3, @ANYRES32=r4, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', r6, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3, [@fwd={0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x3}]}, @typedef={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000300)=""/209, 0x4b, 0xd1, 0x2, 0x0, 0x0, @void, @value}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r10, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r9, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000900)={0x8001, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0x28, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x44}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @btf_id={0x18, 0xe, 0x3, 0x0, 0x1}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xc}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4e}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @generic={0x8, 0x5, 0x0, 0x5, 0x7}, @ldst={0x0, 0x3, 0x4, 0x3, 0xa, 0xffffffffffffff2b, 0x8}, @jmp={0x5, 0x1, 0x7, 0xa, 0x9, 0xfffffffffffffffe, 0x8}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000400)='syzkaller\x00', 0x4, 0x70, &(0x7f0000000680)=""/112, 0x41000, 0xa, '\x00', 0x0, @fallback=0x4, r8, 0x8, &(0x7f0000000700)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0xa, 0x4c}, 0x10, r11, r1, 0x2, &(0x7f0000000940)=[r0, r3, r0], &(0x7f0000000980)=[{0x4, 0x3, 0x1, 0xb}, {0x0, 0x4, 0xc, 0xb}], 0x10, 0x7, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x89a2, &(0x7f0000000080)) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000e40)={&(0x7f0000000bc0)="f02418cf39ba51fefb790bac91207039148ee4375b4a796cd45bbde9e848ca60f3f70aba243c5291fa5dc7e06ee40d0b6f61bf9b6ec1702046f4d1804d170601313fcc512f275e1d576503b60b6abb7017ac726e6069336b1de758c3198153c17128278dbd400a468ce4de5a2033cdf2280fb826ac3393178f786e68b1fda0ad9bf093eebea22f188aace4cbabc20d82e6c32efecb09114ac7e5f166e3d819326adfe1e1dba070c9b1bb4ab96b090d3350e39594e42138351b3bbaa32208c01d071a32e1da589ac1636feba7776d46d6de093139c79e480604b3a22f3fe22627c5d694b69bc85131", &(0x7f0000000cc0)=""/130, &(0x7f0000000d80)="ed78a3ed7f111792d895e5d9ebecf9604c0bb6adbb9ce04106b70fbbeac0d60c1fbf3f8d196f5f8027d11524d2041a034e8693974ef0932802f11483961c8162bcde2bfe5ea6ca2d3287013e1dbb0e54c6fd9034f382c3f329bccda9af0f3ddb81220fd7908ec89931fe6c3d7ee2a0e674f337e1207832e5f3d28ef260736500cc252780a9bafd023a9903dbc32ce8b77742b34aef738f26a272cb4d62f851401fe5e3716a5ce12f6d033fa310fc0ef874b920df", &(0x7f00000009c0)="05190ecc380f515b2cd686cf57dfc9951ee7140c63ed2c419185a29abca12fa322a708b3aba58bd834534747a61edc7a84b680ff8b8672bf268b434d43505e2e6a7ef46f0fcdb0555fe6315af99b1b48866a0da8c94bc2646fdbb52365f0c5560f710d19fb15610eb4a2ef5a5304b0e7b33f4d0576", 0x5, r5}, 0x38) 2.644942336s ago: executing program 1 (id=569): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x6}, 0x0, 0x0, 0xfffffffe, 0x5, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000e00)=ANY=[@ANYRESHEX], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffa6, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7b17, @void, @value}, 0x90) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x18) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x8) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000280), 0x9) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r2, 0x0, 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000380)={r2, 0x0, 0x20000000, 0x2}, 0x20) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={0xffffffffffffffff, 0x0, &(0x7f0000001780)=""/4096}, 0x20) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r3, &(0x7f0000000980), 0x45000) syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f0000000000), &(0x7f0000000200), &(0x7f0000000b00)="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") 2.437694165s ago: executing program 2 (id=570): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0xcc, 0x10001, 0x5, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x15, &(0x7f0000000280)={{r4}, &(0x7f0000001780)=0x4, 0x0}, 0x20) 2.436638865s ago: executing program 3 (id=571): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a2, &(0x7f0000000080)) (fail_nth: 4) 2.352671943s ago: executing program 0 (id=462): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000007000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 262.001686ms ago: executing program 1 (id=572): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000680)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f3ff0000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000400008500000001000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='fdb_delete\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8937, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x5, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="7eaa0000000000007910a8000000000018090000", @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd63"], 0xfdef) 261.163216ms ago: executing program 2 (id=573): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000c00)=ANY=[@ANYBLOB="180000000000005f5db71904139dbb00"/28, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095", @ANYRES16=0x0, @ANYRESDEC, @ANYRES32, @ANYRES64], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0x5, 0x0, 0x6, 0x10, 0x0, 0x7d8, 0x10, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x40, 0x4, @perf_config_ext, 0x8420, 0x33, 0x0, 0x7, 0x4, 0x2, 0x0, 0x0, 0x4, 0x0, 0x1}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x2, 0x8, 0x5, 0x7, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x9, 0x4}, 0x0, 0x1, 0x1, 0x5, 0x0, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xf, r1, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\b\x00'/28], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000061f32c53765ddf7eedac939c33786091eef27bd9924bc867841594dca234393cf74d5e6ee320124bf7280ac02a7a44ad6f33f64a6468fe7bea97b74e"], 0x48) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2000000000000, 0x30084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="1808000000000000000000000300000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000002f000000b70900000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="00000000000000000a0000000000003c334918a5dcae45246c130000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x2, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0f009242ee9200000421e7cc590000000800000008000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00'}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000d8b2337467e78974", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/27], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r8}, &(0x7f0000000540), &(0x7f0000000580)=r9}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r8, &(0x7f0000000780)}, 0x20) 260.411906ms ago: executing program 3 (id=574): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00"/20, @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000004000800"/28], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x200, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000080)='notify_on_release\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x1ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@volatile={0x0, 0x0, 0x0, 0x9, 0x4}, @int={0xd, 0x0, 0x0, 0x1, 0x0, 0x72, 0x0, 0x5, 0x1}, @ptr={0x1, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x30, 0x0]}}, &(0x7f00000008c0)=""/207, 0x44, 0xcf, 0x1, 0x8, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b0af8ff00000000bda107000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ff00000000bfa10000000000006948c863d976b864018af89207010000f8ffffffb702000008000000b70300000000000085000000060000009500000000000000"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x42008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x17}, 0x0, 0xc8, 0x0, 0x0, 0x34}, 0x0, 0x7, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x2a, &(0x7f0000000100)=r6, 0x4) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x4040040) recvmsg$unix(r4, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 259.166726ms ago: executing program 4 (id=575): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYRES16=0x0, @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00@\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x2, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x36, 0x0, 0x0, 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'bridge0\x00', @random="000000000100"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='mm_lru_insertion\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000ffffffffffffffff0000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1, 0x0, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) 247.791477ms ago: executing program 1 (id=576): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="f4c4a800000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000"], 0xcfa4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1, 0x0, 0x8}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 40.146146ms ago: executing program 4 (id=577): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000c00)=ANY=[@ANYBLOB="9feb010018000000000000008b0000008b00000004000000060000000200000f030000000400000007000000ff7f0000020000000000000006000000c2f013020000000000000205000000010000000000eca012f1f52bceb4b0000b04000000050000000000000c040000000d0000000000000c030000000e00000000000002000000000a00000000000001000000007b007201070000000000000b0400000006000000000000020500000000002e00006159a6df0df95c28670a82de470a1ce9151d5a44"], 0x0, 0xa8, 0x0, 0x1, 0x7, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x13, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000005000000000000008100000081b203000200000018110000ff42aa06938580c6bff59e807e3b5544ac039d41a191596c6b4704998d86daa28d81c7a263fe463469a993f9803089ebad4317bf0acf322db33f6f48ee74efa36840c84f3f20431a8647ec47cce8e2f8c9ba70528d57b5b90466f06e78478485316315bfe87346e885190a0ba3ea582faacce621e1704e801d28bb49094ddca7f5d99735cd1a20d213329da2c4d8b33397ea46", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095000000000000001833000004000000000000000000000018460000fcffffff00000000000000002d250001010000009500000000"], &(0x7f0000000580)='syzkaller\x00', 0x7, 0x86, &(0x7f00000006c0)=""/134, 0x41000, 0x1a, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000900)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000940)={0x2, 0x10, 0x400, 0x7f}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x20200, 0x0, 0x0, 0x0) unlink(&(0x7f0000000180)='\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 29.403987ms ago: executing program 2 (id=578): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ppp(0xffffff9c, &(0x7f0000000040), 