last executing test programs: 2.953931617s ago: executing program 4 (id=3275): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB='&\x00'/12, @ANYRES32, @ANYBLOB="16a879ea95ac1b47d40ca9cb398b", @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r1, &(0x7f00000008c0)={0x0, 0x900, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/139, 0x8b}, {0x0, 0x3}], 0x2, &(0x7f0000000880)}, 0x0) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000900)}], 0x1}, 0x800) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x5, 0x1, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 2.76128688s ago: executing program 0 (id=3277): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRESDEC=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, 0x0, &(0x7f0000000280)=r1}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0900000007000000060000000800"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000480), &(0x7f0000000380), 0x749b, r8}, 0x38) write$cgroup_subtree(r6, &(0x7f0000000000), 0xfdef) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r9}, 0x10) syz_clone(0x40100000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.350719986s ago: executing program 3 (id=3282): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) syz_clone(0x2001000, 0x0, 0xfffffffffffffe56, 0x0, 0x0, 0x0) 2.05554911s ago: executing program 4 (id=3287): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000400000000000000000000000000526b6b93a63843368508c5a361d2afc9549c38d81305436b9ab5b111e7dc99b3fbf67cc27f1b5e26ef0f1e83347c910d5d62810f226cd106e951b18cfe046963bb0c6757adc21aad0002000000000000"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000400000000000000000000000000526b6b93a63843368508c5a361d2afc9549c38d81305436b9ab5b111e7dc99b3fbf67cc27f1b5e26ef0f1e83347c910d5d62810f226cd106e951b18cfe046963bb0c6757adc21aad0002000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) 1.775314154s ago: executing program 2 (id=3288): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000280)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYBLOB='&\x00'/12, @ANYBLOB="16a879ea95ac", @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r1, &(0x7f00000008c0)={0x0, 0x900, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/139, 0x8b}, {0x0, 0x3}], 0x2, &(0x7f0000000880)}, 0x0) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000900)="3e26cca5654ec15949e45af8b1159d592e49690b9f6c637472b128e2b445f281f35b794162cb429c47dca66837d2a9544b07d3f068c0072dde7325a5386fe8c27b83e9e41c7b7bc6060c4fedd2553e19fd29d010c862ebfce7794091afccee06954ce44ea262ff002aba2b24787c9211e49d6954645c885b9bd37b06e4c6a2619b52023b5ed6", 0x86}], 0x1}, 0x800) 1.624577577s ago: executing program 2 (id=3289): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200000a000000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='mm_page_alloc\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) 1.582540417s ago: executing program 0 (id=3290): socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x101, 0x7ffc, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000007000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0x1e9f, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000001c0)='(pu&\"\"\t&&') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) sendmsg$unix(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r1], 0x18}, 0x8810) 1.513679938s ago: executing program 2 (id=3291): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0xc8601, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0xf113}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x400, 0x0) close(r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000800)='fib6_table_lookup\x00', r3}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'pim6reg0\x00', 0x2}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) close(r7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r7, 0x8923, &(0x7f0000002280)={'syzkaller0\x00', @random="2d311e000008"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\x95\xf4\xe4\x13\x95k#Jz.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcf\x01t\r%\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') 1.460012289s ago: executing program 1 (id=3292): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) 1.457711499s ago: executing program 3 (id=3293): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) (async, rerun: 64) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() (async) write$cgroup_devices(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="1e030800d3ff71ef288543"], 0xffdd) 1.301336651s ago: executing program 3 (id=3294): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYRESHEX], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYRESHEX], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0x1, &(0x7f0000000040)="957692bcdbaed3317b50b951118c511a637812d1ec038897855c9532002199cbbd51ffd0d2beb6d931a7247f5dc4becf489bb06b7575b3f63ed781", &(0x7f0000001080)=""/252}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0x1, &(0x7f0000000040)="957692bcdbaed3317b50b951118c511a637812d1ec038897855c9532002199cbbd51ffd0d2beb6d931a7247f5dc4becf489bb06b7575b3f63ed781", &(0x7f0000001080)=""/252}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x65, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x104800}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x65, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x104800}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007f6a2b4d0403a9ae36582240904e1e50e1bd166ae8ed65cfccf2ab04b42833fcffffffffffffffe98fcbca5d6e7d23e77a9af1a265c18355d7c0f43646d20a1477d52722f9677a731fab9f50673f162a874cb612926e3add2e464d80b96bf5aff7403900aa685260b2d52b9897b0ff9a22aff51c0263932be254616a93d554d165ceb5afb880c18833a61fddc9ce515eec1796471be450634d16efcdbe7f71bc1ed7acd474e57f3c8c50a7b772837479ac9db53689883f7917c9dc35a86a2f727b27460f2e8925e2106624f89d86fe0c3b7e220f41eaf634c3936fca4e6543fa6ca11c852bfece481bcca4aa9463d76d16b52cea0687d56004f6749fe48cacb30c4118545f5746edaefe6308b12052c30f71c5b35f5f508190"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000002c0)='workqueue_queue_work\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r6) (async) close(r6) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x2, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x2, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.297297622s ago: executing program 1 (id=3304): r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000040)=0xffffffffffffffff, 0x12) r1 = perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x80, 0x5, 0x0, 0x9, 0x2, 0x0, 0x18000000000, 0x2000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6cb3, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x1c02, 0x5, 0x120, 0x9, 0x5, 0x7, 0x8, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r1, 0x0, 0xf, &(0x7f0000000140)='cgroup.threads\x00', 0x0}, 0x30) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x2, 0x5d, 0x0, 0x44014, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x1, 0x2, @void, @value, @void, @value}, 0x50) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000440)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000480)=[0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe1, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x95, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000780), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000840)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)=[0x0], &(0x7f00000008c0)=[0x0], 0x0, 0x9f, &(0x7f0000000900)=[{}, {}], 0x10, 0x10, &(0x7f0000000940), &(0x7f0000000980), 0x8, 0x95, 0x8, 0x8, &(0x7f00000009c0)}}, 0x10) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b40)={r2}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000c00)={{0x1, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)='%pS \x00'}, 0x20) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000c40)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x80000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0xe, 0x16, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, [@map_fd={0x18, 0x51c164cbfd36884b, 0x1, 0x0, r3}, @tail_call, @ldst={0x0, 0x1, 0x6, 0x2, 0x2, 0x62, 0x1a}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x40}}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000340)='GPL\x00', 0x21dc, 0x88, &(0x7f0000000380)=""/136, 0x40f00, 0x8, '\x00', r5, @fallback=0x35, r6, 0x8, &(0x7f00000007c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000800)={0x2, 0xa, 0x8, 0x80}, 0x10, r8, r9, 0x1, &(0x7f0000000cc0)=[r10, r11, 0x1, 0xffffffffffffffff], &(0x7f0000000d00)=[{0x3, 0x3, 0xd, 0x1}], 0x10, 0x35, @void, @value}, 0x94) openat$cgroup_int(r4, &(0x7f0000000e00)='memory.max\x00', 0x2, 0x0) sendmsg$tipc(r4, &(0x7f0000001080)={&(0x7f0000000e40)=@id={0x1e, 0x3, 0x1, {0x4e23, 0x3}}, 0x10, &(0x7f0000000f40)=[{&(0x7f0000000e80)="99a57bb909b3cd4564a7168d72c4a63cd48276432861ac3707b2b9ee4188d44d039fac6a0cf5a09231b9f5c5b6107bf7ad1abd18cec55aebf5b2926bfd914f548869e7024f1cb18f27439aeb44766a31dd32e2cb6aa0454c7583b4e992ca02e177850ecf5c0ce3c3bacf1696652e2b8868a34b66411d967f21872851c66fdfcc3459c4c00dd3aa47e3f1e2997d", 0x8d}], 0x1, &(0x7f0000000f80)="0feb74744397bf070b8879e4899fd3f5f30f6b8d4fb7065f133a347cc6afefad58e9c117553521306bfa58191b014345aafafb5f8e2a7703ba3d105baf165f6e6df579b8daf224ee1fa57c33d6171220297ef531d3bce575c460cf9d9104116b1f5ed0deae5be812c98cdce073b4eddb02a7ba9d1a5332d8b93eba895c34b557ad9dc50f5dc991efa2f827a2880f7574110c8dbcbe898e5329fe9aa95a3aa378def63ad4492e06ce136d01134a384e50c35f7d80d13eefa952835b72c29ad4e4f2d0091372876e50ebffc00e9c", 0xcd, 0x20080801}, 0x20004000) socketpair(0x7, 0x3, 0x75dd, &(0x7f00000010c0)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001380)={0xffffffffffffffff, 0x4}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001440)={0x1a, 0x30, &(0x7f0000001100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xfffeffff}, @jmp={0x5, 0x0, 0xb, 0x8, 0xb, 0x18, 0x4}, @generic={0x5, 0x5, 0x1, 0x101, 0x7}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9c9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001280)='syzkaller\x00', 0x6, 0x56, &(0x7f00000012c0)=""/86, 0x41000, 0xc, '\x00', r7, @tracing=0x1a, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001340)={0x0, 0xe, 0x2, 0x80000000}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f00000013c0)=[r12], &(0x7f0000001400)=[{0x2, 0x4, 0xd, 0x9}, {0x0, 0x5, 0xb, 0x7}, {0x4, 0x5, 0x4, 0x5}, {0x0, 0x4, 0x8, 0x3}], 0x10, 0x1, @void, @value}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001500)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000001540)='.\x00') bpf$MAP_CREATE(0x0, &(0x7f0000001580)=@base={0x1f, 0x9, 0x264c, 0x7, 0x182, r11, 0x3, '\x00', 0x0, r6, 0x5, 0x1, 0x5, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001680)={r11, 0x58, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000016c0)=@base={0x9, 0x80000001, 0x8, 0x4, 0x20000, 0x1, 0x6, '\x00', r13, r4, 0x2, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) openat$cgroup_procs(r4, &(0x7f0000001740)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000001780)={'virt_wifi0\x00'}) ioctl$TUNDETACHFILTER(r4, 0x401054d6, 0x0) syz_clone(0x14008100, &(0x7f00000017c0)="23839308464ac60c1acb35ac1c7982a7329e7a14b03ff10d36c7a569e8f80ab329f2b9fcf511ce8e675d3f416728870ff8e53821a2b49151ff425ff2a0a31ecba9a663c5d7a5b8a24e7d7e5c996dc385edd1ff7d89691c95356611056802317718d3a420bc7a507152a1b1fe5a7693455e6d2946c0342380f6d402044c0d2e30fb451eed30846c5daaaed9dcacfc07210f201ff5b5b11d3f8cc8c6b675cb98c831ec6975478049c7d58669f6a701778999601fa8b4e330ac1f1a9399d37b1195b4fd24a038ce38ab5960f27bd554dbf6", 0xd0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="ccb14c3e362581d301cf7e86b77d577f2a3186cdac99d58af00e40b6f1192c67f343e3b33989427680ed6f9d2a56aa44c255514f3b1c1031c01d09780ad590c725c761bdfc20627ecd47adfd8cddf60c2aa0861814c9ee4237e5594e6b14ca3e56b001d9aaedf640f6fa0c4330ff96c67fa6c8092dfa959a81ba4386e22dd66d65b446bd4813a9aa1d18de6a80cc3da92952e503321e7c8f5f985d0ae531a598df12d2e76e7bafbad352b354b3ec2a5be362e05e97412cc36bdd17b30930ae3f596064262dd5a81209156671b4349ee385") r14 = openat$cgroup_pressure(r4, &(0x7f0000001a40)='cpu.pressure\x00', 0x2, 0x0) close(r14) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001ac0)={[{0x2d, 'cpuset'}, {0x2d, 'io'}, {0x6, 'memory'}, {0x3d, 'blkio'}, {0x2b, 'pids'}, {0x2b, 'perf_event'}, {0x2b, 'rlimit'}, {0x2b, 'io'}, {0x2d, 'cpuacct'}]}, 0x42) 1.167328513s ago: executing program 4 (id=3295): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB='&\x00'/12, @ANYRES32, @ANYBLOB="16a879ea95ac1b47d40ca9cb398b", @ANYRES64=0x0], 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r1, &(0x7f00000008c0)={0x0, 0x900, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/139, 0x8b}, {0x0, 0x3}], 0x2, &(0x7f0000000880)}, 0x0) close(r5) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000900)="3e26cca5654ec15949e45af8b1159d592e49690b9f6c637472b128e2b445f281f35b794162cb429c47dca66837d2a9544b07d3f068c0072dde7325a5386fe8c27b83e9e41c7b7bc6060c4fedd2553e19fd29d010c862ebfce7794091afccee06954ce44ea262ff002aba2b24787c9211e49d6954645c885b9bd37b06e4c6a2619b52023b5ed6", 0x86}], 0x1}, 0x800) 1.166796683s ago: executing program 2 (id=3296): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0xe, 0x4, &(0x7f00000002c0)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1, 0x0, 0x2d}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)='/proc/sys/net/\x00\x00v4\x00\x00s/\x92ync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd1l,'}, 0x30) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0x11, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x2, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080), 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x9, 0x9, 0x2, 0x9, 0x42, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x24}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x3fc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$OBJ_PIN_MAP(0x9, &(0x7f0000000040)=@generic={0x0, r1}, 0x18) 1.164346493s ago: executing program 1 (id=3297): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB='&\x00'/12, @ANYRES32, @ANYBLOB="16a879ea95ac1b47d40ca9cb398b", @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r1, &(0x7f00000008c0)={0x0, 0x900, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/139, 0x8b}, {0x0, 0x3}], 0x2, &(0x7f0000000880)}, 0x0) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000900)="3e26cca5654ec15949e45af8b1159d592e49690b9f6c637472b128e2b445f281f35b794162cb429c47dca66837d2a9544b07d3f068c0072dde7325a5386fe8c27b83e9", 0x43}], 0x1}, 0x800) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x5, 0x1, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1.040038565s ago: executing program 4 (id=3298): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffff9, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0xa, 0x5, 0x7, 0xc1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r4}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001880), 0x0, 0x1, r4}, 0x38) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x1d, &(0x7f00000001c0), 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff0ff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000400000006a0a80fe000000008500000053000000b70000000000000095000010000000004e62011c3034fdb117168bd07ba08af339d1a1ee35fe163a255c33282044b32495ef8ab9adc67ccc945ff15d802f5132143c0a9fc7a84452569957c1002ed7d458e17f791f4798c8eb484de03312c69b3edff5be26765ba5f8f2879021c2ea53ac547a654bbd2db5356b971d83dd12742be9087a3e7b7c0efd3e38c794eb06b0b8c392904ae7dd5e4dee88518ddf12dddd4bfc6a4dd3b6beba51074229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff2357ef17f95a25780c3a057826ef4e912f01a201e694e3049b8c8fe8b65d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cff7f4d8b9d8eaf302f0b2e0c252b0000000000000000ee917bca4885bbf597a14ab6458e6272d88e0c8088f404f011289ebc5623faa1182632161e073af1d69a2e36be115be3b325ecd201d2ffb0a7fa4f5d1106560cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222674280f55e98107450c19b861299fcd9ed9d8679406419406bf0c5329bd5b4697336112b0b8756ce3574046bf611a108f8df4d1a88597840b702b6fa8edfff8faf8b8ec039bab385cac0535373bb8fab90539b1a65ddff841eb671f7faf39a43a66c5540b8762b42007c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ccd4b19b53b60322af0aa66e8f448e1bd96822e6b70b62912c926dbe417cccd4f696d528fa8a3ea847f10e9b1106f3bb506f1d7fbdf801000000000000006c028eb5b5a073d0de5538ab42e171b3baae34c35987b0dda497ac3f5e97e60eaeea15c6d55badf9b86b1c000100006e60cd06c9ed24313ce607d403bb6030f800000000690db0221b1705c501f802ff59b4e683efa4b6e77e042072ec9eb8166f6e28b49a7705a1befc4d315878f88a8fb1dd679fb4c5557abae6849917dc51a89d47b728502f7e621fc0e3ba04020000c149ee6601728c750930519339b44197c22da865059b475afd96187d881e93b42a5fdfd686d8900c44c67133eeb0109dcb60dddad58037fda65885a15a42560ee3027a5ebf95254744f10fd607bc3100b94932b8d9447c42f6e21ee0e54f8be386bdc09decece910a481e648e0cb074536a25ff581d92af08a06f857311a2f14326b0b290205e91a682e00c8762cbc6b904c980eef6e6ae00f0000000000006a8194479700a02b92bec8d05eae1f24fdd7b80d3dde04c22f689594de2ebb9687219de8d73ac83823feb402a2415a9850d5f0183ec67be96dc0e4acd7acf1dfe79d6771903b76e2ae47d972651390c22d641030e1ddac018dc3116e1803af10a5f2b5f7ba58aca5bcabbbab24414a3810788e5503e4be66d683daac5f00000000000000001000ba96edb95ede0e1957c2a2754258d9fd028096cc15a8b912b494d4bbe609031ea1ca65a548941d5d16297757310d9daebd5a3dabbced3b051129cd60a37d397643324e6f0aadf978d639650000000000000000570b0acbcaa196e6b46e213a34c1a550e7c2d8cee7a278cee591f360e345d37dc9f8991a16c08d72317e42d2ac9126acd76130ef1086016697e4d51c4b42b2efc8edab88d46bc3d5d6e5a634c912bc40513643bf44cb416b3149"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0x2, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r8, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r9, &(0x7f0000000d40), 0x0}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000280)=ANY=[@ANYRES32=r14, @ANYRES32=r13, @ANYBLOB='&\x00'/12, @ANYRES32, @ANYBLOB="16a879ea95ac1b47d40ca9cb398b", @ANYRES64=0x0], 0x10) r15 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000011c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001000)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffff9}, @jmp={0x5, 0x1, 0xc, 0x6, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x368d}, @map_fd={0x18, 0x5, 0x1, 0x0, r8}], &(0x7f0000001080)='GPL\x00', 0x1ff, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000010c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001100)={0x1, 0xa, 0x764d, 0x74}, 0x10, 0x105fa, 0xffffffffffffffff, 0x1, &(0x7f0000001140)=[r4, r9, r8, r4, r8], &(0x7f0000001180)=[{0x3, 0x3, 0x1, 0x6}], 0x10, 