last executing test programs: 2.883373461s ago: executing program 3 (id=2907): bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x9}}, 0x0, 0x3, 0xffffffffffffffff, 0x9) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x48) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x14, 0x10001, 0x6, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x0, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x5, 0xc, &(0x7f0000000080)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) (async, rerun: 64) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xa, 0x0, 0x0) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x10103) recvmsg$unix(0xffffffffffffffff, 0x0, 0x73384056b0ffeb81) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x4e, 0x1, 0x0, 0x0, 0x0, 0x210e, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xe}, 0x110104, 0x32, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="11000000040000000400000002"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000000000000b7040000000000008500000033000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0xd, &(0x7f0000000200)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x5ee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1000000}, 0x50) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) 2.821409591s ago: executing program 3 (id=2909): r0 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x3}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000500)=ANY=[@ANYBLOB="185012000000000000e8321d967442d95f0854afcc550c3d440000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c00"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r1}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x403}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r3}, 0x10) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="00a0fe6993d6d3121570850860da07c0000000000000000000aad2002646dea2ab0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000100000000000018010000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[], &(0x7f0000000000)=""/140, 0x26, 0x8c, 0x1, 0x0, 0x0, @void, @value}, 0x20) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x3, &(0x7f0000000cc0)=ANY=[@ANYBLOB="180800000000000000000000310b000095000000000400000f37f1f354298f7543cdbde9ee983e54ddfe74bd6cf8b0f686e92eed498f39cdb3b11e97981e4a36f8e9a7ac03d83e7894cee7222758e2c7e877a69d2f1f24e90d60e97238142df7ba083c827243e2a5b4df56eb5aadb6e9fcfd66aa4859225bad2791a3eca1961f3e2c55b8f5f0fd0f75a967eead350288bb30e6772fb7b9f232da8d7ef785bbe174b6cd"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000001c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x7, 0x11, &(0x7f00000009c0)=ANY=[@ANYBLOB="180000000000000000000000000000801868000006000094f00f48f2568c0000000000716affff95000000000000001800000009000000000000000800000018210000", @ANYRES32, @ANYBLOB="0000000009000000c0b90600f0ffffff9500000000000000183600000300000000000000000000001867000002000200000000000100000095000000000000009500000000000000"], &(0x7f0000000240)='syzkaller\x00', 0x9, 0xd0, &(0x7f0000000bc0)=""/208, 0x40f00, 0x4e, '\x00', 0x0, @fallback=0x2c, r0, 0x8, &(0x7f00000003c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0x5, 0x80000001, 0x1}, 0x10, 0x0, r2, 0x3, &(0x7f00000004c0)=[r4, r4], &(0x7f0000000500)=[{0x4, 0x3, 0xc, 0x4}, {0x0, 0x1, 0x8, 0x1}, {0x5, 0x3, 0x4, 0xa}], 0x10, 0x1, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00', @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000009000000000000000000000000180100002020702500000000010000000000000000000000bfa100000000670007010000f8ffffffb702000008000000b70300000000000085000000710000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) 2.753615681s ago: executing program 1 (id=2912): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40000000, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.511767153s ago: executing program 1 (id=2915): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000000), &(0x7f0000000200), 0xa7c}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r0, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf, &(0x7f0000000840)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0xe6, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, 0x0, 0xfdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000b00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000b80)=[0x0], 0x0, 0x40, &(0x7f0000000bc0)=[{}], 0x8, 0x10, &(0x7f0000000c00), 0x0, 0x0, 0x50, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x7, 0x19, &(0x7f0000000680)=@raw=[@btf_id={0x18, 0x1, 0x3, 0x0, 0x2}, @exit, @call={0x85, 0x0, 0x0, 0x1d}, @ldst={0x0, 0x0, 0x7, 0x5, 0x1, 0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x67}, @ringbuf_query, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000380)='GPL\x00', 0x1, 0xae, &(0x7f0000000780)=""/174, 0x40f00, 0x0, '\x00', r1, @fallback=0x30, r3, 0x8, &(0x7f0000000a80)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000ac0)={0x2, 0xf, 0x92, 0x8}, 0x10, r4, r0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x8010743f, 0x2000000c) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff01000000", @ANYRES32=0x1, @ANYBLOB="000000100000000000006a38ad50a7dd9d000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @restrict]}}, 0x0, 0x8a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1, 0x0, 0x0, @void, @value}, 0x20) syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x2, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000000000000000001008400000000000000a500ffffffffff809500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000040)='blkio.throttle.read_iops_device\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000180), 0x12) 2.199867465s ago: executing program 4 (id=2918): r0 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x3}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r1}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r3}, 0x10) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="00a0fe6993d6d3121570850860da07c0000000000000000000aad2002646dea2ab0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) (fail_nth: 24) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[], &(0x7f0000000000)=""/140, 0x26, 0x8c, 0x1, 0x0, 0x0, @void, @value}, 0x20) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb31}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7538e475dd6317ce6203c23c000700000000000000875a65969ff57b0000040000000000001f04"], 0xfe1b) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000001c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x7, 0x11, &(0x7f0000000cc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, [@map_idx_val={0x18, 0x8, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffff6a71}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, @map_val={0x18, 0x1, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x9}, @ldst={0x0, 0x0, 0x6, 0x9, 0xb, 0x6, 0xfffffffffffffff0}, @exit, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x20002, 0x0, 0x0, 0x0, 0x1}, @exit]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xd0, &(0x7f0000000bc0)=""/208, 0x40f00, 0x4e, '\x00', 0x0, @fallback=0xe, r0, 0x8, &(0x7f00000003c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x5, 0x80000001, 0x1}, 0x10, 0x0, r2, 0x3, &(0x7f00000004c0)=[r4, r4], &(0x7f0000000500)=[{0x4, 0x3, 0xc, 0x4}, {0x0, 0x1, 0x8, 0x1}, {0x0, 0x3, 0x4, 0xa}], 0x10, 0x1, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00', @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) 2.195410055s ago: executing program 0 (id=2919): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x17}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x2d000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.101188666s ago: executing program 3 (id=2920): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xf, 0x9, &(0x7f0000000540)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000500000085000000bb000000a700000000000000180000e9ffffff000000000000000000950000000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0xe, &(0x7f0000001240)=ANY=[@ANYRES16=r0], &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x1}, 0x8, 0x10, &(0x7f0000000100), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x1f2f, 0xf, 0x3ce, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32=r1, @ANYBLOB="00000000000000008000000000000000000000003b73601ab8660fefe66e9d32572759e15e9a2ae4fb06bef6e3d5f96f7ab257c989538f6c886a000000000000478b0c6b7020fa3d2ac0643a3996701cf18fbd8acbe2fd49a5597358a2a21add0e32f73022666ea5263e7900698fa7bf48585dcce8f9b21e28e6874cc4f52a3f914bc950e23fd24c827fee2d0462c53927e26ce274b266ce52a3419d5dba242dd62e142c0569310cabc3ae07a0773d20aeefbc2304425c5e2e39c9efd7fcd1f4889f8ea8217f0302475361bb7eb7da1032f00f197ef94f5ec185", @ANYRES32=0x0, @ANYRESHEX, @ANYBLOB="000000000000000000000000000000000000000000000000000000004ddd9f2d8579ed847617b6177e"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000011f, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r3, @ANYRES16=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x16) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='blkio.bfq.io_wait_time_recursive\x00', 0x100002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r6, 0x58, &(0x7f0000000600)}, 0x10) ioctl$TUNSETLINK(r7, 0x400454cd, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000b00)='ext4_ext_convert_to_initialized_enter\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000940)=ANY=[@ANYRESHEX=r5, @ANYBLOB="7e65bf84df826f6776bc365443b663ac60f3daca4d82034a83f7bf003afba7ceb525620a27c8a5fd157e4d509f43e64ae8db5ad5f8eb93f3b9a3ecf5323c2b67d7bdc752b76d279b008b2b891c122ffad9c762dff06f32c3ab3f3e7755cd69384bdc2fdb7f9966d9fa4b8b51f9bb064bcfab9f98a07e0259f7ecd79d5237e8b39abd05b91da464c12878d879dfa5201256558a0ff060b72878ffb5b8b21a829cb3d33acb66e318d19e0dad48cf4bcd52a9ba373e584434fa4716e7bdb3ae9fed55f9123a21d4ac4b0562", @ANYRESDEC=r4, @ANYRES16=r2], &(0x7f0000000240)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = syz_clone(0x10000000, &(0x7f0000000180)="5ca44104bacbd4ed9a63193f03d96fcefefd4c56923e051251f71eefebe02d822d2c0d9349613bfa55ccc1f6", 0x2c, &(0x7f00000001c0), &(0x7f0000000280), &(0x7f0000000300)="1f81eef4ee181e80fb2a2d9e44a2ea6c3bb91cc12e751c9611191b10c80c12a93708fa0f91eafae5c809118816a8710c24cd41ce5529bb42ae7cb04953f3b41bc1da72c434430e0e8b310ccad3ce8da4e43133be39") syz_open_procfs$namespace(r9, &(0x7f0000000380)='ns/user\x00') socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a1, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000500)={'\x00', 0x52d35ce30131f272}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000400)='ext4_fc_commit_start\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x89f0, &(0x7f0000000080)) 2.031236196s ago: executing program 0 (id=2921): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='mm_page_alloc\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.986889586s ago: executing program 0 (id=2922): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032c00fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="b400000000000000791048000000000079111800000000009500000000000000db74589d4b38cc306ac390649f72dea0e50e2317db042855d6c74ff3493c7e31e3f6c643155a8e0c01d50bc3347475750472719cc516fa14b769e7f385ba72c60242263c05ddab05e37efe81b8bffc35cd93263ff755d611c4cca1684b14708f6a83366aa430ad2d700b186da622d6fba700000000000000000000000002000000000000f2badf9815c5000000"], &(0x7f00000001c0)='syzkaller\x00', 0x2, 0xd1, &(0x7f0000000000)=""/209, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x36) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7538e475dd6317ce6203c23c00fe80000000010000875a65969ff50be800040000000000001e04"], 0xfe1b) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x800000, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850200000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f2, &(0x7f0000000080)) 1.836136257s ago: executing program 2 (id=2924): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x2}, 0x48, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="000800000000000000080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18010000000020000000000000000000181900", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) unlink(0x0) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) socketpair(0x1a, 0x3, 0x5, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xa, 0x4, 0x69ee, 0x1, 0xd0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r4}, &(0x7f0000000080), &(0x7f0000000280)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 1.779224298s ago: executing program 3 (id=2925): perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x1, 0x1, 0x5, 0x8001, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1, 0x8, @value, @void, @void, @value}, 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r0}, 0x8) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x35, &(0x7f0000000040), 0x4) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0xc}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) (rerun: 64) 1.667892438s ago: executing program 1 (id=2926): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x17, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000018000000711206000000000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.587815989s ago: executing program 1 (id=2927): r0 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x3}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r1}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r3}, 0x10) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="00a0fe6993d6d3121570850860da07c0000000000000000000aad2002646dea2ab00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[], 0x0, 0x26, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb31}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfe1b) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000001c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x7, 0x11, &(0x7f0000000cc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, [@map_idx_val={0x18, 0x8, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffff6a71}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, @map_val={0x18, 0x1, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x9}, @ldst={0x0, 0x0, 0x6, 0x9, 0xb, 0x6, 0xfffffffffffffff0}, @exit, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x20002, 0x0, 0x0, 0x0, 0x1}, @exit]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xd0, &(0x7f0000000bc0)=""/208, 0x40f00, 0x4e, '\x00', 0x0, @fallback=0xe, r0, 0x8, &(0x7f00000003c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x5, 0x80000001, 0x1}, 0x10, 0x0, r2, 0x3, &(0x7f00000004c0)=[r4, r4], &(0x7f0000000500)=[{0x4, 0x3, 0xc, 0x4}, {0x0, 0x1, 0x8, 0x1}, {0x0, 0x3, 0x4, 0xa}], 0x10, 0x1, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f3, &(0x7f0000000080)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) 1.46853074s ago: executing program 4 (id=2928): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x502, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0xff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1.46809365s ago: executing program 3 (id=2929): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'dvmrp1\x00', 0x2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r8, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb000000000000000081c1e63d2b3f4e7a53080edbcb3b7900000000020000000000cbfe0b8486521541fdc48001e793b144daf8acd6"], 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) close(r10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0xd, 0x2e, 0x0, 0x200, 0xffffffffffffffff, 0x2, '\x00', 0x0, r1, 0x2, 0x1, 0x4, 0x8, @void, @value, @void, @value}, 0x50) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32=r11, @ANYRESDEC=r6], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r12}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) 1.45342115s ago: executing program 4 (id=2930): bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x20, &(0x7f0000000380)={&(0x7f0000000500)=""/248, 0xf8, 0x0, &(0x7f0000000240)=""/5, 0x5}}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000400)='sched_switch\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000880), 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1e0000000436c7f30eb39b85a3000000400800009984f61c16b8423b7476a74e65c2a08160cd275f7770be83b38255d13145f15fdbd1097660e8f22ce4e3744b467052c24107cfc077", @ANYRES32, @ANYBLOB="0400"/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="0500000005000000010000000d00"/28], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={r1, 0x0, 0x90, 0x1000, &(0x7f0000000600)="4109d0db802bee3c12724e4976010587af41b6d784cedd586e877aa9da4a44f235aa34d653d489794db6baddd459ca505001626287692269a225a471e91eee957c2088edef9a41328c8f514e1a1c549dbb4477ea6c6c8fc00d23397b38227777d0601e6d932e3ecc18953eaf3a2072f094827dae77184b5126db0143adff0c91c73c35705681b8b690b6837723153f9a", &(0x7f0000001180)=""/4096, 0x9, 0x0, 0x4c, 0xa0, &(0x7f00000006c0)="1ddb2913bf1902a4cb7bb8d4e0339cb44536205e780785324eba9215af5cfb5f42597be098c0aefae935f26fd0489a430fa0777f3ac1f43fbb21db3118ce9decfa9310f25302660ef52407cf", &(0x7f0000000740)="d82fc94c112b48130e89f23aa0a2a722298bf15b50aa08a0e8c111367f43d344cdb9b92cffd8fe56b890b6bc401a2df2aa6d82696d51595d67968e7654ba60edd2c71a6db35a2c30bc73cc7647e3e93fff4fc556442a8cabc2e095a2ed1585588225282a112932860b19808f1fdc4323a37b43e8a3092bfde7f8066acf51f64c0adbd5e1d2c3589c045de7efd4e74cd5b04facd3e6cf45637bae2e9178c8c642", 0x2, 0x0, 0x6}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4, 0x20020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000000002}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x2, 0x3, 0x0, &(0x7f0000000440)={0x0, 0x0}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) 1.321993351s ago: executing program 2 (id=2931): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x17, &(0x7f0000000880)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x76}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000b40)={{r2}, 0x0, &(0x7f0000000b00)='%-010d \x00'}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001940)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) 1.167068382s ago: executing program 4 (id=2932): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x20, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x7ab046, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02b6a4e6fd8400"/20, @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000020c80000000000000000009500000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r0}, 0x10) 1.098784212s ago: executing program 0 (id=2933): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, &(0x7f00000003c0)=0x3, 0x12) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="1802000000000000ddd3d7bf00000000850000002e0000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)='hugetlb.2MB.rsvd.failcnt\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x18) socketpair(0x11, 0x2, 0x869, &(0x7f0000000340)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b07080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf5af51d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b0fdf9743af932cd6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa16509945ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a3174b531f573fe0e5239c000be2733c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae47846892bb423c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d7122361c37c61a43b5afd865b60d4cae891b73220f17d25985a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953e88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a72e1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e48701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867ec92d13a4fa4ae033a09673866cd77f4bcdaaa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a268921738938aa9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xd, 0xfffffffd}, 0x10, 0x0, r4, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000400)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0a00000000441400e27f00000100800000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) 971.127973ms ago: executing program 4 (id=2934): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x2}, 0x48, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r1}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="000800000000000000080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18010000000020000000000000000000181900", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) unlink(0x0) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) socketpair(0x1a, 0x3, 0x5, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xa, 0x4, 0x69ee, 0x1, 0xd0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r4}, &(0x7f0000000080), &(0x7f0000000280)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 892.052743ms ago: executing program 1 (id=2935): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x282400, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r2}, &(0x7f0000000080), &(0x7f00000001c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x5fe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 806.578284ms ago: executing program 1 (id=2936): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000000), &(0x7f0000000200), 0xa7c}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r0, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf, &(0x7f0000000840)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0xe6, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, 0x0, 0xfdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000b00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000b80)=[0x0], 0x0, 0x40, &(0x7f0000000bc0)=[{}], 0x8, 0x10, &(0x7f0000000c00), 0x0, 0x0, 0x50, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x7, 0x19, &(0x7f0000000680)=@raw=[@btf_id={0x18, 0x1, 0x3, 0x0, 0x2}, @exit, @call={0x85, 0x0, 0x0, 0x1d}, @ldst={0x0, 0x0, 0x7, 0x5, 0x1, 0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x67}, @ringbuf_query, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000380)='GPL\x00', 0x1, 0xae, &(0x7f0000000780)=""/174, 0x40f00, 0x0, '\x00', r1, @fallback=0x30, r3, 0x8, &(0x7f0000000a80)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000ac0)={0x2, 0xf, 0x92, 0x8}, 0x10, r4, r0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x8010743f, 0x2000000c) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff01000000", @ANYRES32=0x1, @ANYBLOB="000000100000000000006a38ad50a7dd9d000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @restrict]}}, 0x0, 0x8a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1, 0x0, 0x0, @void, @value}, 0x20) syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x2, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000000000000000001008400000000000000a500ffffffffff809500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000040)='blkio.throttle.read_iops_device\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000180), 0x12) 597.902885ms ago: executing program 3 (id=2937): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x4, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000000c0), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x16004, 0x0, 0x81, 0x5, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() sendmsg$unix(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xee00}}}], 0x38, 0x20000900}, 0x0) recvmsg(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000), 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff191812", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001380)={0x0, r4, 0x0, 0x1}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x15, 0x17, &(0x7f0000000880)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {0x85, 0x0, 0x0, 0x76}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 360.307877ms ago: executing program 2 (id=2938): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000200000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 279.856198ms ago: executing program 2 (id=2939): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x19, 0x18, &(0x7f00000008c0)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x7, 0x0, 0x0, 0x41100, 0x41, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="280100"], 0x128}, 0x0) recvmsg$unix(r0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="050000002e000000420000004000000080ffffff", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/17], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000740)="acf513f392d69a2df4419d", &(0x7f0000000080), 0xb7e0, r2, 0x0, 0xa00369a4}, 0x38) 192.578818ms ago: executing program 2 (id=2940): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r2}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) (async) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) (async) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x10000, 0x5, 0x8000, 0x0, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000003000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x97, &(0x7f00000001c0)=""/151, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, &(0x7f0000000500)="00c0916813583c530397047f026ec1364c0838dd75f8c0ab60348dd5b27f63b04306030a8860772f5cb60c9ecbdb2123912d00c4c8238f41fe3e8fcdb27a34077853040fc372d918e51218c6e41bf2952df3b824e4fb3821c5cda19d061dfcb0", 0x0, 0x2}, 0x50) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x89f1, &(0x7f0000000900)={'nr0\x00', @random="0600002000"}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a640500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x300, @void, @value}, 0x80) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x24010, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x87}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r8, 0x0, 0xe, 0x0, &(0x7f00000003c0)="386d178529a39dea18dd3f87d7a5", 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, 0xfffffffffffffffe) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) 150.883539ms ago: executing program 4 (id=2941): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x2}, 0x48, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="000800000000000000080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18010000000020000000000000000000181900", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) unlink(0x0) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) socketpair(0x1a, 0x3, 0x5, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xa, 0x4, 0x69ee, 0x1, 0xd0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r4}, &(0x7f0000000080), &(0x7f0000000280)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 103.253499ms ago: executing program 2 (id=2942): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x4, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r1, &(0x7f0000000200)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x534}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x37, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xfe, 0x60000004, &(0x7f0000000100)="b9ff03076044238cb89e14f008000de0ffff00184000633c77fbac141412e000002062079f4b4d2f87e5feca6aab845013f2325f1a3903050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f90931dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r8, r9, 0x5, 0x0, 0x0, @void, @value}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001940)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r8}, &(0x7f00000006c0), &(0x7f0000000700)=r7}, 0x20) sendmsg$inet(r6, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$TOKEN_CREATE(0x24, &(0x7f0000000300), 0x8) 102.219439ms ago: executing program 0 (id=2943): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x1, 0x10001, 0x2, 0x100, 0xffffffffffffffff, 0xb0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x2, 0xc, @void, @value, @void, @value}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x2, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) close(r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r3, &(0x7f00000000c0), &(0x7f0000000000)=""/8, 0x2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x5ee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x5}, 0x50) 0s ago: executing program 0 (id=2944): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="0100000004000000040000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000882f6de6f452588ff556735451db87a689c6cf1948df48b15a4a3e9dc7bb032ea8c0679498cffd14274168d896bfdb8ee3e35f52c47f3200633e17bb0c4ea398fa8be036fb6438f04ef99ae6c405d1d4640eef778f98825a7948b82b"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x2, 0x6, &(0x7f0000000c00)=ANY=[@ANYBLOB="180200"/13, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0x4, &(0x7f0000000dc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x10000000, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, &(0x7f0000000000), 0x0}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r4}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0600000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/17, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r5}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) sendmsg$inet(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000040)="2de81cd37f9707b84df8b0323305d29cd020a94708661b954860b8fd65b5bf91e2192ec92ddcb5f7ceec38a240b01bf828b9a210612136c6e176aa04b7ff0c3148ad9ded926d3cb1cc26a445bf66d0ea0fce", 0x52}, {&(0x7f0000000540)="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", 0x1000}], 0x2, &(0x7f0000000100)=[@ip_tos_u8={{0x11}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}], 0x30}, 0x4000000) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.10.14' (ED25519) to the list of known hosts. [ 20.988609][ T28] audit: type=1400 audit(1732135956.136:66): avc: denied { mounton } for pid=282 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.011588][ T28] audit: type=1400 audit(1732135956.166:67): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.012579][ T282] cgroup: Unknown subsys name 'net' [ 21.038970][ T28] audit: type=1400 audit(1732135956.186:68): avc: denied { unmount } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.039118][ T282] cgroup: Unknown subsys name 'devices' [ 21.148753][ T282] cgroup: Unknown subsys name 'hugetlb' [ 21.154155][ T282] cgroup: Unknown subsys name 'rlimit' [ 21.289309][ T28] audit: type=1400 audit(1732135956.436:69): avc: denied { setattr } for pid=282 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.312283][ T28] audit: type=1400 audit(1732135956.436:70): avc: denied { mounton } for pid=282 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.336802][ T28] audit: type=1400 audit(1732135956.436:71): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.346428][ T285] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 21.368820][ T28] audit: type=1400 audit(1732135956.516:72): avc: denied { relabelto } for pid=285 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.394050][ T28] audit: type=1400 audit(1732135956.516:73): avc: denied { write } for pid=285 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.422740][ T28] audit: type=1400 audit(1732135956.566:74): avc: denied { read } for pid=282 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.423163][ T282] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.448062][ T28] audit: type=1400 audit(1732135956.566:75): avc: denied { open } for pid=282 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.164959][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.171830][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.179148][ T292] device bridge_slave_0 entered promiscuous mode [ 22.196597][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.203429][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.210724][ T292] device bridge_slave_1 entered promiscuous mode [ 22.238533][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.245389][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.252816][ T293] device bridge_slave_0 entered promiscuous mode [ 22.262841][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.269711][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.276951][ T294] device bridge_slave_0 entered promiscuous mode [ 22.286973][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.293817][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.301147][ T291] device bridge_slave_0 entered promiscuous mode [ 22.307634][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.314470][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.321705][ T293] device bridge_slave_1 entered promiscuous mode [ 22.328088][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.334929][ T295] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.342240][ T295] device bridge_slave_0 entered promiscuous mode [ 22.348704][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.355541][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.362872][ T294] device bridge_slave_1 entered promiscuous mode [ 22.372931][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.379810][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.387008][ T291] device bridge_slave_1 entered promiscuous mode [ 22.397411][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.404243][ T295] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.411535][ T295] device bridge_slave_1 entered promiscuous mode [ 22.642268][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.649224][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.656364][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.663193][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.673148][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.680002][ T295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.687223][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.693964][ T295] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.715308][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.722164][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.729281][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.736046][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.749379][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.756221][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.763374][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.770255][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.780883][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.787844][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.794929][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.801754][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.829189][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.836255][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.844089][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.851585][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.859015][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.865966][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.873036][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.880101][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.887244][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.894171][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.901147][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.938507][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.946884][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.953704][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.961160][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.969355][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.976189][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.999769][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.008507][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.015744][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.023124][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.031777][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.038619][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.045775][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.054071][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.060950][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.068102][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.076076][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.082926][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.090192][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.098179][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.104995][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.134518][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.164612][ T292] device veth0_vlan entered promiscuous mode [ 23.172125][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.180365][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.187646][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.195558][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.202397][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.209584][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.217660][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.224502][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.231774][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.239545][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.247325][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.255048][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.262977][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.270917][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.278897][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.286780][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.294848][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.303051][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.311196][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.319418][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.327306][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.335035][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.343262][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.351332][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.358187][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.365334][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.373196][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.381356][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.388659][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.399465][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.407921][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.415860][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.422704][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.431142][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.438958][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.456167][ T292] device veth1_macvtap entered promiscuous mode [ 23.467385][ T291] device veth0_vlan entered promiscuous mode [ 23.476868][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.484255][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.491766][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.499983][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.507966][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.515898][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.526955][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.535236][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.552922][ T291] device veth1_macvtap entered promiscuous mode [ 23.565935][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.574173][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.582321][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.590308][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.598783][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.606799][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.614796][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.629814][ T295] device veth0_vlan entered promiscuous mode [ 23.644505][ T294] device veth0_vlan entered promiscuous mode [ 