0x200000, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000fcffffffffffff0000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000280)={0x1, 0x80, 0x7f, 0x0, 0x2, 0xc, 0x0, 0xb, 0x8, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x2, 0xfffffffffffffffd}, 0x2000, 0x3c94, 0x37, 0x2, 0x1, 0xffffffff, 0x0, 0x0, 0x7, 0x0, 0x7fffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) sendmsg$tipc(r4, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) close(r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x6023}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 0s ago: executing program 0 (id=462): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000007000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.14' (ED25519) to the list of known hosts. [ 21.665840][ T24] audit: type=1400 audit(1727800898.929:66): avc: denied { mounton } for pid=275 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.666779][ T275] cgroup: Unknown subsys name 'net' [ 21.688294][ T24] audit: type=1400 audit(1727800898.929:67): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.715568][ T24] audit: type=1400 audit(1727800898.959:68): avc: denied { unmount } for pid=275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.715762][ T275] cgroup: Unknown subsys name 'devices' [ 21.892161][ T275] cgroup: Unknown subsys name 'hugetlb' [ 21.897719][ T275] cgroup: Unknown subsys name 'rlimit' [ 22.058899][ T24] audit: type=1400 audit(1727800899.319:69): avc: denied { setattr } for pid=275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.081854][ T24] audit: type=1400 audit(1727800899.319:70): avc: denied { mounton } for pid=275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.106371][ T24] audit: type=1400 audit(1727800899.319:71): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.111238][ T278] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 22.137850][ T24] audit: type=1400 audit(1727800899.399:72): avc: denied { relabelto } for pid=278 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.163378][ T24] audit: type=1400 audit(1727800899.399:73): avc: denied { write } for pid=278 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.216245][ T24] audit: type=1400 audit(1727800899.479:74): avc: denied { read } for pid=275 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.241670][ T24] audit: type=1400 audit(1727800899.479:75): avc: denied { open } for pid=275 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.267669][ T275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.709318][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.716240][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.723396][ T285] device bridge_slave_0 entered promiscuous mode [ 22.730046][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.737090][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.744261][ T285] device bridge_slave_1 entered promiscuous mode [ 22.768391][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.775250][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.782556][ T287] device bridge_slave_0 entered promiscuous mode [ 22.789993][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.797206][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.804375][ T287] device bridge_slave_1 entered promiscuous mode [ 22.853446][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.860349][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.867554][ T288] device bridge_slave_0 entered promiscuous mode [ 22.876103][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.883069][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.890108][ T288] device bridge_slave_1 entered promiscuous mode [ 22.928472][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.935357][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.942610][ T289] device bridge_slave_0 entered promiscuous mode [ 22.949234][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.956176][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.963208][ T289] device bridge_slave_1 entered promiscuous mode [ 22.974069][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.980986][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.987987][ T286] device bridge_slave_0 entered promiscuous mode [ 22.994721][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.001612][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.008617][ T286] device bridge_slave_1 entered promiscuous mode [ 23.048250][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.055102][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.062207][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.068978][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.140386][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.147255][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.154329][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.161359][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.184611][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.191475][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.198747][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.205596][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.217911][ T111] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.225755][ T111] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.233145][ T111] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.240129][ T111] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.247690][ T111] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.254922][ T111] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.262548][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.269748][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.292250][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.299633][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.307916][ T111] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.314783][ T111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.336741][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.344779][ T111] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.351623][ T111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.358962][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.367564][ T111] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.374425][ T111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.382141][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.390090][ T111] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.397091][ T111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.412714][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.420686][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.441142][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.449076][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.457357][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.465173][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.473303][ T111] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.480160][ T111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.494740][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.503181][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.512900][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.523030][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.531360][ T111] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.538181][ T111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.546564][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.554630][ T111] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.561496][ T111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.583347][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.591958][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.600047][ T111] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.606918][ T111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.614444][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.622626][ T111] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.629444][ T111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.637001][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.644764][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.652638][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.660443][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.668829][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.676706][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.684813][ T111] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.691926][ T111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.699353][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.711086][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.719014][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.736738][ T285] device veth0_vlan entered promiscuous mode [ 23.742966][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.750193][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.758265][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.766316][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.774505][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.782347][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.794307][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.802511][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.813094][ T286] device veth0_vlan entered promiscuous mode [ 23.824870][ T289] device veth0_vlan entered promiscuous mode [ 23.830982][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.839141][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.847345][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.855740][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.863896][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.871596][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.879679][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.887055][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.894289][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.901567][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.911739][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.919688][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.930971][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.939184][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.947525][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.955698][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.967677][ T287] device veth0_vlan entered promiscuous mode [ 23.977593][ T288] device veth0_vlan entered promiscuous mode [ 23.984859][ T285] device veth1_macvtap entered promiscuous mode [ 