0x6, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000001280)={0xffffffffffffffff}) r17 = perf_event_open$cgroup(&(0x7f00000012c0)={0x4, 0x80, 0xc, 0x3, 0x5, 0x4, 0x0, 0x0, 0x20, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x20d, 0x4, @perf_config_ext={0x6, 0x5}, 0x101000, 0x6, 0x7, 0x2, 0x1, 0x13, 0x3, 0x0, 0x8, 0x0, 0x9}, 0xffffffffffffffff, 0x5, r0, 0x3) sendmsg$unix(r11, &(0x7f0000001480)={&(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000180)=[{&(0x7f0000001780)="b498ca2e4a0050a19185bef129044d27e8a823f19302dc555ca21eba68a581e02ca3500b62bb88e1a980583646f5eb8c0682028d286dfc92a34ef7730708e8a4c696cc9905c78a04b846726f91d6c77089626b62d9bf21d420255c59f7a834c8617f2ad0bb97ae7624bc3f23510b0dfe7dbcdd31eaeceafd11f4fb6d649178de79ce790048b6d021c31542497f0b025ad7b4b546ce80a514b5bcc6e771c0d38f962ced23fcb07b12b38e852fe24d08cefeccf28a9b841433b34ca650c2163c73d51af68707a0533df68d57c82149c26fed738e4f30b36db84fd270685cb384b27cc5d773675b0150802e08328e2da9a7f8697a0b9bd4dccfe3b12f851effb3ef063708d49b3f654f6d95283d1de096ed878bc49a557992d9cb69992747f3c77a001977b715d65811e9091384dfa0bc5a03e5fc020d1ebb4fb282c0ff12f05e77ded7ee9caf1c28ffba11df3c4e74f7273ab6f1a60b6e2fd1254214813ab1366cdaafc7b1044264a4fb0654bd2fe1b6f486e10c23441a9ab9bc6d95131b9382fcc69f248edaf876deff23b3cdd7ae4110fad5d7e7c502dc02fb3ffc4b774f25958151d86ee6c44252a8e7c5813b897d34575ed557c9323b1baa08c19fb18d7442907f7822392622f6098c074a6161e69f22c50557db50d359afbac550e6b1c81718b3d085da3d3410da7e24b7dccc68a8cea99ea1b4103890a45db8123e656089b9d2551c1768341feab07904064d9b64114b58d8e3dfc0c578f14dc8d605723891ff184aa47b53f0662b6fa65410279d1c197230b4da3310f908b95f0d6be0241d42598860853123f1af6c9b406525b57c96e50523b4118f4b8529914a02deabbf04e43ca65c0fc156e3343e8687d91e14fda15bb3e198c14719c1bc63b1c1e298d7ec6edeccfc443915a3dc080620897ec92c4dfcd68b192df696bad6c05308a7c66edcae500694486dae8e213fc0aef7edb3b22d079862770441bc296f52dfb4822f91ef78a85fd8ea2b13aabe8cf2ff6db0630e242433eb04fa6bdbda405f6e9bc54d0dab71966ff104445be90b9fcbcefa9f057f51eacca0659677af5cfed5bccd9a523022eb1f298c9b5f46345f56ab5cf1a12b9be86b90003b1b43c0707f08d36078371cb753cfb96e12997560ab1f4e48fe1234a2c2d794cc59d8c3a362f48cda8cb52bb43f023b488db712d98d974ef45c3c5514d521358a9af4542bec846b804488037f2574c24672e0f06636849f3ab53835db2af00b7b324d02da388cb5b6320bf281ca5b9da05d1f0cc5c895d9fa8d9a1bafc6f915b6cd677efe606d65db6a24d6452a0d32e42fcde78dbe986c794bdd212bd75deee94058ac9a5dbf9eb8f492ac9369cbc2709de064d9c0c0a573ac8a3164cd6efd47a72dbb529124fc8b5c850323569ed1d2191dea3a3445838b50eaad6cd66b3d7c93817e8df0a43ce06347d1f9d29121a01ff5e4b45dab1497cc8d4cccf3e1c93e28d488c4dfcfce9517c422a57473db629d01e3e235845faeb14b90cc7118209f1fdab08d147ca4288633230e21e78e7098c181914d009641eac446d012f71479aded40ccabe3b4655c905b40c54e253cd735586677455d4e5f054e7c70723d994ce51982654fcf44b509299c069a965f8c59ea1ff3aabc6991661ceb8a84baab0b3d442908211d3a80bebe0d5e3294551bf21cfa954572898f7bb421ca549e7de70d79a792a2d512d55b9e780f0b9c75701976c098fe1a51998c53f3ad2a8825225fc2fdb0ad2e8440a8ce6b79714a054dc7b7391cbd71f861e79e3019ed58a7926c259201a22232db567ef6d984fa5fbb532f767aa4566ae7fbaa49fe134e4b1071d498368d3c040f75ed24b71ff474fdb4c688328f32dcba3cf70da96fdeb63cdd60517efbd26d5922e2ffbe765c7c882b797c5b0e1baaa8d71defaf867d0520f5c0564e1a9be9720caf66fa9e9274c0e24d967807d45691f878c7d1c68a417f97a6d86f4ba6d5857cbca14b29e14f33c145c5a1b497cd56e9acec739b66ef384ffd4d148085481ebc1a5bedc5cc48621e16d1c156157976d6d2932e93bd2f49701e087e01c6b71193fad9958d9a115ed774af2b32dc8a4b0b36c9681b87cec373f3ae4c4db54c5d8c0d1d4f4bcae6452e258a928aa7bb1f5c5794658f27176dcbc617a78299db1c372dc93d4cd188757afae32a6e1c6d10fd825554c86e3ab767ee8d35185c4afc938f1415c184ec2b754a9558dc01e88e41dabb93b4669ba2b80658ac2f1b8f62bd5f4eac7a41f8d32717959701872257078fb86bfbf2f0fd07b8692098ee7ef279d1f081d1279cfb04a91e0163b26776bed9a347c3ddba4849a72c65469dec1ab39ded3aac282742637adb5ccef9572116482eba6cc90029e44f594146dc1e0079f8cdd3010cfeb1b9e14b4dabc2700c658d2c53023f7a35a3ebc2b576bb720ad21698e254cf9464a2d7964edb4f26bc5f0f6b4cd227e7f67759dafefa76929474a73d63ff7b1328ae93e75909b646b27a7898a109f6d62389582dacafc4287add69b6c7f9e4430a89c65c5d1a0b2957d159f71ddbc9b995ee218d860081f2c8af769261f03edf532e28868c506af6d64f873c3e9de7a64cee72fb42866141915dac542cddbab46359f223161d277c7700ed793b0422d465f9b91938b9336378d6fe693d655aad442d7e320d7702d67a9dc3d003cf1d370ecf9de0ab3d67c1dd64e390c33c38db6e0fd1d9bc9823572812c0465c19626405a3b4f8d72f3c537a041607a417e9522ca261aa675df184f61e69a75450072df4720f2f66e894347dbccb87cbe576ff5c833a63c989cc4c6b829ae75e6d954f2c0a7a46e1f4b1d5a278015b942d215aa93b3cfb8e96c8cd7b40611bd8c9efb36326fba867df51d503cdd6665d6d5259f53a5b1983c1293bfe4c70984a84282eb42892445d23d11cbc52aaee85b8ec27900a9e4dbf638accfdff78deade8bf015247dc75d3419cc783e46cd68809832cd571790585ea42809de8f211e354f5278029709aa5b0f944b4a4ca2ac50d8d974e5fdde48754274361fb2c5232ac9f111532bab34b6ac1fe6909b1d89188bb49ad5965f5bdac26f603b71f76452ad8da9375687d09d728851488616dc19e11368b1d384bf95f51945b09bd81029608e659e40c824355dbe3fec80eeb797ced02329d90109318500bf2565f134ba99fbe4903afa0aa6676e6ff096fd5938695d8b2a6e6d715db4bd3eceba7bcc75d2e4b3ef8947e426bb5c946730e341de5c8a06c44714853294f5e3b90fa29689de787fde0fd108f3f34330d14e553ed1a198dd18cbfe020ad498e7cccbdf7c1aca0e39feae59d4835f51f41a53cdcdd29fbe7afe62e367e8a884f41fb7c0ee07fe0a7b52d9f25b54a12bc5d079fb90bc798ffb04686cdb4b0d951150d9ce8068fc623866fec63e40846f0f2d78d8d43708bf33f3eb84703b561984ef146f075782e07372054a77c1eeeb753af0b4c54ffde3b3386987e9b31549f8601019d71e372762f453670052dc2ca6a5973fbe75c444c13d7171af9452b5581c19812ba96b4fcd2cf7e3c4efad92d6fd6e7234f83840dce1add6c39cebd9ff8c050cceef6ea9a7b679ebe07522ec5d702f24bd4b0b05aeda0a3fcdb33f0abe7b01b62842412bc137c74d731e85ecc1a0618c50ede9d440b3744c69a5c8b9fb6a7fb43c0826946974cd3a0d4d283ec077e275224e307491edce673341002715fa2c114a6ccdc5e0daa8e9615d05f8b1d1761da7c32d8d6e2114723e7de851009ce9fe93e34f64d28428be4f186cd96a3c0fc21a1f3b7572d24bdabc76fd543ef6bb53a750271dd3b1cb38b88a07ce57dbbc8cefaf9a50479b025da91bf9f8ba045c1eea04a265f65a3203d2e94750844512cc7aaff7bc0d60c29bdc42c7023c697aca5a7876e5a7ece8b6285ba44955f32992a9a76df615537c53ce975f0dde48f4c2c4d275d18823698e6436153d227592d116bff2c76b7b3b3981d58e68acf9583f5e1dc97093efa22e652b717ee73f69b94df7227455aa48d07ef81f350237a1a636ead9de647bad7ef2d10428ba9257c8ec9565b1ced7d23e97b20a56fd8ae3beeb0532e4642b35a28dfe9d949e56ed7defa6e6d49a37ef3e1c0652e9a1c1740ca7864bad5b7df21d7621b129224ee218c0358c1c7d9e723ac913a144a6261b8bece42d6564212c105e1bd8e16e92b47936371ea20c46953311510f0bee0fac9a84ddaa15b3119d6db24a47bfd923fffcdb6384ad7a6ec71d5ee08e68b16e03a335671220130c2700ec50b1c63fa5324f015327aae9837158f17e7539287a5230fa3c97e1781aadf415bd72c438df0dba12c2c63919e1bb533179701dad328f79ff5de765cbbed23b8c5df2351e342906a512628abe156151b2c7e0d98b00c08562b936efa15d9e0db02c9af63270b9d69e7f3bb6c01252710bdebb03b4bf9f26b85b4f0d6848b3b2a3baae67d71cafa0f9f60ad1ce6e6b0365ccf94c1fa00d15c030d2b81c6175524c91e3249a134dc4fa815a8c50dfba6bc33edbbc83a2032e20f6d9e5813ac88f77e14271cc98ab3dca1d68cf5332986f516e42feeb9aa40ed6040cff8cb52ff6902759c0dd642d546db26b0836c793cbdbaaab485cb32283d01ac85721a31d0625bbc9f894c1202db270dc94f26ed6e387d9a4f0bcfb08e99f28610b5ca4bc29e3094ccd04e4f741d0949cdf8c8a7857101fa62cd894ede7beb538bc934bf58e4c88da0452b00efa19e709e4c69e5abe8e53603e9e890e738f1c080a7796db89ad671136ccb4a37a3cd0bf4c432da15ca50f2a694f27438eb91450b3da2990c6a7211bdd795790b5e6bb22ba889382458832234b512f4bfdbec366aec1608cd02ed73bd07b89595b0ce2a528525531f45a6bd6f55c4bc974bfc46fcf080e5ebd3cd767964eeb7aefc396b8a8bd6379503182483ffcb05786330cf1ccea88e5165deef2e145c90883a5cce8a7377be34c0ce3110b824170c4daa96fc67638e519ed8cc3cd974edbf2c95c2735f5a3ede619d700601ea04d0d11efe640c62e8f350f50cb138361644f20adda7d41f1d7dd8af2053adca18f8c2f7aaa4ff119e82aa157cf7f50c881b94b4352b32b5a69447ecae19b62665344613c072cf0fd9f370f30199fe3d0c80fd6a6c6e18de8ffcd08129049b12ef5ada6c4c23766f111c70a17d363384cd156417f5d6aa5857cd240273eb91008c19003ce10ee796adf0e938a77318f8a35f110215e24c422b24f980fa0c6e13c1ecc1433d25675f062f210e5520966161257f3fb7b2fe16a7f6a8be7db1c55ee12334b029410e171262d1aefea1f5c9c51418c4ddec03b558c4ad3473b128142ded8b47874f508acde3fede007ab2ec0166b562535c0963094a848c949577f9a6d0cf99341b870be2355d76c48cd08b9ee172a7aaf39735e8dd093524fa6be37604a433dad573271f87804e4b2e29ef9f5ed4e9a82e11784e5b3d54c902c32735c61d413aa846648508ef038b3866c928415b53dc1098bd7d12700b430d69aecba673837b223964a12e2d644ef952ea870c63233a44eb1df5831d6b044ac082624901b8a3be0b6ab13c95b1a3b81791f02eb871db2e78cc4196d5203b915ca8e0db51d282bd5cb9fbc6fa6b9467d7b84a64b9cc3702574274d08014b4e9120a994cb7c44af55598221268b97b54463e693f8ee6dcd2cb463b6be5f3e2b4b4ea89a1014f2ec9030c825bb121f27a69beaadebbb69a0d74a4aa1289bc4d563e6e844d63fb5f44dcef4edc18", 0x1000}, {&(0x7f0000000540)="832ea8a2093a23c0f2bea1e64e81fac357d504021142c3789c25874ebcf9633957fc6bb16172bd4d4c325cdf55b15e045241fbed096ae510919fc9ec340991a276b1e6615ce0b499038442e6a6600a8d226b9af95f59b8e87280b0ce077dbd7b437ff2beb1502b504257e27add4db7fbc46ae349040dc839568aa09f989a63fa57489df7fe37e3d573b1fef82844cb59de7dc5364179e4aa3d52bfb28ad7ba39ce6829dd46be409b9bebb6cb48236f2f79c61225d105f0ae71695ee572fd4be86de020fe64ac9bf54ead654615dca50c55d358697b70f5c368793725a38d67fbad57499ba316317a0c2e307cdbac2d608e2baa6b21f9db016c", 0xf9}], 0x2, &(0x7f0000001340)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r12, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r6]}}, @rights={{0x2c, 0x1, 0x1, [r8, r15, r7, r10, r3, r2, r4]}}, @rights={{0x10}}, @rights={{0x24, 0x1, 0x1, [r9, r16, r2, r13, r17]}}], 0x140, 0x20040000}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r14}, &(0x7f0000000000), &(0x7f0000000080)=r10}, 0x20) recvmsg$unix(r11, &(0x7f00000008c0)={0x0, 0x900, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/139, 0x8b}, {0x0, 0x3}], 0x2, &(0x7f0000000880)}, 0x0) sendmsg$inet(r12, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000900)="3e26cca5654ec15949e45af8b1159d592e49690b9f6c637472b128e2b445f281f35b794162cb429c47dca66837d2a9544b07d3f068c0072dde7325a5386fe8c27b83e9e41c7b7bc6060c4fedd2553e19fd29d010c862ebfce7794091afccee06954ce44ea262ff002aba2b24787c9211e49d6954645c885b9bd37b06e4c6a2619b52023b5ed6", 0x86}], 0x1}, 0x800) 1.003465546s ago: executing program 1 (id=3299): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000280)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYBLOB='&\x00'/12, @ANYBLOB="16a879ea95ac", @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r1, &(0x7f00000008c0)={0x0, 0x900, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/139, 0x8b}, {0x0, 0x3}], 0x2, &(0x7f0000000880)}, 0x0) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000900)="3e26cca5654ec15949e45af8b1159d592e49690b9f6c637472b128e2b445f281f35b794162cb429c47dca66837d2a9544b07d3f068c0072dde7325a5386fe8c27b83e9e41c7b7bc6060c4fedd2553e19fd29d010c862ebfce7794091afccee06954ce44ea262ff002aba2b24787c9211e49d6954645c885b9bd37b06e4c6a2619b52023b5ed6", 0x86}], 0x1}, 0x800) 946.278926ms ago: executing program 2 (id=3300): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRESOCT=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, 0x0, &(0x7f0000000280)=r1}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0900000007000000060000000800"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000480), &(0x7f0000000380), 0x749b, r8}, 0x38) write$cgroup_subtree(r6, &(0x7f0000000000), 0xfdef) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r9}, 0x10) syz_clone(0x40100000, 0x0, 0x0, 0x0, 0x0, 0x0) 909.882087ms ago: executing program 0 (id=3301): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200000a000000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='mm_page_alloc\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) 896.519657ms ago: executing program 1 (id=3302): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYRESOCT=r0, @ANYRESHEX=r1], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_kthread_work_queue_work\x00', r2}, 0x10) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b8fb57ed692c986000000070000000108010008", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_freezer_state(r4, &(0x7f0000000400)='FREEZING\x00', 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f0000000000)='/proc/t/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee\x00\x00'}, 0x30) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000380), &(0x7f00000003c0)=r6}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e0000000a690000c40f0000ffffff7f00200000", @ANYRES32, @ANYBLOB="050000000000000000000000000000000000fb00", @ANYRES32=r5, @ANYRES32=r4, @ANYBLOB="0300000003000000000000000600"/28], 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="0d00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="08ac37c8f775bd9bf90000000000000000000fd42de3a4f882f21754b03e519142eed90c2b43d1663e7c5e150cc479534c7525a6a6d63fc09024f32fcdb079595660c0406c8ff96615eee9bf233b651bab5098f4e0349f77885669297edb6f4d7f3e05918bf914a7cdc20acb8b55ddcaf838960da96c71299c2eaacfded0a29a29451fd335d997", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28, @ANYRES16=r3, @ANYBLOB="557f77506f6d0ec1f5e24e40d45c8c1c1146ffe48d0301c59cc9fb1d956cc00bd9dbda0cefef18602d2dd5190618c47447738299b86fa2d9448449151ebc5f16a84fbcc7d1e862d1927d09bda6f3751cdc9ab4a4ea9bf0481a57b6d1918543ed0a47538f21b9f06a29ea0f35f8312557fc7a554d2512a9587d34bfa989f3610d770bef712f735ece405a0cda8b15b30f5489c6c0d78efbc1ab88d14dfd8818e8d7782e417f8824b3c896be751cca08d615cc755170053407b1438c194eadd51e78bc5d46c83cb23d40f1a9c53758690ebc72dbab5eed5a8ba9e3a1e41ee5c0"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000800850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="08f272f808af"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) 851.352048ms ago: executing program 4 (id=3303): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x38880, 0x0) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f00000004c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000440), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r3) openat$ppp(0xffffffffffffff9c, 0x0, 0x305500, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r1, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0, 0x86, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x8, 0xe2, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x40}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$tipc(r6, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000cc0)=ANY=[], 0x0, 0x77, 0x0, 0x0, 0x100000, 0x10000, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0e00000004000000040000000200020000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03090000020000000000000000000000000000000000000000000000c6deba5a21a0d179a36aaae8ba02d301eebc5cab25b3"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) 851.112818ms ago: executing program 3 (id=3305): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) 805.491789ms ago: executing program 0 (id=3306): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1b, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000095dc1d81683552146810c4e3c700000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000064e7441ed4440f2006c3e80c5fc22651ee0bbb39dc4a55c9338bd29045a0c0e0ad3824bed1934057d8efc5580c0102616d3132388ff72e8e528ba64cb131"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b000000000000000000000000800007000000005c25d66308b0fa81f823bacad1c86b85154dc77a7a1a731e4e9537024fa0a13469e85c57bc69058580f0872e819a9e541832044b2c427f65f48349025c25226dac9cdd8b258dd972ef38111c02e0d0b84d786e4e29ed4c0b67dc3bdeffa649e3b4958587e1d8e26afdd35aa07f44e3ab18", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000fb7335db91850b43fd75f29cd0fa6df6794fcfeda542311b2b04002da1a29d60b72c777a44f96002b043c21c38b280452208492d25873ea3c3ab065d51a73fd51d729a1085336990a3698a2ebe044d4aa5cc5dfc11d6aabcb08adf86420eef49df2696b38e20b4ba3bf3672bb2359a860ff0b2f015b6f2a3fcc3e9e5f27453b18adcbb1792244cb04bca766de16b426c925971f1b6a4b86227692a4d0e777c0fb3a3687f9cd466ba802c4b7af6972930c3036820541fd8fa4f63c14c6efed1c256345ac179733f00f5224e18fe82f58cf49e"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYRES32, @ANYBLOB='\x00@\x00'/18, @ANYRES32=0x0, @ANYBLOB='\x00'/21], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000440)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r8, 0x11, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) close(r1) 753.65605ms ago: executing program 3 (id=3307): r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000008385000000710000009500000700000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRESHEX=r1], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r3}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) (async, rerun: 32) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) (async) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) (rerun: 64) ioctl$TUNSETOFFLOAD(r1, 0x8004745a, 0x2000000c) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 64) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r8}, 0x10) (async, rerun: 64) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r10}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x14, &(0x7f0000000400)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r11}}, @call={0x85, 0x0, 0x0, 0x50}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r12}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES16=r13], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0xa3db4a2ef2b9e579, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, @value=r5}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6a, '\x00', 0x0, @fallback=0xe, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 32) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) 620.740741ms ago: executing program 3 (id=3308): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a000000080000000200000004"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x46}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000007200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000700)='tasks\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x14, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000008000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) ioctl$TUNSETPERSIST(r7, 0x400454c9, 0x1) ioctl$TUNGETVNETLE(r7, 0x800454dd, &(0x7f0000000080)) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r9}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x4}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r10, &(0x7f0000000300)="d8a9c367224032b7876d96b56121c982579530549cf5b3d20433d03adfa910812ed7a494e3c5b72aafcb43b005cdb7c2e9d094c13d811d384fbb9d760273c347cadd5158e0af5e40c2b507aff4ccf6640df756c761fcc5bb4b94b8cba198f5a6d66014bf55a08ed1adb3547a57e1417320692c15a0dce680dfad6b17c66ac3f64d2ea76fc48fc7baa4ace0f934deaa697a065b67d122a2cb87ee39c0f29a1b267a462b4d421a", &(0x7f00000003c0)=""/183}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000580)='scsi_eh_wakeup\x00', r5, 