23.651145][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.659483][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.667876][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.675869][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.684247][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.692069][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.700132][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.708406][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.716701][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.724685][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.733070][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.740957][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.748868][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.756141][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.763482][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.770969][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.792574][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.800803][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.809243][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.817461][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.825291][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.832753][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.841047][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.851282][ T293] device veth0_vlan entered promiscuous mode [ 23.862041][ T295] device veth1_macvtap entered promiscuous mode [ 23.876133][ T294] device veth1_macvtap entered promiscuous mode [ 23.892195][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.905325][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.915320][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.932494][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.940664][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.949027][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.976343][ C0] hrtimer: interrupt took 23641 ns [ 23.997596][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.067256][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.129227][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.161876][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.179978][ T293] device veth1_macvtap entered promiscuous mode [ 24.214476][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.228615][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.280688][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.358196][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.918805][ T366] syz.2.13[366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.918883][ T366] syz.2.13[366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.285094][ T366] device veth0_vlan left promiscuous mode [ 26.384757][ T366] device veth0_vlan entered promiscuous mode [ 26.403950][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.416978][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.424432][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.657315][ T28] kauditd_printk_skb: 34 callbacks suppressed [ 26.657333][ T28] audit: type=1400 audit(1732135961.796:110): avc: denied { create } for pid=382 comm="syz.4.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.266940][ T28] audit: type=1400 audit(1732135963.396:111): avc: denied { cpu } for pid=407 comm="syz.4.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 28.994973][ T28] audit: type=1400 audit(1732135964.136:112): avc: denied { create } for pid=423 comm="syz.2.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 29.061983][ T424] Driver unsupported XDP return value 0 on prog (id 43) dev N/A, expect packet loss! [ 31.565944][ T469] syz.3.42[469] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.566019][ T469] syz.3.42[469] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.826125][ T495] syz.4.49 (495) used greatest stack depth: 22168 bytes left [ 34.252494][ T540] syz.3.63[540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.252564][ T540] syz.3.63[540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.598332][ T546] device veth0_vlan left promiscuous mode [ 34.616836][ T546] device veth0_vlan entered promiscuous mode [ 34.623828][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.640611][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 34.676649][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 34.807765][ T28] audit: type=1400 audit(1732135969.956:113): avc: denied { relabelfrom } for pid=553 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.893695][ T28] audit: type=1400 audit(1732135969.956:114): avc: denied { relabelto } for pid=553 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 35.327499][ T394] syz.4.17 (394) used greatest stack depth: 21880 bytes left [ 35.487014][ T564] FAULT_INJECTION: forcing a failure. [ 35.487014][ T564] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 35.546499][ T564] CPU: 0 PID: 564 Comm: syz.2.71 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 35.555873][ T564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 35.565772][ T564] Call Trace: [ 35.568891][ T564] [ 35.571669][ T564] dump_stack_lvl+0x151/0x1b7 [ 35.576183][ T564] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 35.581478][ T564] ? __check_object_size+0x47b/0x650 [ 35.586600][ T564] dump_stack+0x15/0x1e [ 35.590587][ T564] should_fail_ex+0x3d0/0x520 [ 35.595104][ T564] should_fail+0xb/0x10 [ 35.599094][ T564] should_fail_usercopy+0x1a/0x20 [ 35.603954][ T564] _copy_from_user+0x1e/0xc0 [ 35.608384][ T564] generic_map_update_batch+0x54c/0x8c0 [ 35.613765][ T564] ? raw_irqentry_exit_cond_resched+0x2a/0x30 [ 35.619666][ T564] ? generic_map_delete_batch+0x5c0/0x5c0 [ 35.625222][ T564] ? __fdget+0x1aa/0x240 [ 35.629305][ T564] ? generic_map_delete_batch+0x5c0/0x5c0 [ 35.634857][ T564] bpf_map_do_batch+0x4cc/0x630 [ 35.639551][ T564] __sys_bpf+0x66b/0x7f0 [ 35.643709][ T564] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 35.648955][ T564] ? __ia32_sys_read+0x90/0x90 [ 35.653609][ T564] ? debug_smp_processor_id+0x17/0x20 [ 35.658812][ T564] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 35.664717][ T564] __x64_sys_bpf+0x7c/0x90 [ 35.668969][ T564] x64_sys_call+0x87f/0x9a0 [ 35.673307][ T564] do_syscall_64+0x3b/0xb0 [ 35.677558][ T564] ? clear_bhb_loop+0x55/0xb0 [ 35.682076][ T564] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 35.687807][ T564] RIP: 0033:0x7f505f37e819 [ 35.692052][ T564] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 35.711500][ T564] RSP: 002b:00007f5060203038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 35.719744][ T564] RAX: ffffffffffffffda RBX: 00007f505f535fa0 RCX: 00007f505f37e819 [ 35.727669][ T564] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 35.735572][ T564] RBP: 00007f5060203090 R08: 0000000000000000 R09: 0000000000000000 [ 35.743377][ T564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 35.751196][ T564] R13: 0000000000000000 R14: 00007f505f535fa0 R15: 00007ffce9ea3d78 [ 35.759011][ T564] [ 37.989672][ T28] audit: type=1400 audit(1732135973.136:115): avc: denied { create } for pid=619 comm="syz.3.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 38.147639][ T28] audit: type=1400 audit(1732135973.136:116): avc: denied { write } for pid=619 comm="syz.3.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 42.608731][ T739] syz.4.124[739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.608796][ T739] syz.4.124[739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.620181][ T28] audit: type=1400 audit(1732135977.776:117): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 42.864787][ T749] device veth0_vlan left promiscuous mode [ 42.884493][ T749] device veth0_vlan entered promiscuous mode [ 42.972761][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 42.989989][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 43.035670][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 43.652326][ T763] device veth1_macvtap left promiscuous mode [ 44.604083][ T790] FAULT_INJECTION: forcing a failure. [ 44.604083][ T790] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 44.663370][ T790] CPU: 1 PID: 790 Comm: syz.1.139 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 44.672846][ T790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 44.682736][ T790] Call Trace: [ 44.685857][ T790] [ 44.688638][ T790] dump_stack_lvl+0x151/0x1b7 [ 44.693148][ T790] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 44.698447][ T790] ? migrate_enable+0x1cb/0x2b0 [ 44.703134][ T790] ? migrate_disable+0x6a/0x190 [ 44.707819][ T790] dump_stack+0x15/0x1e [ 44.711811][ T790] should_fail_ex+0x3d0/0x520 [ 44.716325][ T790] should_fail+0xb/0x10 [ 44.720314][ T790] should_fail_usercopy+0x1a/0x20 [ 44.725178][ T790] _copy_from_user+0x1e/0xc0 [ 44.729601][ T790] generic_map_update_batch+0x4d9/0x8c0 [ 44.734987][ T790] ? generic_map_delete_batch+0x5c0/0x5c0 [ 44.740541][ T790] ? __sanitizer_cov_trace_switch+0xf/0xe0 [ 44.746181][ T790] ? generic_map_delete_batch+0x5c0/0x5c0 [ 44.751736][ T790] bpf_map_do_batch+0x4cc/0x630 [ 44.756421][ T790] __sys_bpf+0x66b/0x7f0 [ 44.760500][ T790] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 44.765712][ T790] ? __ia32_sys_read+0x90/0x90 [ 44.770308][ T790] ? debug_smp_processor_id+0x17/0x20 [ 44.775517][ T790] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 44.781417][ T790] __x64_sys_bpf+0x7c/0x90 [ 44.785674][ T790] x64_sys_call+0x87f/0x9a0 [ 44.790012][ T790] do_syscall_64+0x3b/0xb0 [ 44.794265][ T790] ? clear_bhb_loop+0x55/0xb0 [ 44.798775][ T790] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 44.804524][ T790] RIP: 0033:0x7f3c21f7e819 [ 44.808767][ T790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 44.828285][ T790] RSP: 002b:00007f3c22d5b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 44.836533][ T790] RAX: ffffffffffffffda RBX: 00007f3c22135fa0 RCX: 00007f3c21f7e819 [ 44.844344][ T790] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 44.852156][ T790] RBP: 00007f3c22d5b090 R08: 0000000000000000 R09: 0000000000000000 [ 44.859975][ T790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 44.867778][ T790] R13: 0000000000000000 R14: 00007f3c22135fa0 R15: 00007ffe0bd91248 [ 44.875600][ T790] [ 46.669354][ T824] syz.4.149[824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.669432][ T824] syz.4.149[824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.833697][ T821] device veth0_vlan left promiscuous mode [ 46.856232][ T821] device veth0_vlan entered promiscuous mode [ 46.921160][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.929524][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.937275][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 50.909444][ T28] audit: type=1400 audit(1732135986.056:118): avc: denied { create } for pid=902 comm="syz.4.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 51.517684][ T919] syz.2.176[919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.517755][ T919] syz.2.176[919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.727245][ T919] device veth0_vlan left promiscuous mode [ 51.832342][ T919] device veth0_vlan entered promiscuous mode [ 52.335628][ T28] audit: type=1400 audit(1732135987.476:119): avc: denied { read } for pid=940 comm="syz.3.182" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 52.458754][ T28] audit: type=1400 audit(1732135987.516:120): avc: denied { open } for pid=940 comm="syz.3.182" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 52.476405][ T945] syz.3.182 (945) used obsolete PPPIOCDETACH ioctl [ 52.697439][ T28] audit: type=1400 audit(1732135987.516:121): avc: denied { ioctl } for pid=940 comm="syz.3.182" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 53.801176][ T977] syz.2.192[977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.801256][ T977] syz.2.192[977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.827438][ T831] syz.1.148 (831) used greatest stack depth: 21840 bytes left [ 53.844015][ T977] device veth0_vlan left promiscuous mode [ 53.871224][ T977] device veth0_vlan entered promiscuous mode [ 56.677149][ T1050] device sit0 entered promiscuous mode [ 56.927121][ T1059] FAULT_INJECTION: forcing a failure. [ 56.927121][ T1059] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 57.016418][ T1059] CPU: 0 PID: 1059 Comm: syz.0.220 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 57.025970][ T1059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 57.035868][ T1059] Call Trace: [ 57.038990][ T1059] [ 57.041769][ T1059] dump_stack_lvl+0x151/0x1b7 [ 57.046288][ T1059] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 57.051572][ T1059] ? kstrtouint+0xf6/0x180 [ 57.055837][ T1059] ? _kstrtol+0x150/0x150 [ 57.059997][ T1059] dump_stack+0x15/0x1e [ 57.063989][ T1059] should_fail_ex+0x3d0/0x520 [ 57.068589][ T1059] should_fail+0xb/0x10 [ 57.072581][ T1059] should_fail_usercopy+0x1a/0x20 [ 57.077440][ T1059] _copy_from_user+0x1e/0xc0 [ 57.081866][ T1059] copy_msghdr_from_user+0xaa/0x670 [ 57.086909][ T1059] ? sendmsg_copy_msghdr+0x70/0x70 [ 57.091856][ T1059] __sys_sendmsg+0x236/0x390 [ 57.096274][ T1059] ? ____sys_sendmsg+0x9a0/0x9a0 [ 57.101059][ T1059] ? __kasan_check_write+0x14/0x20 [ 57.105996][ T1059] ? mutex_unlock+0xb2/0x260 [ 57.110427][ T1059] ? __kasan_check_write+0x14/0x20 [ 57.115374][ T1059] ? __ia32_sys_read+0x90/0x90 [ 57.119974][ T1059] ? debug_smp_processor_id+0x17/0x20 [ 57.125174][ T1059] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 57.131081][ T1059] __x64_sys_sendmsg+0x7f/0x90 [ 57.135686][ T1059] x64_sys_call+0x16a/0x9a0 [ 57.140024][ T1059] do_syscall_64+0x3b/0xb0 [ 57.144272][ T1059] ? clear_bhb_loop+0x55/0xb0 [ 57.148783][ T1059] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 57.154516][ T1059] RIP: 0033:0x7f6b2f57e819 [ 57.158768][ T1059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 57.178205][ T1059] RSP: 002b:00007f6b303be038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 57.186454][ T1059] RAX: ffffffffffffffda RBX: 00007f6b2f735fa0 RCX: 00007f6b2f57e819 [ 57.194272][ T1059] RDX: 0000000000000000 RSI: 0000000020000400 RDI: 0000000000000007 [ 57.202073][ T1059] RBP: 00007f6b303be090 R08: 0000000000000000 R09: 0000000000000000 [ 57.209882][ T1059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 57.217697][ T1059] R13: 0000000000000000 R14: 00007f6b2f735fa0 R15: 00007ffd7cf918b8 [ 57.225624][ T1059] [ 57.457616][ T1074] syz.0.226[1074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.457696][ T1074] syz.0.226[1074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.516920][ T1072] syz.1.227[1072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.548608][ T1074] device veth0_vlan left promiscuous mode [ 57.576841][ T1072] syz.1.227[1072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.598683][ T1074] device veth0_vlan entered promiscuous mode [ 57.656377][ T471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.674661][ T471] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.739596][ T471] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 57.755462][ T1085] device veth0_vlan left promiscuous mode [ 57.781006][ T1085] device veth0_vlan entered promiscuous mode [ 58.718111][ T1120] syz.1.239[1120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.718186][ T1120] syz.1.239[1120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.936181][ T1117] device veth0_vlan left promiscuous mode [ 58.988493][ T1117] device veth0_vlan entered promiscuous mode [ 59.059777][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.097147][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.186750][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 62.181340][ T1181] syz.1.256[1181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.181416][ T1181] syz.1.256[1181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.345041][ T1181] device veth0_vlan left promiscuous mode [ 62.393330][ T1181] device veth0_vlan entered promiscuous mode [ 62.423971][ T471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 62.439405][ T471] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 62.528732][ T471] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 63.142789][ T1203] syz.4.262[1203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.142866][ T1203] syz.4.262[1203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.376712][ T1203] device veth0_vlan left promiscuous mode [ 63.489908][ T1203] device veth0_vlan entered promiscuous mode [ 63.536987][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 63.565569][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 63.657190][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 65.203846][ T1250] ªªªªªª: renamed from vlan0 [ 65.260419][ T1255] syz.3.278[1255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.260498][ T1255] syz.3.278[1255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.423889][ T1255] device veth0_vlan left promiscuous mode [ 65.547071][ T1255] device veth0_vlan entered promiscuous mode [ 70.996521][ T28] audit: type=1400 audit(1732136006.146:122): avc: denied { write } for pid=1360 comm="syz.2.314" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 71.158990][ T28] audit: type=1400 audit(1732136006.176:123): avc: denied { create } for pid=1360 comm="syz.2.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 72.610737][ T1394] syz.3.323[1394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.610807][ T1394] syz.3.323[1394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.775518][ T1393] device veth0_vlan left promiscuous mode [ 72.798569][ T1393] device veth0_vlan entered promiscuous mode [ 72.834337][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.843232][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.853568][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 75.089877][ T28] audit: type=1400 audit(1732136010.236:124): avc: denied { create } for pid=1432 comm="syz.3.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 76.115953][ T1452] syz.1.343[1452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.116030][ T1452] syz.1.343[1452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.185955][ T1454] syz.0.345[1454] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.236145][ T1459] FAULT_INJECTION: forcing a failure. [ 76.236145][ T1459] name failslab, interval 1, probability 0, space 0, times 0 [ 76.262434][ T1454] syz.0.345[1454] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.280263][ T1459] CPU: 1 PID: 1459 Comm: syz.4.347 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 76.294626][ T1452] device veth0_vlan left promiscuous mode [ 76.300839][ T1459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 76.300854][ T1459] Call Trace: [ 76.300861][ T1459] [ 76.300869][ T1459] dump_stack_lvl+0x151/0x1b7 [ 76.300899][ T1459] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 76.300924][ T1459] ? avc_has_perm_noaudit+0x2dd/0x430 [ 76.300956][ T1459] dump_stack+0x15/0x1e [ 76.300976][ T1459] should_fail_ex+0x3d0/0x520 [ 76.301010][ T1459] __should_failslab+0xaf/0xf0 [ 76.301034][ T1459] should_failslab+0x9/0x20 [ 76.301061][ T1459] kmem_cache_alloc_node+0x42/0x330 [ 76.301083][ T1459] ? __alloc_skb+0xcc/0x2d0 [ 76.312262][ T1452] device veth0_vlan entered promiscuous mode [ 76.316496][ T1459] __alloc_skb+0xcc/0x2d0 [ 76.316534][ T1459] alloc_skb_with_frags+0xa6/0x680 [ 76.316557][ T1459] ? avc_has_perm_noaudit+0x348/0x430 [ 76.348424][ T471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 76.350515][ T1459] sock_alloc_send_pskb+0x915/0xa50 [ 76.358510][ T471] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 76.359893][ T1459] ? sock_kzfree_s+0x60/0x60 [ 76.370429][ T471] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 76.374206][ T1459] ? __kasan_check_write+0x14/0x20 [ 76.374229][ T1459] ? _raw_spin_lock+0xa4/0x1b0 [ 76.424982][ T1459] ? _raw_spin_trylock_bh+0x190/0x190 [ 76.430187][ T1459] ? avc_has_perm+0x16f/0x260 [ 76.434704][ T1459] unix_dgram_sendmsg+0x5b1/0x2050 [ 76.439774][ T1459] ? unix_dgram_poll+0x690/0x690 [ 76.444548][ T1459] unix_seqpacket_sendmsg+0x120/0x1f0 [ 76.449746][ T1459] ? unix_dgram_peer_wake_me+0x450/0x450 [ 76.455220][ T1459] ____sys_sendmsg+0x5d3/0x9a0 [ 76.459820][ T1459] ? __sys_sendmsg_sock+0x40/0x40 [ 76.464704][ T1459] __sys_sendmsg+0x2a9/0x390 [ 76.469106][ T1459] ? ____sys_sendmsg+0x9a0/0x9a0 [ 76.473882][ T1459] ? __kasan_check_write+0x14/0x20 [ 76.478821][ T1459] ? mutex_unlock+0xb2/0x260 [ 76.483251][ T1459] ? __kasan_check_write+0x14/0x20 [ 76.488199][ T1459] ? __ia32_sys_read+0x90/0x90 [ 76.492798][ T1459] ? debug_smp_processor_id+0x17/0x20 [ 76.498002][ T1459] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 76.503908][ T1459] __x64_sys_sendmsg+0x7f/0x90 [ 76.508507][ T1459] x64_sys_call+0x16a/0x9a0 [ 76.512851][ T1459] do_syscall_64+0x3b/0xb0 [ 76.517099][ T1459] ? clear_bhb_loop+0x55/0xb0 [ 76.521613][ T1459] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 76.527360][ T1459] RIP: 0033:0x7ff0bdd7e819 [ 76.531597][ T1459] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 76.551037][ T1459] RSP: 002b:00007ff0beacf038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 76.559278][ T1459] RAX: ffffffffffffffda RBX: 00007ff0bdf35fa0 RCX: 00007ff0bdd7e819 [ 76.567093][ T1459] RDX: 0000000000000000 RSI: 0000000020000400 RDI: 0000000000000007 [ 76.574901][ T1459] RBP: 00007ff0beacf090 R08: 0000000000000000 R09: 0000000000000000 [ 76.582726][ T1459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 76.590531][ T1459] R13: 0000000000000000 R14: 00007ff0bdf35fa0 R15: 00007ffc3bd8b8c8 [ 76.598343][ T1459] [ 76.625525][ T1454] device veth0_vlan left promiscuous mode [ 76.640069][ T1454] device veth0_vlan entered promiscuous mode [ 77.616544][ T28] audit: type=1400 audit(1732136012.766:125): avc: denied { setopt } for pid=1475 comm="syz.1.