23.992043][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.999543][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.007569][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.016097][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.023934][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.031843][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.039106][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.046503][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.053967][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.061885][ T286] device veth1_macvtap entered promiscuous mode [ 24.073559][ T287] device veth1_macvtap entered promiscuous mode [ 24.081404][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.089087][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.097473][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.105836][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.115109][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.123198][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.136841][ T289] device veth1_macvtap entered promiscuous mode [ 24.149921][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.158389][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.166782][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.177453][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.185582][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.193272][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.201591][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.209985][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.218244][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.226443][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.234581][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.242776][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.250733][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.258690][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.267006][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.283401][ T288] device veth1_macvtap entered promiscuous mode [ 24.292125][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.299567][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.308047][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.333489][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.343603][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.352814][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.361396][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.369418][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.377844][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.391271][ T287] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 24.463380][ C0] hrtimer: interrupt took 27636 ns [ 24.542914][ T325] device veth0_vlan left promiscuous mode [ 24.587322][ T324] cgroup: syz.2.3 (324) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 24.609785][ T324] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 24.687710][ T325] device veth0_vlan entered promiscuous mode [ 25.021760][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.039399][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.554403][ T347] device syzkaller0 entered promiscuous mode [ 25.578534][ T356] device veth0_vlan left promiscuous mode [ 25.669096][ T356] device veth0_vlan entered promiscuous mode [ 25.739334][ T361] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.753924][ T361] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.931836][ T362] device veth0_vlan left promiscuous mode [ 26.005642][ T362] device veth0_vlan entered promiscuous mode [ 26.235897][ T368] device veth0_vlan left promiscuous mode [ 26.410384][ T368] device veth0_vlan entered promiscuous mode [ 26.648582][ T376] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.666761][ T376] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.063568][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.075567][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.413801][ T454] device veth0_vlan left promiscuous mode [ 35.499994][ T454] device veth0_vlan entered promiscuous mode [ 35.720467][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.741089][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.761863][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.784406][ T456] device bridge_slave_1 left promiscuous mode [ 35.790789][ T456] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.823982][ T456] device bridge_slave_0 left promiscuous mode [ 35.916582][ T456] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.369154][ T492] device bridge_slave_1 left promiscuous mode [ 37.385714][ T492] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.402111][ T492] device bridge_slave_0 left promiscuous mode [ 37.441654][ T492] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.495410][ T499] device veth0_vlan left promiscuous mode [ 37.665165][ T499] device veth0_vlan entered promiscuous mode [ 38.299480][ T508] device veth0_vlan left promiscuous mode [ 38.371309][ T508] device veth0_vlan entered promiscuous mode [ 38.863377][ T518] device veth0_vlan left promiscuous mode [ 39.009654][ T518] device veth0_vlan entered promiscuous mode [ 39.580380][ T529] device veth0_vlan left promiscuous mode [ 39.651568][ T529] device veth0_vlan entered promiscuous mode [ 40.580752][ T551] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.594585][ T551] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.320806][ T564] device veth0_vlan left promiscuous mode [ 41.588103][ T564] device veth0_vlan entered promiscuous mode [ 42.096132][ T575] device veth0_vlan left promiscuous mode [ 42.330380][ T575] device veth0_vlan entered promiscuous mode [ 42.562349][ T24] kauditd_printk_skb: 36 callbacks suppressed [ 42.562360][ T24] audit: type=1400 audit(1727800919.829:112): avc: denied { read write } for pid=582 comm="syz.4.66" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 42.687061][ T24] audit: type=1400 audit(1727800919.909:113): avc: denied { open } for pid=582 comm="syz.4.66" path="/dev/ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 42.764353][ T24] audit: type=1400 audit(1727800919.919:114): avc: denied { ioctl } for pid=582 comm="syz.4.66" path="/dev/ppp" dev="devtmpfs" ino=133 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 42.860256][ T587] device veth0_vlan left promiscuous mode [ 42.987196][ T587] device veth0_vlan entered promiscuous mode [ 43.232060][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.291160][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 43.308650][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 43.671159][ T605] device veth0_vlan left promiscuous mode [ 43.748532][ T605] device veth0_vlan entered promiscuous mode [ 44.722413][ T630] device bridge_slave_1 left promiscuous mode [ 44.728368][ T630] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.781508][ T630] device bridge_slave_0 left promiscuous mode [ 44.804451][ T630] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.916650][ T24] audit: type=1400 audit(1727800922.179:115): avc: denied { cpu } for pid=633 comm="syz.1.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 45.184040][ T638] device veth0_vlan left promiscuous mode [ 45.200042][ T638] device veth0_vlan entered promiscuous mode [ 45.230091][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.267266][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 45.309324][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 45.822893][ T646] device veth0_vlan left promiscuous mode [ 45.855926][ T646] device veth0_vlan entered promiscuous mode [ 47.500782][ T24] audit: type=1400 audit(1727800924.769:116): avc: denied { read } for pid=667 comm="syz.3.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 49.073595][ T681] device veth0_vlan left promiscuous mode [ 49.278546][ T681] device veth0_vlan entered promiscuous mode [ 49.436169][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.452319][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.472282][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.804678][ T685] device veth0_vlan left promiscuous mode [ 49.919693][ T685] device veth0_vlan entered promiscuous mode [ 51.707547][ T711] device veth0_vlan left promiscuous mode [ 51.935139][ T711] device veth0_vlan entered promiscuous mode [ 52.259609][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 52.291125][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 52.389292][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 52.582410][ T730] device veth0_vlan left promiscuous mode [ 52.692239][ T730] device veth0_vlan entered promiscuous mode [ 52.876230][ T728] device veth0_vlan left promiscuous mode [ 52.930221][ T728] device veth0_vlan entered promiscuous mode [ 53.125064][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 53.217013][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 53.311480][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 56.251611][ T783] device veth0_vlan left promiscuous mode [ 56.382669][ T783] device veth0_vlan entered promiscuous mode [ 57.688297][ T789] device veth0_vlan left promiscuous mode [ 57.786730][ T789] device veth0_vlan entered promiscuous mode [ 57.920669][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.932154][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.952173][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 58.239488][ T800] device veth0_vlan left promiscuous mode [ 58.338320][ T800] device veth0_vlan entered promiscuous mode [ 58.900735][ T808] device veth0_vlan left promiscuous mode [ 58.940383][ T808] device veth0_vlan entered promiscuous mode [ 59.086908][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.096220][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.103596][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.150674][ T805] device veth0_vlan left promiscuous mode [ 59.156609][ T805] device veth0_vlan entered promiscuous mode [ 59.316736][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.373295][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.460290][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.890631][ T825] device veth0_vlan left promiscuous mode [ 60.185114][ T825] device veth0_vlan entered promiscuous mode [ 60.949609][ T834] device veth0_vlan left promiscuous mode [ 61.235208][ T834] device veth0_vlan entered promiscuous mode [ 61.492756][ T842] device veth0_vlan left promiscuous mode [ 61.667330][ T842] device veth0_vlan entered promiscuous mode [ 63.188444][ T865] device bridge_slave_1 left promiscuous mode [ 63.214788][ T865] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.245940][ T865] device