0x0, 0x4}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 591.979061ms ago: executing program 0 (id=3309): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB='&\x00'/12, @ANYRES32, @ANYBLOB="16a879ea95ac1b47d40ca9cb398b", @ANYRES64=0x0], 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r1, &(0x7f00000008c0)={0x0, 0x900, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/139, 0x8b}, {0x0, 0x3}], 0x2, &(0x7f0000000880)}, 0x0) close(r5) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000900)="3e26cca5654ec15949e45af8b1159d592e49690b9f6c637472b128e2b445f281f35b794162cb429c47dca66837d2a9544b07d3f068c0072dde7325a5386fe8c27b83e9e41c7b7bc6060c4fedd2553e19fd29d010c862ebfce7794091afccee06954ce44ea262ff002aba2b24787c9211e49d6954645c885b9bd37b06e4c6a2619b52023b5ed6", 0x86}], 0x1}, 0x800) 446.340524ms ago: executing program 0 (id=3310): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB='&\x00'/12, @ANYRES32, @ANYBLOB="16a879ea95ac1b47d40ca9cb398b", @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r1, &(0x7f00000008c0)={0x0, 0x900, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/139, 0x8b}, {0x0, 0x3}], 0x2, &(0x7f0000000880)}, 0x0) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000900)="3e26cca5654ec15949e45af8b1159d592e49690b9f6c637472b128e2b445f281f35b794162cb429c47dca66837d2a9544b07d3f068c0072dde7325a5386fe8c27b83e9", 0x43}], 0x1}, 0x800) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x5, 0x1, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 303.476636ms ago: executing program 32 (id=3310): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB='&\x00'/12, @ANYRES32, @ANYBLOB="16a879ea95ac1b47d40ca9cb398b", @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r1, &(0x7f00000008c0)={0x0, 0x900, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/139, 0x8b}, {0x0, 0x3}], 0x2, &(0x7f0000000880)}, 0x0) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000900)="3e26cca5654ec15949e45af8b1159d592e49690b9f6c637472b128e2b445f281f35b794162cb429c47dca66837d2a9544b07d3f068c0072dde7325a5386fe8c27b83e9", 0x43}], 0x1}, 0x800) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x5, 0x1, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 22.45979ms ago: executing program 4 (id=3312): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b000000000000000000000000000400000000005b73a873e9a9e3c1288423393c68bbc192c9fb30e973f4319e8afd6dd104000000000000008d2e9820bc7b2e1445df0d0ae92ab1b9595b4d98f07c20a8fe0b0120654170d4950d901ce440c9822ee950d69f22686115cc8d61289a0109abda1fff2d6badfe860671110c29e7d6e6818e96e47d25ef85b8eb0ef4964426fe0150d9f07560af0f824b071de8a7c673b49f925414a59bc110e302c5634bf0b2c8b012a6ffea319b343645038cbada39b692", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020703400000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="170000000000000007000000ff00d456000000008e090c10e4b3775f9d1f3c47e40ddaff10d287d5870280eb2cdc55788af48930c96a5fef6758d5b44550f0a62f6fd32eccc6537bf690d7ea392cb3a25041d2c028e85b43743d0ec33bf5e96739872638654e2aff9e9d8f16d9c0bfbee459281bfd68e5ae6b05fe2ebc6a2873b0c0dba9a1dd623cfbded6ebc277b2dab0837261563ff281eadd2f75a8bc30c465930f5716d0a6502ec2ce32f5d6f3a0ea0a8f67f0395238bfc93ada9b54fe8085df5b56", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x3, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="180700000300"/16], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x105002, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYRES64=r5], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000580)={'lo\x00', 0x1}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000d80), 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000060000000800000001"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000a40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000700000095", @ANYRES64=r4, @ANYRES8=0x0, @ANYRESHEX=r2, @ANYRESDEC=r9, @ANYRESOCT=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r10}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x80086601, 0x0) bpf$ITER_CREATE(0xb, &(0x7f00000004c0), 0x8) 21.61486ms ago: executing program 33 (id=3312): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b000000000000000000000000000400000000005b73a873e9a9e3c1288423393c68bbc192c9fb30e973f4319e8afd6dd104000000000000008d2e9820bc7b2e1445df0d0ae92ab1b9595b4d98f07c20a8fe0b0120654170d4950d901ce440c9822ee950d69f22686115cc8d61289a0109abda1fff2d6badfe860671110c29e7d6e6818e96e47d25ef85b8eb0ef4964426fe0150d9f07560af0f824b071de8a7c673b49f925414a59bc110e302c5634bf0b2c8b012a6ffea319b343645038cbada39b692", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020703400000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="170000000000000007000000ff00d456000000008e090c10e4b3775f9d1f3c47e40ddaff10d287d5870280eb2cdc55788af48930c96a5fef6758d5b44550f0a62f6fd32eccc6537bf690d7ea392cb3a25041d2c028e85b43743d0ec33bf5e96739872638654e2aff9e9d8f16d9c0bfbee459281bfd68e5ae6b05fe2ebc6a2873b0c0dba9a1dd623cfbded6ebc277b2dab0837261563ff281eadd2f75a8bc30c465930f5716d0a6502ec2ce32f5d6f3a0ea0a8f67f0395238bfc93ada9b54fe8085df5b56", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x3, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="180700000300"/16], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x105002, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYRES64=r5], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000580)={'lo\x00', 0x1}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000d80), 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000060000000800000001"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000a40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000700000095", @ANYRES64=r4, @ANYRES8=0x0, @ANYRESHEX=r2, @ANYRESDEC=r9, @ANYRESOCT=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r10}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x80086601, 0x0) bpf$ITER_CREATE(0xb, &(0x7f00000004c0), 0x8) 10.1201ms ago: executing program 1 (id=3313): socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x101, 0x7ffc, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000007000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0x1e9f, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000001c0)='(pu&\"\"\t&&') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) sendmsg$unix(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r1], 0x18}, 0x8810) 0s ago: executing program 2 (id=3314): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000280)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYBLOB='&\x00'/12, @ANYBLOB="16a879ea95ac", @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r1, &(0x7f00000008c0)={0x0, 0x900, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/139, 0x8b}, {0x0, 0x3}], 0x2, &(0x7f0000000880)}, 0x0) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000900)="3e26cca5654ec15949e45af8b1159d592e49690b9f6c637472b128e2b445f281f35b794162cb429c47dca66837d2a9544b07d3f068c0072dde7325a5386fe8c27b83e9e41c7b7bc6060c4fedd2553e19fd29d010c862ebfce7794091afccee06954ce44ea262ff002aba2b24787c9211e49d6954645c885b9bd37b06e4c6a2619b52023b5ed6", 0x86}], 0x1}, 0x800) kernel console output (not intermixed with test programs): 0033:0x7f0508527169 [ 160.932338][ T5232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 160.951874][ T5232] RSP: 002b:00007f0506b91038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 160.960102][ T5232] RAX: ffffffffffffffda RBX: 00007f050873ffa0 RCX: 00007f0508527169 [ 160.967916][ T5232] RDX: 0000000000000038 RSI: 0000200000000000 RDI: 000000000000001a [ 160.975725][ T5232] RBP: 00007f0506b91090 R08: 0000000000000000 R09: 0000000000000000 [ 160.983561][ T5232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 160.991351][ T5232] R13: 0000000000000000 R14: 00007f050873ffa0 R15: 00007ffedd9a1678 [ 160.999567][ T5232] [ 161.094248][ T5046] syz.2.1438 (5046) used greatest stack depth: 21632 bytes left [ 161.157841][ T5245] device veth0_vlan left promiscuous mode [ 161.183088][ T5245] device veth0_vlan entered promiscuous mode [ 161.204465][ T555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.237690][ T555] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.249759][ T555] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 162.058798][ T5258] bridge0: port 3(veth0) entered blocking state [ 162.066551][ T5258] bridge0: port 3(veth0) entered disabled state [ 162.077488][ T5258] device veth0 entered promiscuous mode [ 162.093057][ T5260] device veth0 left promiscuous mode [ 162.106816][ T5260] bridge0: port 3(veth0) entered disabled state [ 162.396722][ T5259] device syzkaller0 entered promiscuous mode [ 163.062961][ T5303] device veth0_vlan left promiscuous mode [ 163.112878][ T5303] device veth0_vlan entered promiscuous mode [ 163.155071][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.171761][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.196710][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 164.024260][ T5334] device syzkaller0 entered promiscuous mode [ 164.071676][ T5350] device veth0_vlan left promiscuous mode [ 164.095281][ T5350] device veth0_vlan entered promiscuous mode [ 164.146007][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 164.193948][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 164.241189][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 164.957677][ T5382] device veth0_vlan left promiscuous mode [ 165.060873][ T5382] device veth0_vlan entered promiscuous mode [ 165.087035][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.098644][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.179734][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.697035][ T5412] device veth0_vlan left promiscuous mode [ 166.703102][ T5412] device veth0_vlan entered promiscuous mode [ 166.756764][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.807790][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.820846][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 167.151745][ T5423] device pim6reg1 entered promiscuous mode [ 167.271367][ T5427] device veth0_vlan left promiscuous mode [ 167.322331][ T5427] device veth0_vlan entered promiscuous mode [ 167.339359][ T5427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.353284][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.361860][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 167.377075][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.419932][ T5431] device sit0 left promiscuous mode [ 167.442949][ T5432] device sit0 entered promiscuous mode [ 169.606938][ T5478] device veth0_vlan left promiscuous mode [ 169.657377][ T5478] device veth0_vlan entered promiscuous mode [ 169.743099][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 169.766253][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 169.801828][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 169.992679][ T5490] device veth0_vlan left promiscuous mode [ 170.067717][ T5490] device veth0_vlan entered promiscuous mode [ 171.897376][ T5527] device veth0_vlan left promiscuous mode [ 171.945985][ T5527] device veth0_vlan entered promiscuous mode [ 171.999352][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.057752][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.065195][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 174.120595][ T5581] device veth0_vlan left promiscuous mode [ 174.140084][ T5581] device veth0_vlan entered promiscuous mode [ 174.147576][ T5581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 174.156713][ T555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 174.168153][ T555] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 174.206311][ T555] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 174.349264][ T5587] device sit0 left promiscuous mode [ 175.301156][ T5613] device sit0 entered promiscuous mode [ 175.429539][ T5622] device veth0_vlan left promiscuous mode [ 175.436161][ T5622] device veth0_vlan entered promiscuous mode [ 175.448605][ T5623] device pim6reg1 entered promiscuous mode [ 176.652160][ T5654] device veth0_vlan left promiscuous mode [ 176.666855][ T5654] device veth0_vlan entered promiscuous mode [ 176.783496][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.810189][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.857611][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.925526][ T5656] device sit0 entered promiscuous mode [ 177.140605][ T5665] device pim6reg1 entered promiscuous mode [ 177.300667][ T5673] device pim6reg1 entered promiscuous mode [ 178.723836][ T5695] device veth0_vlan left promiscuous mode [ 178.747807][ T5695] device veth0_vlan entered promiscuous mode [ 179.036538][ T5698] device sit0 entered promiscuous mode [ 179.216831][ T5711] device pim6reg1 entered promiscuous mode [ 180.581737][ T5727] device veth0_vlan left promiscuous mode [ 180.588195][ T5727] device veth0_vlan entered promiscuous mode [ 180.887227][ T5729] device pim6reg1 entered promiscuous mode [ 182.095940][ T5776] device pim6reg1 entered promiscuous mode [ 182.110703][ T5772] device veth0_vlan left promiscuous mode [ 182.131849][ T5772] device veth0_vlan entered promiscuous mode [ 182.170292][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.179571][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.187372][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 182.194968][ T5774] device pim6reg1 entered promiscuous mode [ 182.345131][ T5774] device sit0 entered promiscuous mode [ 182.424300][ T5792] device veth0_vlan left promiscuous mode [ 182.455060][ T5792] device veth0_vlan entered promiscuous mode [ 182.525896][ T5793] device veth0_vlan left promiscuous mode [ 182.541437][ T5793] device veth0_vlan entered promiscuous mode [ 182.597211][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.613313][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.646775][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 182.943961][ T30] audit: type=1400 audit(1743551772.040:163): avc: denied { create } for pid=5797 comm="syz.1.1666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 184.387469][ T5824] device pim6reg1 entered promiscuous mode [ 185.072280][ T5856] device pim6reg1 entered promiscuous mode [ 185.294366][ T5859] device veth0_vlan left promiscuous mode [ 185.320501][ T5859] device veth0_vlan entered promiscuous mode [ 185.381633][ T5873] device pim6reg1 entered promiscuous mode [ 185.893427][ T5896] device veth0_vlan left promiscuous mode [ 185.947313][ T5896] device veth0_vlan entered promiscuous mode [ 186.019374][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.045191][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.109781][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.194831][ T5897] device wg2 entered promiscuous mode [ 186.260083][ T5903] device pim6reg1 entered promiscuous mode [ 186.898560][ T5924] device pim6reg1 entered promiscuous mode [ 187.308612][ T5942] device pim6reg1 entered promiscuous mode [ 187.765080][ T5948] device veth0_vlan left promiscuous mode [ 187.802135][ T5948] device veth0_vlan entered promiscuous mode [ 187.852256][ T5948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 187.891566][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 187.915648][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 187.931961][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.288378][ T5974] device pim6reg1 entered promiscuous mode [ 188.352708][ T5984] device pim6reg1 entered promiscuous mode [ 188.867747][ T5996] device veth0_vlan left promiscuous mode [ 188.978808][ T5996] device veth0_vlan entered promiscuous mode [ 189.458244][ T6004] device veth0_vlan left promiscuous mode [ 189.518040][ T6004] device veth0_vlan entered promiscuous mode [ 189.586678][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 189.618731][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 189.653368][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 189.837534][ T6017] device syzkaller0 entered promiscuous mode [ 190.327356][ T6026] device pim6reg1 entered promiscuous mode [ 190.445905][ T6034] device pim6reg1 entered promiscuous mode [ 192.180631][ T6077] device pim6reg1 entered promiscuous mode [ 192.925139][ T6105] device pim6reg1 entered promiscuous mode [ 193.316561][ T6113] device veth0_vlan left promiscuous mode [ 193.326871][ T6113] device veth0_vlan entered promiscuous mode [ 193.383510][ T6117] Â: renamed from pim6reg1 [ 195.294357][ T6144] device pim6reg1 entered promiscuous mode [ 196.578905][ T6189] device pim6reg1 entered promiscuous mode [ 197.916188][ T6222] FAULT_INJECTION: forcing a failure. [ 197.916188][ T6222] name failslab, interval 1, probability 0, space 0, times 0 [ 198.027584][ T6222] CPU: 0 PID: 6222 Comm: syz.4.1798 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 198.037324][ T6222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 198.047241][ T6222] Call Trace: [ 198.050336][ T6222] [ 198.053118][ T6222] dump_stack_lvl+0x151/0x1c0 [ 198.057629][ T6222] ? io_uring_drop_tctx_refs+0x190/0x190 [ 198.063531][ T6222] ? __kasan_slab_alloc+0xc3/0xe0 [ 198.068388][ T6222] ? __kasan_slab_alloc+0xb1/0xe0 [ 198.073254][ T6222] ? slab_post_alloc_hook+0x53/0x2c0 [ 198.078476][ T6222] ? dup_task_struct+0x53/0xc60 [ 198.083154][ T6222] ? copy_process+0x5c4/0x3290 [ 198.087758][ T6222] ? kernel_clone+0x21e/0x9e0 [ 198.092270][ T6222] dump_stack+0x15/0x20 [ 198.096266][ T6222] should_fail+0x3c6/0x510 [ 198.100615][ T6222] __should_failslab+0xa4/0xe0 [ 198.105211][ T6222] should_failslab+0x9/0x20 [ 198.109725][ T6222] slab_pre_alloc_hook+0x37/0xd0 [ 198.114498][ T6222] kmem_cache_alloc_trace+0x48/0x270 [ 198.119618][ T6222] ? __get_vm_area_node+0x117/0x360 [ 198.124659][ T6222] __get_vm_area_node+0x117/0x360 [ 198.129516][ T6222] __vmalloc_node_range+0xe2/0x8d0 [ 198.134460][ T6222] ? copy_process+0x5c4/0x3290 [ 198.139063][ T6222] ? slab_post_alloc_hook+0x72/0x2c0 [ 198.144182][ T6222] ? dup_task_struct+0x53/0xc60 [ 198.148873][ T6222] ? dup_task_struct+0x53/0xc60 [ 198.153557][ T6222] dup_task_struct+0x416/0xc60 [ 198.158156][ T6222] ? copy_process+0x5c4/0x3290 [ 198.162755][ T6222] ? __kasan_check_write+0x14/0x20 [ 198.167706][ T6222] copy_process+0x5c4/0x3290 [ 198.172129][ T6222] ? bad_area_nosemaphore+0x2d/0x40 [ 198.177172][ T6222] ? exc_page_fault+0x47a/0x7f0 [ 198.181855][ T6222] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 198.186888][ T6222] kernel_clone+0x21e/0x9e0 [ 198.191222][ T6222] ? __check_object_size+0x73/0x3d0 [ 198.196258][ T6222] ? create_io_thread+0x1e0/0x1e0 [ 198.201121][ T6222] __x64_sys_clone+0x23f/0x290 [ 198.205718][ T6222] ? __do_sys_vfork+0x130/0x130 [ 198.210497][ T6222] ? __bpf_trace_sys_enter+0x62/0x70 [ 198.215613][ T6222] x64_sys_call+0x1b0/0x9a0 [ 198.219955][ T6222] do_syscall_64+0x3b/0xb0 [ 198.224205][ T6222] ? clear_bhb_loop+0x35/0x90 [ 198.228719][ T6222] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 198.234445][ T6222] RIP: 0033:0x7f0508527169 [ 198.238699][ T6222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 198.258147][ T6222] RSP: 002b:00007f0506b90fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 198.266388][ T6222] RAX: ffffffffffffffda RBX: 00007f050873ffa0 RCX: 00007f0508527169 [ 198.274194][ T6222] RDX: 0000000000000000 RSI: fffffffffffffe50 RDI: 0000000002001000 [ 198.282011][ T6222] RBP: 00007f0506b91090 R08: 0000000000000000 R09: 0000000000000000 [ 198.289819][ T6222] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 198.297633][ T6222] R13: 0000000000000001 R14: 00007f050873ffa0 R15: 00007ffedd9a1678 [ 198.305453][ T6222] [ 198.336949][ T6222] syz.4.1798: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 198.352608][ T6222] CPU: 1 PID: 6222 Comm: syz.4.1798 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 198.362325][ T6222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 198.372219][ T6222] Call Trace: [ 198.375343][ T6222] [ 198.378123][ T6222] dump_stack_lvl+0x151/0x1c0 [ 198.382635][ T6222] ? io_uring_drop_tctx_refs+0x190/0x190 [ 198.388138][ T6222] ? pr_cont_kernfs_name+0xf0/0x100 [ 198.393136][ T6222] dump_stack+0x15/0x20 [ 198.397129][ T6222] warn_alloc+0x21a/0x390 [ 198.401298][ T6222] ? should_failslab+0x9/0x20 [ 198.405809][ T6222] ? zone_watermark_ok_safe+0x270/0x270 [ 198.411190][ T6222] ? __get_vm_area_node+0x347/0x360 [ 198.416230][ T6222] __vmalloc_node_range+0x2c1/0x8d0 [ 198.421255][ T6222] ? slab_post_alloc_hook+0x72/0x2c0 [ 198.426379][ T6222] ? dup_task_struct+0x53/0xc60 [ 198.431067][ T6222] ? dup_task_struct+0x53/0xc60 [ 198.435752][ T6222] dup_task_struct+0x416/0xc60 [ 198.440348][ T6222] ? copy_process+0x5c4/0x3290 [ 198.444948][ T6222] ? __kasan_check_write+0x14/0x20 [ 198.449898][ T6222] copy_process+0x5c4/0x3290 [ 198.454327][ T6222] ? bad_area_nosemaphore+0x2d/0x40 [ 198.459448][ T6222] ? exc_page_fault+0x47a/0x7f0 [ 198.464135][ T6222] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 198.469089][ T6222] kernel_clone+0x21e/0x9e0 [ 198.473418][ T6222] ? __check_object_size+0x73/0x3d0 [ 198.478450][ T6222] ? create_io_thread+0x1e0/0x1e0 [ 198.483320][ T6222] __x64_sys_clone+0x23f/0x290 [ 198.487918][ T6222] ? __do_sys_vfork+0x130/0x130 [ 198.492689][ T6222] ? __bpf_trace_sys_enter+0x62/0x70 [ 198.497891][ T6222] x64_sys_call+0x1b0/0x9a0 [ 198.502232][ T6222] do_syscall_64+0x3b/0xb0 [ 198.506482][ T6222] ? clear_bhb_loop+0x35/0x90 [ 198.510996][ T6222] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 198.516722][ T6222] RIP: 0033:0x7f0508527169 [ 198.520980][ T6222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 198.540417][ T6222] RSP: 002b:00007f0506b90fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 198.548666][ T6222] RAX: ffffffffffffffda RBX: 00007f050873ffa0 RCX: 00007f0508527169 [ 198.556477][ T6222] RDX: 0000000000000000 RSI: fffffffffffffe50 RDI: 0000000002001000 [ 198.564285][ T6222] RBP: 00007f0506b91090 R08: 0000000000000000 R09: 0000000000000000 [ 198.572096][ T6222] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 198.579910][ T6222] R13: 0000000000000001 R14: 00007f050873ffa0 R15: 00007ffedd9a1678 [ 198.587729][ T6222] [ 198.716726][ T6230] device pim6reg1 entered promiscuous mode [ 198.774265][ T6222] Mem-Info: [ 198.777272][ T6222] active_anon:99 inactive_anon:15035 isolated_anon:0 [ 198.777272][ T6222] active_file:23491 inactive_file:3032 isolated_file:0 [ 198.777272][ T6222] unevictable:0 dirty:245 writeback:0 [ 198.777272][ T6222] slab_reclaimable:7231 slab_unreclaimable:76543 [ 198.777272][ T6222] mapped:28663 shmem:225 pagetables:608 bounce:0 [ 198.777272][ T6222] kernel_misc_reclaimable:0 [ 198.777272][ T6222] free:1535431 free_pcp:17290 free_cma:0 [ 198.827046][ T6222] Node 0 active_anon:396kB inactive_anon:60140kB active_file:93964kB inactive_file:12128kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:114652kB dirty:980kB writeback:0kB shmem:900kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4188kB pagetables:2432kB all_unreclaimable? no [ 198.876230][ T6222] DMA32 free:2974676kB min:62568kB low:78208kB high:93848kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2978944kB mlocked:0kB bounce:0kB free_pcp:4268kB local_pcp:0kB free_cma:0kB [ 198.921731][ T6222] lowmem_reserve[]: 0 3941 3941 [ 198.927142][ T6222] Normal free:3166800kB min:84884kB low:106104kB high:127324kB reserved_highatomic:0KB active_anon:408kB inactive_anon:60276kB active_file:93992kB inactive_file:12168kB unevictable:0kB writepending:1052kB present:5242880kB managed:4035584kB mlocked:0kB bounce:0kB free_pcp:66244kB local_pcp:28724kB free_cma:0kB [ 198.960384][ T6222] lowmem_reserve[]: 0 0 0 [ 198.974265][ T6222] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 723*4096kB (M) = 2974676kB [ 198.989812][ T6222] Normal: 3332*4kB (ME) 2939*8kB (UME) 1755*16kB (UME) 1152*32kB (UME) 651*64kB (UME) 350*128kB (UME) 162*256kB (UME) 54*512kB (UME) 21*1024kB (UE) 10*2048kB (U) 700*4096kB (UM) = 3166552kB [ 199.008452][ T6222] 26768 total pagecache pages [ 199.012881][ T6222] 0 pages in swap cache [ 199.016852][ T6222] Swap cache stats: add 0, delete 0, find 0/0 [ 199.046993][ T6222] Free swap = 124996kB [ 199.051095][ T6222] Total swap = 124996kB [ 199.055069][ T6222] 2097051 pages RAM [ 199.059340][ T6222] 0 pages HighMem/MovableOnly [ 199.063927][ T6222] 343419 pages reserved [ 199.091406][ T6222] 0 pages cma reserved [ 199.888672][ T6260] device wg2 left promiscuous mode [ 199.941061][ T6260] device wg2 entered promiscuous mode [ 200.443138][ T6288] device pim6reg1 entered promiscuous mode [ 201.164445][ T6303] device pim6reg1 entered promiscuous mode [ 201.447824][ T6325] device pim6reg1 entered promiscuous mode [ 202.224797][ T6344] syz.2.1837[6344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.224914][ T6344] syz.2.1837[6344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.470584][ T6360] device sit0 left promiscuous mode [ 202.559389][ T6368] device pim6reg1 entered promiscuous mode [ 202.763169][ T6373] device wg2 entered promiscuous mode [ 202.851962][ T6376] device pim6reg1 entered promiscuous mode [ 203.235002][ T6402] device pim6reg1 entered promiscuous mode [ 204.094920][ T6430] device pim6reg1 entered promiscuous mode [ 204.203989][ T6435] device pim6reg1 entered promiscuous mode [ 204.344945][ T6437] device pim6reg1 entered promiscuous mode [ 205.276453][ T6474] syz.2.1880[6474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.277712][ T6474] syz.2.1880[6474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.332990][ T6474] syz.2.1880[6474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.372598][ T6474] syz.2.1880[6474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.468215][ T6482] device pim6reg1 entered promiscuous mode [ 205.655820][ T6486] device veth0_vlan left promiscuous mode [ 205.687892][ T6486] device veth0_vlan entered promiscuous mode [ 206.533737][ T6523] device pim6reg1 entered promiscuous mode [ 206.646462][ T30] audit: type=1400 audit(1743551795.740:164): avc: denied { attach_queue } for pid=6537 comm="syz.0.1900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 206.712451][ T6535] device syzkaller0 entered promiscuous mode [ 207.000307][ T6554] device pim6reg1 entered promiscuous mode [ 207.541191][ T6562] device pim6reg1 entered promiscuous mode [ 207.981265][ T6566] syz.1.1910[6566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.994227][ T6566] syz.1.1910[6566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.065173][ T6582] syz.1.1910[6582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.142416][ T6582] syz.1.1910[6582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.259276][ T6591] device pim6reg1 entered promiscuous mode [ 208.308423][ T6596] device pim6reg1 entered promiscuous mode [ 208.636428][ T6613] device wg2 left promiscuous mode [ 209.311512][ T6625] syz.4.1928[6625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.312575][ T6625] syz.4.1928[6625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.408856][ T6625] syz.4.1928[6625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.541917][ T6625] syz.4.1928[6625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.797695][ T6640] device pim6reg1 entered promiscuous mode [ 210.303156][ T6672] device pim6reg1 entered promiscuous mode [ 212.267455][ T6733] device pim6reg1 entered promiscuous mode [ 212.593080][ T6750] device veth0_vlan left promiscuous mode [ 212.648632][ T6750] device veth0_vlan entered promiscuous mode [ 212.712942][ T6748] device wg2 left promiscuous mode [ 212.740066][ T6752] device wg2 entered promiscuous mode [ 212.890096][ T6758] device pim6reg1 entered promiscuous mode [ 214.360351][ T6797] device pim6reg1 entered promiscuous mode [ 215.549671][ T6820] device wg2 entered promiscuous mode [ 215.805371][ T6839] device pim6reg1 entered promiscuous mode [ 216.119764][ T6847] device veth0_vlan left promiscuous mode [ 216.126104][ T6847] device veth0_vlan entered promiscuous mode [ 216.150966][ T6847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.191238][ T555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.204826][ T555] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 216.212076][ T555] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 216.299949][ T6851] device pim6reg1 entered promiscuous mode [ 217.112297][ T6878] device pim6reg1 entered promiscuous mode [ 217.214423][ T6876] device wg2 entered promiscuous mode [ 217.482246][ T6896] device veth0_vlan left promiscuous mode [ 217.565151][ T6896] device veth0_vlan entered promiscuous mode [ 217.666768][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.684261][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 217.720270][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.912215][ T6929] device pim6reg1 entered promiscuous mode [ 220.210203][ T6957] device pim6reg1 entered promiscuous mode [ 220.342606][ T6961] device veth0_vlan left promiscuous mode [ 220.468400][ T6961] device veth0_vlan entered promiscuous mode [ 221.667755][ T7000] device pim6reg1 entered promiscuous mode [ 223.084607][ T7041] device pim6reg1 entered promiscuous mode [ 223.491677][ T7066] FAULT_INJECTION: forcing a failure. [ 223.491677][ T7066] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 223.622260][ T7066] CPU: 1 PID: 7066 Comm: syz.2.2066 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 223.632006][ T7066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 223.641900][ T7066] Call Trace: [ 223.645021][ T7066] [ 223.647805][ T7066] dump_stack_lvl+0x151/0x1c0 [ 223.652315][ T7066] ? io_uring_drop_tctx_refs+0x190/0x190 [ 223.657785][ T7066] dump_stack+0x15/0x20 [ 223.661770][ T7066] should_fail+0x3c6/0x510 [ 223.666026][ T7066] should_fail_usercopy+0x1a/0x20 [ 223.670883][ T7066] _copy_from_user+0x20/0xd0 [ 223.675314][ T7066] __sys_bpf+0x1e9/0x760 [ 223.679390][ T7066] ? fput_many+0x160/0x1b0 [ 223.683648][ T7066] ? bpf_link_show_fdinfo+0x300/0x300 [ 223.688852][ T7066] ? debug_smp_processor_id+0x17/0x20 [ 223.694081][ T7066] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 223.699965][ T7066] __x64_sys_bpf+0x7c/0x90 [ 223.704216][ T7066] x64_sys_call+0x87f/0x9a0 [ 223.708553][ T7066] do_syscall_64+0x3b/0xb0 [ 223.712816][ T7066] ? clear_bhb_loop+0x35/0x90 [ 223.717315][ T7066] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 223.723047][ T7066] RIP: 0033:0x7f9d0c7f1169 [ 223.727302][ T7066] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 223.746753][ T7066] RSP: 002b:00007f9d0ae5b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 223.754986][ T7066] RAX: ffffffffffffffda RBX: 00007f9d0ca09fa0 RCX: 00007f9d0c7f1169 [ 223.762881][ T7066] RDX: 0000000000000010 RSI: 0000200000000080 RDI: 000000000000000f [ 223.770697][ T7066] RBP: 00007f9d0ae5b090 R08: 0000000000000000 R09: 0000000000000000 [ 223.778505][ T7066] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 223.786362][ T7066] R13: 0000000000000000 R14: 00007f9d0ca09fa0 R15: 00007fff2c6fee38 [ 223.794143][ T7066] [ 224.076969][ T7088] device pim6reg1 entered promiscuous mode [ 225.144983][ T7123] device pim6reg1 entered promiscuous mode [ 225.201500][ T7125] device pim6reg1 entered promiscuous mode [ 225.941785][ T7146] device sit0 left promiscuous mode [ 226.117814][ T7147] device sit0 entered promiscuous mode [ 226.339972][ T7168] device pim6reg1 entered promiscuous mode [ 227.646493][ T7217] device pim6reg1 entered promiscuous mode [ 228.669666][ T7257] device wg2 left promiscuous mode [ 228.756037][ T7271] FAULT_INJECTION: forcing a failure. [ 228.756037][ T7271] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 228.857606][ T7271] CPU: 0 PID: 7271 Comm: syz.2.2130 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 228.867343][ T7271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 228.877253][ T7271] Call Trace: [ 228.880360][ T7271] [ 228.883143][ T7271] dump_stack_lvl+0x151/0x1c0 [ 228.887714][ T7271] ? io_uring_drop_tctx_refs+0x190/0x190 [ 228.893125][ T7271] dump_stack+0x15/0x20 [ 228.897120][ T7271] should_fail+0x3c6/0x510 [ 228.901365][ T7271] should_fail_alloc_page+0x5a/0x80 [ 228.906397][ T7271] prepare_alloc_pages+0x15c/0x700 [ 228.911348][ T7271] ? __alloc_pages_bulk+0xd80/0xd80 [ 228.916379][ T7271] ? stack_trace_save+0x1c0/0x1c0 [ 228.921237][ T7271] __alloc_pages+0x18c/0x8f0 [ 228.925668][ T7271] ? prep_new_page+0x110/0x110 [ 228.930265][ T7271] ? stack_trace_save+0x113/0x1c0 [ 228.935128][ T7271] wp_page_copy+0x1d4/0x1b00 [ 228.939557][ T7271] ? __kasan_check_write+0x14/0x20 [ 228.944499][ T7271] ? insert_page_into_pte_locked+0x4e0/0x4e0 [ 228.950314][ T7271] ? __pte_map_lock+0x442/0x620 [ 228.954995][ T7271] ? vm_normal_page+0x1e1/0x1f0 [ 228.959685][ T7271] do_wp_page+0x9ca/0xc90 [ 228.963851][ T7271] handle_pte_fault+0x7f1/0x28f0 [ 228.968628][ T7271] ? fault_around_bytes_set+0xc0/0xc0 [ 228.973833][ T7271] ? stack_trace_save+0x113/0x1c0 [ 228.978704][ T7271] ? cgroup_rstat_updated+0xe5/0x370 [ 228.983815][ T7271] do_handle_mm_fault+0x20bc/0x2400 [ 228.988855][ T7271] ? numa_migrate_prep+0xe0/0xe0 [ 228.993620][ T7271] ? do_handle_mm_fault+0x1807/0x2400 [ 228.998832][ T7271] ? numa_migrate_prep+0xe0/0xe0 [ 229.003601][ T7271] ? down_read_trylock+0x3d6/0x7d0 [ 229.008552][ T7271] ? __init_rwsem+0x1d0/0x1d0 [ 229.013062][ T7271] ? vmacache_find+0x21f/0x4d0 [ 229.017665][ T7271] ? __find_vma+0x30/0x150 [ 229.021914][ T7271] exc_page_fault+0x3b5/0x7f0 [ 229.026439][ T7271] asm_exc_page_fault+0x27/0x30 [ 229.031219][ T7271] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 229.037378][ T7271] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 229.056818][ T7271] RSP: 0018:ffffc90000bf78e0 EFLAGS: 00050202 [ 229.062721][ T7271] RAX: ffffffff82663601 RBX: 0000000000000020 RCX: 0000000000000004 [ 229.070616][ T7271] RDX: 0000000000000000 RSI: ffffc90000bf7980 RDI: 0000200000002600 [ 229.078431][ T7271] RBP: ffffc90000bf7910 R08: 0000000000000000 R09: fffff5200017ef34 [ 229.086242][ T7271] R10: 0000000000000000 R11: dffffc0000000001 R12: 00007ffffffff000 [ 229.094073][ T7271] R13: 0000200000002620 R14: ffffc90000bf7980 R15: 0000200000002600 [ 229.101869][ T7271] ? _copy_to_user+0x41/0x90 [ 229.106292][ T7271] ? _copy_to_user+0x78/0x90 [ 229.110718][ T7271] btf_get_info_by_fd+0x4f6/0x710 [ 229.115583][ T7271] ? btf_get_by_fd+0x180/0x180 [ 229.120181][ T7271] ? check_zeroed_user+0x7e/0x190 [ 229.125037][ T7271] ? check_zeroed_user+0x13f/0x190 [ 229.129984][ T7271] bpf_obj_get_info_by_fd+0xd0d/0x3ce0 [ 229.135282][ T7271] ? kernelmode_fixup_or_oops+0x83/0xd0 [ 229.140659][ T7271] ? __bad_area_nosemaphore+0xc2/0x480 [ 229.145959][ T7271] ? bpf_map_get_fd_by_id+0x350/0x350 [ 229.151169][ T7271] ? bad_area_nosemaphore+0x2d/0x40 [ 229.156197][ T7271] ? irqentry_exit+0x30/0x40 [ 229.160626][ T7271] ? exc_page_fault+0x47a/0x7f0 [ 229.165310][ T7271] ? proc_fail_nth_write+0x20b/0x290 [ 229.170440][ T7271] ? asm_exc_page_fault+0x27/0x30 [ 229.175293][ T7271] ? selinux_bpf+0xd2/0x100 [ 229.179633][ T7271] ? security_bpf+0x82/0xb0 [ 229.183972][ T7271] __sys_bpf+0x41c/0x760 [ 229.188049][ T7271] ? bpf_probe_read_user+0x67/0x70 [ 229.193009][ T7271] ? bpf_link_show_fdinfo+0x300/0x300 [ 229.198211][ T7271] __x64_sys_bpf+0x7c/0x90 [ 229.202456][ T7271] x64_sys_call+0x87f/0x9a0 [ 229.206796][ T7271] do_syscall_64+0x3b/0xb0 [ 229.211060][ T7271] ? clear_bhb_loop+0x35/0x90 [ 229.215566][ T7271] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 229.221292][ T7271] RIP: 0033:0x7f9d0c7f1169 [ 229.225547][ T7271] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 229.244982][ T7271] RSP: 002b:00007f9d0ae5b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 229.253230][ T7271] RAX: ffffffffffffffda RBX: 00007f9d0ca09fa0 RCX: 00007f9d0c7f1169 [ 229.261302][ T7271] RDX: 0000000000000010 RSI: 0000200000000080 RDI: 000000000000000f [ 229.269113][ T7271] RBP: 00007f9d0ae5b090 R08: 0000000000000000 R09: 0000000000000000 [ 229.276926][ T7271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 229.284736][ T7271] R13: 0000000000000000 R14: 00007f9d0ca09fa0 R15: 00007fff2c6fee38 [ 229.292902][ T7271] [ 230.805617][ T7327] FAULT_INJECTION: forcing a failure. [ 230.805617][ T7327] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 230.974023][ T7327] CPU: 1 PID: 7327 Comm: syz.3.2147 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 230.983770][ T7327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 230.993661][ T7327] Call Trace: [ 230.996785][ T7327] [ 230.999561][ T7327] dump_stack_lvl+0x151/0x1c0 [ 231.004082][ T7327] ? io_uring_drop_tctx_refs+0x190/0x190 [ 231.009548][ T7327] dump_stack+0x15/0x20 [ 231.013535][ T7327] should_fail+0x3c6/0x510 [ 231.017794][ T7327] should_fail_usercopy+0x1a/0x20 [ 231.022654][ T7327] _copy_to_user+0x20/0x90 [ 231.026902][ T7327] simple_read_from_buffer+0xc7/0x150 [ 231.032112][ T7327] proc_fail_nth_read+0x1a3/0x210 [ 231.036979][ T7327] ? proc_fault_inject_write+0x390/0x390 [ 231.042435][ T7327] ? fsnotify_perm+0x269/0x5b0 [ 231.047037][ T7327] ? security_file_permission+0x86/0xb0 [ 231.052419][ T7327] ? proc_fault_inject_write+0x390/0x390 [ 231.057887][ T7327] vfs_read+0x27d/0xd40 [ 231.061878][ T7327] ? kernel_read+0x1f0/0x1f0 [ 231.066311][ T7327] ? __kasan_check_write+0x14/0x20 [ 231.071250][ T7327] ? mutex_lock+0xb6/0x1e0 [ 231.075512][ T7327] ? wait_for_completion_killable_timeout+0x10/0x10 [ 231.081934][ T7327] ? __fdget_pos+0x2e7/0x3a0 [ 231.086355][ T7327] ? ksys_read+0x77/0x2c0 [ 231.090522][ T7327] ksys_read+0x199/0x2c0 [ 231.094606][ T7327] ? bpf_trace_run1+0x1c0/0x1c0 [ 231.099290][ T7327] ? vfs_write+0x1110/0x1110 [ 231.103713][ T7327] ? __bpf_trace_sys_enter+0x62/0x70 [ 231.108835][ T7327] __x64_sys_read+0x7b/0x90 [ 231.113175][ T7327] x64_sys_call+0x28/0x9a0 [ 231.117429][ T7327] do_syscall_64+0x3b/0xb0 [ 231.121682][ T7327] ? clear_bhb_loop+0x35/0x90 [ 231.126193][ T7327] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 231.131951][ T7327] RIP: 0033:0x7f75b50bdb7c [ 231.136172][ T7327] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 231.155618][ T7327] RSP: 002b:00007f75b3729030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 231.163860][ T7327] RAX: ffffffffffffffda RBX: 00007f75b52d7fa0 RCX: 00007f75b50bdb7c [ 231.171681][ T7327] RDX: 000000000000000f RSI: 00007f75b37290a0 RDI: 0000000000000004 [ 231.179485][ T7327] RBP: 00007f75b3729090 R08: 0000000000000000 R09: 0000000000000000 [ 231.187297][ T7327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 231.195202][ T7327] R13: 0000000000000000 R14: 00007f75b52d7fa0 R15: 00007ffec1ccc318 [ 231.203023][ T7327] [ 232.343993][ T7362] device pim6reg1 entered promiscuous mode [ 232.968630][ T30] audit: type=1400 audit(1743551822.060:165): avc: denied { create } for pid=7375 comm="syz.4.2163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 233.158252][ T7379] device syzkaller0 entered promiscuous mode [ 233.554889][ T7397] device pim6reg1 entered promiscuous mode [ 235.279413][ T7434] device pim6reg1 entered promiscuous mode [ 236.285834][ T7464] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.292856][ T7464] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.346228][ T7464] device bridge0 left promiscuous mode [ 237.257250][ T7487] device syzkaller0 entered promiscuous mode [ 238.395473][ T7523] device pim6reg1 entered promiscuous mode [ 238.740246][ T7532] device pim6reg1 entered promiscuous mode [ 240.301243][ T7563] device pim6reg1 entered promiscuous mode [ 241.906687][ T7601] FAULT_INJECTION: forcing a failure. [ 241.906687][ T7601] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 242.027310][ T7601] CPU: 1 PID: 7601 Comm: syz.2.2236 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 242.037054][ T7601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 242.047380][ T7601] Call Trace: [ 242.050566][ T7601] [ 242.053284][ T7601] dump_stack_lvl+0x151/0x1c0 [ 242.057797][ T7601] ? io_uring_drop_tctx_refs+0x190/0x190 [ 242.063302][ T7601] dump_stack+0x15/0x20 [ 242.067258][ T7601] should_fail+0x3c6/0x510 [ 242.071519][ T7601] should_fail_usercopy+0x1a/0x20 [ 242.076368][ T7601] _copy_from_user+0x20/0xd0 [ 242.080794][ T7601] ___sys_recvmsg+0x150/0x690 [ 242.085315][ T7601] ? __sys_recvmsg+0x260/0x260 [ 242.089920][ T7601] ? __fdget+0x1bc/0x240 [ 242.093991][ T7601] __x64_sys_recvmsg+0x1dc/0x2b0 [ 242.098766][ T7601] ? ___sys_recvmsg+0x690/0x690 [ 242.103465][ T7601] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 242.109359][ T7601] ? exit_to_user_mode_prepare+0x39/0xa0 [ 242.114910][ T7601] x64_sys_call+0x171/0x9a0 [ 242.119826][ T7601] do_syscall_64+0x3b/0xb0 [ 242.124023][ T7601] ? clear_bhb_loop+0x35/0x90 [ 242.128619][ T7601] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 242.134348][ T7601] RIP: 0033:0x7f9d0c7f1169 [ 242.138604][ T7601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 242.158144][ T7601] RSP: 002b:00007f9d0ae5b038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 242.166630][ T7601] RAX: ffffffffffffffda RBX: 00007f9d0ca09fa0 RCX: 00007f9d0c7f1169 [ 242.174453][ T7601] RDX: 0000000000000000 RSI: 00002000000008c0 RDI: 0000000000000004 [ 242.182365][ T7601] RBP: 00007f9d0ae5b090 R08: 0000000000000000 R09: 0000000000000000 [ 242.190269][ T7601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 242.198075][ T7601] R13: 0000000000000000 R14: 00007f9d0ca09fa0 R15: 00007fff2c6fee38 [ 242.205895][ T7601] [ 242.231311][ T7615] device pim6reg1 entered promiscuous mode [ 242.924211][ T7652] device pim6reg1 entered promiscuous mode [ 243.110559][ T7656] FAULT_INJECTION: forcing a failure. [ 243.110559][ T7656] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 243.266997][ T7656] CPU: 1 PID: 7656 Comm: syz.3.2254 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 243.276738][ T7656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 243.286632][ T7656] Call Trace: [ 243.289753][ T7656] [ 243.292529][ T7656] dump_stack_lvl+0x151/0x1c0 [ 243.297050][ T7656] ? io_uring_drop_tctx_refs+0x190/0x190 [ 243.302519][ T7656] ? __kasan_check_write+0x14/0x20 [ 243.307471][ T7656] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 243.312758][ T7656] ? x64_sys_call+0x6bf/0x9a0 [ 243.317266][ T7656] dump_stack+0x15/0x20 [ 243.321258][ T7656] should_fail+0x3c6/0x510 [ 243.325519][ T7656] should_fail_usercopy+0x1a/0x20 [ 243.330371][ T7656] _copy_from_user+0x20/0xd0 [ 243.334797][ T7656] iovec_from_user+0xc7/0x330 [ 243.339312][ T7656] __import_iovec+0x6d/0x420 [ 243.343742][ T7656] import_iovec+0xe5/0x120 [ 243.347990][ T7656] ___sys_recvmsg+0x56b/0x690 [ 243.352503][ T7656] ? __sys_recvmsg+0x260/0x260 [ 243.357113][ T7656] ? __fdget+0x1bc/0x240 [ 243.361185][ T7656] __x64_sys_recvmsg+0x1dc/0x2b0 [ 243.365955][ T7656] ? ___sys_recvmsg+0x690/0x690 [ 243.370646][ T7656] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 243.376551][ T7656] ? exit_to_user_mode_prepare+0x39/0xa0 [ 243.382015][ T7656] x64_sys_call+0x171/0x9a0 [ 243.386351][ T7656] do_syscall_64+0x3b/0xb0 [ 243.390603][ T7656] ? clear_bhb_loop+0x35/0x90 [ 243.395119][ T7656] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 243.400848][ T7656] RIP: 0033:0x7f75b50bf169 [ 243.405102][ T7656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 243.424543][ T7656] RSP: 002b:00007f75b3729038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 243.432787][ T7656] RAX: ffffffffffffffda RBX: 00007f75b52d7fa0 RCX: 00007f75b50bf169 [ 243.440598][ T7656] RDX: 0000000000000000 RSI: 00002000000008c0 RDI: 0000000000000004 [ 243.448408][ T7656] RBP: 00007f75b3729090 R08: 0000000000000000 R09: 0000000000000000 [ 243.456218][ T7656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 243.464033][ T7656] R13: 0000000000000000 R14: 00007f75b52d7fa0 R15: 00007ffec1ccc318 [ 243.471849][ T7656] [ 243.601678][ T7677] ªªªªªª: renamed from vlan0 [ 243.989991][ T7696] device pim6reg1 entered promiscuous mode [ 244.989365][ T7741] device pim6reg1 entered promiscuous mode [ 245.688136][ T7753] device pim6reg1 entered promiscuous mode [ 246.245164][ T7776] device wg2 left promiscuous mode [ 246.665924][ T7789] device pim6reg1 entered promiscuous mode [ 248.996862][ C1] sched: RT throttling activated [ 249.017447][ T7833] device pim6reg1 entered promiscuous mode [ 251.370373][ T7886] device pim6reg1 entered promiscuous mode [ 251.415513][ T7887] device pim6reg1 entered promiscuous mode [ 252.468958][ T7930] device pim6reg1 entered promiscuous mode [ 252.777114][ T7941] device wg2 entered promiscuous mode [ 252.862602][ T7940] device bridge_slave_1 left promiscuous mode [ 252.874186][ T7940] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.894309][ T7940] device bridge_slave_0 left promiscuous mode [ 252.907360][ T7940] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.066684][ T7943] device wg2 entered promiscuous mode [ 253.103291][ T7954] device pim6reg1 entered promiscuous mode [ 253.603530][ T7969] device pim6reg1 entered promiscuous mode [ 254.026111][ T7978] device wg2 left promiscuous mode [ 254.097254][ T7982] device wg2 entered promiscuous mode [ 254.442733][ T8001] device pim6reg1 entered promiscuous mode [ 255.359109][ T8035] device pim6reg1 entered promiscuous mode [ 255.612769][ T8044] device wg2 left promiscuous mode [ 255.759868][ T8044] device wg2 entered promiscuous mode [ 256.078249][ T8057] device veth0_vlan left promiscuous mode [ 256.083832][ T8057] device veth0_vlan entered promiscuous mode [ 256.126455][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.157690][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.187363][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 256.194856][ T8062] bond_slave_1: mtu less than device minimum [ 256.291865][ T8071] device pim6reg1 entered promiscuous mode [ 257.446666][ T8105] device wg2 left promiscuous mode [ 257.500562][ T8105] bridge0: port 3(veth0) entered blocking state [ 257.562374][ T8105] bridge0: port 3(veth0) entered disabled state [ 257.618264][ T8105] device veth0 entered promiscuous mode [ 257.699880][ T8115] device wg2 entered promiscuous mode [ 257.751258][ T8120] device pim6reg1 entered promiscuous mode [ 259.436271][ T8152] device pim6reg1 entered promiscuous mode [ 259.826518][ T8167] device pim6reg1 entered promiscuous mode [ 260.061403][ T8178] device pim6reg1 entered promiscuous mode [ 262.349239][ T8263] device veth1_macvtap left promiscuous mode [ 262.365918][ T8263] device macsec0 left promiscuous mode [ 262.417814][ T8264] device veth1_macvtap entered promiscuous mode [ 262.457358][ T8264] device macsec0 entered promiscuous mode [ 262.520441][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 264.483663][ T30] audit: type=1400 audit(1743551853.580:167): avc: denied { create } for pid=8335 comm="syz.3.2461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 264.513556][ T30] audit: type=1400 audit(1743551853.580:166): avc: denied { create } for pid=8335 comm="syz.3.2461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 264.562624][ T8340] device pim6reg1 entered promiscuous mode [ 264.654795][ T8342] device syzkaller0 entered promiscuous mode [ 265.953351][ T8388] device pim6reg1 entered promiscuous mode [ 266.831724][ T8423] device pim6reg1 entered promiscuous mode [ 267.536377][ T8437] device pim6reg1 entered promiscuous mode [ 267.890343][ T8463] device pim6reg1 entered promiscuous mode [ 268.443724][ T8491] device pim6reg1 entered promiscuous mode [ 269.532524][ T8511] device pim6reg1 entered promiscuous mode [ 269.664218][ T8515] device syzkaller0 entered promiscuous mode [ 269.722531][ T8526] device pim6reg1 entered promiscuous mode [ 269.846504][ T8523] device syzkaller0 entered promiscuous mode [ 271.044404][ T8550] device pim6reg1 entered promiscuous mode [ 275.518218][ T8654] device sit0 left promiscuous mode [ 275.670347][ T8651] device sit0 entered promiscuous mode [ 276.345940][ T8666] device pim6reg1 entered promiscuous mode [ 278.040223][ T8704] syz.0.2576 (8704) used obsolete PPPIOCDETACH ioctl [ 278.297245][ T8712] device pim6reg1 entered promiscuous mode [ 278.451930][ T8719] ªªªªªª: renamed from vlan0 [ 279.330040][ T30] audit: type=1400 audit(1743551868.430:168): avc: denied { create } for pid=8746 comm="syz.0.2589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 280.496092][ T8777] device syzkaller0 entered promiscuous mode [ 280.585668][ T8783] device pim6reg1 entered promiscuous mode [ 280.942142][ T8795] device sit0 entered promiscuous mode [ 281.993542][ T8836] syz.1.2616[8836] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.998815][ T8836] syz.1.2616[8836] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.340363][ T8902] device pim6reg1 entered promiscuous mode [ 285.105368][ T8929] device sit0 left promiscuous mode [ 285.307038][ T8929] device sit0 entered promiscuous mode [ 286.472554][ T8959] device pim6reg1 entered promiscuous mode [ 287.428622][ T8991] device pim6reg1 entered promiscuous mode [ 287.978748][ T9010] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 289.448902][ T9041] device syzkaller0 entered promiscuous mode [ 289.719625][ T9049] device wg2 left promiscuous mode [ 289.759380][ T9050] device wg2 entered promiscuous mode [ 291.528080][ T9108] device syzkaller0 entered promiscuous mode [ 291.674911][ T9114] : renamed from veth0_vlan [ 294.469941][ T9171] device pim6reg1 entered promiscuous mode [ 295.056497][ T9179] device pim6reg1 entered promiscuous mode [ 295.629217][ T9203] device pim6reg1 entered promiscuous mode [ 296.163323][ T9218] device pim6reg1 entered promiscuous mode [ 296.709848][ T9231] device pim6reg1 entered promiscuous mode [ 296.982324][ T9235] device pim6reg1 entered promiscuous mode [ 298.132251][ T9302] device pim6reg1 entered promiscuous mode [ 298.873848][ T9345] device pim6reg1 entered promiscuous mode [ 299.359598][ T9360] device pim6reg1 entered promiscuous mode [ 299.732053][ T9376] device pim6reg1 entered promiscuous mode [ 300.209045][ T9391] device pim6reg1 entered promiscuous mode [ 300.742699][ T9410] device pim6reg1 entered promiscuous mode [ 300.822509][ T9417] device sit0 left promiscuous mode [ 300.925845][ T9418] device sit0 entered promiscuous mode [ 301.214639][ T9434] device pim6reg1 entered promiscuous mode [ 301.478241][ T9444] device pim6reg1 entered promiscuous mode [ 302.835290][ T9463] device pim6reg1 entered promiscuous mode [ 303.670546][ T9476] device pim6reg1 entered promiscuous mode [ 305.245856][ T9513] device pim6reg1 entered promiscuous mode [ 305.516820][ T9528] device pim6reg1 entered promiscuous mode [ 306.448659][ T9560] device pim6reg1 entered promiscuous mode [ 306.908252][ T9586] syzkaller0: create flow: hash 1910631906 index 0 [ 307.014390][ T9584] device syzkaller0 entered promiscuous mode [ 307.183336][ T9586] syzkaller0 (unregistered): delete flow: hash 1910631906 index 0 [ 307.608777][ T9605] device pim6reg1 entered promiscuous mode [ 308.893051][ T9646] device bridge_slave_1 left promiscuous mode [ 308.912539][ T9646] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.957437][ T9646] device bridge_slave_0 left promiscuous mode [ 308.963409][ T9646] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.387222][ T9704] device pim6reg1 entered promiscuous mode [ 312.799446][ T9743] device pim6reg1 entered promiscuous mode [ 313.368571][ T9771] device pim6reg1 entered promiscuous mode [ 313.686405][ T9785] 7’ç÷ï: renamed from syzkaller0 [ 314.098977][ T9792] device pim6reg1 entered promiscuous mode [ 314.188622][ T9804] device pim6reg1 entered promiscuous mode [ 314.536798][ T9820] ÿÿÿÿÿÿ=0,off=0,: renamed from vlan1 [ 314.649946][ T9822] device wg2 left promiscuous mode [ 314.749775][ T9830] device wg2 entered promiscuous mode [ 315.189555][ T9846] device pim6reg1 entered promiscuous mode [ 315.207624][ T9848] device pim6reg1 entered promiscuous mode [ 315.643791][ T9869] device sit0 left promiscuous mode [ 315.805637][ T9872] device sit0 entered promiscuous mode [ 317.605246][ T9912] device pim6reg1 entered promiscuous mode [ 317.661502][ T292] syz-executor (292) used greatest stack depth: 20688 bytes left [ 318.056422][ T9907] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.102262][ T9907] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.147440][ T9907] device bridge_slave_0 entered promiscuous mode [ 318.215899][ T9907] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.270352][ T9907] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.308934][ T9907] device bridge_slave_1 entered promiscuous mode [ 318.832186][ T30] audit: type=1400 audit(1743551907.930:169): avc: denied { create } for pid=9907 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 318.949289][ T30] audit: type=1400 audit(1743551907.930:170): avc: denied { write } for pid=9907 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 319.102921][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 319.118021][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 319.177051][ T30] audit: type=1400 audit(1743551907.930:171): avc: denied { read } for pid=9907 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 319.245075][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 319.278278][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 319.317054][ T367] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.323944][ T367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.382347][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 319.423490][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 319.481986][ T367] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.488903][ T367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 319.569486][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 319.614441][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 319.679770][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 319.773054][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 319.897646][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 319.905915][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 319.961398][ T9907] device veth0_vlan entered promiscuous mode [ 319.972737][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 319.989662][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 319.998681][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 320.006104][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 320.019383][ T9907] device veth1_macvtap entered promiscuous mode [ 320.027728][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 320.036231][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 320.073341][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 320.090391][ T9965] device pim6reg1 entered promiscuous mode [ 320.150696][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 320.173402][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 320.222633][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 320.249637][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 320.338689][ T30] audit: type=1400 audit(1743551909.440:172): avc: denied { mounton } for pid=9907 comm="syz-executor" path="/root/syzkaller.BCq6vj/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 320.380818][ T8] device bridge_slave_1 left promiscuous mode [ 320.386794][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.411170][ T30] audit: type=1400 audit(1743551909.510:173): avc: denied { mount } for pid=9907 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 320.435899][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.498909][ T30] audit: type=1400 audit(1743551909.600:174): avc: denied { mounton } for pid=9907 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 321.751030][T10002] device pim6reg1 entered promiscuous