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 77.817504][ T1482] device syzkaller0 entered promiscuous mode [ 78.527266][ T1503] syz.0.361[1503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.527342][ T1503] syz.0.361[1503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.792255][ T1503] device veth0_vlan left promiscuous mode [ 78.826029][ T1503] device veth0_vlan entered promiscuous mode [ 84.321466][ T1624] syz.1.398[1624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.321546][ T1624] syz.1.398[1624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.549897][ T1624] device veth0_vlan left promiscuous mode [ 84.699260][ T1624] device veth0_vlan entered promiscuous mode [ 84.952943][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 85.020693][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 85.028316][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 86.290932][ T1678] syz.0.418[1678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.291001][ T1678] syz.0.418[1678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.395566][ T1688] syz.1.419[1688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.411539][ T1678] device veth0_vlan left promiscuous mode [ 86.429432][ T1688] syz.1.419[1688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.444234][ T1678] device veth0_vlan entered promiscuous mode [ 86.524134][ T1685] device veth0_vlan left promiscuous mode [ 86.535746][ T1685] device veth0_vlan entered promiscuous mode [ 86.568415][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 86.580170][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 86.590320][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 88.447380][ T1731] syz.3.432[1731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.447452][ T1731] syz.3.432[1731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.671556][ T1727] device veth0_vlan left promiscuous mode [ 88.699603][ T1727] device veth0_vlan entered promiscuous mode [ 92.141361][ T1799] device wg2 entered promiscuous mode [ 92.194436][ T1794] device wg2 left promiscuous mode [ 93.370967][ T1830] syz.0.464[1830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.371042][ T1830] syz.0.464[1830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.654273][ T1830] device veth0_vlan left promiscuous mode [ 93.751148][ T1830] device veth0_vlan entered promiscuous mode [ 95.067297][ T1864] device syzkaller0 entered promiscuous mode [ 100.006307][ C1] sched: RT throttling activated [ 104.301828][ T2003] syz.4.513[2003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.301902][ T2003] syz.4.513[2003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.487590][ T2008] device veth0_vlan left promiscuous mode [ 104.556721][ T2008] device veth0_vlan entered promiscuous mode [ 104.626817][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 104.657671][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 104.685404][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 105.759760][ T2032] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.768337][ T2032] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.447064][ T2049] syz.0.528[2049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.447144][ T2049] syz.0.528[2049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.649587][ T2049] device veth0_vlan left promiscuous mode [ 106.761281][ T2049] device veth0_vlan entered promiscuous mode [ 108.302532][ T2108] FAULT_INJECTION: forcing a failure. [ 108.302532][ T2108] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 108.416605][ T2108] CPU: 1 PID: 2108 Comm: syz.1.545 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 108.426158][ T2108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 108.436056][ T2108] Call Trace: [ 108.439177][ T2108] [ 108.441957][ T2108] dump_stack_lvl+0x151/0x1b7 [ 108.446481][ T2108] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 108.451765][ T2108] dump_stack+0x15/0x1e [ 108.455754][ T2108] should_fail_ex+0x3d0/0x520 [ 108.460268][ T2108] should_fail+0xb/0x10 [ 108.464263][ T2108] should_fail_usercopy+0x1a/0x20 [ 108.469122][ T2108] _copy_to_user+0x1e/0x90 [ 108.473374][ T2108] simple_read_from_buffer+0xc7/0x150 [ 108.478584][ T2108] proc_fail_nth_read+0x1a3/0x210 [ 108.483446][ T2108] ? proc_fault_inject_write+0x390/0x390 [ 108.488910][ T2108] ? fsnotify_perm+0x269/0x5b0 [ 108.493514][ T2108] ? security_file_permission+0x86/0xb0 [ 108.498892][ T2108] ? proc_fault_inject_write+0x390/0x390 [ 108.504358][ T2108] vfs_read+0x26c/0xae0 [ 108.508355][ T2108] ? kernel_read+0x1f0/0x1f0 [ 108.512778][ T2108] ? mutex_lock+0xb1/0x1e0 [ 108.517035][ T2108] ? bit_wait_io_timeout+0x120/0x120 [ 108.522158][ T2108] ? __fdget_pos+0x2e2/0x390 [ 108.526581][ T2108] ? ksys_read+0x77/0x2c0 [ 108.530744][ T2108] ksys_read+0x199/0x2c0 [ 108.534825][ T2108] ? vfs_write+0xed0/0xed0 [ 108.539080][ T2108] ? debug_smp_processor_id+0x17/0x20 [ 108.544283][ T2108] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 108.550191][ T2108] __x64_sys_read+0x7b/0x90 [ 108.554529][ T2108] x64_sys_call+0x28/0x9a0 [ 108.558784][ T2108] do_syscall_64+0x3b/0xb0 [ 108.563033][ T2108] ? clear_bhb_loop+0x55/0xb0 [ 108.567549][ T2108] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 108.573274][ T2108] RIP: 0033:0x7f3c21f7d25c [ 108.577529][ T2108] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 108.597058][ T2108] RSP: 002b:00007f3c22d5b030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 108.605305][ T2108] RAX: ffffffffffffffda RBX: 00007f3c22135fa0 RCX: 00007f3c21f7d25c [ 108.613112][ T2108] RDX: 000000000000000f RSI: 00007f3c22d5b0a0 RDI: 0000000000000009 [ 108.620925][ T2108] RBP: 00007f3c22d5b090 R08: 0000000000000000 R09: 0000000000000000 [ 108.628735][ T2108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 108.636553][ T2108] R13: 0000000000000000 R14: 00007f3c22135fa0 R15: 00007ffe0bd91248 [ 108.644367][ T2108] [ 108.677755][ T28] audit: type=1400 audit(1732136043.826:126): avc: denied { remove_name } for pid=85 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 108.731295][ T28] audit: type=1400 audit(1732136043.826:127): avc: denied { rename } for pid=85 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 108.884526][ T2123] syz.2.551[2123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.884595][ T2123] syz.2.551[2123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.118573][ T2123] device syzkaller0 entered promiscuous mode [ 109.292772][ T28] audit: type=1400 audit(1732136044.436:128): avc: denied { create } for pid=2132 comm="syz.2.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 110.083418][ T2164] syz.1.563[2164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.083501][ T2164] syz.1.563[2164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.166632][ T2164] device veth0_vlan left promiscuous mode [ 110.201235][ T2164] device veth0_vlan entered promiscuous mode [ 111.831541][ T2224] tun0: tun_chr_ioctl cmd 1074025677 [ 111.893056][ T2224] tun0: linktype set to 513 [ 111.921592][ T28] audit: type=1400 audit(1732136047.066:129): avc: denied { ioctl } for pid=2217 comm="syz.0.582" path="cgroup:[4026532361]" dev="nsfs" ino=4026532361 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 112.300190][ T2242] syz.3.588[2242] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.300264][ T2242] syz.3.588[2242] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.576933][ T2242] device veth0_vlan left promiscuous mode [ 112.643444][ T2254] syz.0.590[2254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.643518][ T2254] syz.0.590[2254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.658162][ T2242] device veth0_vlan entered promiscuous mode [ 112.752254][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.777496][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.811850][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.873997][ T2251] device veth0_vlan left promiscuous mode [ 112.999759][ T2251] device veth0_vlan entered promiscuous mode [ 113.003305][ T28] audit: type=1400 audit(1732136048.146:130): avc: denied { create } for pid=2260 comm="syz.3.594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 113.039529][ T2261] syz.3.594 uses obsolete (PF_INET,SOCK_PACKET) [ 114.330648][ T2197] syz.1.573 (2197) used greatest stack depth: 21624 bytes left [ 114.827222][ T28] audit: type=1400 audit(1732136049.976:131): avc: denied { create } for pid=2323 comm="syz.3.615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 114.865890][ T2324] device veth1_macvtap entered promiscuous mode [ 114.898898][ T2324] device macsec0 entered promiscuous mode [ 114.982041][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 116.177539][ T2365] syz.1.628[2365] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.177614][ T2365] syz.1.628[2365] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.771886][ T2369] device syzkaller0 entered promiscuous mode [ 117.472240][ T2401] FAULT_INJECTION: forcing a failure. [ 117.472240][ T2401] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 117.515769][ T2401] CPU: 1 PID: 2401 Comm: syz.3.637 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 117.525334][ T2401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 117.535315][ T2401] Call Trace: [ 117.538525][ T2401] [ 117.541306][ T2401] dump_stack_lvl+0x151/0x1b7 [ 117.545818][ T2401] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 117.551108][ T2401] ? migrate_enable+0x1cb/0x2b0 [ 117.555793][ T2401] ? __check_object_size+0x76/0x650 [ 117.560837][ T2401] dump_stack+0x15/0x1e [ 117.564835][ T2401] should_fail_ex+0x3d0/0x520 [ 117.569339][ T2401] should_fail+0xb/0x10 [ 117.573326][ T2401] should_fail_usercopy+0x1a/0x20 [ 117.578190][ T2401] _copy_from_user+0x1e/0xc0 [ 117.582619][ T2401] generic_map_update_batch+0x54c/0x8c0 [ 117.588021][ T2401] ? generic_map_delete_batch+0x5c0/0x5c0 [ 117.593550][ T2401] ? generic_map_delete_batch+0x5c0/0x5c0 [ 117.599108][ T2401] bpf_map_do_batch+0x4cc/0x630 [ 117.603796][ T2401] __sys_bpf+0x66b/0x7f0 [ 117.607873][ T2401] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 117.613178][ T2401] ? __ia32_sys_read+0x90/0x90 [ 117.617767][ T2401] ? debug_smp_processor_id+0x17/0x20 [ 117.622976][ T2401] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 117.628877][ T2401] __x64_sys_bpf+0x7c/0x90 [ 117.633128][ T2401] x64_sys_call+0x87f/0x9a0 [ 117.637465][ T2401] do_syscall_64+0x3b/0xb0 [ 117.641719][ T2401] ? clear_bhb_loop+0x55/0xb0 [ 117.646232][ T2401] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 117.651963][ T2401] RIP: 0033:0x7fe876f7e819 [ 117.656212][ T2401] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 117.675823][ T2401] RSP: 002b:00007fe877d5e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 117.684065][ T2401] RAX: ffffffffffffffda RBX: 00007fe877135fa0 RCX: 00007fe876f7e819 [ 117.691878][ T2401] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 117.699689][ T2401] RBP: 00007fe877d5e090 R08: 0000000000000000 R09: 0000000000000000 [ 117.707495][ T2401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 117.715305][ T2401] R13: 0000000000000000 R14: 00007fe877135fa0 R15: 00007ffcc736f8f8 [ 117.723127][ T2401] [ 117.917885][ T28] audit: type=1400 audit(1732136053.066:132): avc: denied { read } for pid=2407 comm="syz.3.641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 118.888715][ T2444] device veth1_macvtap left promiscuous mode [ 118.922373][ T2444] device macsec0 left promiscuous mode [ 118.966512][ T2444] device veth1_macvtap entered promiscuous mode [ 118.982788][ T2444] device macsec0 entered promiscuous mode [ 119.067173][ T2452] syz.0.658[2452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.067250][ T2452] syz.0.658[2452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.067388][ T2455] syz.1.657[2455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.098098][ T2455] syz.1.657[2455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.267705][ T2455] device veth0_vlan left promiscuous mode [ 119.358572][ T2455] device veth0_vlan entered promiscuous mode [ 119.391067][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 119.422411][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 119.461614][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 119.535155][ T2452] device veth0_vlan left promiscuous mode [ 119.576952][ T2452] device veth0_vlan entered promiscuous mode [ 119.735905][ T2467] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.886355][ T2481] device pim6reg1 entered promiscuous mode [ 119.997101][ T2491] syz.0.671[2491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.997178][ T2491] syz.0.671[2491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.216852][ T2504] device veth0_vlan left promiscuous mode [ 120.282391][ T2504] device veth0_vlan entered promiscuous mode [ 121.137612][ T2538] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.223342][ T2546] device bridge_slave_1 left promiscuous mode [ 121.278400][ T2546] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.314958][ T2550] syz.2.686[2550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.315034][ T2550] syz.2.686[2550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.327048][ T2546] device bridge_slave_0 left promiscuous mode [ 121.361557][ T2546] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.533398][ T2549] device veth0_vlan left promiscuous mode [ 121.542443][ T2549] device veth0_vlan entered promiscuous mode [ 121.576054][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 121.601572][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 121.617885][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 122.819013][ T2599] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 122.979712][ T2599] device syzkaller0 entered promiscuous mode [ 123.601265][ T28] audit: type=1400 audit(1732136058.746:133): avc: denied { create } for pid=2608 comm="syz.3.704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 126.925502][ T28] audit: type=1400 audit(1732136062.066:134): avc: denied { create } for pid=2689 comm="syz.1.730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 131.347079][ T2795] syz.0.765[2795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.347167][ T2795] syz.0.765[2795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.775162][ T2797] device veth0_vlan left promiscuous mode [ 131.868012][ T2797] device veth0_vlan entered promiscuous mode [ 133.515710][ T2861] device veth0_vlan left promiscuous mode [ 133.531870][ T2861] device veth0_vlan entered promiscuous mode [ 133.862760][ T2872] device wg2 entered promiscuous mode [ 136.439086][ T2907] device veth1_macvtap left promiscuous mode [ 136.445741][ T2907] device macsec0 entered promiscuous mode [ 136.630497][ T2907] device veth1_macvtap entered promiscuous mode [ 136.657140][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 139.864809][ T2978] device pim6reg1 entered promiscuous mode [ 139.920780][ T2989] FAULT_INJECTION: forcing a failure. [ 139.920780][ T2989] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 140.046589][ T2989] CPU: 1 PID: 2989 Comm: syz.1.827 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 140.056146][ T2989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 140.066039][ T2989] Call Trace: [ 140.069165][ T2989] [ 140.071953][ T2989] dump_stack_lvl+0x151/0x1b7 [ 140.076462][ T2989] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 140.081866][ T2989] ? migrate_enable+0x1cb/0x2b0 [ 140.086548][ T2989] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 140.092538][ T2989] dump_stack+0x15/0x1e [ 140.096527][ T2989] should_fail_ex+0x3d0/0x520 [ 140.101048][ T2989] should_fail+0xb/0x10 [ 140.105036][ T2989] should_fail_usercopy+0x1a/0x20 [ 140.109895][ T2989] _copy_from_user+0x1e/0xc0 [ 140.114340][ T2989] generic_map_update_batch+0x54c/0x8c0 [ 140.119704][ T2989] ? generic_map_delete_batch+0x5c0/0x5c0 [ 140.125260][ T2989] ? generic_map_delete_batch+0x5c0/0x5c0 [ 140.130816][ T2989] bpf_map_do_batch+0x4cc/0x630 [ 140.135502][ T2989] __sys_bpf+0x66b/0x7f0 [ 140.139581][ T2989] ? clockevents_program_event+0x22f/0x300 [ 140.145224][ T2989] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 140.150435][ T2989] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 140.156424][ T2989] __x64_sys_bpf+0x7c/0x90 [ 140.160671][ T2989] x64_sys_call+0x87f/0x9a0 [ 140.165011][ T2989] do_syscall_64+0x3b/0xb0 [ 140.169266][ T2989] ? clear_bhb_loop+0x55/0xb0 [ 140.173777][ T2989] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 140.179507][ T2989] RIP: 0033:0x7f3c21f7e819 [ 140.183754][ T2989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 140.203203][ T2989] RSP: 002b:00007f3c22d5b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 140.211451][ T2989] RAX: ffffffffffffffda RBX: 00007f3c22135fa0 RCX: 00007f3c21f7e819 [ 140.219258][ T2989] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 140.227087][ T2989] RBP: 00007f3c22d5b090 R08: 0000000000000000 R09: 0000000000000000 [ 140.234880][ T2989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 140.242692][ T2989] R13: 0000000000000000 R14: 00007f3c22135fa0 R15: 00007ffe0bd91248 [ 140.250511][ T2989] [ 141.078671][ T3013] device veth0_vlan left promiscuous mode [ 141.171471][ T3013] device veth0_vlan entered promiscuous mode [ 141.265193][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.283607][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.293091][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 145.167883][ T3127] device veth0_vlan left promiscuous mode [ 145.226393][ T3127] device veth0_vlan entered promiscuous mode [ 148.058372][ T28] audit: type=1400 audit(1732136083.206:135): avc: denied { create } for pid=3201 comm="syz.2.905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 150.033923][ T3243] device veth0_vlan left promiscuous mode [ 150.088698][ T3243] device veth0_vlan entered promiscuous mode [ 150.149721][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 150.162487][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 150.191270][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 151.365781][ T28] audit: type=1400 audit(1732136086.506:136): avc: denied { create } for pid=3273 comm="syz.2.928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 152.380355][ T3297] device veth0_vlan left promiscuous mode [ 152.387661][ T28] audit: type=1400 audit(1732136087.526:137): avc: denied { create } for pid=3290 comm="syz.4.932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 152.427612][ T3297] device veth0_vlan entered promiscuous mode [ 152.452445][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.464178][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 152.480338][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 153.121582][ T3313] device veth0_vlan left promiscuous mode [ 153.252709][ T3313] device veth0_vlan entered promiscuous mode [ 154.827194][ T3347] syz.0.947[3347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.827282][ T3347] syz.0.947[3347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.169823][ T3356] device veth0_vlan left promiscuous mode [ 155.221820][ T3356] device veth0_vlan entered promiscuous mode [ 156.461207][ T3385] syz.3.956[3385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.461282][ T3385] syz.3.956[3385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.718909][ T3385] device veth0_vlan left promiscuous mode [ 156.881251][ T3385] device veth0_vlan entered promiscuous mode [ 156.951083][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.961720][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.981404][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 157.277320][ T3400] device veth0_vlan left promiscuous mode [ 157.291447][ T3400] device veth0_vlan entered promiscuous mode [ 162.356242][ T3531] device veth0_vlan left promiscuous mode [ 162.368663][ T3531] device veth0_vlan entered promiscuous mode [ 162.412275][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.427328][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 162.446933][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 164.452072][ T3572] syz.4.1009[3572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.452145][ T3572] syz.4.1009[3572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.797488][ T3726] syz.1.1051[3726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.861594][ T3726] syz.1.1051[3726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.777961][ T3846] device veth0_vlan left promiscuous mode [ 176.976947][ T3846] device veth0_vlan entered promiscuous mode [ 177.003053][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 177.021528][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 177.053146][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 178.367848][ T28] audit: type=1400 audit(1732136113.506:138): avc: denied { setopt } for pid=3896 comm="syz.2.1105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 179.766741][ T3936] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.261352][ T4029] syz.2.1143[4029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.261436][ T4029] syz.2.1143[4029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.484007][ T4034] device veth0_vlan left promiscuous mode [ 184.609692][ T4034] device veth0_vlan entered promiscuous mode [ 184.652337][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.677453][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 184.724635][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.996932][ T28] audit: type=1400 audit(1732136121.136:139): avc: denied { create } for pid=4068 comm="syz.2.1156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 186.135872][ T28] audit: type=1400 audit(1732136121.146:140): avc: denied { write } for pid=4068 comm="syz.2.1156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 186.377570][ T4076] syz.2.1168[4076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.377646][ T4076] syz.2.1168[4076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.528644][ T4074] syz.3.1157[4074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.692857][ T4074] syz.3.1157[4074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.769821][ T4074] device veth0_vlan left promiscuous mode [ 186.916082][ T4074] device veth0_vlan entered promiscuous mode [ 186.992010][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 187.008345][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 187.054527][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.010398][ T4124] syz.3.1173[4124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.010506][ T4124] syz.3.1173[4124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.335744][ T4164] syz.4.1185[4164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.384250][ T4164] syz.4.1185[4164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.060661][ T4203] syz.1.1196[4203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.112833][ T4203] syz.1.1196[4203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.298886][ T4205] device veth0_vlan left promiscuous mode [ 191.439640][ T4205] device veth0_vlan entered promiscuous mode [ 191.512560][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.557350][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.607963][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 193.997160][ T4254] device veth0_vlan left promiscuous mode [ 194.058321][ T4254] device veth0_vlan entered promiscuous mode [ 195.845188][ T4303] syz.4.1225[4303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.845266][ T4303] syz.4.1225[4303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.126437][ T4308] device veth0_vlan left promiscuous mode [ 196.277264][ T4308] device veth0_vlan entered promiscuous mode [ 197.617806][ T4355] syz.0.1240[4355] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.617882][ T4355] syz.0.1240[4355] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.844913][ T4355] device veth0_vlan left promiscuous mode [ 197.982152][ T4355] device veth0_vlan entered promiscuous mode [ 199.585276][ T4397] syz.4.1254[4397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.585353][ T4397] syz.4.1254[4397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.857989][ T4397] device veth0_vlan left promiscuous mode [ 199.950377][ T4397] device veth0_vlan entered promiscuous mode [ 201.945142][ T4455] syz.2.1271[4455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.945219][ T4455] syz.2.1271[4455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.195797][ T4455] device veth0_vlan left promiscuous mode [ 202.249309][ T4455] device veth0_vlan entered promiscuous mode [ 204.286613][ T4518] syz.0.1291[4518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.286693][ T4518] syz.0.1291[4518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.492047][ T4518] device veth0_vlan left promiscuous mode [ 204.641132][ T4518] device veth0_vlan entered promiscuous mode [ 204.699277][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.728306][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 204.797208][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 205.764676][ T4549] FAULT_INJECTION: forcing a failure. [ 205.764676][ T4549] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 205.866371][ T4549] CPU: 0 PID: 4549 Comm: syz.1.1301 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 205.876015][ T4549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 205.885911][ T4549] Call Trace: [ 205.889031][ T4549] [ 205.891816][ T4549] dump_stack_lvl+0x151/0x1b7 [ 205.896324][ T4549] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 205.901619][ T4549] ? migrate_enable+0x1cb/0x2b0 [ 205.906303][ T4549] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 205.912299][ T4549] dump_stack+0x15/0x1e [ 205.916284][ T4549] should_fail_ex+0x3d0/0x520 [ 205.920806][ T4549] should_fail+0xb/0x10 [ 205.924792][ T4549] should_fail_usercopy+0x1a/0x20 [ 205.929657][ T4549] _copy_from_user+0x1e/0xc0 [ 205.934077][ T4549] generic_map_update_batch+0x54c/0x8c0 [ 205.939458][ T4549] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 205.945104][ T4549] ? generic_map_delete_batch+0x5c0/0x5c0 [ 205.950664][ T4549] ? generic_map_delete_batch+0x5c0/0x5c0 [ 205.956216][ T4549] bpf_map_do_batch+0x4cc/0x630 [ 205.960902][ T4549] __sys_bpf+0x66b/0x7f0 [ 205.964977][ T4549] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 205.970229][ T4549] ? __ia32_sys_read+0x90/0x90 [ 205.974789][ T4549] ? debug_smp_processor_id+0x17/0x20 [ 205.979995][ T4549] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 205.985896][ T4549] __x64_sys_bpf+0x7c/0x90 [ 205.990152][ T4549] x64_sys_call+0x87f/0x9a0 [ 205.994486][ T4549] do_syscall_64+0x3b/0xb0 [ 205.998743][ T4549] ? clear_bhb_loop+0x55/0xb0 [ 206.003255][ T4549] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 206.008985][ T4549] RIP: 0033:0x7f3c21f7e819 [ 206.013231][ T4549] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 206.032677][ T4549] RSP: 002b:00007f3c22d5b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 206.040922][ T4549] RAX: ffffffffffffffda RBX: 00007f3c22135fa0 RCX: 00007f3c21f7e819 [ 206.048743][ T4549] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 206.056543][ T4549] RBP: 00007f3c22d5b090 R08: 0000000000000000 R09: 0000000000000000 [ 206.064355][ T4549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 206.072166][ T4549] R13: 0000000000000000 R14: 00007f3c22135fa0 R15: 00007ffe0bd91248 [ 206.079982][ T4549] [ 206.341526][ T4569] syz.2.1307[4569] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.341605][ T4569] syz.2.1307[4569] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.466079][ T4569] device veth0_vlan left promiscuous mode [ 206.557742][ T4569] device veth0_vlan entered promiscuous mode [ 206.611390][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.637947][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 206.668053][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 208.207851][ T4614] syz.4.1320[4614] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.207932][ T4614] syz.4.1320[4614] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.386544][ T4614] device veth0_vlan left promiscuous mode [ 208.506579][ T4614] device veth0_vlan entered promiscuous mode [ 210.041243][ T4652] device syzkaller0 entered promiscuous mode [ 210.340167][ T4665] syz.1.1333[4665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.340248][ T4665] syz.1.1333[4665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.698521][ T4672] device veth0_vlan left promiscuous mode [ 210.827439][ T4672] device veth0_vlan entered promiscuous mode [ 216.812223][ T4819] syz.4.1376[4819] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.812303][ T4819] syz.4.1376[4819] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.003124][ T4821] device veth0_vlan left promiscuous mode [ 217.034534][ T4821] device veth0_vlan entered promiscuous mode [ 217.085624][ T471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.098738][ T471] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.109385][ T471] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 220.514350][ T4934] syz.2.1411[4934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.514458][ T4934] syz.2.1411[4934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.705125][ T4934] device veth0_vlan left promiscuous mode [ 220.759260][ T4934] device veth0_vlan entered promiscuous mode [ 222.195777][ T4989] FAULT_INJECTION: forcing a failure. [ 222.195777][ T4989] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 222.229586][ T4989] CPU: 1 PID: 4989 Comm: syz.3.1429 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 222.239228][ T4989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 222.249126][ T4989] Call Trace: [ 222.252246][ T4989] [ 222.255022][ T4989] dump_stack_lvl+0x151/0x1b7 [ 222.259538][ T4989] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 222.264834][ T4989] ? migrate_enable+0x1cb/0x2b0 [ 222.269521][ T4989] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 222.275510][ T4989] dump_stack+0x15/0x1e [ 222.279502][ T4989] should_fail_ex+0x3d0/0x520 [ 222.284018][ T4989] should_fail+0xb/0x10 [ 222.288007][ T4989] should_fail_usercopy+0x1a/0x20 [ 222.292866][ T4989] _copy_from_user+0x1e/0xc0 [ 222.297292][ T4989] generic_map_update_batch+0x4d9/0x8c0 [ 222.302682][ T4989] ? generic_map_delete_batch+0x5c0/0x5c0 [ 222.308233][ T4989] ? generic_map_delete_batch+0x5c0/0x5c0 [ 222.313782][ T4989] bpf_map_do_batch+0x4cc/0x630 [ 222.318471][ T4989] __sys_bpf+0x66b/0x7f0 [ 222.322549][ T4989] ? clockevents_program_event+0x22f/0x300 [ 222.328191][ T4989] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 222.333404][ T4989] ? __sched_clock_gtod_offset+0x100/0x100 [ 222.339063][ T4989] ? debug_smp_processor_id+0x17/0x20 [ 222.344250][ T4989] __x64_sys_bpf+0x7c/0x90 [ 222.348504][ T4989] x64_sys_call+0x87f/0x9a0 [ 222.352842][ T4989] do_syscall_64+0x3b/0xb0 [ 222.357095][ T4989] ? clear_bhb_loop+0x55/0xb0 [ 222.361622][ T4989] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 222.367336][ T4989] RIP: 0033:0x7fe876f7e819 [ 222.371586][ T4989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 222.391033][ T4989] RSP: 002b:00007fe877d5e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 222.399275][ T4989] RAX: ffffffffffffffda RBX: 00007fe877135fa0 RCX: 00007fe876f7e819 [ 222.407099][ T4989] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 222.414901][ T4989] RBP: 00007fe877d5e090 R08: 0000000000000000 R09: 0000000000000000 [ 222.422713][ T4989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 222.430622][ T4989] R13: 0000000000000000 R14: 00007fe877135fa0 R15: 00007ffcc736f8f8 [ 222.438441][ T4989] [ 223.308736][ T5017] FAULT_INJECTION: forcing a failure. [ 223.308736][ T5017] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 223.456334][ T5017] CPU: 1 PID: 5017 Comm: syz.4.1437 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 223.465983][ T5017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 223.475880][ T5017] Call Trace: [ 223.479000][ T5017] [ 223.481778][ T5017] dump_stack_lvl+0x151/0x1b7 [ 223.486294][ T5017] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 223.491585][ T5017] ? vfs_write+0x952/0xed0 [ 223.495845][ T5017] dump_stack+0x15/0x1e [ 223.499830][ T5017] should_fail_ex+0x3d0/0x520 [ 223.504343][ T5017] should_fail+0xb/0x10 [ 223.508336][ T5017] should_fail_usercopy+0x1a/0x20 [ 223.513196][ T5017] _copy_from_user+0x1e/0xc0 [ 223.517625][ T5017] __sys_bpf+0x23b/0x7f0 [ 223.521703][ T5017] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 223.526915][ T5017] ? __ia32_sys_read+0x90/0x90 [ 223.531511][ T5017] ? debug_smp_processor_id+0x17/0x20 [ 223.536713][ T5017] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 223.542618][ T5017] __x64_sys_bpf+0x7c/0x90 [ 223.546870][ T5017] x64_sys_call+0x87f/0x9a0 [ 223.551207][ T5017] do_syscall_64+0x3b/0xb0 [ 223.555463][ T5017] ? clear_bhb_loop+0x55/0xb0 [ 223.559975][ T5017] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 223.565713][ T5017] RIP: 0033:0x7ff0bdd7e819 [ 223.569958][ T5017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 223.589404][ T5017] RSP: 002b:00007ff0beacf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 223.597645][ T5017] RAX: ffffffffffffffda RBX: 00007ff0bdf35fa0 RCX: 00007ff0bdd7e819 [ 223.605572][ T5017] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 223.613378][ T5017] RBP: 00007ff0beacf090 R08: 0000000000000000 R09: 0000000000000000 [ 223.621189][ T5017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 223.629003][ T5017] R13: 0000000000000000 R14: 00007ff0bdf35fa0 R15: 00007ffc3bd8b8c8 [ 223.636822][ T5017] [ 223.920603][ T28] audit: type=1400 audit(1732136159.066:141): avc: denied { setattr } for pid=5027 comm="syz.3.1442" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 225.602909][ T5071] syz.4.1454[5071] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.603007][ T5071] syz.4.1454[5071] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.437180][ T28] audit: type=1400 audit(1732136161.586:142): avc: denied { read } for pid=5099 comm="syz.3.1463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 227.100473][ T5121] FAULT_INJECTION: forcing a failure. [ 227.100473][ T5121] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 227.156441][ T5121] CPU: 1 PID: 5121 Comm: syz.2.1469 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 227.166182][ T5121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 227.176204][ T5121] Call Trace: [ 227.179327][ T5121] [ 227.182109][ T5121] dump_stack_lvl+0x151/0x1b7 [ 227.186621][ T5121] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 227.191910][ T5121] ? kstrtouint+0xf6/0x180 [ 227.196165][ T5121] ? _kstrtol+0x150/0x150 [ 227.200337][ T5121] dump_stack+0x15/0x1e [ 227.204322][ T5121] should_fail_ex+0x3d0/0x520 [ 227.208837][ T5121] should_fail+0xb/0x10 [ 227.212834][ T5121] should_fail_usercopy+0x1a/0x20 [ 227.217690][ T5121] _copy_from_user+0x1e/0xc0 [ 227.222116][ T5121] copy_msghdr_from_user+0xaa/0x670 [ 227.227157][ T5121] ? sendmsg_copy_msghdr+0x70/0x70 [ 227.232190][ T5121] __sys_sendmsg+0x236/0x390 [ 227.236614][ T5121] ? ____sys_sendmsg+0x9a0/0x9a0 [ 227.241388][ T5121] ? __kasan_check_write+0x14/0x20 [ 227.246332][ T5121] ? mutex_unlock+0xb2/0x260 [ 227.250776][ T5121] ? __kasan_check_write+0x14/0x20 [ 227.255712][ T5121] ? __ia32_sys_read+0x90/0x90 [ 227.260309][ T5121] ? debug_smp_processor_id+0x17/0x20 [ 227.265512][ T5121] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 227.271417][ T5121] __x64_sys_sendmsg+0x7f/0x90 [ 227.276020][ T5121] x64_sys_call+0x16a/0x9a0 [ 227.280356][ T5121] do_syscall_64+0x3b/0xb0 [ 227.284608][ T5121] ? clear_bhb_loop+0x55/0xb0 [ 227.289121][ T5121] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 227.294853][ T5121] RIP: 0033:0x7f505f37e819 [ 227.299100][ T5121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 227.318543][ T5121] RSP: 002b:00007f5060203038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 227.326788][ T5121] RAX: ffffffffffffffda RBX: 00007f505f535fa0 RCX: 00007f505f37e819 [ 227.334602][ T5121] RDX: 0000000000000003 RSI: 0000000020000980 RDI: 0000000000000006 [ 227.342411][ T5121] RBP: 00007f5060203090 R08: 0000000000000000 R09: 0000000000000000 [ 227.350222][ T5121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 227.358035][ T5121] R13: 0000000000000000 R14: 00007f505f535fa0 R15: 00007ffce9ea3d78 [ 227.365850][ T5121] [ 228.750221][ T28] audit: type=1400 audit(1732136163.896:143): avc: denied { create } for pid=5178 comm="syz.1.1488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 232.170096][ T5264] FAULT_INJECTION: forcing a failure. [ 232.170096][ T5264] name failslab, interval 1, probability 0, space 0, times 0 [ 232.195292][ T5268] syz.2.1515[5268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.195367][ T5268] syz.2.1515[5268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.235037][ T5264] CPU: 1 PID: 5264 Comm: syz.4.1513 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 232.256050][ T5264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 232.265941][ T5264] Call Trace: [ 232.269066][ T5264] [ 232.271841][ T5264] dump_stack_lvl+0x151/0x1b7 [ 232.276356][ T5264] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 232.281648][ T5264] ? __stack_depot_save+0x36/0x480 [ 232.286601][ T5264] dump_stack+0x15/0x1e [ 232.290593][ T5264] should_fail_ex+0x3d0/0x520 [ 232.295194][ T5264] __should_failslab+0xaf/0xf0 [ 232.299792][ T5264] should_failslab+0x9/0x20 [ 232.304127][ T5264] kmem_cache_alloc_node+0x42/0x330 [ 232.309161][ T5264] ? dup_task_struct+0x5a/0x7d0 [ 232.313852][ T5264] dup_task_struct+0x5a/0x7d0 [ 232.318376][ T5264] ? __kasan_check_write+0x14/0x20 [ 232.323310][ T5264] copy_process+0x5c3/0x3530 [ 232.327742][ T5264] ? __kasan_check_write+0x14/0x20 [ 232.332682][ T5264] ? proc_fail_nth_write+0x20b/0x290 [ 232.337806][ T5264] ? selinux_file_permission+0x2bb/0x560 [ 232.343272][ T5264] ? proc_fail_nth_read+0x210/0x210 [ 232.348304][ T5264] ? fsnotify_perm+0x6a/0x5b0 [ 232.352825][ T5264] ? idle_dummy+0x10/0x10 [ 232.356985][ T5264] ? vfs_write+0x952/0xed0 [ 232.361252][ T5264] ? __kasan_slab_free+0x11/0x20 [ 232.366026][ T5264] kernel_clone+0x229/0x890 [ 232.370353][ T5264] ? __kasan_check_write+0x14/0x20 [ 232.375385][ T5264] ? mutex_unlock+0xb2/0x260 [ 232.379814][ T5264] ? create_io_thread+0x180/0x180 [ 232.384678][ T5264] __x64_sys_clone+0x231/0x280 [ 232.389276][ T5264] ? __do_sys_vfork+0x110/0x110 [ 232.393966][ T5264] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 232.399862][ T5264] ? exit_to_user_mode_prepare+0x39/0xa0 [ 232.405335][ T5264] x64_sys_call+0x1b0/0x9a0 [ 232.409674][ T5264] do_syscall_64+0x3b/0xb0 [ 232.413924][ T5264] ? clear_bhb_loop+0x55/0xb0 [ 232.418439][ T5264] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 232.424166][ T5264] RIP: 0033:0x7ff0bdd7e819 [ 232.428422][ T5264] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 232.448207][ T5264] RSP: 002b:00007ff0beacefe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 232.456452][ T5264] RAX: ffffffffffffffda RBX: 00007ff0bdf35fa0 RCX: 00007ff0bdd7e819 [ 232.464265][ T5264] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 232.472077][ T5264] RBP: 00007ff0beacf090 R08: 0000000000000000 R09: 0000000000000000 [ 232.479886][ T5264] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 232.487697][ T5264] R13: 0000000000000000 R14: 00007ff0bdf35fa0 R15: 00007ffc3bd8b8c8 [ 232.495516][ T5264] [ 233.337407][ T5263] device veth0_vlan left promiscuous mode [ 233.385344][ T5263] device veth0_vlan entered promiscuous mode [ 233.546101][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 233.559349][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 233.599612][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 234.926808][ T5297] device syzkaller0 entered promiscuous mode [ 235.135438][ T5315] syz.2.1530[5315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.135521][ T5315] syz.2.1530[5315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.338769][ T5316] device veth0_vlan left promiscuous mode [ 235.429757][ T5316] device veth0_vlan entered promiscuous mode [ 240.951499][ T5392] syz.3.1553[5392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.951579][ T5392] syz.3.1553[5392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.124130][ T5397] device veth0_vlan left promiscuous mode [ 241.177580][ T5397] device veth0_vlan entered promiscuous mode [ 241.206072][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.230881][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.278744][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 241.780720][ T5420] syz.3.1564[5420] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.780805][ T5420] syz.3.1564[5420] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.942521][ T5425] syz.2.1566[5425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.944307][ T5420] device veth0_vlan left promiscuous mode [ 241.973267][ T5425] syz.2.1566[5425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.997534][ T5420] device veth0_vlan entered promiscuous mode [ 242.187815][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 242.206135][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 242.257585][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 242.424341][ T5432] device veth0_vlan left promiscuous mode [ 242.484671][ T5432] device veth0_vlan entered promiscuous mode [ 242.579136][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 242.602243][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 242.675511][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.249815][ T5453] syz.3.1573[5453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.249899][ T5453] syz.3.1573[5453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.409690][ T5453] device veth0_vlan left promiscuous mode [ 243.470214][ T5453] device veth0_vlan entered promiscuous mode [ 243.708066][ T5477] syz.3.1581[5477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.708157][ T5477] syz.3.1581[5477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.900597][ T5477] device veth0_vlan left promiscuous mode [ 244.053532][ T5477] device veth0_vlan entered promiscuous mode [ 244.181228][ T28] audit: type=1400 audit(1732136179.326:144): avc: denied { create } for pid=5486 comm="syz.4.1585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 245.000781][ T5518] FAULT_INJECTION: forcing a failure. [ 245.000781][ T5518] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 245.029243][ T5518] CPU: 1 PID: 5518 Comm: syz.4.1595 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 245.038900][ T5518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 245.048796][ T5518] Call Trace: [ 245.051922][ T5518] [ 245.054692][ T5518] dump_stack_lvl+0x151/0x1b7 [ 245.059211][ T5518] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 245.064502][ T5518] ? _parse_integer+0x2a/0x40 [ 245.069013][ T5518] dump_stack+0x15/0x1e [ 245.073013][ T5518] should_fail_ex+0x3d0/0x520 [ 245.077524][ T5518] should_fail+0xb/0x10 [ 245.081600][ T5518] should_fail_usercopy+0x1a/0x20 [ 245.086460][ T5518] _copy_from_user+0x1e/0xc0 [ 245.090884][ T5518] iovec_from_user+0xc7/0x320 [ 245.095399][ T5518] __import_iovec+0x70/0x430 [ 245.099831][ T5518] import_iovec+0xe5/0x120 [ 245.104079][ T5518] copy_msghdr_from_user+0x527/0x670 [ 245.109203][ T5518] ? sendmsg_copy_msghdr+0x70/0x70 [ 245.114151][ T5518] __sys_sendmsg+0x236/0x390 [ 245.118574][ T5518] ? ____sys_sendmsg+0x9a0/0x9a0 [ 245.123351][ T5518] ? __kasan_check_write+0x14/0x20 [ 245.128294][ T5518] ? mutex_unlock+0xb2/0x260 [ 245.132744][ T5518] ? __kasan_check_write+0x14/0x20 [ 245.137675][ T5518] ? __ia32_sys_read+0x90/0x90 [ 245.142270][ T5518] ? debug_smp_processor_id+0x17/0x20 [ 245.147477][ T5518] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 245.153379][ T5518] __x64_sys_sendmsg+0x7f/0x90 [ 245.157981][ T5518] x64_sys_call+0x16a/0x9a0 [ 245.162316][ T5518] do_syscall_64+0x3b/0xb0 [ 245.166567][ T5518] ? clear_bhb_loop+0x55/0xb0 [ 245.171172][ T5518] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 245.176898][ T5518] RIP: 0033:0x7ff0bdd7e819 [ 245.181157][ T5518] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 245.200606][ T5518] RSP: 002b:00007ff0beacf038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 245.208838][ T5518] RAX: ffffffffffffffda RBX: 00007ff0bdf35fa0 RCX: 00007ff0bdd7e819 [ 245.216649][ T5518] RDX: 0000000000000003 RSI: 0000000020000980 RDI: 0000000000000006 [ 245.224466][ T5518] RBP: 00007ff0beacf090 R08: 0000000000000000 R09: 0000000000000000 [ 245.232272][ T5518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 245.240083][ T5518] R13: 0000000000000000 R14: 00007ff0bdf35fa0 R15: 00007ffc3bd8b8c8 [ 245.247905][ T5518] [ 245.624056][ T5522] device veth0_vlan left promiscuous mode [ 245.663030][ T5522] device veth0_vlan entered promiscuous mode [ 251.203661][ T5664] bpf_get_probe_write_proto: 4 callbacks suppressed [ 251.203713][ T5664] syz.0.1637[5664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.287999][ T5664] syz.0.1637[5664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.401918][ T5664] device veth0_vlan left promiscuous mode [ 251.457262][ T5664] device veth0_vlan entered promiscuous mode [ 254.974316][ T5747] device pim6reg1 entered promiscuous mode [ 256.781267][ T5798] device pim6reg1 entered promiscuous mode [ 256.889414][ T5810] device pim6reg1 entered promiscuous mode [ 257.606723][ T5855] syz.3.1713[5855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.606794][ T5855] syz.3.1713[5855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.635703][ T5865] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 258.114504][ T5897] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 258.190160][ T5897] device syzkaller0 entered promiscuous mode [ 260.201817][ T5940] syz.1.1743[5940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.201895][ T5940] syz.1.1743[5940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.456482][ T5940] device veth0_vlan left promiscuous mode [ 260.477883][ T5940] device veth0_vlan entered promiscuous mode [ 260.516872][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.527937][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 260.535328][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 263.292747][ T5994] syz.1.1759[5994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.292826][ T5994] syz.1.1759[5994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.494619][ T5994] device veth0_vlan left promiscuous mode [ 263.579707][ T5994] device veth0_vlan entered promiscuous mode [ 263.591329][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 263.599657][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 263.617924][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 263.678947][ T6007] syz.0.1763[6007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.679020][ T6007] syz.0.1763[6007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.812240][ T6009] syz.2.1765[6009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.838353][ T6009] syz.2.1765[6009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.881463][ T6007] device veth0_vlan left promiscuous mode [ 263.912159][ T6007] device veth0_vlan entered promiscuous mode [ 264.075535][ T6009] device veth0_vlan left promiscuous mode [ 264.092289][ T6009] device veth0_vlan entered promiscuous mode [ 264.141647][ T6021] syz.0.1767[6021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.141723][ T6021] syz.0.1767[6021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.285829][ T6028] device veth0_vlan left promiscuous mode [ 264.319082][ T6028] device veth0_vlan entered promiscuous mode [ 264.703344][ T6038] device syzkaller0 entered promiscuous mode [ 265.877533][ T6062] syz.3.1780[6062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.877614][ T6062] syz.3.1780[6062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.421503][ T6062] device veth0_vlan left promiscuous mode [ 266.443191][ T6062] device veth0_vlan entered promiscuous mode [ 270.819974][ T6180] FAULT_INJECTION: forcing a failure. [ 270.819974][ T6180] name failslab, interval 1, probability 0, space 0, times 0 [ 270.876495][ T6180] CPU: 0 PID: 6180 Comm: syz.0.1814 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 270.886230][ T6180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 270.896132][ T6180] Call Trace: [ 270.899247][ T6180] [ 270.902020][ T6180] dump_stack_lvl+0x151/0x1b7 [ 270.906539][ T6180] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 270.911831][ T6180] ? debug_smp_processor_id+0x17/0x20 [ 270.917055][ T6180] ? get_perf_callchain+0x5cb/0x810 [ 270.922071][ T6180] dump_stack+0x15/0x1e [ 270.926062][ T6180] should_fail_ex+0x3d0/0x520 [ 270.930577][ T6180] __should_failslab+0xaf/0xf0 [ 270.935179][ T6180] ? __get_vm_area_node+0x129/0x370 [ 270.940213][ T6180] should_failslab+0x9/0x20 [ 270.944556][ T6180] __kmem_cache_alloc_node+0x3d/0x2a0 [ 270.949762][ T6180] ? __get_vm_area_node+0x129/0x370 [ 270.954799][ T6180] kmalloc_node_trace+0x26/0xb0 [ 270.959500][ T6180] __get_vm_area_node+0x129/0x370 [ 270.964342][ T6180] __vmalloc_node_range+0x338/0x1560 [ 270.969463][ T6180] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 270.974844][ T6180] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 270.980484][ T6180] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 270.986478][ T6180] ? selinux_capable+0x2f1/0x430 [ 270.991258][ T6180] ? vmap+0x2b0/0x2b0 [ 270.995066][ T6180] ? selinux_capset+0xf0/0xf0 [ 270.999580][ T6180] ? avc_has_perm_noaudit+0x348/0x430 [ 271.004792][ T6180] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 271.010167][ T6180] __vmalloc+0x7a/0x90 [ 271.014076][ T6180] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 271.019459][ T6180] bpf_prog_alloc_no_stats+0x3e/0x400 [ 271.024661][ T6180] ? security_capable+0x87/0xb0 [ 271.029353][ T6180] bpf_prog_alloc+0x22/0x1c0 [ 271.033781][ T6180] bpf_prog_load+0x84a/0x1bf0 [ 271.038292][ T6180] ? map_freeze+0x3a0/0x3a0 [ 271.042634][ T6180] ? selinux_bpf+0xcb/0x100 [ 271.046968][ T6180] ? security_bpf+0x82/0xb0 [ 271.051310][ T6180] __sys_bpf+0x52c/0x7f0 [ 271.055392][ T6180] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 271.060600][ T6180] ? __ia32_sys_read+0x90/0x90 [ 271.065197][ T6180] ? debug_smp_processor_id+0x17/0x20 [ 271.070401][ T6180] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 271.076308][ T6180] __x64_sys_bpf+0x7c/0x90 [ 271.080557][ T6180] x64_sys_call+0x87f/0x9a0 [ 271.084895][ T6180] do_syscall_64+0x3b/0xb0 [ 271.089148][ T6180] ? clear_bhb_loop+0x55/0xb0 [ 271.093662][ T6180] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 271.099394][ T6180] RIP: 0033:0x7f6b2f57e819 [ 271.103644][ T6180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 271.123176][ T6180] RSP: 002b:00007f6b303be038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 271.131418][ T6180] RAX: ffffffffffffffda RBX: 00007f6b2f735fa0 RCX: 00007f6b2f57e819 [ 271.139233][ T6180] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 271.147043][ T6180] RBP: 00007f6b303be090 R08: 0000000000000000 R09: 0000000000000000 [ 271.154851][ T6180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 271.162662][ T6180] R13: 0000000000000000 R14: 00007f6b2f735fa0 R15: 00007ffd7cf918b8 [ 271.170486][ T6180] [ 271.220809][ T6180] syz.0.1814: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 271.240661][ T6180] CPU: 0 PID: 6180 Comm: syz.0.1814 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 271.250300][ T6180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 271.260190][ T6180] Call Trace: [ 271.263317][ T6180] [ 271.266090][ T6180] dump_stack_lvl+0x151/0x1b7 [ 271.270607][ T6180] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 271.275900][ T6180] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 271.281544][ T6180] dump_stack+0x15/0x1e [ 271.285535][ T6180] warn_alloc+0x21a/0x3a0 [ 271.289697][ T6180] ? should_failslab+0x9/0x20 [ 271.294215][ T6180] ? zone_watermark_ok_safe+0x270/0x270 [ 271.299605][ T6180] ? kmalloc_node_trace+0x3d/0xb0 [ 271.304459][ T6180] ? __get_vm_area_node+0x361/0x370 [ 271.309495][ T6180] __vmalloc_node_range+0x35c/0x1560 [ 271.314614][ T6180] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 271.320254][ T6180] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 271.326250][ T6180] ? selinux_capable+0x2f1/0x430 [ 271.331016][ T6180] ? vmap+0x2b0/0x2b0 [ 271.334833][ T6180] ? selinux_capset+0xf0/0xf0 [ 271.339352][ T6180] ? avc_has_perm_noaudit+0x348/0x430 [ 271.344557][ T6180] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 271.349939][ T6180] __vmalloc+0x7a/0x90 [ 271.353882][ T6180] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 271.359227][ T6180] bpf_prog_alloc_no_stats+0x3e/0x400 [ 271.364430][ T6180] ? security_capable+0x87/0xb0 [ 271.369124][ T6180] bpf_prog_alloc+0x22/0x1c0 [ 271.373545][ T6180] bpf_prog_load+0x84a/0x1bf0 [ 271.378062][ T6180] ? map_freeze+0x3a0/0x3a0 [ 271.382402][ T6180] ? selinux_bpf+0xcb/0x100 [ 271.386735][ T6180] ? security_bpf+0x82/0xb0 [ 271.391078][ T6180] __sys_bpf+0x52c/0x7f0 [ 271.395156][ T6180] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 271.400371][ T6180] ? __ia32_sys_read+0x90/0x90 [ 271.404965][ T6180] ? debug_smp_processor_id+0x17/0x20 [ 271.410173][ T6180] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 271.416074][ T6180] __x64_sys_bpf+0x7c/0x90 [ 271.420325][ T6180] x64_sys_call+0x87f/0x9a0 [ 271.424663][ T6180] do_syscall_64+0x3b/0xb0 [ 271.428917][ T6180] ? clear_bhb_loop+0x55/0xb0 [ 271.433430][ T6180] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 271.439161][ T6180] RIP: 0033:0x7f6b2f57e819 [ 271.443410][ T6180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 271.462853][ T6180] RSP: 002b:00007f6b303be038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 271.471102][ T6180] RAX: ffffffffffffffda RBX: 00007f6b2f735fa0 RCX: 00007f6b2f57e819 [ 271.478912][ T6180] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 271.486721][ T6180] RBP: 00007f6b303be090 R08: 0000000000000000 R09: 0000000000000000 [ 271.494531][ T6180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 271.502344][ T6180] R13: 0000000000000000 R14: 00007f6b2f735fa0 R15: 00007ffd7cf918b8 [ 271.510161][ T6180] [ 271.626345][ T6180] Mem-Info: [ 271.629764][ T6180] active_anon:22021 inactive_anon:0 isolated_anon:0 [ 271.629764][ T6180] active_file:25233 inactive_file:1999 isolated_file:0 [ 271.629764][ T6180] unevictable:0 dirty:376 writeback:0 [ 271.629764][ T6180] slab_reclaimable:7491 slab_unreclaimable:75894 [ 271.629764][ T6180] mapped:38981 shmem:14869 pagetables:672 [ 271.629764][ T6180] sec_pagetables:0 bounce:0 [ 271.629764][ T6180] kernel_misc_reclaimable:0 [ 271.629764][ T6180] free:1502004 free_pcp:8686 free_cma:0 [ 271.693072][ T6180] Node 0 active_anon:89584kB inactive_anon:0kB active_file:100932kB inactive_file:7996kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:155924kB dirty:1504kB writeback:0kB shmem:60976kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4396kB pagetables:2588kB sec_pagetables:0kB all_unreclaimable? no [ 271.727528][ T6180] DMA32 free:2966484kB boost:0kB min:62552kB low:78188kB high:93824kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2971552kB mlocked:0kB bounce:0kB free_pcp:5068kB local_pcp:0kB free_cma:0kB [ 271.756103][ T6180] lowmem_reserve[]: 0 3932 3932 3932 [ 271.812341][ T6180] Normal free:3041028kB boost:0kB min:84900kB low:106124kB high:127348kB reserved_highatomic:0KB active_anon:93896kB inactive_anon:0kB active_file:100932kB inactive_file:7996kB unevictable:0kB writepending:1508kB present:5242880kB managed:4026400kB mlocked:0kB bounce:0kB free_pcp:25088kB local_pcp:8080kB free_cma:0kB [ 272.236540][ T6180] lowmem_reserve[]: 0 0 0 0 [ 272.241020][ T6180] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 722*4096kB (M) = 2966484kB [ 272.321608][ T6180] Normal: 464*4kB (UM) 556*8kB (UE) 224*16kB (UE) 608*32kB (UME) 458*64kB (UME) 149*128kB (UME) 94*256kB (ME) 41*512kB (UME) 10*1024kB (ME) 3*2048kB (UME) 706*4096kB (UM) = 3030944kB [ 272.368370][ T6180] 46641 total pagecache pages [ 272.381879][ T6180] 0 pages in swap cache [ 272.404335][ T6180] Free swap = 124996kB [ 272.413919][ T6180] Total swap = 124996kB [ 272.422262][ T6180] 2097051 pages RAM [ 272.425940][ T6180] 0 pages HighMem/MovableOnly [ 272.430866][ T6180] 347563 pages reserved [ 272.435091][ T6180] 0 pages cma reserved [ 272.470128][ T6217] syz.3.1824[6217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.470198][ T6217] syz.3.1824[6217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.691073][ T6224] device veth0_vlan left promiscuous mode [ 272.837013][ T6224] device veth0_vlan entered promiscuous mode [ 272.911386][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.914777][ T6236] syz.4.1829[6236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.937090][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.946589][ T6236] syz.4.1829[6236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.009434][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 273.225651][ T6235] device veth0_vlan left promiscuous mode [ 273.358051][ T6235] device veth0_vlan entered promiscuous mode [ 278.974707][ T6415] syz.4.1883[6415] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.974784][ T6415] syz.4.1883[6415] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.252370][ T6422] device veth0_vlan left promiscuous mode [ 279.410358][ T6422] device veth0_vlan entered promiscuous mode [ 279.555941][ T6428] device pim6reg1 entered promiscuous mode [ 281.700425][ T6493] syz.3.1907[6493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.700504][ T6493] syz.3.1907[6493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.972001][ T6493] device veth0_vlan left promiscuous mode [ 282.127775][ T6493] device veth0_vlan entered promiscuous mode [ 282.266467][ T5525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 282.307264][ T5525] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 282.343421][ T5525] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 282.556790][ T6514] device veth1_macvtap left promiscuous mode [ 282.779211][ T28] audit: type=1400 audit(1732136217.926:145): avc: denied { create } for pid=6519 comm="syz.4.1916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 