bridge_slave_0 left promiscuous mode [ 63.331154][ T865] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.644009][ T887] device veth0_vlan left promiscuous mode [ 64.723847][ T887] device veth0_vlan entered promiscuous mode [ 65.554703][ T893] device veth0_vlan left promiscuous mode [ 65.627968][ T893] device veth0_vlan entered promiscuous mode [ 69.212627][ T921] device veth0_vlan left promiscuous mode [ 69.409620][ T921] device veth0_vlan entered promiscuous mode [ 69.851324][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.964568][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 70.062797][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 72.834505][ T964] device veth0_vlan left promiscuous mode [ 73.007068][ T964] device veth0_vlan entered promiscuous mode [ 73.207227][ T971] device veth0_vlan left promiscuous mode [ 73.391031][ T971] device veth0_vlan entered promiscuous mode [ 73.751521][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 73.759557][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.781456][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 74.026220][ T984] device veth0_vlan left promiscuous mode [ 74.208655][ T984] device veth0_vlan entered promiscuous mode [ 75.023072][ T999] device veth0_vlan left promiscuous mode [ 75.239569][ T999] device veth0_vlan entered promiscuous mode [ 75.430898][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.474229][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 75.565842][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 76.148201][ T1018] device veth0_vlan left promiscuous mode [ 76.161787][ T1018] device veth0_vlan entered promiscuous mode [ 76.169120][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 76.201124][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 76.290908][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 76.322852][ T1014] device veth0_vlan left promiscuous mode [ 76.496199][ T1014] device veth0_vlan entered promiscuous mode [ 76.753246][ T1022] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.762173][ T1022] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.771132][ T1022] device bridge_slave_0 entered promiscuous mode [ 76.784528][ T1029] device veth0_vlan left promiscuous mode [ 76.847961][ T1029] device veth0_vlan entered promiscuous mode [ 77.129842][ T1022] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.158057][ T1022] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.262692][ T1022] device bridge_slave_1 entered promiscuous mode [ 77.341808][ T24] audit: type=1400 audit(1727800954.609:117): avc: denied { write } for pid=1041 comm="syz.0.184" name="net" dev="proc" ino=17464 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 77.383572][ T24] audit: type=1400 audit(1727800954.629:118): avc: denied { add_name } for pid=1041 comm="syz.0.184" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 77.406533][ T24] audit: type=1400 audit(1727800954.629:119): avc: denied { create } for pid=1041 comm="syz.0.184" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 77.484542][ T24] audit: type=1400 audit(1727800954.629:120): avc: denied { associate } for pid=1041 comm="syz.0.184" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 77.521958][ T1045] device veth0_vlan left promiscuous mode [ 77.623585][ T1045] device veth0_vlan entered promiscuous mode [ 77.888540][ T1054] device veth0_vlan left promiscuous mode [ 78.200911][ T1054] device veth0_vlan entered promiscuous mode [ 78.491097][ T1072] device veth0_vlan left promiscuous mode [ 78.693442][ T1072] device veth0_vlan entered promiscuous mode [ 79.009930][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.031243][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.117337][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 79.161305][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 79.169412][ T591] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.176257][ T591] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.188138][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 79.196745][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.205956][ T591] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.212818][ T591] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.377697][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 79.450768][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.469019][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 79.484533][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.499449][ T1081] device veth0_vlan left promiscuous mode [ 79.571009][ T1081] device veth0_vlan entered promiscuous mode [ 79.590317][ T111] device veth1_macvtap left promiscuous mode [ 79.596191][ T111] device veth0_vlan left promiscuous mode [ 79.709393][ T1022] device veth0_vlan entered promiscuous mode [ 79.803014][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.811242][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.819171][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.911398][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 80.000911][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 80.071816][ T1022] device veth1_macvtap entered promiscuous mode [ 80.143759][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 80.210992][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 80.335540][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 80.439762][ T1095] device veth0_vlan left promiscuous mode [ 80.462294][ T1095] device veth0_vlan entered promiscuous mode [ 80.519139][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 80.559005][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 80.724827][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 80.781412][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 80.917250][ T24] audit: type=1400 audit(1727800958.179:121): avc: denied { mount } for pid=1022 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 81.201415][ T1110] device veth0_vlan left promiscuous mode [ 81.456373][ T1110] device veth0_vlan entered promiscuous mode [ 82.018745][ T1119] device veth0_vlan left promiscuous mode [ 82.173728][ T1119] device veth0_vlan entered promiscuous mode [ 82.313180][ T1118] device veth0_vlan left promiscuous mode [ 82.444445][ T1118] device veth0_vlan entered promiscuous mode [ 84.208498][ T1139] device veth0_vlan left promiscuous mode [ 84.370565][ T1139] device veth0_vlan entered promiscuous mode [ 85.817999][ T1147] device veth0_vlan left promiscuous mode [ 85.998750][ T1147] device veth0_vlan entered promiscuous mode [ 86.150754][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 86.167452][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 86.228560][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 87.247650][ T1167] device veth0_vlan left promiscuous mode [ 87.300297][ T1167] device veth0_vlan entered promiscuous mode [ 87.483276][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 87.498963][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 87.534188][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 87.554570][ T1174] device veth0_vlan left promiscuous mode [ 87.674380][ T1174] device veth0_vlan entered promiscuous mode [ 87.929591][ T1184] device veth0_vlan left promiscuous mode [ 88.069969][ T1184] device veth0_vlan entered promiscuous mode [ 88.458736][ T1202] device veth0_vlan left promiscuous mode [ 88.647345][ T1202] device veth0_vlan entered promiscuous mode [ 89.135379][ T1213] device veth0_vlan left promiscuous mode [ 89.309583][ T1213] device veth0_vlan entered promiscuous mode [ 89.524390][ T1212] device veth0_vlan left promiscuous mode [ 89.632940][ T1212] device veth0_vlan entered promiscuous mode [ 91.109259][ T1233] device veth0_vlan left promiscuous mode [ 91.173296][ T1233] device veth0_vlan entered promiscuous mode [ 91.339228][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.357526][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.393771][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 91.527170][ T1239] device veth0_vlan left promiscuous mode [ 91.830568][ T1239] device veth0_vlan entered promiscuous mode [ 92.226172][ T1241] device veth0_vlan left promiscuous mode [ 92.324417][ T1241] device veth0_vlan entered promiscuous mode [ 92.480567][ T1244] device veth0_vlan left promiscuous mode [ 92.595141][ T1244] device veth0_vlan entered promiscuous mode [ 93.225109][ T1263] device veth0_vlan left promiscuous mode [ 93.353063][ T1263] device veth0_vlan entered promiscuous mode [ 93.577275][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 93.591190][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 93.601536][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 93.666954][ T1267] device veth0_vlan left promiscuous mode [ 93.814602][ T1267] device veth0_vlan entered promiscuous mode [ 94.719308][ T1288] device veth0_vlan left promiscuous mode [ 94.920566][ T1288] device veth0_vlan entered promiscuous mode [ 95.421042][ T1298] FAULT_INJECTION: forcing a failure. [ 95.421042][ T1298] name failslab, interval 1, probability 0, space 0, times 1 [ 95.484532][ T1298] CPU: 1 PID: 1298 Comm: syz.1.252 Not tainted 5.10.225-syzkaller-00594-g63626fcd0804 #0 [ 95.494150][ T1298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 95.504059][ T1298] Call Trace: [ 95.507189][ T1298] dump_stack_lvl+0x1e2/0x24b [ 95.511690][ T1298] ? bfq_pos_tree_add_move+0x43b/0x43b [ 95.517015][ T1298] dump_stack+0x15/0x17 [ 95.520970][ T1298] should_fail+0x3c6/0x510 [ 95.525233][ T1298] ? __request_module+0x28c/0x8d0 [ 95.530079][ T1298] __should_failslab+0xa4/0xe0 [ 95.534689][ T1298] should_failslab+0x9/0x20 [ 95.539024][ T1298] kmem_cache_alloc_trace+0x3a/0x2e0 [ 95.544153][ T1298] ? dev_load+0x5b/0xb0 [ 95.548134][ T1298] __request_module+0x28c/0x8d0 [ 95.552820][ T1298] ? selinux_capable+0x2f1/0x430 [ 95.557591][ T1298] ? capable+0x78/0xe0 [ 95.561500][ T1298] ? copy_regset_to_user+0x210/0x210 [ 95.566616][ T1298] ? do_vfs_ioctl+0x798/0x1a30 [ 95.571216][ T1298] ? preempt_count_add+0x92/0x1a0 [ 95.576095][ T1298] ? cap_capable+0x1ce/0x270 [ 95.580523][ T1298] ? security_capable+0x87/0xb0 [ 95.585199][ T1298] dev_load+0x5b/0xb0 [ 95.589013][ T1298] dev_ioctl+0x5b9/0xb40 [ 95.593101][ T1298] sock_ioctl+0x685/0x760 [ 95.597254][ T1298] ? sock_poll+0x340/0x340 [ 95.601509][ T1298] ? security_file_ioctl+0x84/0xb0 [ 95.606454][ T1298] ? sock_poll+0x340/0x340 [ 95.610717][ T1298] __se_sys_ioctl+0x114/0x190 [ 95.615224][ T1298] __x64_sys_ioctl+0x7b/0x90 [ 95.619654][ T1298] do_syscall_64+0x34/0x70 [ 95.624086][ T1298] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 95.629848][ T1298] RIP: 0033:0x7f39f14bfff9 [ 