mode [ 321.773176][T10007] device sit0 left promiscuous mode [ 321.902945][T10015] device pim6reg1 entered promiscuous mode [ 322.084345][T10005] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.110536][T10005] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.143921][T10005] device bridge_slave_0 entered promiscuous mode [ 322.174490][ T367] GPL: port 1(erspan0) entered disabled state [ 322.185163][ T367] device erspan0 left promiscuous mode [ 322.191182][ T367] GPL: port 1(erspan0) entered disabled state [ 322.201299][T10005] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.208470][T10005] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.215897][T10005] device bridge_slave_1 entered promiscuous mode [ 322.455306][ T367] device veth1_macvtap left promiscuous mode [ 322.466032][ T367] device veth0_vlan left promiscuous mode [ 322.864515][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 322.878051][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.956949][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 323.000841][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 323.010374][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.017259][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.024898][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 323.062532][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 323.096314][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.103224][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.138404][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 323.196923][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 323.241669][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 323.281168][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 323.330818][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 323.394380][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 323.402752][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 323.500946][T10005] device veth0_vlan entered promiscuous mode [ 323.515033][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 323.524810][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 323.577705][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 323.649125][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 323.746931][T10049] ÿÿÿÿÿÿ: renamed from vlan1 [ 323.758469][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 323.787713][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 323.842112][T10005] device veth1_macvtap entered promiscuous mode [ 323.955631][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 323.972004][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 324.005784][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 324.646816][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 324.665500][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 324.759449][T10059] device pim6reg1 entered promiscuous mode [ 325.629360][T10076] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.646907][T10076] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.664536][T10076] device bridge_slave_0 entered promiscuous mode [ 325.718168][T10088] device pim6reg1 entered promiscuous mode [ 325.727613][T10076] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.734584][T10076] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.757939][T10076] device bridge_slave_1 entered promiscuous mode [ 326.764441][T10113] device pim6reg1 entered promiscuous mode [ 327.074616][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 327.086815][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 327.107472][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 327.118103][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 327.206446][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.214257][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.349413][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 327.439438][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 327.536316][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.543959][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.725937][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 327.794508][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 327.889650][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 327.964498][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 328.056625][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 328.122195][T10130] device pim6reg1 entered promiscuous mode [ 328.134776][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 328.154958][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 328.194639][T10076] device veth0_vlan entered promiscuous mode [ 328.231107][T10132] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.246410][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 328.263370][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 328.385067][T10076] device veth1_macvtap entered promiscuous mode [ 328.513530][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 328.531679][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 328.620935][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 328.667528][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 328.746586][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 328.878606][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 328.957592][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 329.023616][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 329.065443][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 330.456226][T10173] device pim6reg1 entered promiscuous mode [ 330.800113][T10180] device pim6reg1 entered promiscuous mode [ 331.507418][T10199] FAULT_INJECTION: forcing a failure. [ 331.507418][T10199] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 331.610863][T10199] CPU: 1 PID: 10199 Comm: syz.2.3014 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 331.621075][T10199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 331.633005][T10199] Call Trace: [ 331.636456][T10199] [ 331.639525][T10199] dump_stack_lvl+0x151/0x1c0 [ 331.645106][T10199] ? io_uring_drop_tctx_refs+0x190/0x190 [ 331.650806][T10199] dump_stack+0x15/0x20 [ 331.654793][T10199] should_fail+0x3c6/0x510 [ 331.659076][T10199] should_fail_usercopy+0x1a/0x20 [ 331.663900][T10199] _copy_to_iter+0x22f/0xde0 [ 331.668329][T10199] ? stack_trace_save+0x1c0/0x1c0 [ 331.673635][T10199] ? iov_iter_init+0x190/0x190 [ 331.678840][T10199] ? __check_object_size+0x2ec/0x3d0 [ 331.684518][T10199] simple_copy_to_iter+0x50/0x70 [ 331.689288][T10199] __skb_datagram_iter+0xd4/0x780 [ 331.695200][T10199] ? skb_copy_datagram_iter+0x170/0x170 [ 331.700677][T10199] skb_copy_datagram_iter+0x43/0x170 [ 331.706022][T10199] unix_stream_read_actor+0x70/0xb0 [ 331.711051][T10199] unix_stream_read_generic+0xe65/0x2540 [ 331.716529][T10199] ? unix_stream_read_actor+0xb0/0xb0 [ 331.721851][T10199] ? __kasan_check_read+0x11/0x20 [ 331.726945][T10199] ? schedule+0x136/0x1e0 [ 331.731201][T10199] __unix_stream_recvmsg+0x190/0x210 [ 331.736625][T10199] ? scm_recv+0x720/0x720 [ 331.740939][T10199] ? mutex_unlock+0xb2/0x260 [ 331.745358][T10199] ? __unix_stream_recvmsg+0x210/0x210 [ 331.751016][T10199] ? __mutex_lock_slowpath+0x10/0x10 [ 331.756318][T10199] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 331.762035][T10199] ? remove_wait_queue+0x12e/0x140 [ 331.767099][T10199] unix_bpf_recvmsg+0xb5b/0xcc0 [ 331.771939][T10199] ? unix_stream_bpf_update_proto+0x170/0x170 [ 331.777906][T10199] ? wait_woken+0x170/0x170 [ 331.782335][T10199] ? selinux_socket_recvmsg+0x243/0x340 [ 331.787975][T10199] ? selinux_socket_sendmsg+0x340/0x340 [ 331.793369][T10199] unix_stream_recvmsg+0x216/0x2c0 [ 331.798323][T10199] ? unix_stream_sendmsg+0x1060/0x1060 [ 331.804927][T10199] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 331.810737][T10199] ? __unix_stream_recvmsg+0x210/0x210 [ 331.817194][T10199] ? _kstrtoull+0x3a0/0x4a0 [ 331.821535][T10199] ? security_socket_recvmsg+0x87/0xb0 [ 331.827063][T10199] ? unix_stream_sendmsg+0x1060/0x1060 [ 331.832669][T10199] ____sys_recvmsg+0x286/0x530 [ 331.837533][T10199] ? __sys_recvmsg_sock+0x50/0x50 [ 331.842578][T10199] ? import_iovec+0xe5/0x120 [ 331.847428][T10199] ___sys_recvmsg+0x1ec/0x690 [ 331.852285][T10199] ? __sys_recvmsg+0x260/0x260 [ 331.857033][T10199] ? __fdget+0x1bc/0x240 [ 331.861120][T10199] __x64_sys_recvmsg+0x1dc/0x2b0 [ 331.866071][T10199] ? ___sys_recvmsg+0x690/0x690 [ 331.870837][T10199] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 331.877611][T10199] ? exit_to_user_mode_prepare+0x39/0xa0 [ 331.883622][T10199] x64_sys_call+0x171/0x9a0 [ 331.888055][T10199] do_syscall_64+0x3b/0xb0 [ 331.892299][T10199] ? clear_bhb_loop+0x35/0x90 [ 331.896807][T10199] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 331.902542][T10199] RIP: 0033:0x7fbc1c2af169 [ 331.906789][T10199] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 331.926943][T10199] RSP: 002b:00007fbc1a919038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 331.935927][T10199] RAX: ffffffffffffffda RBX: 00007fbc1c4c7fa0 RCX: 00007fbc1c2af169 [ 331.944440][T10199] RDX: 0000000000000000 RSI: 00002000000008c0 RDI: 0000000000000003 [ 331.952247][T10199] RBP: 00007fbc1a919090 R08: 0000000000000000 R09: 0000000000000000 [ 331.960225][T10199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 331.968475][T10199] R13: 0000000000000000 R14: 00007fbc1c4c7fa0 R15: 00007fffdef818d8 [ 331.978265][T10199] [ 333.192686][T10223] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.238093][T10223] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.335144][T10223] device bridge_slave_0 entered promiscuous mode [ 333.369346][T10223] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.426937][T10223] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.436016][T10223] device bridge_slave_1 entered promiscuous mode [ 333.477384][T10252] FAULT_INJECTION: forcing a failure. [ 333.477384][T10252] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 333.709806][T10252] CPU: 1 PID: 10252 Comm: syz.3.3029 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 333.719947][T10252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 333.729930][T10252] Call Trace: [ 333.734221][T10252] [ 333.737405][T10252] dump_stack_lvl+0x151/0x1c0 [ 333.741912][T10252] ? io_uring_drop_tctx_refs+0x190/0x190 [ 333.747473][T10252] ? security_socket_recvmsg+0x87/0xb0 [ 333.752860][T10252] dump_stack+0x15/0x20 [ 333.756936][T10252] should_fail+0x3c6/0x510 [ 333.761189][T10252] should_fail_usercopy+0x1a/0x20 [ 333.766057][T10252] _copy_to_user+0x20/0x90 [ 333.771196][T10252] simple_read_from_buffer+0xc7/0x150 [ 333.776657][T10252] proc_fail_nth_read+0x1a3/0x210 [ 333.782383][T10252] ? proc_fault_inject_write+0x390/0x390 [ 333.788667][T10252] ? fsnotify_perm+0x269/0x5b0 [ 333.793613][T10252] ? security_file_permission+0x86/0xb0 [ 333.799625][T10252] ? proc_fault_inject_write+0x390/0x390 [ 333.805572][T10252] vfs_read+0x27d/0xd40 [ 333.811215][T10252] ? kernel_read+0x1f0/0x1f0 [ 333.816533][T10252] ? __kasan_check_write+0x14/0x20 [ 333.821473][T10252] ? mutex_lock+0xb6/0x1e0 [ 333.825845][T10252] ? wait_for_completion_killable_timeout+0x10/0x10 [ 333.833536][T10252] ? __fdget_pos+0x2e7/0x3a0 [ 333.839477][T10252] ? ksys_read+0x77/0x2c0 [ 333.843721][T10252] ksys_read+0x199/0x2c0 [ 333.848055][T10252] ? vfs_write+0x1110/0x1110 [ 333.852486][T10252] ? __kasan_check_write+0x14/0x20 [ 333.857626][T10252] ? switch_fpu_return+0x15f/0x2e0 [ 333.862595][T10252] __x64_sys_read+0x7b/0x90 [ 333.866891][T10252] x64_sys_call+0x28/0x9a0 [ 333.871229][T10252] do_syscall_64+0x3b/0xb0 [ 333.875573][T10252] ? clear_bhb_loop+0x35/0x90 [ 333.880988][T10252] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 333.886965][T10252] RIP: 0033:0x7f530ae93b7c [ 333.891300][T10252] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 333.911501][T10252] RSP: 002b:00007f53094ff030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 333.919738][T10252] RAX: ffffffffffffffda RBX: 00007f530b0adfa0 RCX: 00007f530ae93b7c [ 333.927641][T10252] RDX: 000000000000000f RSI: 00007f53094ff0a0 RDI: 0000000000000006 [ 333.935557][T10252] RBP: 00007f53094ff090 R08: 0000000000000000 R09: 0000000000000000 [ 333.943670][T10252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 333.951496][T10252] R13: 0000000000000000 R14: 00007f530b0adfa0 R15: 00007ffe45b1c148 [ 333.959297][T10252] [ 334.331717][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 334.387357][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 334.462503][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 334.489074][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 334.547297][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.554254][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.647069][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 334.737275][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 334.770852][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.777765][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 334.858182][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 335.029525][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 335.063869][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 335.142793][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 335.198645][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 335.264149][T10223] device veth0_vlan entered promiscuous mode [ 335.302589][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 335.327759][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 335.414892][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 335.427350][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 335.458972][T10223] device veth1_macvtap entered promiscuous mode [ 335.470101][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 335.482759][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 335.515209][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 335.642100][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 335.657852][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 335.676466][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 335.717278][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 335.890681][T10297] device pim6reg1 entered promiscuous mode [ 335.949035][ T367] device bridge_slave_1 left promiscuous mode [ 335.955406][ T367] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.988487][ T367] device bridge_slave_0 left promiscuous mode [ 335.994581][ T367] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.247119][T10343] device pim6reg1 entered promiscuous mode [ 337.937806][T10384] device pim6reg1 entered promiscuous mode [ 339.411980][T10441] device pim6reg1 entered promiscuous mode [ 340.177733][T10465] device pim6reg1 entered promiscuous mode [ 340.335118][T10475] FAULT_INJECTION: forcing a failure. [ 340.335118][T10475] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 340.437189][T10475] CPU: 1 PID: 10475 Comm: syz.2.3098 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 340.447024][T10475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 340.456952][T10475] Call Trace: [ 340.460033][T10475] [ 340.462811][T10475] dump_stack_lvl+0x151/0x1c0 [ 340.467328][T10475] ? io_uring_drop_tctx_refs+0x190/0x190 [ 340.472797][T10475] ? __kasan_check_write+0x14/0x20 [ 340.477755][T10475] dump_stack+0x15/0x20 [ 340.481733][T10475] should_fail+0x3c6/0x510 [ 340.485989][T10475] should_fail_usercopy+0x1a/0x20 [ 340.490845][T10475] _copy_from_user+0x20/0xd0 [ 340.495271][T10475] sock_do_ioctl+0x229/0x5a0 [ 340.499795][T10475] ? sock_show_fdinfo+0xa0/0xa0 [ 340.504499][T10475] ? selinux_file_ioctl+0x3cc/0x540 [ 340.509548][T10475] sock_ioctl+0x455/0x740 [ 340.513760][T10475] ? sock_poll+0x400/0x400 [ 340.518010][T10475] ? __fget_files+0x31e/0x380 [ 340.522650][T10475] ? security_file_ioctl+0x84/0xb0 [ 340.527583][T10475] ? sock_poll+0x400/0x400 [ 340.531835][T10475] __se_sys_ioctl+0x114/0x190 [ 340.537074][T10475] __x64_sys_ioctl+0x7b/0x90 [ 340.541485][T10475] x64_sys_call+0x98/0x9a0 [ 340.545740][T10475] do_syscall_64+0x3b/0xb0 [ 340.549993][T10475] ? clear_bhb_loop+0x35/0x90 [ 340.554596][T10475] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 340.560318][T10475] RIP: 0033:0x7fbc1c2af169 [ 340.564674][T10475] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 340.584335][T10475] RSP: 002b:00007fbc1a919038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 340.592526][T10475] RAX: ffffffffffffffda RBX: 00007fbc1c4c7fa0 RCX: 00007fbc1c2af169 [ 340.600329][T10475] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 0000000000000008 [ 340.608139][T10475] RBP: 00007fbc1a919090 R08: 0000000000000000 R09: 0000000000000000 [ 340.615950][T10475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 340.623767][T10475] R13: 0000000000000000 R14: 00007fbc1c4c7fa0 R15: 00007fffdef818d8 [ 340.631587][T10475] [ 341.551440][T10498] device syzkaller0 entered promiscuous mode [ 341.780324][T10505] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.906050][T10507] device pim6reg1 entered promiscuous mode [ 342.090317][ T288] syz-executor (288) used greatest stack depth: 20352 bytes left [ 342.740848][T10509] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.747871][T10509] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.756365][T10509] device bridge_slave_0 entered promiscuous mode [ 342.816936][T10509] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.823994][T10509] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.831659][T10509] device bridge_slave_1 entered promiscuous mode [ 342.885113][ T367] GPL: port 1(erspan0) entered disabled state [ 342.892216][ T367] device erspan0 left promiscuous mode [ 342.897927][ T367] GPL: port 1(erspan0) entered disabled state [ 343.231390][ T367] device veth0 left promiscuous mode [ 343.236599][ T367] bridge0: port 3(veth0) entered disabled state [ 343.243707][ T367] device bridge_slave_1 left promiscuous mode [ 343.249724][ T367] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.257417][ T367] device bridge_slave_0 left promiscuous mode [ 343.263395][ T367] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.277662][ T367] device veth0_vlan left promiscuous mode [ 343.308110][T10530] syz.0.3116[10530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.308195][T10530] syz.0.3116[10530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.264292][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 344.294980][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 