284.975761][ T6613] FAULT_INJECTION: forcing a failure. [ 284.975761][ T6613] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 285.152240][ T6613] CPU: 1 PID: 6613 Comm: syz.0.1948 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 285.161894][ T6613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 285.171783][ T6613] Call Trace: [ 285.174903][ T6613] [ 285.177684][ T6613] dump_stack_lvl+0x151/0x1b7 [ 285.182200][ T6613] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 285.187495][ T6613] dump_stack+0x15/0x1e [ 285.191485][ T6613] should_fail_ex+0x3d0/0x520 [ 285.196001][ T6613] should_fail+0xb/0x10 [ 285.199998][ T6613] should_fail_usercopy+0x1a/0x20 [ 285.204847][ T6613] _copy_from_user+0x1e/0xc0 [ 285.209279][ T6613] generic_map_update_batch+0x4d9/0x8c0 [ 285.214661][ T6613] ? generic_map_delete_batch+0x5c0/0x5c0 [ 285.220212][ T6613] ? generic_map_delete_batch+0x5c0/0x5c0 [ 285.225767][ T6613] bpf_map_do_batch+0x4cc/0x630 [ 285.230453][ T6613] __sys_bpf+0x66b/0x7f0 [ 285.234704][ T6613] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 285.239918][ T6613] ? __ia32_sys_read+0x90/0x90 [ 285.244512][ T6613] ? debug_smp_processor_id+0x17/0x20 [ 285.249719][ T6613] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 285.255620][ T6613] __x64_sys_bpf+0x7c/0x90 [ 285.259887][ T6613] x64_sys_call+0x87f/0x9a0 [ 285.264214][ T6613] do_syscall_64+0x3b/0xb0 [ 285.268466][ T6613] ? clear_bhb_loop+0x55/0xb0 [ 285.272987][ T6613] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 285.278708][ T6613] RIP: 0033:0x7f6b2f57e819 [ 285.283048][ T6613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 285.302491][ T6613] RSP: 002b:00007f6b303be038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 285.310736][ T6613] RAX: ffffffffffffffda RBX: 00007f6b2f735fa0 RCX: 00007f6b2f57e819 [ 285.318547][ T6613] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 285.326442][ T6613] RBP: 00007f6b303be090 R08: 0000000000000000 R09: 0000000000000000 [ 285.334254][ T6613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 285.342067][ T6613] R13: 0000000000000000 R14: 00007f6b2f735fa0 R15: 00007ffd7cf918b8 [ 285.349904][ T6613] [ 285.468582][ T6623] device veth1_macvtap entered promiscuous mode [ 285.479224][ T6623] device macsec0 entered promiscuous mode [ 285.497110][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 286.492453][ T6661] FAULT_INJECTION: forcing a failure. [ 286.492453][ T6661] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 286.506111][ T6661] CPU: 0 PID: 6661 Comm: syz.0.1962 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 286.515745][ T6661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 286.525641][ T6661] Call Trace: [ 286.528763][ T6661] [ 286.531542][ T6661] dump_stack_lvl+0x151/0x1b7 [ 286.536058][ T6661] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 286.541351][ T6661] ? vfs_write+0x952/0xed0 [ 286.545603][ T6661] ? __kasan_slab_free+0x11/0x20 [ 286.550376][ T6661] dump_stack+0x15/0x1e [ 286.554492][ T6661] should_fail_ex+0x3d0/0x520 [ 286.559016][ T6661] should_fail+0xb/0x10 [ 286.562997][ T6661] should_fail_usercopy+0x1a/0x20 [ 286.567849][ T6661] _copy_from_user+0x1e/0xc0 [ 286.572273][ T6661] __sys_bpf+0x23b/0x7f0 [ 286.576355][ T6661] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 286.581565][ T6661] ? __ia32_sys_read+0x90/0x90 [ 286.586168][ T6661] ? debug_smp_processor_id+0x17/0x20 [ 286.591369][ T6661] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 286.597272][ T6661] __x64_sys_bpf+0x7c/0x90 [ 286.601528][ T6661] x64_sys_call+0x87f/0x9a0 [ 286.605881][ T6661] do_syscall_64+0x3b/0xb0 [ 286.610115][ T6661] ? clear_bhb_loop+0x55/0xb0 [ 286.614628][ T6661] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 286.620360][ T6661] RIP: 0033:0x7f6b2f57e819 [ 286.624616][ T6661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 286.644055][ T6661] RSP: 002b:00007f6b303be038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 286.652298][ T6661] RAX: ffffffffffffffda RBX: 00007f6b2f735fa0 RCX: 00007f6b2f57e819 [ 286.660110][ T6661] RDX: 0000000000000069 RSI: 00000000200002c0 RDI: 000000000000000a [ 286.667923][ T6661] RBP: 00007f6b303be090 R08: 0000000000000000 R09: 0000000000000000 [ 286.675727][ T6661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 286.683546][ T6661] R13: 0000000000000000 R14: 00007f6b2f735fa0 R15: 00007ffd7cf918b8 [ 286.691368][ T6661] [ 289.187333][ T6734] syz.0.1985[6734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.187426][ T6734] syz.0.1985[6734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.365114][ T6737] device veth0_vlan left promiscuous mode [ 289.462200][ T6737] device veth0_vlan entered promiscuous mode [ 289.529735][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 289.560930][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 289.568735][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 290.308885][ T6757] syz.1.1991[6757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.308973][ T6757] syz.1.1991[6757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.461481][ T6757] device veth0_vlan left promiscuous mode [ 290.485805][ T6757] device veth0_vlan entered promiscuous mode [ 290.628620][ T6762] syz.2.1993[6762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.628703][ T6762] syz.2.1993[6762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.810611][ T6762] device veth0_vlan left promiscuous mode [ 290.867143][ T6762] device veth0_vlan entered promiscuous mode [ 290.958954][ T28] audit: type=1400 audit(1732136226.106:146): avc: denied { create } for pid=6778 comm="syz.3.2000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 291.026782][ T6777] syz.1.1997[6777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.026858][ T6777] syz.1.1997[6777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.327372][ T6777] device veth0_vlan left promiscuous mode [ 291.346002][ T6777] device veth0_vlan entered promiscuous mode [ 291.358792][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 291.369127][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 291.378253][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 297.360393][ T6941] device syzkaller0 entered promiscuous mode [ 297.636751][ T28] audit: type=1400 audit(1732136232.786:147): avc: denied { create } for pid=6946 comm="syz.1.2050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 297.740258][ T6949] FAULT_INJECTION: forcing a failure. [ 297.740258][ T6949] name failslab, interval 1, probability 0, space 0, times 0 [ 297.745243][ T28] audit: type=1400 audit(1732136232.846:148): avc: denied { create } for pid=6946 comm="syz.1.2050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 297.856258][ T6949] CPU: 0 PID: 6949 Comm: syz.4.2051 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 297.865908][ T6949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 297.875806][ T6949] Call Trace: [ 297.878921][ T6949] [ 297.881707][ T6949] dump_stack_lvl+0x151/0x1b7 [ 297.886223][ T6949] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 297.891513][ T6949] ? _parse_integer+0x2a/0x40 [ 297.896026][ T6949] ? kstrtoull+0x1cd/0x2e0 [ 297.900276][ T6949] dump_stack+0x15/0x1e [ 297.904268][ T6949] should_fail_ex+0x3d0/0x520 [ 297.908897][ T6949] __should_failslab+0xaf/0xf0 [ 297.913492][ T6949] ? bpf_test_init+0xf1/0x190 [ 297.918003][ T6949] should_failslab+0x9/0x20 [ 297.922344][ T6949] __kmem_cache_alloc_node+0x3d/0x2a0 [ 297.927556][ T6949] ? bpf_test_init+0xf1/0x190 [ 297.932062][ T6949] __kmalloc+0xa3/0x1e0 [ 297.936071][ T6949] bpf_test_init+0xf1/0x190 [ 297.940403][ T6949] bpf_prog_test_run_xdp+0x414/0x1130 [ 297.945608][ T6949] ? avc_denied+0x1b0/0x1b0 [ 297.949949][ T6949] ? dev_put+0x80/0x80 [ 297.953859][ T6949] ? __kasan_check_write+0x14/0x20 [ 297.958794][ T6949] ? fput+0x15b/0x1b0 [ 297.962615][ T6949] ? dev_put+0x80/0x80 [ 297.966522][ T6949] bpf_prog_test_run+0x3b0/0x630 [ 297.971297][ T6949] ? bpf_prog_query+0x260/0x260 [ 297.975984][ T6949] ? selinux_bpf+0xd2/0x100 [ 297.980321][ T6949] ? security_bpf+0x82/0xb0 [ 297.984664][ T6949] __sys_bpf+0x59f/0x7f0 [ 297.988740][ T6949] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 297.993955][ T6949] ? __ia32_sys_read+0x90/0x90 [ 297.998553][ T6949] ? debug_smp_processor_id+0x17/0x20 [ 298.003756][ T6949] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 298.009658][ T6949] __x64_sys_bpf+0x7c/0x90 [ 298.013912][ T6949] x64_sys_call+0x87f/0x9a0 [ 298.018252][ T6949] do_syscall_64+0x3b/0xb0 [ 298.022505][ T6949] ? clear_bhb_loop+0x55/0xb0 [ 298.027016][ T6949] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 298.032744][ T6949] RIP: 0033:0x7ff0bdd7e819 [ 298.037000][ T6949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 298.056524][ T6949] RSP: 002b:00007ff0beacf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 298.064772][ T6949] RAX: ffffffffffffffda RBX: 00007ff0bdf35fa0 RCX: 00007ff0bdd7e819 [ 298.072584][ T6949] RDX: 0000000000000069 RSI: 00000000200002c0 RDI: 000000000000000a [ 298.080391][ T6949] RBP: 00007ff0beacf090 R08: 0000000000000000 R09: 0000000000000000 [ 298.088205][ T6949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 298.096015][ T6949] R13: 0000000000000000 R14: 00007ff0bdf35fa0 R15: 00007ffc3bd8b8c8 [ 298.103837][ T6949] [ 298.164966][ T6951] device sit0 entered promiscuous mode [ 298.172884][ T6953] syz.0.2053[6953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.172981][ T6953] syz.0.2053[6953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.332795][ T6953] syz.0.2053[6953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.462124][ T6953] syz.0.2053[6953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.829698][ T6986] device wg2 entered promiscuous mode [ 301.844197][ T7053] device sit0 left promiscuous mode [ 302.040160][ T7051] device sit0 entered promiscuous mode [ 305.232826][ T7156] device veth0_vlan left promiscuous mode [ 305.254286][ T7156] device veth0_vlan entered promiscuous mode [ 306.794131][ T7207] syz.2.2135[7207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.794208][ T7207] syz.2.2135[7207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.923319][ T7207] device veth0_vlan left promiscuous mode [ 306.999530][ T7207] device veth0_vlan entered promiscuous mode [ 307.217366][ T471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 307.247035][ T471] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 307.302414][ T471] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 307.530218][ T7229] device sit0 entered promiscuous mode [ 308.960877][ T7270] FAULT_INJECTION: forcing a failure. [ 308.960877][ T7270] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 309.153856][ T7270] CPU: 0 PID: 7270 Comm: syz.2.2152 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 309.163507][ T7270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 309.173397][ T7270] Call Trace: [ 309.176607][ T7270] [ 309.179387][ T7270] dump_stack_lvl+0x151/0x1b7 [ 309.183901][ T7270] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 309.189200][ T7270] dump_stack+0x15/0x1e [ 309.193186][ T7270] should_fail_ex+0x3d0/0x520 [ 309.197704][ T7270] should_fail+0xb/0x10 [ 309.201691][ T7270] should_fail_usercopy+0x1a/0x20 [ 309.206555][ T7270] _copy_from_user+0x1e/0xc0 [ 309.210979][ T7270] bpf_test_init+0x12e/0x190 [ 309.215522][ T7270] bpf_prog_test_run_xdp+0x414/0x1130 [ 309.220728][ T7270] ? avc_denied+0x1b0/0x1b0 [ 309.225079][ T7270] ? dev_put+0x80/0x80 [ 309.228979][ T7270] ? __kasan_check_write+0x14/0x20 [ 309.233920][ T7270] ? fput+0x15b/0x1b0 [ 309.237742][ T7270] ? dev_put+0x80/0x80 [ 309.241647][ T7270] bpf_prog_test_run+0x3b0/0x630 [ 309.246422][ T7270] ? bpf_prog_query+0x260/0x260 [ 309.251109][ T7270] ? selinux_bpf+0xd2/0x100 [ 309.255449][ T7270] ? security_bpf+0x82/0xb0 [ 309.259790][ T7270] __sys_bpf+0x59f/0x7f0 [ 309.263866][ T7270] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 309.269078][ T7270] ? __ia32_sys_read+0x90/0x90 [ 309.273676][ T7270] ? debug_smp_processor_id+0x17/0x20 [ 309.278883][ T7270] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 309.284785][ T7270] __x64_sys_bpf+0x7c/0x90 [ 309.289040][ T7270] x64_sys_call+0x87f/0x9a0 [ 309.293377][ T7270] do_syscall_64+0x3b/0xb0 [ 309.297628][ T7270] ? clear_bhb_loop+0x55/0xb0 [ 309.302141][ T7270] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 309.307871][ T7270] RIP: 0033:0x7f505f37e819 [ 309.312128][ T7270] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 309.331564][ T7270] RSP: 002b:00007f5060203038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 309.339810][ T7270] RAX: ffffffffffffffda RBX: 00007f505f535fa0 RCX: 00007f505f37e819 [ 309.347623][ T7270] RDX: 0000000000000069 RSI: 00000000200002c0 RDI: 000000000000000a [ 309.355435][ T7270] RBP: 00007f5060203090 R08: 0000000000000000 R09: 0000000000000000 [ 309.363246][ T7270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 309.371054][ T7270] R13: 0000000000000000 R14: 00007f505f535fa0 R15: 00007ffce9ea3d78 [ 309.378959][ T7270] [ 313.088937][ T7357] syz.3.2177[7357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.089024][ T7357] syz.3.2177[7357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.235890][ T7357] device veth0_vlan left promiscuous mode [ 313.323175][ T7357] device veth0_vlan entered promiscuous mode [ 313.379119][ T7366] device syzkaller0 entered promiscuous mode [ 313.709557][ T7380] device sit0 entered promiscuous mode [ 314.633767][ T7435] FAULT_INJECTION: forcing a failure. [ 314.633767][ T7435] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 314.680293][ T7435] CPU: 0 PID: 7435 Comm: syz.3.2206 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 314.689939][ T7435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 314.699836][ T7435] Call Trace: [ 314.702956][ T7435] [ 314.705768][ T7435] dump_stack_lvl+0x151/0x1b7 [ 314.710339][ T7435] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 314.715667][ T7435] ? __alloc_pages+0x234/0x610 [ 314.720399][ T7435] dump_stack+0x15/0x1e [ 314.724376][ T7435] should_fail_ex+0x3d0/0x520 [ 314.729859][ T7435] should_fail+0xb/0x10 [ 314.733858][ T7435] should_fail_usercopy+0x1a/0x20 [ 314.738710][ T7435] copyin+0x1e/0x90 [ 314.742359][ T7435] _copy_from_iter+0x3c9/0xe00 [ 314.746963][ T7435] ? copyout_mc+0x80/0x80 [ 314.751126][ T7435] ? copyout_mc+0x80/0x80 [ 314.755291][ T7435] copy_page_from_iter+0x1d7/0x2b0 [ 314.760243][ T7435] skb_copy_datagram_from_iter+0x2f3/0x6d0 [ 314.765884][ T7435] unix_stream_sendmsg+0x78f/0x1070 [ 314.770921][ T7435] ? unix_show_fdinfo+0x2f0/0x2f0 [ 314.775780][ T7435] ? security_socket_sendmsg+0x82/0xb0 [ 314.781068][ T7435] ? unix_show_fdinfo+0x2f0/0x2f0 [ 314.785926][ T7435] ____sys_sendmsg+0x5d3/0x9a0 [ 314.790529][ T7435] ? __sys_sendmsg_sock+0x40/0x40 [ 314.795394][ T7435] __sys_sendmsg+0x2a9/0x390 [ 314.799818][ T7435] ? ____sys_sendmsg+0x9a0/0x9a0 [ 314.804599][ T7435] ? __kasan_check_write+0x14/0x20 [ 314.809533][ T7435] ? mutex_unlock+0xb2/0x260 [ 314.813970][ T7435] ? __kasan_check_write+0x14/0x20 [ 314.818923][ T7435] ? __ia32_sys_read+0x90/0x90 [ 314.823512][ T7435] ? debug_smp_processor_id+0x17/0x20 [ 314.828713][ T7435] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 314.834616][ T7435] __x64_sys_sendmsg+0x7f/0x90 [ 314.839222][ T7435] x64_sys_call+0x16a/0x9a0 [ 314.843558][ T7435] do_syscall_64+0x3b/0xb0 [ 314.847809][ T7435] ? clear_bhb_loop+0x55/0xb0 [ 314.852325][ T7435] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 314.858052][ T7435] RIP: 0033:0x7fe876f7e819 [ 314.862305][ T7435] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 314.881745][ T7435] RSP: 002b:00007fe877d5e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 314.889990][ T7435] RAX: ffffffffffffffda RBX: 00007fe877135fa0 RCX: 00007fe876f7e819 [ 314.897806][ T7435] RDX: 0000000000000003 RSI: 0000000020000980 RDI: 0000000000000006 [ 314.905612][ T7435] RBP: 00007fe877d5e090 R08: 0000000000000000 R09: 0000000000000000 [ 314.913427][ T7435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 314.921242][ T7435] R13: 0000000000000000 R14: 00007fe877135fa0 R15: 00007ffcc736f8f8 [ 314.929055][ T7435] [ 317.122876][ T7510] FAULT_INJECTION: forcing a failure. [ 317.122876][ T7510] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 317.148859][ T7510] CPU: 0 PID: 7510 Comm: syz.0.2234 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 317.158669][ T7510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 317.168653][ T7510] Call Trace: [ 317.171773][ T7510] [ 317.174551][ T7510] dump_stack_lvl+0x151/0x1b7 [ 317.179068][ T7510] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 317.184367][ T7510] dump_stack+0x15/0x1e [ 317.188353][ T7510] should_fail_ex+0x3d0/0x520 [ 317.192866][ T7510] should_fail+0xb/0x10 [ 317.196861][ T7510] should_fail_usercopy+0x1a/0x20 [ 317.201725][ T7510] _copy_from_user+0x1e/0xc0 [ 317.206165][ T7510] generic_map_update_batch+0x54c/0x8c0 [ 317.211532][ T7510] ? generic_map_delete_batch+0x5c0/0x5c0 [ 317.217171][ T7510] ? generic_map_delete_batch+0x5c0/0x5c0 [ 317.222734][ T7510] bpf_map_do_batch+0x4cc/0x630 [ 317.227413][ T7510] __sys_bpf+0x66b/0x7f0 [ 317.231495][ T7510] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 317.236705][ T7510] ? __ia32_sys_read+0x90/0x90 [ 317.241301][ T7510] ? debug_smp_processor_id+0x17/0x20 [ 317.246505][ T7510] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 317.252510][ T7510] __x64_sys_bpf+0x7c/0x90 [ 317.256757][ T7510] x64_sys_call+0x87f/0x9a0 [ 317.261114][ T7510] do_syscall_64+0x3b/0xb0 [ 317.265348][ T7510] ? clear_bhb_loop+0x55/0xb0 [ 317.269867][ T7510] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 317.275591][ T7510] RIP: 0033:0x7f6b2f57e819 [ 317.279945][ T7510] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 317.299390][ T7510] RSP: 002b:00007f6b303be038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 317.307629][ T7510] RAX: ffffffffffffffda RBX: 00007f6b2f735fa0 RCX: 00007f6b2f57e819 [ 317.315438][ T7510] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 317.323249][ T7510] RBP: 00007f6b303be090 R08: 0000000000000000 R09: 0000000000000000 [ 317.331060][ T7510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 317.338974][ T7510] R13: 0000000000000000 R14: 00007f6b2f735fa0 R15: 00007ffd7cf918b8 [ 317.346780][ T7510] [ 318.014007][ T7546] device wg2 left promiscuous mode [ 320.492085][ T7604] device pim6reg1 entered promiscuous mode [ 321.580731][ T7641] device veth0_vlan left promiscuous mode [ 321.662489][ T7641] device veth0_vlan entered promiscuous mode [ 326.639045][ T7775] bond_slave_1: mtu less than device minimum [ 328.577936][ T7818] FAULT_INJECTION: forcing a failure. [ 328.577936][ T7818] name failslab, interval 1, probability 0, space 0, times 0 [ 328.679987][ T7818] CPU: 1 PID: 7818 Comm: syz.2.2328 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 328.689635][ T7818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 328.699523][ T7818] Call Trace: [ 328.702647][ T7818] [ 328.705426][ T7818] dump_stack_lvl+0x151/0x1b7 [ 328.709935][ T7818] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 328.715235][ T7818] dump_stack+0x15/0x1e [ 328.719223][ T7818] should_fail_ex+0x3d0/0x520 [ 328.723738][ T7818] __should_failslab+0xaf/0xf0 [ 328.728334][ T7818] ? kvmalloc_node+0x221/0x640 [ 328.732948][ T7818] should_failslab+0x9/0x20 [ 328.737276][ T7818] __kmem_cache_alloc_node+0x3d/0x2a0 [ 328.742480][ T7818] ? kasan_save_alloc_info+0x1f/0x30 [ 328.747602][ T7818] ? kvmalloc_node+0x221/0x640 [ 328.752203][ T7818] __kmalloc_node+0xa3/0x1e0 [ 328.756630][ T7818] ? is_bpf_text_address+0x172/0x190 [ 328.761755][ T7818] kvmalloc_node+0x221/0x640 [ 328.766179][ T7818] ? __kernel_text_address+0xd/0x40 [ 328.771223][ T7818] ? vm_mmap+0xb0/0xb0 [ 328.775114][ T7818] ? arch_stack_walk+0xf3/0x140 [ 328.779798][ T7818] ? bpf_test_run_xdp_live+0xd0/0x1f70 [ 328.785096][ T7818] bpf_test_run_xdp_live+0x286/0x1f70 [ 328.790580][ T7818] ? stack_trace_snprint+0xf0/0xf0 [ 328.795506][ T7818] ? __stack_depot_save+0x36/0x480 [ 328.800453][ T7818] ? kasan_set_track+0x60/0x70 [ 328.805050][ T7818] ? kasan_set_track+0x4b/0x70 [ 328.809650][ T7818] ? kasan_save_alloc_info+0x1f/0x30 [ 328.814769][ T7818] ? __kasan_kmalloc+0x9c/0xb0 [ 328.819371][ T7818] ? __kmalloc+0xb4/0x1e0 [ 328.823536][ T7818] ? bpf_prog_test_run_xdp+0x414/0x1130 [ 328.828927][ T7818] ? xdp_convert_md_to_buff+0x360/0x360 [ 328.834306][ T7818] ? x64_sys_call+0x87f/0x9a0 [ 328.838814][ T7818] ? do_syscall_64+0x3b/0xb0 [ 328.843246][ T7818] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 328.849150][ T7818] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 328.855221][ T7818] ? __kasan_check_write+0x14/0x20 [ 328.860165][ T7818] ? _copy_from_user+0x90/0xc0 [ 328.864778][ T7818] ? bpf_test_init+0x169/0x190 [ 328.869368][ T7818] ? xdp_convert_md_to_buff+0x5d/0x360 [ 328.874661][ T7818] bpf_prog_test_run_xdp+0x7d1/0x1130 [ 328.879874][ T7818] ? dev_put+0x80/0x80 [ 328.883777][ T7818] ? __kasan_check_write+0x14/0x20 [ 328.888722][ T7818] ? fput+0x15b/0x1b0 [ 328.892538][ T7818] ? dev_put+0x80/0x80 [ 328.896449][ T7818] bpf_prog_test_run+0x3b0/0x630 [ 328.901222][ T7818] ? bpf_prog_query+0x260/0x260 [ 328.905916][ T7818] ? selinux_bpf+0xd2/0x100 [ 328.910255][ T7818] ? security_bpf+0x82/0xb0 [ 328.914591][ T7818] __sys_bpf+0x59f/0x7f0 [ 328.918666][ T7818] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 328.923879][ T7818] ? __ia32_sys_read+0x90/0x90 [ 328.928478][ T7818] ? debug_smp_processor_id+0x17/0x20 [ 328.933695][ T7818] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 328.939686][ T7818] __x64_sys_bpf+0x7c/0x90 [ 328.944067][ T7818] x64_sys_call+0x87f/0x9a0 [ 328.948403][ T7818] do_syscall_64+0x3b/0xb0 [ 328.952663][ T7818] ? clear_bhb_loop+0x55/0xb0 [ 328.957173][ T7818] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 328.962980][ T7818] RIP: 0033:0x7f505f37e819 [ 328.967392][ T7818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 328.986833][ T7818] RSP: 002b:00007f5060203038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 328.995080][ T7818] RAX: ffffffffffffffda RBX: 00007f505f535fa0 RCX: 00007f505f37e819 [ 329.002896][ T7818] RDX: 0000000000000069 RSI: 00000000200002c0 RDI: 000000000000000a [ 329.010702][ T7818] RBP: 00007f5060203090 R08: 0000000000000000 R09: 0000000000000000 [ 329.018515][ T7818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 329.026326][ T7818] R13: 0000000000000000 R14: 00007f505f535fa0 R15: 00007ffce9ea3d78 [ 329.034170][ T7818] [ 330.839057][ T7852] device veth0_vlan left promiscuous mode [ 330.974625][ T7852] device veth0_vlan entered promiscuous mode [ 331.077746][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.136855][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 331.176917][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 333.283576][ T28] audit: type=1400 audit(1732136268.426:149): avc: denied { append } for pid=7904 comm="syz.2.2356" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 333.974274][ T7923] syz.3.2361[7923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.974351][ T7923] syz.3.2361[7923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.292742][ T7933] device veth0_vlan left promiscuous mode [ 334.411328][ T7933] device veth0_vlan entered promiscuous mode [ 336.230893][ T7986] syz.4.2382[7986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.230959][ T7986] syz.4.2382[7986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.391778][ T7986] device veth0_vlan left promiscuous mode [ 336.417456][ T7986] device veth0_vlan entered promiscuous mode [ 336.456466][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 336.474606][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 336.483286][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 338.578170][ T8040] syz.3.2400[8040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.578259][ T8040] syz.3.2400[8040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.856683][ T8043] device veth0_vlan left promiscuous mode [ 338.999342][ T8043] device veth0_vlan entered promiscuous mode [ 339.066526][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 339.079294][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 339.111313][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 339.348804][ T8053] device pim6reg1 entered promiscuous mode [ 340.794903][ T8120] device syzkaller0 entered promiscuous mode [ 341.158694][ T8129] FAULT_INJECTION: forcing a failure. [ 341.158694][ T8129] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 341.296561][ T8129] CPU: 0 PID: 8129 Comm: syz.3.2431 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 341.306208][ T8129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 341.316103][ T8129] Call Trace: [ 341.319223][ T8129] [ 341.322001][ T8129] dump_stack_lvl+0x151/0x1b7 [ 341.326516][ T8129] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 341.331808][ T8129] ? kstrtouint+0xf6/0x180 [ 341.336100][ T8129] ? _kstrtol+0x150/0x150 [ 341.340236][ T8129] dump_stack+0x15/0x1e [ 341.344226][ T8129] should_fail_ex+0x3d0/0x520 [ 341.348736][ T8129] should_fail+0xb/0x10 [ 341.352725][ T8129] should_fail_usercopy+0x1a/0x20 [ 341.357590][ T8129] _copy_from_user+0x1e/0xc0 [ 341.362018][ T8129] copy_msghdr_from_user+0xaa/0x670 [ 341.367050][ T8129] ? sendmsg_copy_msghdr+0x70/0x70 [ 341.372002][ T8129] __sys_sendmsg+0x236/0x390 [ 341.376427][ T8129] ? ____sys_sendmsg+0x9a0/0x9a0 [ 341.381204][ T8129] ? __kasan_check_write+0x14/0x20 [ 341.386142][ T8129] ? mutex_unlock+0xb2/0x260 [ 341.390584][ T8129] ? __kasan_check_write+0x14/0x20 [ 341.395519][ T8129] ? __ia32_sys_read+0x90/0x90 [ 341.400119][ T8129] ? debug_smp_processor_id+0x17/0x20 [ 341.405328][ T8129] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 341.411227][ T8129] __x64_sys_sendmsg+0x7f/0x90 [ 341.415827][ T8129] x64_sys_call+0x16a/0x9a0 [ 341.420163][ T8129] do_syscall_64+0x3b/0xb0 [ 341.424418][ T8129] ? clear_bhb_loop+0x55/0xb0 [ 341.428930][ T8129] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 341.434662][ T8129] RIP: 0033:0x7fe876f7e819 [ 341.438931][ T8129] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 341.458356][ T8129] RSP: 002b:00007fe877d5e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 341.466600][ T8129] RAX: ffffffffffffffda RBX: 00007fe877135fa0 RCX: 00007fe876f7e819 [ 341.474414][ T8129] RDX: 0000000000000003 RSI: 0000000020000980 RDI: 0000000000000006 [ 341.482227][ T8129] RBP: 00007fe877d5e090 R08: 0000000000000000 R09: 0000000000000000 [ 341.490034][ T8129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 341.497850][ T8129] R13: 0000000000000000 R14: 00007fe877135fa0 R15: 00007ffcc736f8f8 [ 341.505668][ T8129] [ 342.761789][ T8183] device pim6reg1 entered promiscuous mode [ 343.286255][ T8205] device sit0 left promiscuous mode [ 343.561556][ T8217] syz.3.2467[8217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.561633][ T8217] syz.3.2467[8217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.644108][ T8213] syz.4.2464[8213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.729003][ T8222] device sit0 left promiscuous mode [ 343.779128][ T8213] syz.4.2464[8213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.058162][ T8229] device veth0_vlan left promiscuous mode [ 344.147456][ T8229] device veth0_vlan entered promiscuous mode [ 346.331722][ T8289] device sit0 left promiscuous mode [ 346.561662][ T8290] device sit0 entered promiscuous mode [ 350.560949][ T8416] FAULT_INJECTION: forcing a failure. [ 350.560949][ T8416] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 350.604721][ T8418] device veth0_vlan left promiscuous mode [ 350.657592][ T8418] device veth0_vlan entered promiscuous mode [ 350.698229][ T8416] CPU: 0 PID: 8416 Comm: syz.0.2530 Not tainted 6.1.112-syzkaller-00022-g5b095ade1229 #0 [ 350.707879][ T8416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 350.717774][ T8416] Call Trace: [ 350.720904][ T8416] [ 350.723672][ T8416] dump_stack_lvl+0x151/0x1b7 [ 350.728191][ T8416] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 350.733481][ T8416] ? perf_event_output_forward+0x14e/0x1b0 [ 350.739124][ T8416] ? _parse_integer+0x2a/0x40 [ 350.743639][ T8416] dump_stack+0x15/0x1e [ 350.747637][ T8416] should_fail_ex+0x3d0/0x520 [ 350.752162][ T8416] should_fail+0xb/0x10 [ 350.756133][ T8416] should_fail_usercopy+0x1a/0x20 [ 350.760994][ T8416] _copy_from_user+0x1e/0xc0 [ 350.765557][ T8416] iovec_from_user+0xc7/0x320 [ 350.770083][ T8416] __import_iovec+0x70/0x430 [ 350.774486][ T8416] ? perf_swevent_hrtimer+0x449/0x4f0 [ 350.779700][ T8416] import_iovec+0xe5/0x120 [ 350.783954][ T8416] copy_msghdr_from_user+0x527/0x670 [ 350.789073][ T8416] ? sendmsg_copy_msghdr+0x70/0x70 [ 350.794023][ T8416] __sys_sendmsg+0x236/0x390 [ 350.798533][ T8416] ? ____sys_sendmsg+0x9a0/0x9a0 [ 350.803373][ T8416] ? kvm_sched_clock_read+0x18/0x40 [ 350.808436][ T8416] ? sched_clock+0x9/0x10 [ 350.812602][ T8416] ? sched_clock_cpu+0x71/0x2b0 [ 350.817298][ T8416] ? debug_smp_processor_id+0x17/0x20 [ 350.822721][ T8416] __x64_sys_sendmsg+0x7f/0x90 [ 350.827299][ T8416] x64_sys_call+0x16a/0x9a0 [ 350.831640][ T8416] do_syscall_64+0x3b/0xb0 [ 350.835895][ T8416] ? clear_bhb_loop+0x55/0xb0 [ 350.840408][ T8416] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 350.846134][ T8416] RIP: 0033:0x7f6b2f57e819 [ 350.850384][ T8416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 350.869830][ T8416] RSP: 002b:00007f6b303be038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 350.878074][ T8416] RAX: ffffffffffffffda RBX: 00007f6b2f735fa0 RCX: 00007f6b2f57e819 [ 350.885882][ T8416] RDX: 0000000000000003 RSI: 0000000020000980 RDI: 0000000000000006 [ 350.893696][ T8416] RBP: 00007f6b303be090 R08: 0000000000000000 R09: 0000000000000000 [ 350.901506][ T8416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 350.909317][ T8416] R13: 0000000000000000 R14: 00007f6b2f735fa0 R15: 00007ffd7cf918b8 [ 350.917138][ T8416] [ 350.920987][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 350.934889][ T28] audit: type=1400 audit(1732136286.076:150): avc: denied { unlink } for pid=85 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 350.947190][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 350.964688][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 351.263833][ T8433] device wg2 entered promiscuous mode [ 353.304685][ T8494] syz.2.2555[8494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.304754][ T8494] syz.2.2555[8494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.546548][ T8497] device veth0_vlan left promiscuous mode [ 353.615085][ T8497] device veth0_vlan entered promiscuous mode [ 353.720058][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 353.731246][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 353.753381][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 354.857687][ T8535] syz.0.2570[8535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.857759][ T8535] syz.0.2570[8535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.871340][ T8537] device sit0 entered promiscuous mode [ 355.166283][ T8541] device veth0_vlan left promiscuous mode [ 355.246687][ T8541] device veth0_vlan entered promiscuous mode [ 357.200036][ T8612] device syzkaller0 entered promiscuous mode [ 357.298053][ T28] audit: type=1400 audit(1732136292.446:151): avc: denied { write } for pid=8619 comm="syz.4.2599" name="cgroup.subtree_control" dev="cgroup2" ino=373 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 357.461259][ T28] audit: type=1400 audit(1732136292.486:152): avc: denied { open } for pid=8619 comm="syz.4.2599" path="" dev="cgroup2" ino=373 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 357.485620][ T8622] tun0: tun_chr_ioctl cmd 1074025675 [ 357.514426][ T8622] tun0: persist enabled [ 361.840348][ T8744] syz.4.2640[8744] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 361.840423][ T8744] syz.4.2640[8744] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.142639][ T8750] device veth0_vlan left promiscuous mode [ 362.190862][ T8750] device veth0_vlan entered promiscuous mode [ 362.958663][ T8786] syz.4.2655[8786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.958736][ T8786] syz.4.2655[8786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.187770][ T8791] device veth0_vlan left promiscuous mode [ 363.260877][ T8791] device veth0_vlan entered promiscuous mode [ 363.801483][ T8817] device bridge0 entered promiscuous mode [ 363.836411][ T8817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 364.765690][ T8842] syz.4.2674[8842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.765773][ T8842] syz.4.2674[8842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.892707][ T8842] device veth0_vlan left promiscuous mode [ 365.008933][ T8842] device veth0_vlan entered promiscuous mode [ 365.372228][ T8870] device veth0_vlan left promiscuous mode [ 365.404366][ T8870] device veth0_vlan entered promiscuous mode [ 367.216871][ T28] audit: type=1400 audit(1732136302.356:153): avc: denied { create } for pid=8929 comm="syz.0.2699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 367.512627][ T8941] syz.0.2704[8941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.512702][ T8941] syz.0.2704[8941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.802862][ T8948] device veth0_vlan left promiscuous mode [ 367.832246][ T8948] device veth0_vlan entered promiscuous mode [ 370.991117][ T9051] device wg2 left promiscuous mode [ 371.090325][ T9047] device wg2 entered promiscuous mode [ 375.674328][ T9185] syz.0.2782[9185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.674403][ T9185] syz.0.2782[9185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.936719][ T9190] device veth0_vlan left promiscuous mode [ 375.991899][ T9190] device veth0_vlan entered promiscuous mode [ 376.069013][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 376.088309][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 376.104751][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 376.594972][ T9209] device pim6reg1 entered promiscuous mode [ 377.788218][ T9219] device wg2 entered promiscuous mode [ 384.676436][ T9435] syz.4.2862[9435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.676535][ T9435] syz.4.2862[9435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.908131][ T9440] device veth0_vlan left promiscuous mode [ 384.988143][ T9440] device veth0_vlan entered promiscuous mode [ 385.296403][ T9447] syz.2.2865[9447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.296482][ T9447] syz.2.2865[9447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.406557][ T9447] device veth0_vlan left promiscuous mode [ 385.486119][ T9447] device veth0_vlan entered promiscuous mode [ 386.087947][ T295] syz-executor (295) used greatest stack depth: 21072 bytes left [ 386.435650][ T9470] bridge0: port 1(bridge_slave_0) entered blocking state [ 386.443035][ T9470] bridge0: port 1(bridge_slave_0) entered disabled state [ 386.450920][ T9470] device bridge_slave_0 entered promiscuous mode [ 386.485140][ T9470] bridge0: port 2(bridge_slave_1) entered blocking state [ 386.497718][ T9470] bridge0: port 2(bridge_slave_1) entered disabled state [ 386.506715][ T9470] device bridge_slave_1 entered promiscuous mode [ 386.800368][ T5525] device bridge_slave_1 left promiscuous mode [ 386.812533][ T5525] bridge0: port 2(bridge_slave_1) entered disabled state [ 386.879014][ T5525] device bridge_slave_0 left promiscuous mode [ 386.936448][ T5525] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.018930][ T5525] device veth1_macvtap left promiscuous mode [ 387.059178][ T5525] device veth0_vlan left promiscuous mode [ 387.873081][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 387.896553][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 387.976441][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 387.994842][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 388.027284][ T1602] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.034155][ T1602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.104251][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 388.132805][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 388.155560][ T1602] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.162481][ T1602] bridge0: port 2(bridge_slave_1) entered forwarding state [ 388.266825][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 388.277195][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 388.336099][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 388.358719][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 388.386958][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 388.469662][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 388.488135][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 388.535980][ T9470] device veth0_vlan entered promiscuous mode [ 388.548128][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 388.576782][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 388.599833][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 388.637716][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 388.722992][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 388.746569][ T1602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 388.796024][ T9470] device veth1_macvtap entered promiscuous mode [ 388.869999][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 388.893441][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 388.906833][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 388.974762][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 388.991300][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 389.026229][ T28] audit: type=1400 audit(1732136324.166:154): avc: denied { mounton } for pid=9470 comm="syz-executor" path="/root/syzkaller.CwFtoI/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 389.103998][ T28] audit: type=1400 audit(1732136324.176:155): avc: denied { mount } for pid=9470 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 389.149834][ T28] audit: type=1400 audit(1732136324.196:156): avc: denied { mounton } for pid=9470 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=522 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 389.186003][ T9530] device syzkaller0 entered promiscuous mode [ 394.410673][ T292] syz-executor (292) used greatest stack depth: 21032 bytes left [ 394.867365][ T315] device veth1_macvtap left promiscuous mode [ 395.687330][ T315] device bridge_slave_1 left promiscuous mode [ 395.693259][ T315] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.700632][ T315] device bridge_slave_0 left promiscuous mode [ 395.706595][ T315] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.714390][ T315] device bridge_slave_1 left promiscuous mode [ 395.720380][ T315] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.727662][ T315] device bridge_slave_0 left promiscuous mode [ 395.733572][ T315] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.741985][ T315] device bridge_slave_1 left promiscuous mode [ 395.748028][ T315] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.755274][ T315] device bridge_slave_0 left promiscuous mode [ 395.761298][ T315] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.769018][ T315] device bridge_slave_1 left promiscuous mode [ 395.774920][ T315] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.782213][ T315] device bridge_slave_0 left promiscuous mode [ 395.788195][ T315] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.796897][ T315] device veth1_macvtap left promiscuous mode [ 395.802708][ T315] device veth0_vlan left promiscuous mode [ 395.808735][ T315] device veth1_macvtap left promiscuous mode [ 395.814543][ T315] device veth0_vlan left promiscuous mode [ 395.820448][ T315] device veth1_macvtap left promiscuous mode [ 395.826339][ T315] device veth0_vlan left promiscuous mode [ 395.832097][ T315] device veth1_macvtap left promiscuous mode [ 395.837948][ T315] device veth0_vlan left promiscuous mode