95.634082][ T1298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.653773][ T1298] RSP: 002b:00007f39f0139038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 95.662013][ T1298] RAX: ffffffffffffffda RBX: 00007f39f1677f80 RCX: 00007f39f14bfff9 [ 95.669830][ T1298] RDX: 0000000020000900 RSI: 00000000000089f0 RDI: 0000000000000004 [ 95.677635][ T1298] RBP: 00007f39f0139090 R08: 0000000000000000 R09: 0000000000000000 [ 95.685564][ T1298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.693768][ T1298] R13: 0000000000000000 R14: 00007f39f1677f80 R15: 00007fffba32a908 [ 95.710815][ T24] audit: type=1400 audit(1727800972.979:122): avc: denied { sys_module } for pid=1297 comm="syz.1.252" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 96.945652][ T1318] device veth0_vlan left promiscuous mode [ 97.060254][ T1318] device veth0_vlan entered promiscuous mode [ 97.376610][ T1328] device veth0_vlan left promiscuous mode [ 97.518975][ T1328] device veth0_vlan entered promiscuous mode [ 97.752984][ T1331] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.771674][ T1331] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.316785][ T1337] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.323764][ T1337] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.331208][ T1337] device bridge_slave_0 entered promiscuous mode [ 98.338116][ T1337] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.350532][ T1337] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.357962][ T1337] device bridge_slave_1 entered promiscuous mode [ 98.648232][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 98.660801][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 98.780214][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 98.842739][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 98.883375][ T591] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.890233][ T591] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.016748][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 99.024382][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 99.032535][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 99.041119][ T591] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.047980][ T591] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.064316][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 99.072375][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 99.103998][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 99.153770][ T1337] device veth0_vlan entered promiscuous mode [ 99.160901][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 99.169093][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 99.259411][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 99.365531][ T1337] device veth1_macvtap entered promiscuous mode [ 99.479842][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 99.537348][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 99.671343][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 99.703284][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 99.731163][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 99.742808][ T1357] FAULT_INJECTION: forcing a failure. [ 99.742808][ T1357] name failslab, interval 1, probability 0, space 0, times 0 [ 99.780847][ T1357] CPU: 1 PID: 1357 Comm: syz.3.268 Not tainted 5.10.225-syzkaller-00594-g63626fcd0804 #0 [ 99.790467][ T1357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 99.800355][ T1357] Call Trace: [ 99.803500][ T1357] dump_stack_lvl+0x1e2/0x24b [ 99.808000][ T1357] ? panic+0x812/0x812 [ 99.811910][ T1357] ? bfq_pos_tree_add_move+0x43b/0x43b [ 99.817202][ T1357] dump_stack+0x15/0x17 [ 99.821213][ T1357] should_fail+0x3c6/0x510 [ 99.825446][ T1357] ? selinux_sk_alloc_security+0x60/0x140 [ 99.831089][ T1357] __should_failslab+0xa4/0xe0 [ 99.835688][ T1357] should_failslab+0x9/0x20 [ 99.840034][ T1357] kmem_cache_alloc_trace+0x3a/0x2e0 [ 99.845240][ T1357] selinux_sk_alloc_security+0x60/0x140 [ 99.850625][ T1357] security_sk_alloc+0x72/0xb0 [ 99.855221][ T1357] sk_prot_alloc+0x142/0x370 [ 99.859653][ T1357] sk_alloc+0x38/0x4d0 [ 99.863550][ T1357] ? slab_post_alloc_hook+0x80/0x2f0 [ 99.868677][ T1357] tipc_sk_create+0x103/0x1e70 [ 99.873270][ T1357] ? security_inode_alloc+0x29/0x120 [ 99.878416][ T1357] ? __kasan_check_write+0x14/0x20 [ 99.883342][ T1357] ? _raw_spin_lock+0xa4/0x1b0 [ 99.887930][ T1357] ? _raw_spin_trylock_bh+0x190/0x190 [ 99.893148][ T1357] ? security_inode_alloc+0xc0/0x120 [ 99.898268][ T1357] ? inode_init_always+0x77e/0x9f0 [ 99.903211][ T1357] __sock_create+0x3a6/0x760 [ 99.907649][ T1357] __sys_socketpair+0x313/0x6e0 [ 99.912341][ T1357] ? __ia32_sys_socket+0x90/0x90 [ 99.917092][ T1357] ? __ia32_sys_read+0x90/0x90 [ 99.921694][ T1357] __x64_sys_socketpair+0x9b/0xb0 [ 99.926555][ T1357] do_syscall_64+0x34/0x70 [ 99.930809][ T1357] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 99.936885][ T1357] RIP: 0033:0x7f9015410ff9 [ 99.941138][ T1357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 99.960877][ T1357] RSP: 002b:00007f901408a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 99.969111][ T1357] RAX: ffffffffffffffda RBX: 00007f90155c8f80 RCX: 00007f9015410ff9 [ 99.976922][ T1357] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 99.984742][ T1357] RBP: 00007f901408a090 R08: 0000000000000000 R09: 0000000000000000 [ 99.992549][ T1357] R10: 0000000020000940 R11: 0000000000000246 R12: 0000000000000001 [ 100.000373][ T1357] R13: 0000000000000000 R14: 00007f90155c8f80 R15: 00007ffddca1d7d8 [ 100.258978][ T1367] device syzkaller0 entered promiscuous mode [ 100.296329][ T1360] device veth0_vlan left promiscuous mode [ 100.316410][ T1360] device veth0_vlan entered promiscuous mode [ 100.333383][ T24] audit: type=1400 audit(1727800977.599:123): avc: denied { relabelfrom } for pid=1362 comm="syz.4.262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 100.362089][ T24] audit: type=1400 audit(1727800977.599:124): avc: denied { relabelto } for pid=1362 comm="syz.4.262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 100.437612][ T1377] device veth0_vlan left promiscuous mode [ 100.641141][ T1377] device veth0_vlan entered promiscuous mode [ 100.842266][ T1375] device veth0_vlan left promiscuous mode [ 101.025226][ T1375] device veth0_vlan entered promiscuous mode [ 101.239877][ T111] device veth1_macvtap left promiscuous mode [ 101.249035][ T111] device veth0_vlan left promiscuous mode [ 101.360144][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.369107][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 101.377169][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 101.387279][ T1386] device veth0_vlan left promiscuous mode [ 101.394553][ T1386] device veth0_vlan entered promiscuous mode [ 101.508308][ T1395] device veth0_vlan left promiscuous mode [ 101.690374][ T1395] device veth0_vlan entered promiscuous mode [ 102.516371][ T1415] device veth0_vlan left promiscuous mode [ 102.854768][ T1415] device veth0_vlan entered promiscuous mode [ 103.228815][ T1430] FAULT_INJECTION: forcing a failure. [ 103.228815][ T1430] name failslab, interval 1, probability 0, space 0, times 0 [ 103.366297][ T1430] CPU: 0 PID: 1430 Comm: syz.4.290 Not tainted 5.10.225-syzkaller-00594-g63626fcd0804 #0 [ 103.375925][ T1430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 103.385819][ T1430] Call Trace: [ 103.388948][ T1430] dump_stack_lvl+0x1e2/0x24b [ 103.393464][ T1430] ? bfq_pos_tree_add_move+0x43b/0x43b [ 103.398751][ T1430] dump_stack+0x15/0x17 [ 103.402746][ T1430] should_fail+0x3c6/0x510 [ 103.406999][ T1430] ? btf_new_fd+0x287/0x9c0 [ 103.411350][ T1430] __should_failslab+0xa4/0xe0 [ 103.415937][ T1430] should_failslab+0x9/0x20 [ 103.420274][ T1430] kmem_cache_alloc_trace+0x3a/0x2e0 [ 103.425393][ T1430] ? btf_new_fd+0x112/0x9c0 [ 103.429740][ T1430] btf_new_fd+0x287/0x9c0 [ 103.433906][ T1430] __se_sys_bpf+0x1aed/0x11cb0 [ 103.438503][ T1430] ? stack_trace_save+0x113/0x1c0 [ 103.443361][ T1430] ? terminate_walk+0x407/0x4f0 [ 103.448048][ T1430] ? stack_trace_snprint+0xf0/0xf0 [ 103.452998][ T1430] ? __kasan_check_write+0x14/0x20 [ 103.457945][ T1430] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 103.463248][ T1430] ? __x64_sys_bpf+0x90/0x90 [ 103.467666][ T1430] ? __kasan_slab_free+0x11/0x20 [ 103.472440][ T1430] ? kmem_cache_free+0xa9/0x1e0 [ 103.477221][ T1430] ? do_sys_openat2+0x1fc/0x710 [ 103.481901][ T1430] ? __x64_sys_openat+0x243/0x290 [ 103.486763][ T1430] ? do_syscall_64+0x34/0x70 [ 103.491194][ T1430] ? _kstrtoull+0x3a0/0x4a0 [ 103.495533][ T1430] ? kstrtouint_from_user+0x20a/0x2a0 [ 103.500727][ T1430] ? kstrtol_from_user+0x310/0x310 [ 103.505678][ T1430] ? queue_stack_map_delete_elem+0x10/0x10 [ 103.511349][ T1430] ? memset+0x35/0x40 [ 103.515136][ T1430] ? __fsnotify_parent+0x4b9/0x6c0 [ 103.520085][ T1430] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 103.526509][ T1430] ? proc_fail_nth_write+0x20b/0x290 [ 103.531630][ T1430] ? proc_fail_nth_read+0x210/0x210 [ 103.536660][ T1430] ? security_file_permission+0x86/0xb0 [ 103.542044][ T1430] ? rw_verify_area+0x1c3/0x360 [ 103.546924][ T1430] ? preempt_count_add+0x92/0x1a0 [ 103.551855][ T1430] ? vfs_write+0x852/0xe70 [ 103.556197][ T1430] ? putname+0xe7/0x140 [ 103.560197][ T1430] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 103.565963][ T1430] ? kmem_cache_free+0x1c0/0x1e0 [ 103.570699][ T1430] ? kernel_write+0x3d0/0x3d0 [ 103.575220][ T1430] ? __kasan_check_write+0x14/0x20 [ 103.580166][ T1430] ? mutex_lock+0xa5/0x110 [ 103.584428][ T1430] ? mutex_trylock+0xa0/0xa0 [ 103.588846][ T1430] ? __kasan_check_write+0x14/0x20 [ 103.593789][ T1430] ? fput_many+0x160/0x1b0 [ 103.598058][ T1430] ? debug_smp_processor_id+0x17/0x20 [ 103.603246][ T1430] __x64_sys_bpf+0x7b/0x90 [ 103.607496][ T1430] do_syscall_64+0x34/0x70 [ 103.611750][ T1430] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 103.617477][ T1430] RIP: 0033:0x7f58a1428ff9 [ 103.621730][ T1430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 103.641181][ T1430] RSP: 002b:00007f58a00a2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 103.649427][ T1430] RAX: ffffffffffffffda RBX: 00007f58a15e0f80 RCX: 00007f58a1428ff9 [ 103.657235][ T1430] RDX: 0000000000000020 RSI: 00000000200012c0 RDI: 0000000000000012 [ 103.665040][ T1430] RBP: 00007f58a00a2090 R08: 0000000000000000 R09: 0000000000000000 [ 103.672849][ T1430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 103.680746][ T1430] R13: 0000000000000000 R14: 00007f58a15e0f80 R15: 00007fffa8825b68 [ 104.684852][ T1465] device veth1_macvtap left promiscuous mode [ 105.114586][ T1471] FAULT_INJECTION: forcing a failure. [ 105.114586][ T1471] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 105.143713][ T1471] CPU: 0 PID: 1471 Comm: syz.1.301 Not tainted 5.10.225-syzkaller-00594-g63626fcd0804 #0 [ 105.153343][ T1471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 105.163225][ T1471] Call Trace: [ 105.166373][ T1471] dump_stack_lvl+0x1e2/0x24b [ 105.170867][ T1471] ? bfq_pos_tree_add_move+0x43b/0x43b [ 105.176150][ T1471] dump_stack+0x15/0x17 [ 105.180139][ T1471] should_fail+0x3c6/0x510 [ 105.184394][ T1471] should_fail_usercopy+0x1a/0x20 [ 105.189251][ T1471] _copy_to_user+0x20/0x90 [ 105.193523][ T1471] simple_read_from_buffer+0xc7/0x150 [ 105.198759][ T1471] proc_fail_nth_read+0x1a3/0x210 [ 105.203590][ T1471] ? proc_fault_inject_write+0x390/0x390 [ 105.209051][ T1471] ? security_file_permission+0x86/0xb0 [ 105.214432][ T1471] ? rw_verify_area+0x1c3/0x360 [ 105.219179][ T1471] ? proc_fault_inject_write+0x390/0x390 [ 105.224594][ T1471] vfs_read+0x200/0xba0 [ 105.228577][ T1471] ? kernel_read+0x70/0x70 [ 105.232835][ T1471] ? __kasan_check_write+0x14/0x20 [ 105.237772][ T1471] ? mutex_lock+0xa5/0x110 [ 105.242025][ T1471] ? mutex_trylock+0xa0/0xa0 [ 105.246450][ T1471] ? __fdget_pos+0x2e7/0x3a0 [ 105.250879][ T1471] ? ksys_read+0x77/0x2c0 [ 105.255040][ T1471] ksys_read+0x199/0x2c0 [ 105.259120][ T1471] ? vfs_write+0xe70/0xe70 [ 105.263375][ T1471] ? fpu__clear_all+0x20/0x20 [ 105.267890][ T1471] ? __kasan_check_read+0x11/0x20 [ 105.272760][ T1471] __x64_sys_read+0x7b/0x90 [ 105.277088][ T1471] do_syscall_64+0x34/0x70 [ 105.281343][ T1471] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 105.287068][ T1471] RIP: 0033:0x7f39f14bea3c [ 105.291323][ T1471] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 105.310761][ T1471] RSP: 002b:00007f39f0118030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 105.319095][ T1471] RAX: ffffffffffffffda RBX: 00007f39f1678058 RCX: 00007f39f14bea3c [ 105.326908][ T1471] RDX: 000000000000000f RSI: 00007f39f01180a0 RDI: 0000000000000004 [ 105.334715][ T1471] RBP: 00007f39f0118090 R08: 0000000000000000 R09: 0000000000000000 [ 105.342622][ T1471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 105.350431][ T1471] R13: 0000000000000000 R14: 00007f39f1678058 R15: 00007fffba32a908 [ 105.536092][ T1493] FAULT_INJECTION: forcing a failure. [ 105.536092][ T1493] name failslab, interval 1, probability 0, space 0, times 0 [ 105.549166][ T1493] CPU: 1 PID: 1493 Comm: syz.2.307 Not tainted 5.10.225-syzkaller-00594-g63626fcd0804 #0 [ 105.558862][ T1493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 105.568746][ T1493] Call Trace: [ 105.572058][ T1493] dump_stack_lvl+0x1e2/0x24b [ 105.576560][ T1493] ? panic+0x812/0x812 [ 105.580467][ T1493] ? bfq_pos_tree_add_move+0x43b/0x43b [ 105.585764][ T1493] ? __kasan_check_write+0x14/0x20 [ 105.590735][ T1493] ? calc_wheel_index+0x16b/0xa40 [ 105.595570][ T1493] ? tun_chr_ioctl+0x2a/0x40 [ 105.600000][ T1493] ? __se_sys_ioctl+0x114/0x190 [ 105.604693][ T1493] dump_stack+0x15/0x17 [ 105.608675][ T1493] should_fail+0x3c6/0x510 [ 105.612929][ T1493] ? kvmalloc_node+0x82/0x130 [ 105.617442][ T1493] __should_failslab+0xa4/0xe0 [ 105.622042][ T1493] should_failslab+0x9/0x20 [ 105.626379][ T1493] __kmalloc+0x60/0x330 [ 105.630375][ T1493] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 105.636018][ T1493] kvmalloc_node+0x82/0x130 [ 105.640351][ T1493] tun_attach+0x8a9/0x1560 [ 105.644606][ T1493] ? mod_timer_pending+0x30/0x30 [ 105.649381][ T1493] ? selinux_tun_dev_alloc_security+0x51/0x140 [ 105.655561][ T1493] tun_net_init+0x411/0x550 [ 105.659886][ T1493] register_netdevice+0x346/0x13f0 [ 105.664837][ T1493] ? xdp_rxq_info_reg+0xec/0x2e0 [ 105.669606][ T1493] ? netif_stacked_transfer_operstate+0x240/0x240 [ 105.675944][ T1493] tun_set_iff+0x816/0xdb0 [ 105.680192][ T1493] __tun_chr_ioctl+0x8b3/0x2260 [ 105.684879][ T1493] ? tun_flow_create+0x320/0x320 [ 105.689650][ T1493] ? __fget_files+0x31e/0x380 [ 105.694166][ T1493] tun_chr_ioctl+0x2a/0x40 [ 105.698416][ T1493] ? tun_chr_poll+0x670/0x670 [ 105.702929][ T1493] __se_sys_ioctl+0x114/0x190 [ 105.707441][ T1493] __x64_sys_ioctl+0x7b/0x90 [ 105.711870][ T1493] do_syscall_64+0x34/0x70 [ 105.716121][ T1493] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 105.721851][ T1493] RIP: 0033:0x7fbba5cb5ff9 [ 105.726106][ T1493] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 105.745544][ T1493] RSP: 002b:00007fbba492f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 105.753789][ T1493] RAX: ffffffffffffffda RBX: 00007fbba5e6df80 RCX: 00007fbba5cb5ff9 [ 105.761775][ T1493] RDX: 0000000020000100 RSI: 00000000400454ca RDI: 0000000000000004 [ 105.769582][ T1493] RBP: 00007fbba492f090 R08: 0000000000000000 R09: 0000000000000000 [ 105.777392][ T1493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 105.785205][ T1493] R13: 0000000000000000 R14: 00007fbba5e6df80 R15: 00007ffea98ef848 [ 107.425741][ T1529] device veth0_vlan left promiscuous mode [ 107.542354][ T1529] device veth0_vlan entered promiscuous mode [ 107.902204][ T1548] FAULT_INJECTION: forcing a failure. [ 107.902204][ T1548] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 108.100920][ T1548] CPU: 1 PID: 1548 Comm: syz.1.323 Not tainted 5.10.225-syzkaller-00594-g63626fcd0804 #0 [ 108.110547][ T1548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 108.120433][ T1548] Call Trace: [ 108.123563][ T1548] dump_stack_lvl+0x1e2/0x24b [ 108.128079][ T1548] ? bfq_pos_tree_add_move+0x43b/0x43b [ 108.133372][ T1548] ? exc_general_protection+0x415/0x490 [ 108.138755][ T1548] dump_stack+0x15/0x17 [ 108.142748][ T1548] should_fail+0x3c6/0x510 [ 108.147003][ T1548] should_fail_usercopy+0x1a/0x20 [ 108.151863][ T1548] copy_fpstate_to_sigframe+0x8ce/0xbb0 [ 108.157243][ T1548] ? fpregs_set+0x6f0/0x6f0 [ 108.161584][ T1548] ? bpf_probe_read_user_str+0x49/0x70 [ 108.166885][ T1548] ? bpf_trace_run3+0x126/0x2c0 [ 108.171598][ T1548] ? bpf_trace_run2+0x280/0x280 [ 108.176259][ T1548] ? fpu__alloc_mathframe+0x89/0x150 [ 108.181370][ T1548] get_sigframe+0x378/0x4b0 [ 108.185723][ T1548] ? memcpy+0x56/0x70 [ 108.189536][ T1548] ? restore_sigcontext+0x710/0x710 [ 108.194564][ T1548] arch_do_signal_or_restart+0x434/0x17c0 [ 108.200122][ T1548] ? __send_signal+0x8b5/0xb90 [ 108.204801][ T1548] ? rw_verify_area+0x1c3/0x360 [ 108.209635][ T1548] ? __do_sys_rt_sigreturn+0x1e0/0x1e0 [ 108.214924][ T1548] ? force_sig_info_to_task+0x297/0x320 [ 108.220305][ T1548] ? force_sig+0x112/0x1d0 [ 108.224558][ T1548] ? send_sig+0x60/0x60 [ 108.228551][ T1548] exit_to_user_mode_loop+0x9b/0xd0 [ 108.233589][ T1548] irqentry_exit_to_user_mode+0x4e/0x80 [ 108.238963][ T1548] irqentry_exit+0x12/0x60 [ 108.243210][ T1548] exc_general_protection+0x415/0x490 [ 108.248423][ T1548] ? __ia32_sys_read+0x90/0x90 [ 108.253028][ T1548] ? asm_exc_general_protection+0x8/0x30 [ 108.258494][ T1548] asm_exc_general_protection+0x1e/0x30 [ 108.263869][ T1548] RIP: 0033:0x7f39f1498879 [ 108.268120][ T1548] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 108.287583][ T1548] RSP: 002b:00007f39f01387c8 EFLAGS: 00010283 [ 108.293460][ T1548] RAX: 0000000000000999 RBX: 00007f39f0138d30 RCX: 00007f39f163e160 [ 108.301275][ T1548] RDX: 9999999999999999 RSI: 00007f39f1532054 RDI: 9999999999999999 [ 108.309082][ T1548] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 108.316900][ T1548] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 108.324707][ T1548] R13: 00007f39f0138eb0 R14: 9999999999999999 R15: 0000000000000000 [ 110.285563][ T1591] device veth0_vlan left promiscuous mode [ 110.291698][ T1591] device veth0_vlan entered promiscuous mode [ 111.736247][ T1625] FAULT_INJECTION: forcing a failure. [ 111.736247][ T1625] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 111.932306][ T1625] CPU: 0 PID: 1625 Comm: syz.1.346 Not tainted 5.10.225-syzkaller-00594-g63626fcd0804 #0 [ 111.941931][ T1625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 111.954012][ T1625] Call Trace: [ 111.957383][ T1625] dump_stack_lvl+0x1e2/0x24b [ 111.961948][ T1625] ? panic+0x812/0x812 [ 111.965793][ T1625] ? bfq_pos_tree_add_move+0x43b/0x43b [ 111.971090][ T1625] ? vsnprintf+0x1b96/0x1c70 [ 111.975693][ T1625] dump_stack+0x15/0x17 [ 111.979682][ T1625] should_fail+0x3c6/0x510 [ 111.983942][ T1625] should_fail_usercopy+0x1a/0x20 [ 111.988791][ T1625] _copy_to_user+0x20/0x90 [ 111.993050][ T1625] bpf_verifier_vlog+0x1ab/0x330 [ 111.997827][ T1625] __btf_verifier_log+0xd1/0x120 [ 112.002696][ T1625] ? bpf_verifier_vlog+0x1b8/0x330 [ 112.007629][ T1625] ? btf_check_sec_info+0x4f0/0x4f0 [ 112.012664][ T1625] ? btf_parse_hdr+0x1d5/0x770 [ 112.017265][ T1625] ? memcpy+0x56/0x70 [ 112.021085][ T1625] btf_parse_hdr+0x36d/0x770 [ 112.025515][ T1625] btf_new_fd+0x487/0x9c0 [ 112.029681][ T1625] __se_sys_bpf+0x1aed/0x11cb0 [ 112.034280][ T1625] ? stack_trace_save+0x113/0x1c0 [ 112.039149][ T1625] ? terminate_walk+0x407/0x4f0 [ 112.043828][ T1625] ? stack_trace_snprint+0xf0/0xf0 [ 112.051956][ T1625] ? kmem_cache_free+0xa9/0x1e0 [ 112.057231][ T1625] ? kmem_cache_free+0xa9/0x1e0 [ 112.061902][ T1625] ? kasan_set_track+0x5d/0x70 [ 112.066529][ T1625] ? __x64_sys_bpf+0x90/0x90 [ 112.070941][ T1625] ? __kasan_slab_free+0x11/0x20 [ 112.075701][ T1625] ? slab_free_freelist_hook+0xc0/0x190 [ 112.081089][ T1625] ? kmem_cache_free+0xa9/0x1e0 [ 112.085771][ T1625] ? putname+0xe7/0x140 [ 112.089760][ T1625] ? do_sys_openat2+0x1fc/0x710 [ 112.094449][ T1625] ? __x64_sys_openat+0x243/0x290 [ 112.099314][ T1625] ? do_syscall_64+0x34/0x70 [ 112.103737][ T1625] ? _kstrtoull+0x3a0/0x4a0 [ 112.108076][ T1625] ? kstrtouint_from_user+0x20a/0x2a0 [ 112.113284][ T1625] ? kstrtol_from_user+0x310/0x310 [ 112.118233][ T1625] ? memset+0x35/0x40 [ 112.122053][ T1625] ? __fsnotify_parent+0x4b9/0x6c0 [ 112.127266][ T1625] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 112.133683][ T1625] ? proc_fail_nth_write+0x20b/0x290 [ 112.138804][ T1625] ? proc_fail_nth_read+0x210/0x210 [ 112.143924][ T1625] ? security_file_permission+0x86/0xb0 [ 112.154684][ T1625] ? rw_verify_area+0x1c3/0x360 [ 112.159453][ T1625] ? preempt_count_add+0x92/0x1a0 [ 112.164305][ T1625] ? vfs_write+0x852/0xe70 [ 112.168558][ T1625] ? kmem_cache_free+0xa9/0x1e0 [ 112.173245][ T1625] ? kernel_write+0x3d0/0x3d0 [ 112.177763][ T1625] ? __kasan_check_write+0x14/0x20 [ 112.182710][ T1625] ? mutex_lock+0xa5/0x110 [ 112.186959][ T1625] ? mutex_trylock+0xa0/0xa0 [ 112.191388][ T1625] ? __kasan_check_write+0x14/0x20 [ 112.196344][ T1625] ? fput_many+0x160/0x1b0 [ 112.200590][ T1625] ? debug_smp_processor_id+0x17/0x20 [ 112.205793][ T1625] __x64_sys_bpf+0x7b/0x90 [ 112.210163][ T1625] do_syscall_64+0x34/0x70 [ 112.214414][ T1625] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 112.220141][ T1625] RIP: 0033:0x7f39f14bfff9 [ 112.224390][ T1625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 112.243835][ T1625] RSP: 002b:00007f39f0139038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 112.254128][ T1625] RAX: ffffffffffffffda RBX: 00007f39f1677f80 RCX: 00007f39f14bfff9 [ 112.262092][ T1625] RDX: 0000000000000020 RSI: 00000000200000c0 RDI: 0000000000000012 [ 112.269905][ T1625] RBP: 00007f39f0139090 R08: 0000000000000000 R09: 0000000000000000 [ 112.277716][ T1625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 112.285529][ T1625] R13: 0000000000000001 R14: 00007f39f1677f80 R15: 00007fffba32a908 [ 112.739854][ T24] audit: type=1400 audit(1727800989.999:125): avc: denied { remove_name } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 112.780833][ T1639] device veth0_vlan left promiscuous mode [ 112.883111][ T1639] device veth0_vlan entered promiscuous mode [ 113.092781][ T24] audit: type=1400 audit(1727800989.999:126): avc: denied { rename } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 115.085492][ T24] audit: type=1400 audit(1727800992.349:127): avc: denied { create } for pid=1650 comm="syz.1.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 115.861702][ T24] audit: type=1400 audit(1727800993.129:128): avc: denied { read } for pid=76 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 116.630789][ T24] audit: type=1400 audit(1727800993.899:129): avc: denied { create } for pid=1660 comm="syz.1.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 117.110698][ T24] audit: type=1400 audit(1727800993.929:130): avc: denied { write } for pid=1660 comm="syz.1.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 119.240520][ T24] audit: type=1400 audit(1727800996.499:131): avc: denied { create } for pid=1681 comm="syz.3.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 119.742879][ T24] audit: type=1400 audit(1727800997.009:132): avc: denied { create } for pid=1690 comm="syz.3.362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 120.534558][ T1704] device veth0_vlan left promiscuous mode [ 120.949564][ T1704] device veth0_vlan entered promiscuous mode [ 122.258499][ T24] audit: type=1400 audit(1727800999.509:133): avc: denied { setopt } for pid=1730 comm="syz.3.373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 123.341431][ T24] audit: type=1400 audit(1727801000.609:134): avc: denied { create } for pid=1755 comm="syz.0.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 124.062886][ T24] audit: type=1400 audit(1727801001.329:135): avc: denied { tracepoint } for pid=1765 comm="syz.3.384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 124.171265][ T1764] device veth0_vlan left promiscuous mode [ 124.259993][ T1764] device veth0_vlan entered promiscuous mode [ 126.321440][ T1807] device pim6reg1 entered promiscuous mode [ 127.256539][ T1818] device veth0_vlan left promiscuous mode [ 127.281967][ T1818] device veth0_vlan entered promiscuous mode [ 127.288841][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 127.372170][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 127.490816][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 128.665592][ T24] audit: type=1400 audit(1727801005.929:136): avc: denied { read } for pid=1850 comm="syz.0.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 130.175713][ T24] audit: type=1400 audit(1727801007.439:137): avc: denied { create } for pid=1888 comm="syz.0.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 130.307288][ T24] audit: type=1400 audit(1727801007.439:138): avc: denied { create } for pid=1888 comm="syz.0.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 130.770539][ T24] audit: type=1400 audit(1727801007.849:139): avc: denied { create } for pid=1890 comm="syz.0.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 133.635021][ T1939] device veth0_vlan left promiscuous mode [ 133.800929][ T1939] device veth0_vlan entered promiscuous mode [ 133.871601][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 133.879570][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 133.906391][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.111488][ T1946] syz.4.432 uses obsolete (PF_INET,SOCK_PACKET) [ 134.118207][ T24] audit: type=1400 audit(1727801011.379:140): avc: denied { create } for pid=1945 comm="syz.4.432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 135.921820][ T24] audit: type=1400 audit(1727801013.189:141): avc: denied { create } for pid=1954 comm="syz.4.436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 137.740980][ T1989] device veth0_vlan left promiscuous mode [ 137.854460][ T1989] device veth0_vlan entered promiscuous mode [ 143.311350][ T2040] device veth0_vlan left promiscuous mode [ 143.317249][ T2040] device veth0_vlan entered promiscuous mode [ 143.503211][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.521582][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.538402][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 144.027164][ T2057] FAULT_INJECTION: forcing a failure. [ 144.027164][ T2057] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 144.151697][ T2057] CPU: 1 PID: 2057 Comm: syz.1.465 Not tainted 5.10.225-syzkaller-00594-g63626fcd0804 #0 [ 144.161314][ T2057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 144.171203][ T2057] Call Trace: [ 144.174360][ T2057] dump_stack_lvl+0x1e2/0x24b [ 144.178854][ T2057] ? bfq_pos_tree_add_move+0x43b/0x43b [ 144.184147][ T2057] dump_stack+0x15/0x17 [ 144.188136][ T2057] should_fail+0x3c6/0x510 [ 144.192392][ T2057] should_fail_alloc_page+0x52/0x60 [ 144.197418][ T2057] __alloc_pages_nodemask+0x1b3/0xaf0 [ 144.202631][ T2057] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 144.208011][ T2057] ? __kasan_kmalloc+0x9/0x10 [ 144.212521][ T2057] ? bpf_ringbuf_alloc+0x6b/0x410 [ 144.217384][ T2057] bpf_ringbuf_alloc+0x100/0x410 [ 144.222161][ T2057] ringbuf_map_alloc+0x275/0x3a0 [ 144.227016][ T2057] __se_sys_bpf+0x620f/0x11cb0 [ 144.231619][ T2057] ? stack_trace_save+0x113/0x1c0 [ 144.236477][ T2057] ? terminate_walk+0x407/0x4f0 [ 144.241164][ T2057] ? stack_trace_snprint+0xf0/0xf0 [ 144.246120][ T2057] ? kmem_cache_free+0xa9/0x1e0 [ 144.250795][ T2057] ? kmem_cache_free+0xa9/0x1e0 [ 144.255481][ T2057] ? kasan_set_track+0x5d/0x70 [ 144.260082][ T2057] ? __x64_sys_bpf+0x90/0x90 [ 144.264513][ T2057] ? __kasan_slab_free+0x11/0x20 [ 144.269375][ T2057] ? slab_free_freelist_hook+0xc0/0x190 [ 144.274753][ T2057] ? kmem_cache_free+0xa9/0x1e0 [ 144.279437][ T2057] ? putname+0xe7/0x140 [ 144.283427][ T2057] ? do_sys_openat2+0x1fc/0x710 [ 144.288116][ T2057] ? __x64_sys_openat+0x243/0x290 [ 144.292975][ T2057] ? do_syscall_64+0x34/0x70 [ 144.297420][ T2057] ? _kstrtoull+0x3a0/0x4a0 [ 144.301745][ T2057] ? kstrtouint_from_user+0x20a/0x2a0 [ 144.306950][ T2057] ? kstrtol_from_user+0x310/0x310 [ 144.311898][ T2057] ? memset+0x35/0x40 [ 144.315719][ T2057] ? __fsnotify_parent+0x4b9/0x6c0 [ 144.320666][ T2057] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 144.327088][ T2057] ? proc_fail_nth_write+0x20b/0x290 [ 144.332208][ T2057] ? proc_fail_nth_read+0x210/0x210 [ 144.337238][ T2057] ? security_file_permission+0x86/0xb0 [ 144.342766][ T2057] ? rw_verify_area+0x1c3/0x360 [ 144.347452][ T2057] ? preempt_count_add+0x92/0x1a0 [ 144.352311][ T2057] ? vfs_write+0x852/0xe70 [ 144.356564][ T2057] ? kmem_cache_free+0xa9/0x1e0 [ 144.361380][ T2057] ? kernel_write+0x3d0/0x3d0 [ 144.365887][ T2057] ? __kasan_check_write+0x14/0x20 [ 144.370831][ T2057] ? mutex_lock+0xa5/0x110 [ 144.375091][ T2057] ? mutex_trylock+0xa0/0xa0 [ 144.379518][ T2057] ? __kasan_check_write+0x14/0x20 [ 144.384457][ T2057] ? fput_many+0x160/0x1b0 [ 144.388719][ T2057] ? debug_smp_processor_id+0x17/0x20 [ 144.393919][ T2057] __x64_sys_bpf+0x7b/0x90 [ 144.398175][ T2057] do_syscall_64+0x34/0x70 [ 144.402425][ T2057] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 144.408153][ T2057] RIP: 0033:0x7f39f14bfff9 [ 144.412416][ T2057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.431844][ T2057] RSP: 002b:00007f39f0139038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 144.440087][ T2057] RAX: ffffffffffffffda RBX: 00007f39f1677f80 RCX: 00007f39f14bfff9 [ 144.447899][ T2057] RDX: 0000000000000048 RSI: 00000000200000c0 RDI: 0000000000000000 [ 144.455708][ T2057] RBP: 00007f39f0139090 R08: 0000000000000000 R09: 0000000000000000 [ 144.463518][ T2057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 144.471329][ T2057] R13: 0000000000000000 R14: 00007f39f1677f80 R15: 00007fffba32a908 [ 144.702264][ T2060] device veth0_vlan left promiscuous mode [ 144.708108][ T2060] device veth0_vlan entered promiscuous mode [ 144.963094][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 145.011416][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 145.091093][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 145.490902][ T2094] device veth0_vlan left promiscuous mode [ 145.538880][ T2094] device veth0_vlan entered promiscuous mode [ 145.696105][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 145.706097][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 145.713950][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 147.203650][ T7] device veth1_macvtap left promiscuous mode [ 147.209483][ T7] device veth0_vlan left promiscuous mode [ 150.199778][ T24] audit: type=1400 audit(1727801027.459:142): avc: denied { create } for pid=2199 comm="syz.3.500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 150.762410][ T2217] device veth0_vlan left promiscuous mode [ 150.895344][ T2217] device veth0_vlan entered promiscuous mode [ 151.265352][ T2237] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.281301][ T2237] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.314283][ T2240] FAULT_INJECTION: forcing a failure. [ 151.314283][ T2240] name failslab, interval 1, probability 0, space 0, times 0 [ 151.372764][ T2240] CPU: 0 PID: 2240 Comm: syz.2.510 Not tainted 5.10.225-syzkaller-00594-g63626fcd0804 #0 [ 151.382376][ T2240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 151.392354][ T2240] Call Trace: [ 151.395488][ T2240] dump_stack_lvl+0x1e2/0x24b [ 151.400000][ T2240] ? bfq_pos_tree_add_move+0x43b/0x43b [ 151.405376][ T2240] ? stack_trace_save+0x113/0x1c0 [ 151.410239][ T2240] dump_stack+0x15/0x17 [ 151.414235][ T2240] should_fail+0x3c6/0x510 [ 151.418484][ T2240] ? __kthread_create_on_node+0x11f/0x410 [ 151.424039][ T2240] __should_failslab+0xa4/0xe0 [ 151.428636][ T2240] should_failslab+0x9/0x20 [ 151.432976][ T2240] kmem_cache_alloc_trace+0x3a/0x2e0 [ 151.438183][ T2240] ? put_cpu_map_entry+0x590/0x590 [ 151.443131][ T2240] ? put_cpu_map_entry+0x590/0x590 [ 151.448078][ T2240] __kthread_create_on_node+0x11f/0x410 [ 151.453461][ T2240] ? kthread_create_on_node+0x120/0x120 [ 151.458846][ T2240] ? put_cpu_map_entry+0x590/0x590 [ 151.463794][ T2240] kthread_create_on_node+0xda/0x120 [ 151.468908][ T2240] ? tsk_fork_get_node+0x10/0x10 [ 151.473685][ T2240] ? kvmalloc_node+0x82/0x130 [ 151.478203][ T2240] ? kvmalloc_node+0xee/0x130 [ 151.482710][ T2240] cpu_map_update_elem+0x9a2/0xe30 [ 151.487654][ T2240] ? cpu_map_lookup_elem+0x100/0x100 [ 151.492773][ T2240] ? __check_object_size+0x73/0x3c0 [ 151.497809][ T2240] ? __virt_addr_valid+0x23d/0x2e0 [ 151.502755][ T2240] bpf_map_update_value+0x1a8/0x420 [ 151.507794][ T2240] __se_sys_bpf+0x7687/0x11cb0 [ 151.512394][ T2240] ? perf_prepare_sample+0x1af0/0x1af0 [ 151.517698][ T2240] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 151.523672][ T2240] ? __x64_sys_bpf+0x90/0x90 [ 151.528188][ T2240] ? __this_cpu_preempt_check+0x13/0x20 [ 151.533573][ T2240] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 151.539644][ T2240] ? hrtimer_forward+0x1a6/0x2c0 [ 151.544417][ T2240] ? perf_swevent_hrtimer+0x4b8/0x560 [ 151.549630][ T2240] ? cpu_clock_event_read+0x50/0x50 [ 151.554664][ T2240] ? timerqueue_add+0x24c/0x270 [ 151.559344][ T2240] ? enqueue_hrtimer+0xad/0x200 [ 151.564036][ T2240] ? __hrtimer_run_queues+0x438/0xa50 [ 151.569237][ T2240] ? __hrtimer_run_queues+0x9ea/0xa50 [ 151.574457][ T2240] ? ktime_get+0x10e/0x140 [ 151.578700][ T2240] ? lapic_next_event+0x5f/0x70 [ 151.583428][ T2240] ? clockevents_program_event+0x214/0x2c0 [ 151.589029][ T2240] ? hrtimer_interrupt+0x6a8/0x8b0 [ 151.593980][ T2240] ? debug_smp_processor_id+0x17/0x20 [ 151.599188][ T2240] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 151.605085][ T2240] __x64_sys_bpf+0x7b/0x90 [ 151.609336][ T2240] do_syscall_64+0x34/0x70 [ 151.613590][ T2240] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 151.619314][ T2240] RIP: 0033:0x7fbba5cb5ff9 [ 151.623578][ T2240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 151.643012][ T2240] RSP: 002b:00007fbba492f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 151.651269][ T2240] RAX: ffffffffffffffda RBX: 00007fbba5e6df80 RCX: 00007fbba5cb5ff9 [ 151.659152][ T2240] RDX: 0000000000000020 RSI: 0000000020000940 RDI: 0000000000000002 [ 151.666956][ T2240] RBP: 00007fbba492f090 R08: 0000000000000000 R09: 0000000000000000 [ 151.674769][ T2240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 151.682579][ T2240] R13: 0000000000000000 R14: 00007fbba5e6df80 R15: 00007ffea98ef848 [ 157.186642][ T24] audit: type=1400 audit(1727801034.449:143): avc: denied { create } for pid=2312 comm="syz.1.528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 160.831533][ T24] audit: type=1400 audit(1727801038.069:144): avc: denied { write } for pid=2360 comm="syz.4.540" name="cgroup.subtree_control" dev="cgroup2" ino=233 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 161.032921][ T24] audit: type=1400 audit(1727801038.089:145): avc: denied { open } for pid=2360 comm="syz.4.540" path="" dev="cgroup2" ino=233 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 170.062229][ T2449] FAULT_INJECTION: forcing a failure. [ 170.062229][ T2449] name failslab, interval 1, probability 0, space 0, times 0 [ 170.074697][ T2449] CPU: 1 PID: 2449 Comm: syz.2.565 Not tainted 5.10.225-syzkaller-00594-g63626fcd0804 #0 [ 170.084251][ T2449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 170.094142][ T2449] Call Trace: [ 170.097275][ T2449] dump_stack_lvl+0x1e2/0x24b [ 170.101787][ T2449] ? bfq_pos_tree_add_move+0x43b/0x43b [ 170.107078][ T2449] dump_stack+0x15/0x17 [ 170.111075][ T2449] should_fail+0x3c6/0x510 [ 170.115326][ T2449] ? kvmalloc_node+0x82/0x130 [ 170.119838][ T2449] __should_failslab+0xa4/0xe0 [ 170.124438][ T2449] should_failslab+0x9/0x20 [ 170.128950][ T2449] __kmalloc+0x60/0x330 [ 170.132946][ T2449] kvmalloc_node+0x82/0x130 [ 170.137287][ T2449] btf_new_fd+0x2c3/0x9c0 [ 170.141453][ T2449] __se_sys_bpf+0x1aed/0x11cb0 [ 170.146050][ T2449] ? stack_trace_save+0x113/0x1c0 [ 170.150907][ T2449] ? terminate_walk+0x407/0x4f0 [ 170.155594][ T2449] ? stack_trace_snprint+0xf0/0xf0 [ 170.160544][ T2449] ? kmem_cache_free+0xa9/0x1e0 [ 170.165227][ T2449] ? kmem_cache_free+0xa9/0x1e0 [ 170.169916][ T2449] ? kasan_set_track+0x5d/0x70 [ 170.174525][ T2449] ? __x64_sys_bpf+0x90/0x90 [ 170.179115][ T2449] ? __kasan_slab_free+0x11/0x20 [ 170.183890][ T2449] ? slab_free_freelist_hook+0xc0/0x190 [ 170.189274][ T2449] ? kmem_cache_free+0xa9/0x1e0 [ 170.193959][ T2449] ? putname+0xe7/0x140 [ 170.197958][ T2449] ? do_sys_openat2+0x1fc/0x710 [ 170.202640][ T2449] ? __x64_sys_openat+0x243/0x290 [ 170.207497][ T2449] ? do_syscall_64+0x34/0x70 [ 170.211922][ T2449] ? _kstrtoull+0x3a0/0x4a0 [ 170.216261][ T2449] ? kstrtouint_from_user+0x20a/0x2a0 [ 170.221472][ T2449] ? kstrtol_from_user+0x310/0x310 [ 170.226417][ T2449] ? memset+0x35/0x40 [ 170.230236][ T2449] ? __fsnotify_parent+0x4b9/0x6c0 [ 170.235183][ T2449] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 170.241605][ T2449] ? proc_fail_nth_write+0x20b/0x290 [ 170.246730][ T2449] ? proc_fail_nth_read+0x210/0x210 [ 170.251762][ T2449] ? security_file_permission+0x86/0xb0 [ 170.257144][ T2449] ? rw_verify_area+0x1c3/0x360 [ 170.261828][ T2449] ? preempt_count_add+0x92/0x1a0 [ 170.266688][ T2449] ? vfs_write+0x852/0xe70 [ 170.270942][ T2449] ? kmem_cache_free+0xa9/0x1e0 [ 170.275625][ T2449] ? kernel_write+0x3d0/0x3d0 [ 170.280141][ T2449] ? __kasan_check_write+0x14/0x20 [ 170.285088][ T2449] ? mutex_lock+0xa5/0x110 [ 170.289340][ T2449] ? mutex_trylock+0xa0/0xa0 [ 170.293769][ T2449] ? __kasan_check_write+0x14/0x20 [ 170.298714][ T2449] ? fput_many+0x160/0x1b0 [ 170.302969][ T2449] ? debug_smp_processor_id+0x17/0x20 [ 170.308173][ T2449] __x64_sys_bpf+0x7b/0x90 [ 170.312425][ T2449] do_syscall_64+0x34/0x70 [ 170.316678][ T2449] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 170.322940][ T2449] RIP: 0033:0x7fbba5cb5ff9 [ 170.327191][ T2449] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 170.346811][ T2449] RSP: 002b:00007fbba492f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 170.354974][ T2449] RAX: ffffffffffffffda RBX: 00007fbba5e6df80 RCX: 00007fbba5cb5ff9 [ 170.362790][ T2449] RDX: 0000000000000028 RSI: 00000000200032c0 RDI: 0000000000000012 [ 170.370594][ T2449] RBP: 00007fbba492f090 R08: 0000000000000000 R09: 0000000000000000 [ 170.378403][ T2449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 170.386215][ T2449] R13: 0000000000000001 R14: 00007fbba5e6df80 R15: 00007ffea98ef848 [ 170.752361][ T2472] FAULT_INJECTION: forcing a failure. [ 170.752361][ T2472] name failslab, interval 1, probability 0, space 0, times 0 [ 170.909469][ T2472] CPU: 1 PID: 2472 Comm: syz.3.571 Not tainted 5.10.225-syzkaller-00594-g63626fcd0804 #0 [ 170.919085][ T2472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 170.928974][ T2472] Call Trace: [ 170.932108][ T2472] dump_stack_lvl+0x1e2/0x24b [ 170.936620][ T2472] ? bfq_pos_tree_add_move+0x43b/0x43b [ 170.941911][ T2472] dump_stack+0x15/0x17 [ 170.945903][ T2472] should_fail+0x3c6/0x510 [ 170.950159][ T2472] ? call_usermodehelper_setup+0x72/0x1e0 [ 170.955718][ T2472] __should_failslab+0xa4/0xe0 [ 170.960314][ T2472] should_failslab+0x9/0x20 [ 170.964652][ T2472] kmem_cache_alloc_trace+0x3a/0x2e0 [ 170.969773][ T2472] call_usermodehelper_setup+0x72/0x1e0 [ 170.975152][ T2472] ? __request_module+0x8d0/0x8d0 [ 170.980015][ T2472] __request_module+0x37d/0x8d0 [ 170.984703][ T2472] ? selinux_capable+0x2f1/0x430 [ 170.989474][ T2472] ? capable+0x78/0xe0 [ 170.993382][ T2472] ? copy_regset_to_user+0x210/0x210 [ 170.998501][ T2472] ? cap_capable+0x1ce/0x270 [ 171.002927][ T2472] ? security_capable+0x87/0xb0 [ 171.007613][ T2472] dev_load+0x5b/0xb0 [ 171.011429][ T2472] dev_ioctl+0x513/0xb40 [ 171.015509][ T2472] sock_do_ioctl+0x295/0x3a0 [ 171.019935][ T2472] ? sock_show_fdinfo+0xa0/0xa0 [ 171.024621][ T2472] ? kernel_write+0x3d0/0x3d0 [ 171.029135][ T2472] ? selinux_file_ioctl+0x3cc/0x540 [ 171.034173][ T2472] sock_ioctl+0x4a6/0x760 [ 171.038337][ T2472] ? sock_poll+0x340/0x340 [ 171.042591][ T2472] ? security_file_ioctl+0x84/0xb0 [ 171.047534][ T2472] ? sock_poll+0x340/0x340 [ 171.051792][ T2472] __se_sys_ioctl+0x114/0x190 [ 171.056310][ T2472] __x64_sys_ioctl+0x7b/0x90 [ 171.060815][ T2472] do_syscall_64+0x34/0x70 [ 171.065070][ T2472] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 171.070800][ T2472] RIP: 0033:0x7f9015410ff9 [ 171.075048][ T2472] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 171.094490][ T2472] RSP: 002b:00007f901408a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 171.102734][ T2472] RAX: ffffffffffffffda RBX: 00007f90155c8f80 RCX: 00007f9015410ff9 [ 171.110542][ T2472] RDX: 0000000020000080 RSI: 00000000000089a2 RDI: 000000000000004c [ 171.118374][ T2472] RBP: 00007f901408a090 R08: 0000000000000000 R09: 0000000000000000 [ 171.126167][ T2472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 171.133978][ T2472] R13: 0000000000000000 R14: 00007f90155c8f80 R15: 00007ffddca1d7d8 [ 172.900451][ T2484] device veth1_macvtap left promiscuous mode [ 173.128089][ T2496] device veth0_vlan left promiscuous mode [ 173.163459][ T2496] device veth0_vlan entered promiscuous mode SYZFAIL: tun: can't open /dev/net/tun (errno 2: No such file or directory) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=0 req=462 state=3 status=67 (errno 9: Bad file descriptor) [ 173.304681][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 173.312904][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 173.322579][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 174.624852][ T309] device bridge_slave_1 left promiscuous mode [ 174.650684][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.800880][ T309] device bridge_slave_0 left promiscuous mode [ 174.806820][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.951750][ T309] device bridge_slave_1 left promiscuous mode [ 174.957763][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.111848][ T309] device bridge_slave_0 left promiscuous mode [ 175.117777][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.311321][ T309] device veth0_vlan left promiscuous mode [ 178.311385][ T309] device bridge_slave_1 left promiscuous mode [ 178.317293][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.324462][ T309] device bridge_slave_0 left promiscuous mode [ 178.330382][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.337922][ T309] device veth1_macvtap left promiscuous mode [ 178.343833][ T309] device veth1_macvtap left promiscuous mode