344.367529][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 344.397174][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 344.449307][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.456155][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.473441][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 344.481899][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 344.490660][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.497537][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.505439][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 344.553651][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 344.598126][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 344.671083][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 344.679418][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 344.694728][T10509] device veth0_vlan entered promiscuous mode [ 344.704022][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 344.712675][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 344.731991][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 344.749995][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 344.774753][T10509] device veth1_macvtap entered promiscuous mode [ 344.889672][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 344.917227][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 344.925109][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 344.958109][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 344.981165][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 345.007979][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 345.016308][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 345.024977][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 345.084752][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 345.656313][T10571] device pim6reg1 entered promiscuous mode [ 345.729195][T10574] FAULT_INJECTION: forcing a failure. [ 345.729195][T10574] name failslab, interval 1, probability 0, space 0, times 0 [ 345.749952][T10574] CPU: 0 PID: 10574 Comm: syz.2.3129 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 345.759917][T10574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 345.769811][T10574] Call Trace: [ 345.772935][T10574] [ 345.775714][T10574] dump_stack_lvl+0x151/0x1c0 [ 345.780227][T10574] ? io_uring_drop_tctx_refs+0x190/0x190 [ 345.785695][T10574] ? search_extable+0xaf/0xf0 [ 345.790210][T10574] ? kmem_cache_free+0x115/0x330 [ 345.794988][T10574] dump_stack+0x15/0x20 [ 345.798972][T10574] should_fail+0x3c6/0x510 [ 345.803228][T10574] __should_failslab+0xa4/0xe0 [ 345.807828][T10574] ? dup_task_struct+0x53/0xc60 [ 345.812512][T10574] should_failslab+0x9/0x20 [ 345.816849][T10574] slab_pre_alloc_hook+0x37/0xd0 [ 345.821626][T10574] ? dup_task_struct+0x53/0xc60 [ 345.826321][T10574] kmem_cache_alloc+0x44/0x250 [ 345.830914][T10574] dup_task_struct+0x53/0xc60 [ 345.835427][T10574] ? __kasan_check_write+0x14/0x20 [ 345.840376][T10574] copy_process+0x5c4/0x3290 [ 345.844803][T10574] ? bad_area_nosemaphore+0x2d/0x40 [ 345.849843][T10574] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 345.854783][T10574] kernel_clone+0x21e/0x9e0 [ 345.859118][T10574] ? debug_smp_processor_id+0x17/0x20 [ 345.864326][T10574] ? create_io_thread+0x1e0/0x1e0 [ 345.869188][T10574] __x64_sys_clone+0x23f/0x290 [ 345.873788][T10574] ? __do_sys_vfork+0x130/0x130 [ 345.878476][T10574] ? __bpf_trace_sys_enter+0x62/0x70 [ 345.883596][T10574] ? __traceiter_sys_enter+0x2a/0x40 [ 345.888715][T10574] x64_sys_call+0x1b0/0x9a0 [ 345.893054][T10574] do_syscall_64+0x3b/0xb0 [ 345.897304][T10574] ? clear_bhb_loop+0x35/0x90 [ 345.901820][T10574] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 345.907547][T10574] RIP: 0033:0x7fbc1c2af169 [ 345.911804][T10574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 345.931371][T10574] RSP: 002b:00007fbc1a918fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 345.939609][T10574] RAX: ffffffffffffffda RBX: 00007fbc1c4c7fa0 RCX: 00007fbc1c2af169 [ 345.947422][T10574] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 345.955231][T10574] RBP: 00007fbc1a919090 R08: 0000000000000000 R09: 0000000000000000 [ 345.963046][T10574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 345.970868][T10574] R13: 0000000000000000 R14: 00007fbc1c4c7fa0 R15: 00007fffdef818d8 [ 345.978672][T10574] [ 346.233857][T10587] FAULT_INJECTION: forcing a failure. [ 346.233857][T10587] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 346.336931][T10587] CPU: 1 PID: 10587 Comm: syz.4.3134 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 346.346758][T10587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 346.356650][T10587] Call Trace: [ 346.359770][T10587] [ 346.362549][T10587] dump_stack_lvl+0x151/0x1c0 [ 346.367061][T10587] ? io_uring_drop_tctx_refs+0x190/0x190 [ 346.372540][T10587] dump_stack+0x15/0x20 [ 346.376524][T10587] should_fail+0x3c6/0x510 [ 346.380781][T10587] should_fail_usercopy+0x1a/0x20 [ 346.385644][T10587] _copy_from_user+0x20/0xd0 [ 346.390066][T10587] sock_do_ioctl+0x229/0x5a0 [ 346.394491][T10587] ? sock_show_fdinfo+0xa0/0xa0 [ 346.399181][T10587] ? selinux_file_ioctl+0x3cc/0x540 [ 346.404215][T10587] sock_ioctl+0x455/0x740 [ 346.408382][T10587] ? sock_poll+0x400/0x400 [ 346.412627][T10587] ? __fget_files+0x31e/0x380 [ 346.417146][T10587] ? security_file_ioctl+0x84/0xb0 [ 346.422098][T10587] ? sock_poll+0x400/0x400 [ 346.426466][T10587] __se_sys_ioctl+0x114/0x190 [ 346.430981][T10587] __x64_sys_ioctl+0x7b/0x90 [ 346.435404][T10587] x64_sys_call+0x98/0x9a0 [ 346.439657][T10587] do_syscall_64+0x3b/0xb0 [ 346.443906][T10587] ? clear_bhb_loop+0x35/0x90 [ 346.448424][T10587] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 346.454149][T10587] RIP: 0033:0x7f0b63648169 [ 346.458402][T10587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 346.478057][T10587] RSP: 002b:00007f0b61cb2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 346.486295][T10587] RAX: ffffffffffffffda RBX: 00007f0b63860fa0 RCX: 00007f0b63648169 [ 346.494106][T10587] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 000000000000000b [ 346.501916][T10587] RBP: 00007f0b61cb2090 R08: 0000000000000000 R09: 0000000000000000 [ 346.509731][T10587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 346.517542][T10587] R13: 0000000000000000 R14: 00007f0b63860fa0 R15: 00007ffcc726b598 [ 346.525355][T10587] [ 346.583117][T10591] device wg1 entered promiscuous mode [ 346.694623][T10611] device pim6reg1 entered promiscuous mode [ 347.801420][T10644] FAULT_INJECTION: forcing a failure. [ 347.801420][T10644] name failslab, interval 1, probability 0, space 0, times 0 [ 347.857118][T10644] CPU: 0 PID: 10644 Comm: syz.4.3151 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 347.867033][T10644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 347.876924][T10644] Call Trace: [ 347.880049][T10644] [ 347.882827][T10644] dump_stack_lvl+0x151/0x1c0 [ 347.887339][T10644] ? io_uring_drop_tctx_refs+0x190/0x190 [ 347.892810][T10644] ? search_extable+0xaf/0xf0 [ 347.897319][T10644] dump_stack+0x15/0x20 [ 347.901310][T10644] should_fail+0x3c6/0x510 [ 347.905568][T10644] __should_failslab+0xa4/0xe0 [ 347.910179][T10644] ? dup_task_struct+0x53/0xc60 [ 347.914856][T10644] should_failslab+0x9/0x20 [ 347.919191][T10644] slab_pre_alloc_hook+0x37/0xd0 [ 347.923969][T10644] ? dup_task_struct+0x53/0xc60 [ 347.928655][T10644] kmem_cache_alloc+0x44/0x250 [ 347.933252][T10644] dup_task_struct+0x53/0xc60 [ 347.937765][T10644] ? __kasan_check_write+0x14/0x20 [ 347.942715][T10644] copy_process+0x5c4/0x3290 [ 347.947142][T10644] ? bad_area_nosemaphore+0x2d/0x40 [ 347.952176][T10644] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 347.957122][T10644] kernel_clone+0x21e/0x9e0 [ 347.961464][T10644] ? irqentry_exit+0x30/0x40 [ 347.965970][T10644] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 347.971614][T10644] ? create_io_thread+0x1e0/0x1e0 [ 347.976476][T10644] __x64_sys_clone+0x23f/0x290 [ 347.981077][T10644] ? __do_sys_vfork+0x130/0x130 [ 347.985774][T10644] ? __bpf_trace_sys_enter+0x62/0x70 [ 347.990883][T10644] ? __traceiter_sys_enter+0x2a/0x40 [ 347.996003][T10644] x64_sys_call+0x1b0/0x9a0 [ 348.000344][T10644] do_syscall_64+0x3b/0xb0 [ 348.004595][T10644] ? clear_bhb_loop+0x35/0x90 [ 348.009109][T10644] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 348.014835][T10644] RIP: 0033:0x7f0b63648169 [ 348.019089][T10644] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 348.038532][T10644] RSP: 002b:00007f0b61cb1fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 348.046774][T10644] RAX: ffffffffffffffda RBX: 00007f0b63860fa0 RCX: 00007f0b63648169 [ 348.054635][T10644] RDX: 0000000000000000 RSI: fffffffffffffe50 RDI: 0000000002001000 [ 348.062659][T10644] RBP: 00007f0b61cb2090 R08: 0000000000000000 R09: 0000000000000000 [ 348.070473][T10644] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 348.078303][T10644] R13: 0000000000000000 R14: 00007f0b63860fa0 R15: 00007ffcc726b598 [ 348.086099][T10644] [ 348.104654][ T30] audit: type=1400 audit(1743551937.200:175): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 348.167756][T10656] device pim6reg1 entered promiscuous mode [ 348.173443][T10656] FAULT_INJECTION: forcing a failure. [ 348.173443][T10656] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 348.186352][T10656] CPU: 1 PID: 10656 Comm: syz.4.3157 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 348.196153][T10656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 348.206046][T10656] Call Trace: [ 348.209168][T10656] [ 348.211952][T10656] dump_stack_lvl+0x151/0x1c0 [ 348.216462][T10656] ? io_uring_drop_tctx_refs+0x190/0x190 [ 348.216899][ T30] audit: type=1400 audit(1743551937.200:176): avc: denied { unlink } for pid=83 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 348.221927][T10656] dump_stack+0x15/0x20 [ 348.221949][T10656] should_fail+0x3c6/0x510 [ 348.252239][T10656] should_fail_usercopy+0x1a/0x20 [ 348.257076][T10656] strncpy_from_user+0x24/0x2d0 [ 348.261766][T10656] ? update_load_avg+0x43a/0x1150 [ 348.266622][T10656] strncpy_from_user_nofault+0x73/0x150 [ 348.272004][T10656] bpf_probe_read_compat_str+0xec/0x180 [ 348.277490][T10656] bpf_prog_c1796171ffc7efef+0x35/0xcb8 [ 348.282887][T10656] bpf_trace_run3+0x11e/0x250 [ 348.287387][T10656] ? bpf_trace_run2+0x210/0x210 [ 348.292078][T10656] ? __this_cpu_preempt_check+0x13/0x20 [ 348.297452][T10656] ? tracing_record_taskinfo_sched_switch+0x84/0x390 [ 348.303966][T10656] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 348.310124][T10656] __bpf_trace_sched_switch+0xb/0x10 [ 348.315244][T10656] __traceiter_sched_switch+0x85/0xc0 [ 348.320452][T10656] __schedule+0x134b/0x1590 [ 348.324793][T10656] ? release_firmware_map_entry+0x190/0x190 [ 348.330521][T10656] ? preempt_schedule+0xd9/0xe0 [ 348.335207][T10656] preempt_schedule_common+0x9b/0xf0 [ 348.340329][T10656] preempt_schedule+0xd9/0xe0 [ 348.344840][T10656] ? schedule_preempt_disabled+0x20/0x20 [ 348.350308][T10656] ? __printk_safe_exit+0x9/0x20 [ 348.355082][T10656] ? console_trylock+0x190/0x200 [ 348.359857][T10656] ? __this_cpu_preempt_check+0x13/0x20 [ 348.365240][T10656] preempt_schedule_thunk+0x16/0x18 [ 348.370270][T10656] ? vprintk_emit+0x152/0x340 [ 348.374786][T10656] ? vprintk_emit+0x32a/0x340 [ 348.379297][T10656] vprintk_emit+0x32f/0x340 [ 348.383725][T10656] ? vprintk_store+0x1620/0x1620 [ 348.388497][T10656] ? memcpy+0x56/0x70 [ 348.392318][T10656] vprintk_default+0x26/0x30 [ 348.396745][T10656] vprintk+0x74/0x80 [ 348.400476][T10656] _printk+0xd1/0x120 [ 348.404294][T10656] ? crng_reseed+0x1a0/0x1a0 [ 348.408725][T10656] ? __dev_set_promiscuity+0x1c1/0x5b0 [ 348.414019][T10656] ? panic+0x760/0x760 [ 348.417924][T10656] ? __kasan_check_read+0x11/0x20 [ 348.422786][T10656] __dev_set_promiscuity+0x1d3/0x5b0 [ 348.427905][T10656] __dev_change_flags+0x459/0x6e0 [ 348.432961][T10656] ? avc_denied+0x1b0/0x1b0 [ 348.437401][T10656] ? dev_get_flags+0x1e0/0x1e0 [ 348.442419][T10656] ? _kstrtoull+0x3a0/0x4a0 [ 348.446761][T10656] dev_change_flags+0x8c/0x1a0 [ 348.451362][T10656] dev_ifsioc+0x147/0x10c0 [ 348.455622][T10656] ? dev_ioctl+0xe70/0xe70 [ 348.459873][T10656] ? mutex_lock+0xb6/0x1e0 [ 348.464207][T10656] ? wait_for_completion_killable_timeout+0x10/0x10 [ 348.470632][T10656] dev_ioctl+0x54d/0xe70 [ 348.474724][T10656] sock_do_ioctl+0x34f/0x5a0 [ 348.479132][T10656] ? sock_show_fdinfo+0xa0/0xa0 [ 348.483835][T10656] ? selinux_file_ioctl+0x3cc/0x540 [ 348.488860][T10656] sock_ioctl+0x455/0x740 [ 348.493022][T10656] ? sock_poll+0x400/0x400 [ 348.497272][T10656] ? __fget_files+0x31e/0x380 [ 348.501790][T10656] ? security_file_ioctl+0x84/0xb0 [ 348.506750][T10656] ? sock_poll+0x400/0x400 [ 348.510998][T10656] __se_sys_ioctl+0x114/0x190 [ 348.515500][T10656] __x64_sys_ioctl+0x7b/0x90 [ 348.519953][T10656] x64_sys_call+0x98/0x9a0 [ 348.524180][T10656] do_syscall_64+0x3b/0xb0 [ 348.528431][T10656] ? clear_bhb_loop+0x35/0x90 [ 348.532965][T10656] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 348.538673][T10656] RIP: 0033:0x7f0b63648169 [ 348.542933][T10656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 348.562541][T10656] RSP: 002b:00007f0b61cb2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 348.570790][T10656] RAX: ffffffffffffffda RBX: 00007f0b63860fa0 RCX: 00007f0b63648169 [ 348.578602][T10656] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 0000000000000008 [ 348.586410][T10656] RBP: 00007f0b61cb2090 R08: 0000000000000000 R09: 0000000000000000 [ 348.594222][T10656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 348.602030][T10656] R13: 0000000000000000 R14: 00007f0b63860fa0 R15: 00007ffcc726b598 [ 348.609855][T10656] [ 348.615932][T10659] FAULT_INJECTION: forcing a failure. [ 348.615932][T10659] name failslab, interval 1, probability 0, space 0, times 0 [ 348.628560][T10659] CPU: 0 PID: 10659 Comm: syz.1.3154 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 348.638361][T10659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 348.648257][T10659] Call Trace: [ 348.651378][T10659] [ 348.654156][T10659] dump_stack_lvl+0x151/0x1c0 [ 348.658669][T10659] ? io_uring_drop_tctx_refs+0x190/0x190 [ 348.664138][T10659] ? avc_has_perm_noaudit+0x430/0x430 [ 348.669344][T10659] dump_stack+0x15/0x20 [ 348.673335][T10659] should_fail+0x3c6/0x510 [ 348.677594][T10659] __should_failslab+0xa4/0xe0 [ 348.682540][T10659] should_failslab+0x9/0x20 [ 348.686878][T10659] slab_pre_alloc_hook+0x37/0xd0 [ 348.691652][T10659] ? dev_load+0x5b/0xb0 [ 348.695643][T10659] kmem_cache_alloc_trace+0x48/0x270 [ 348.700767][T10659] ? __request_module+0x28c/0x8e0 [ 348.705625][T10659] ? dev_load+0x5b/0xb0 [ 348.709619][T10659] __request_module+0x28c/0x8e0 [ 348.714306][T10659] ? capable+0x78/0xe0 [ 348.718211][T10659] ? _trace_android_vh_delayacct_thrashing_end+0x120/0x120 [ 348.725248][T10659] ? security_capable+0x87/0xb0 [ 348.729928][T10659] dev_load+0x5b/0xb0 [ 348.733748][T10659] dev_ioctl+0x536/0xe70 [ 348.737830][T10659] sock_do_ioctl+0x34f/0x5a0 [ 348.742262][T10659] ? sock_show_fdinfo+0xa0/0xa0 [ 348.746943][T10659] ? selinux_file_ioctl+0x3cc/0x540 [ 348.751977][T10659] sock_ioctl+0x455/0x740 [ 348.756248][T10659] ? sock_poll+0x400/0x400 [ 348.760502][T10659] ? __fget_files+0x31e/0x380 [ 348.765182][T10659] ? security_file_ioctl+0x84/0xb0 [ 348.770124][T10659] ? sock_poll+0x400/0x400 [ 348.774376][T10659] __se_sys_ioctl+0x114/0x190 [ 348.778891][T10659] __x64_sys_ioctl+0x7b/0x90 [ 348.783316][T10659] x64_sys_call+0x98/0x9a0 [ 348.787570][T10659] do_syscall_64+0x3b/0xb0 [ 348.791826][T10659] ? clear_bhb_loop+0x35/0x90 [ 348.796337][T10659] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 348.802065][T10659] RIP: 0033:0x7fe3ea89b169 [ 348.806318][T10659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 348.825764][T10659] RSP: 002b:00007fe3e8ee4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 348.834003][T10659] RAX: ffffffffffffffda RBX: 00007fe3eaab4080 RCX: 00007fe3ea89b169 [ 348.841903][T10659] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 000000000000000a [ 348.849728][T10659] RBP: 00007fe3e8ee4090 R08: 0000000000000000 R09: 0000000000000000 [ 348.857608][T10659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 348.865421][T10659] R13: 0000000000000000 R14: 00007fe3eaab4080 R15: 00007fffbfb1ac98 [ 348.873501][T10659] [ 348.902551][ T30] audit: type=1400 audit(1743551937.200:177): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 348.922881][ T30] audit: type=1400 audit(1743551937.970:178): avc: denied { sys_module } for pid=10652 comm="syz.1.3154" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 348.973690][T10654] device pim6reg1 entered promiscuous mode [ 348.991648][T10665] FAULT_INJECTION: forcing a failure. [ 348.991648][T10665] name failslab, interval 1, probability 0, space 0, times 0 [ 349.025054][T10665] CPU: 1 PID: 10665 Comm: syz.3.3159 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 349.034880][T10665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 349.044770][T10665] Call Trace: [ 349.047897][T10665] [ 349.050696][T10665] dump_stack_lvl+0x151/0x1c0 [ 349.055187][T10665] ? io_uring_drop_tctx_refs+0x190/0x190 [ 349.060651][T10665] dump_stack+0x15/0x20 [ 349.064643][T10665] should_fail+0x3c6/0x510 [ 349.068897][T10665] __should_failslab+0xa4/0xe0 [ 349.073498][T10665] should_failslab+0x9/0x20 [ 349.077836][T10665] slab_pre_alloc_hook+0x37/0xd0 [ 349.082611][T10665] __kmalloc+0x6d/0x2c0 [ 349.086602][T10665] ? security_prepare_creds+0x4d/0x140 [ 349.091898][T10665] security_prepare_creds+0x4d/0x140 [ 349.097016][T10665] prepare_creds+0x472/0x6a0 [ 349.101445][T10665] copy_creds+0xf0/0x630 [ 349.105528][T10665] ? dup_task_struct+0x7e6/0xc60 [ 349.110296][T10665] copy_process+0x7c3/0x3290 [ 349.114722][T10665] ? __kasan_check_write+0x14/0x20 [ 349.119668][T10665] ? selinux_file_permission+0x2c4/0x570 [ 349.125138][T10665] ? proc_fail_nth_read+0x210/0x210 [ 349.130178][T10665] ? fsnotify_perm+0x6a/0x5b0 [ 349.134690][T10665] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 349.139631][T10665] ? vfs_write+0x94d/0x1110 [ 349.143976][T10665] kernel_clone+0x21e/0x9e0 [ 349.148311][T10665] ? debug_smp_processor_id+0x17/0x20 [ 349.153529][T10665] ? create_io_thread+0x1e0/0x1e0 [ 349.158380][T10665] __x64_sys_clone+0x23f/0x290 [ 349.162980][T10665] ? __do_sys_vfork+0x130/0x130 [ 349.167669][T10665] ? __bpf_trace_sys_enter+0x62/0x70 [ 349.172793][T10665] x64_sys_call+0x1b0/0x9a0 [ 349.177129][T10665] do_syscall_64+0x3b/0xb0 [ 349.181379][T10665] ? clear_bhb_loop+0x35/0x90 [ 349.185898][T10665] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 349.191619][T10665] RIP: 0033:0x7f530ae95169 [ 349.195875][T10665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 349.215317][T10665] RSP: 002b:00007f53094fefe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 349.223556][T10665] RAX: ffffffffffffffda RBX: 00007f530b0adfa0 RCX: 00007f530ae95169 [ 349.231374][T10665] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 349.239185][T10665] RBP: 00007f53094ff090 R08: 0000000000000000 R09: 0000000000000000 [ 349.246992][T10665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 349.254803][T10665] R13: 0000000000000000 R14: 00007f530b0adfa0 R15: 00007ffe45b1c148 [ 349.262625][T10665] [ 350.002292][T10686] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.227282][T10695] FAULT_INJECTION: forcing a failure. [ 350.227282][T10695] name failslab, interval 1, probability 0, space 0, times 0 [ 350.240798][T10695] CPU: 0 PID: 10695 Comm: syz.0.3168 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 350.250612][T10695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 350.260510][T10695] Call Trace: [ 350.263630][T10695] [ 350.266403][T10695] dump_stack_lvl+0x151/0x1c0 [ 350.270922][T10695] ? io_uring_drop_tctx_refs+0x190/0x190 [ 350.276393][T10695] dump_stack+0x15/0x20 [ 350.280379][T10695] should_fail+0x3c6/0x510 [ 350.284633][T10695] __should_failslab+0xa4/0xe0 [ 350.289231][T10695] should_failslab+0x9/0x20 [ 350.293569][T10695] slab_pre_alloc_hook+0x37/0xd0 [ 350.298349][T10695] __kmalloc+0x6d/0x2c0 [ 350.302338][T10695] ? kvmalloc_node+0x1f0/0x4d0 [ 350.306939][T10695] kvmalloc_node+0x1f0/0x4d0 [ 350.311453][T10695] ? vm_mmap+0xb0/0xb0 [ 350.315357][T10695] ? __kasan_check_write+0x14/0x20 [ 350.320307][T10695] pfifo_fast_init+0x110/0x7a0 [ 350.325077][T10695] qdisc_create_dflt+0x144/0x3e0 [ 350.329851][T10695] ? _raw_spin_lock+0xa4/0x1b0 [ 350.334458][T10695] dev_activate+0x2e0/0x1140 [ 350.338883][T10695] __dev_open+0x3bf/0x4e0 [ 350.343046][T10695] ? dev_open+0x260/0x260 [ 350.347208][T10695] ? _raw_spin_unlock_bh+0x51/0x60 [ 350.352154][T10695] ? dev_set_rx_mode+0x245/0x2e0 [ 350.356925][T10695] ? __kasan_check_read+0x11/0x20 [ 350.361791][T10695] __dev_change_flags+0x1db/0x6e0 [ 350.366650][T10695] ? avc_denied+0x1b0/0x1b0 [ 350.370991][T10695] ? dev_get_flags+0x1e0/0x1e0 [ 350.375593][T10695] ? _kstrtoull+0x3a0/0x4a0 [ 350.379931][T10695] dev_change_flags+0x8c/0x1a0 [ 350.384528][T10695] dev_ifsioc+0x147/0x10c0 [ 350.388783][T10695] ? dev_ioctl+0xe70/0xe70 [ 350.393032][T10695] ? mutex_lock+0xb6/0x1e0 [ 350.397287][T10695] ? wait_for_completion_killable_timeout+0x10/0x10 [ 350.403711][T10695] dev_ioctl+0x54d/0xe70 [ 350.407790][T10695] sock_do_ioctl+0x34f/0x5a0 [ 350.412217][T10695] ? sock_show_fdinfo+0xa0/0xa0 [ 350.416992][T10695] ? selinux_file_ioctl+0x3cc/0x540 [ 350.422024][T10695] sock_ioctl+0x455/0x740 [ 350.426186][T10695] ? sock_poll+0x400/0x400 [ 350.430442][T10695] ? __fget_files+0x31e/0x380 [ 350.434955][T10695] ? security_file_ioctl+0x84/0xb0 [ 350.439903][T10695] ? sock_poll+0x400/0x400 [ 350.444239][T10695] __se_sys_ioctl+0x114/0x190 [ 350.448754][T10695] __x64_sys_ioctl+0x7b/0x90 [ 350.453184][T10695] x64_sys_call+0x98/0x9a0 [ 350.457522][T10695] do_syscall_64+0x3b/0xb0 [ 350.461770][T10695] ? clear_bhb_loop+0x35/0x90 [ 350.466285][T10695] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 350.472013][T10695] RIP: 0033:0x7f1d9be69169 [ 350.476269][T10695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 350.495947][T10695] RSP: 002b:00007f1d9a4d3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 350.504181][T10695] RAX: ffffffffffffffda RBX: 00007f1d9c081fa0 RCX: 00007f1d9be69169 [ 350.511997][T10695] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 000000000000000b [ 350.519804][T10695] RBP: 00007f1d9a4d3090 R08: 0000000000000000 R09: 0000000000000000 [ 350.527619][T10695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 350.535426][T10695] R13: 0000000000000000 R14: 00007f1d9c081fa0 R15: 00007ffc75c8cbc8 [ 350.543246][T10695] [ 350.566306][T10695] device pim6reg1 entered promiscuous mode [ 351.744968][T10745] ip6_vti0: mtu greater than device maximum [ 351.767396][T10748] FAULT_INJECTION: forcing a failure. [ 351.767396][T10748] name failslab, interval 1, probability 0, space 0, times 0 [ 351.781199][T10748] CPU: 1 PID: 10748 Comm: syz.1.3184 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 351.791011][T10748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 351.800907][T10748] Call Trace: [ 351.804031][T10748] [ 351.806812][T10748] dump_stack_lvl+0x151/0x1c0 [ 351.811327][T10748] ? io_uring_drop_tctx_refs+0x190/0x190 [ 351.816794][T10748] dump_stack+0x15/0x20 [ 351.820780][T10748] should_fail+0x3c6/0x510 [ 351.825035][T10748] __should_failslab+0xa4/0xe0 [ 351.829637][T10748] should_failslab+0x9/0x20 [ 351.833975][T10748] slab_pre_alloc_hook+0x37/0xd0 [ 351.838749][T10748] __kmalloc+0x6d/0x2c0 [ 351.842739][T10748] ? kvmalloc_node+0x1f0/0x4d0 [ 351.847356][T10748] kvmalloc_node+0x1f0/0x4d0 [ 351.851764][T10748] ? vm_mmap+0xb0/0xb0 [ 351.855673][T10748] ? __kasan_check_write+0x14/0x20 [ 351.860618][T10748] pfifo_fast_init+0x25e/0x7a0 [ 351.865220][T10748] qdisc_create_dflt+0x144/0x3e0 [ 351.869989][T10748] ? _raw_spin_lock+0xa4/0x1b0 [ 351.874637][T10748] dev_activate+0x2e0/0x1140 [ 351.879029][T10748] __dev_open+0x3bf/0x4e0 [ 351.883187][T10748] ? dev_open+0x260/0x260 [ 351.887351][T10748] ? _raw_spin_unlock_bh+0x51/0x60 [ 351.892295][T10748] ? dev_set_rx_mode+0x245/0x2e0 [ 351.897177][T10748] ? __kasan_check_read+0x11/0x20 [ 351.902035][T10748] __dev_change_flags+0x1db/0x6e0 [ 351.906895][T10748] ? avc_denied+0x1b0/0x1b0 [ 351.911234][T10748] ? dev_get_flags+0x1e0/0x1e0 [ 351.915836][T10748] dev_change_flags+0x8c/0x1a0 [ 351.920436][T10748] dev_ifsioc+0x147/0x10c0 [ 351.924688][T10748] ? dev_ioctl+0xe70/0xe70 [ 351.928940][T10748] ? mutex_lock+0x135/0x1e0 [ 351.933288][T10748] ? wait_for_completion_killable_timeout+0x10/0x10 [ 351.939714][T10748] dev_ioctl+0x54d/0xe70 [ 351.943784][T10748] sock_do_ioctl+0x34f/0x5a0 [ 351.948208][T10748] ? sock_show_fdinfo+0xa0/0xa0 [ 351.952897][T10748] ? debug_smp_processor_id+0x17/0x20 [ 351.958102][T10748] ? bpf_perf_event_read+0x1d7/0x220 [ 351.963224][T10748] ? selinux_file_ioctl+0x3cc/0x540 [ 351.968258][T10748] sock_ioctl+0x455/0x740 [ 351.972423][T10748] ? sock_poll+0x400/0x400 [ 351.976672][T10748] ? __fget_files+0x31e/0x380 [ 351.981191][T10748] ? security_file_ioctl+0x84/0xb0 [ 351.986133][T10748] ? sock_poll+0x400/0x400 [ 351.990397][T10748] __se_sys_ioctl+0x114/0x190 [ 351.994900][T10748] __x64_sys_ioctl+0x7b/0x90 [ 351.999342][T10748] x64_sys_call+0x98/0x9a0 [ 352.003578][T10748] do_syscall_64+0x3b/0xb0 [ 352.007833][T10748] ? clear_bhb_loop+0x35/0x90 [ 352.012349][T10748] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 352.018077][T10748] RIP: 0033:0x7fe3ea89b169 [ 352.022329][T10748] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 352.041770][T10748] RSP: 002b:00007fe3e8f05038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 352.050016][T10748] RAX: ffffffffffffffda RBX: 00007fe3eaab3fa0 RCX: 00007fe3ea89b169 [ 352.057824][T10748] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 000000000000000b [ 352.065635][T10748] RBP: 00007fe3e8f05090 R08: 0000000000000000 R09: 0000000000000000 [ 352.073447][T10748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 352.081257][T10748] R13: 0000000000000000 R14: 00007fe3eaab3fa0 R15: 00007fffbfb1ac98 [ 352.089078][T10748] [ 352.098308][T10748] device pim6reg1 entered promiscuous mode [ 352.341033][T10763] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 352.458021][T10763] device syzkaller0 entered promiscuous mode [ 353.547861][T10805] FAULT_INJECTION: forcing a failure. [ 353.547861][T10805] name failslab, interval 1, probability 0, space 0, times 0 [ 353.563735][T10805] CPU: 0 PID: 10805 Comm: syz.0.3200 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 353.573690][T10805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 353.583599][T10805] Call Trace: [ 353.586700][T10805] [ 353.589481][T10805] dump_stack_lvl+0x151/0x1c0 [ 353.594003][T10805] ? io_uring_drop_tctx_refs+0x190/0x190 [ 353.599473][T10805] dump_stack+0x15/0x20 [ 353.603460][T10805] should_fail+0x3c6/0x510 [ 353.607707][T10805] __should_failslab+0xa4/0xe0 [ 353.612304][T10805] should_failslab+0x9/0x20 [ 353.616648][T10805] slab_pre_alloc_hook+0x37/0xd0 [ 353.621424][T10805] __kmalloc+0x6d/0x2c0 [ 353.625414][T10805] ? kvmalloc_node+0x1f0/0x4d0 [ 353.630012][T10805] kvmalloc_node+0x1f0/0x4d0 [ 353.634443][T10805] ? vm_mmap+0xb0/0xb0 [ 353.638344][T10805] ? __kasan_check_write+0x14/0x20 [ 353.643292][T10805] pfifo_fast_init+0x3aa/0x7a0 [ 353.647894][T10805] qdisc_create_dflt+0x144/0x3e0 [ 353.652665][T10805] ? _raw_spin_lock+0xa4/0x1b0 [ 353.657264][T10805] dev_activate+0x2e0/0x1140 [ 353.661697][T10805] __dev_open+0x3bf/0x4e0 [ 353.665856][T10805] ? dev_open+0x260/0x260 [ 353.670025][T10805] ? _raw_spin_unlock_bh+0x51/0x60 [ 353.674969][T10805] ? dev_set_rx_mode+0x245/0x2e0 [ 353.679744][T10805] ? __kasan_check_read+0x11/0x20 [ 353.684603][T10805] __dev_change_flags+0x1db/0x6e0 [ 353.689465][T10805] ? avc_denied+0x1b0/0x1b0 [ 353.693806][T10805] ? dev_get_flags+0x1e0/0x1e0 [ 353.698408][T10805] ? _kstrtoull+0x3a0/0x4a0 [ 353.702747][T10805] dev_change_flags+0x8c/0x1a0 [ 353.707348][T10805] dev_ifsioc+0x147/0x10c0 [ 353.711603][T10805] ? dev_ioctl+0xe70/0xe70 [ 353.715846][T10805] ? mutex_lock+0xb6/0x1e0 [ 353.720101][T10805] ? wait_for_completion_killable_timeout+0x10/0x10 [ 353.726529][T10805] dev_ioctl+0x54d/0xe70 [ 353.730607][T10805] sock_do_ioctl+0x34f/0x5a0 [ 353.735119][T10805] ? sock_show_fdinfo+0xa0/0xa0 [ 353.739802][T10805] ? selinux_file_ioctl+0x3cc/0x540 [ 353.744833][T10805] sock_ioctl+0x455/0x740 [ 353.749004][T10805] ? sock_poll+0x400/0x400 [ 353.753251][T10805] ? __fget_files+0x31e/0x380 [ 353.757768][T10805] ? security_file_ioctl+0x84/0xb0 [ 353.762710][T10805] ? sock_poll+0x400/0x400 [ 353.766968][T10805] __se_sys_ioctl+0x114/0x190 [ 353.771478][T10805] __x64_sys_ioctl+0x7b/0x90 [ 353.775906][T10805] x64_sys_call+0x98/0x9a0 [ 353.780181][T10805] do_syscall_64+0x3b/0xb0 [ 353.784411][T10805] ? clear_bhb_loop+0x35/0x90 [ 353.788923][T10805] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 353.794654][T10805] RIP: 0033:0x7f1d9be69169 [ 353.798999][T10805] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 353.818435][T10805] RSP: 002b:00007f1d9a4d3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 353.826676][T10805] RAX: ffffffffffffffda RBX: 00007f1d9c081fa0 RCX: 00007f1d9be69169 [ 353.834493][T10805] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 000000000000000b [ 353.842302][T10805] RBP: 00007f1d9a4d3090 R08: 0000000000000000 R09: 0000000000000000 [ 353.850112][T10805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 353.858014][T10805] R13: 0000000000000000 R14: 00007f1d9c081fa0 R15: 00007ffc75c8cbc8 [ 353.865841][T10805] [ 353.946995][T10805] device pim6reg1 entered promiscuous mode [ 353.971316][T10816] device pim6reg1 entered promiscuous mode [ 353.992956][T10814] device pim6reg1 entered promiscuous mode [ 354.324369][T10833] syz.3.3209[10833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.327891][T10833] syz.3.3209[10833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.540512][T10864] device pim6reg1 entered promiscuous mode [ 355.626909][T10864] FAULT_INJECTION: forcing a failure. [ 355.626909][T10864] name failslab, interval 1, probability 0, space 0, times 0 [ 355.640655][T10864] CPU: 1 PID: 10864 Comm: syz.3.3216 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 355.650473][T10864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 355.660373][T10864] Call Trace: [ 355.663489][T10864] [ 355.666269][T10864] dump_stack_lvl+0x151/0x1c0 [ 355.670779][T10864] ? io_uring_drop_tctx_refs+0x190/0x190 [ 355.676256][T10864] ? irq_work_queue+0xcd/0x160 [ 355.680846][T10864] dump_stack+0x15/0x20 [ 355.684832][T10864] should_fail+0x3c6/0x510 [ 355.689099][T10864] __should_failslab+0xa4/0xe0 [ 355.693687][T10864] ? __alloc_skb+0xbe/0x550 [ 355.698029][T10864] should_failslab+0x9/0x20 [ 355.702365][T10864] slab_pre_alloc_hook+0x37/0xd0 [ 355.707144][T10864] ? __alloc_skb+0xbe/0x550 [ 355.711477][T10864] kmem_cache_alloc+0x44/0x250 [ 355.716080][T10864] __alloc_skb+0xbe/0x550 [ 355.720244][T10864] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 355.725369][T10864] rtmsg_ifinfo+0x78/0x120 [ 355.729633][T10864] __dev_notify_flags+0xdd/0x610 [ 355.734395][T10864] ? __dev_change_flags+0x6e0/0x6e0 [ 355.739427][T10864] ? __dev_change_flags+0x569/0x6e0 [ 355.744461][T10864] ? avc_denied+0x1b0/0x1b0 [ 355.748801][T10864] ? dev_get_flags+0x1e0/0x1e0 [ 355.753400][T10864] ? _kstrtoull+0x3a0/0x4a0 [ 355.757739][T10864] dev_change_flags+0xf0/0x1a0 [ 355.762344][T10864] dev_ifsioc+0x147/0x10c0 [ 355.766593][T10864] ? dev_ioctl+0xe70/0xe70 [ 355.770845][T10864] ? mutex_lock+0xb6/0x1e0 [ 355.775289][T10864] ? wait_for_completion_killable_timeout+0x10/0x10 [ 355.781714][T10864] dev_ioctl+0x54d/0xe70 [ 355.785793][T10864] sock_do_ioctl+0x34f/0x5a0 [ 355.790219][T10864] ? sock_show_fdinfo+0xa0/0xa0 [ 355.794908][T10864] ? selinux_file_ioctl+0x3cc/0x540 [ 355.799941][T10864] sock_ioctl+0x455/0x740 [ 355.804107][T10864] ? sock_poll+0x400/0x400 [ 355.808357][T10864] ? __fget_files+0x31e/0x380 [ 355.812873][T10864] ? security_file_ioctl+0x84/0xb0 [ 355.817821][T10864] ? sock_poll+0x400/0x400 [ 355.822071][T10864] __se_sys_ioctl+0x114/0x190 [ 355.826584][T10864] __x64_sys_ioctl+0x7b/0x90 [ 355.831012][T10864] x64_sys_call+0x98/0x9a0 [ 355.835264][T10864] do_syscall_64+0x3b/0xb0 [ 355.839515][T10864] ? clear_bhb_loop+0x35/0x90 [ 355.844033][T10864] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 355.849908][T10864] RIP: 0033:0x7f530ae95169 [ 355.854155][T10864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 355.873596][T10864] RSP: 002b:00007f53094ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 355.881837][T10864] RAX: ffffffffffffffda RBX: 00007f530b0adfa0 RCX: 00007f530ae95169 [ 355.889652][T10864] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 000000000000000b [ 355.897461][T10864] RBP: 00007f53094ff090 R08: 0000000000000000 R09: 0000000000000000 [ 355.905273][T10864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 355.913117][T10864] R13: 0000000000000000 R14: 00007f530b0adfa0 R15: 00007ffe45b1c148 [ 355.920902][T10864] [ 356.856155][T10915] device pim6reg1 entered promiscuous mode [ 357.053059][T10925] device pim6reg1 entered promiscuous mode [ 357.074486][T10925] FAULT_INJECTION: forcing a failure. [ 357.074486][T10925] name failslab, interval 1, probability 0, space 0, times 0 [ 357.136986][T10925] CPU: 1 PID: 10925 Comm: syz.2.3235 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 357.146964][T10925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 357.156847][T10925] Call Trace: [ 357.159972][T10925] [ 357.162741][T10925] dump_stack_lvl+0x151/0x1c0 [ 357.167261][T10925] ? io_uring_drop_tctx_refs+0x190/0x190 [ 357.172726][T10925] dump_stack+0x15/0x20 [ 357.176716][T10925] should_fail+0x3c6/0x510 [ 357.180978][T10925] __should_failslab+0xa4/0xe0 [ 357.185568][T10925] should_failslab+0x9/0x20 [ 357.189908][T10925] slab_pre_alloc_hook+0x37/0xd0 [ 357.194681][T10925] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 357.199980][T10925] __kmalloc_track_caller+0x6c/0x2c0 [ 357.205099][T10925] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 357.210395][T10925] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 357.215691][T10925] __alloc_skb+0x10c/0x550 [ 357.219939][T10925] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 357.225065][T10925] rtmsg_ifinfo+0x78/0x120 [ 357.229314][T10925] __dev_notify_flags+0xdd/0x610 [ 357.234087][T10925] ? __dev_change_flags+0x6e0/0x6e0 [ 357.239123][T10925] ? __dev_change_flags+0x569/0x6e0 [ 357.244156][T10925] ? avc_denied+0x1b0/0x1b0 [ 357.248494][T10925] ? dev_get_flags+0x1e0/0x1e0 [ 357.253096][T10925] ? _kstrtoull+0x3a0/0x4a0 [ 357.257435][T10925] dev_change_flags+0xf0/0x1a0 [ 357.262040][T10925] dev_ifsioc+0x147/0x10c0 [ 357.266288][T10925] ? dev_ioctl+0xe70/0xe70 [ 357.270538][T10925] ? mutex_lock+0xb6/0x1e0 [ 357.274797][T10925] ? wait_for_completion_killable_timeout+0x10/0x10 [ 357.281220][T10925] dev_ioctl+0x54d/0xe70 [ 357.285297][T10925] sock_do_ioctl+0x34f/0x5a0 [ 357.289722][T10925] ? sock_show_fdinfo+0xa0/0xa0 [ 357.294410][T10925] ? selinux_file_ioctl+0x3cc/0x540 [ 357.299447][T10925] sock_ioctl+0x455/0x740 [ 357.303608][T10925] ? sock_poll+0x400/0x400 [ 357.307863][T10925] ? __fget_files+0x31e/0x380 [ 357.312378][T10925] ? security_file_ioctl+0x84/0xb0 [ 357.317324][T10925] ? sock_poll+0x400/0x400 [ 357.321577][T10925] __se_sys_ioctl+0x114/0x190 [ 357.326088][T10925] __x64_sys_ioctl+0x7b/0x90 [ 357.330527][T10925] x64_sys_call+0x98/0x9a0 [ 357.334768][T10925] do_syscall_64+0x3b/0xb0 [ 357.339021][T10925] ? clear_bhb_loop+0x35/0x90 [ 357.343536][T10925] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 357.349262][T10925] RIP: 0033:0x7fbc1c2af169 [ 357.353516][T10925] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 357.372962][T10925] RSP: 002b:00007fbc1a919038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 357.381205][T10925] RAX: ffffffffffffffda RBX: 00007fbc1c4c7fa0 RCX: 00007fbc1c2af169 [ 357.389014][T10925] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 000000000000000b [ 357.396822][T10925] RBP: 00007fbc1a919090 R08: 0000000000000000 R09: 0000000000000000 [ 357.404635][T10925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 357.412446][T10925] R13: 0000000000000000 R14: 00007fbc1c4c7fa0 R15: 00007fffdef818d8 [ 357.420261][T10925] [ 358.294391][T10958] device syzkaller0 entered promiscuous mode [ 359.005327][T10975] device pim6reg1 entered promiscuous mode [ 359.012033][T10975] FAULT_INJECTION: forcing a failure. [ 359.012033][T10975] name failslab, interval 1, probability 0, space 0, times 0 [ 359.024521][T10975] CPU: 1 PID: 10975 Comm: syz.2.3252 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 359.034258][T10975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 359.044143][T10975] Call Trace: [ 359.047270][T10975] [ 359.050045][T10975] dump_stack_lvl+0x151/0x1c0 [ 359.054558][T10975] ? io_uring_drop_tctx_refs+0x190/0x190 [ 359.060027][T10975] ? pcpu_alloc+0xda0/0x13e0 [ 359.064455][T10975] dump_stack+0x15/0x20 [ 359.068451][T10975] should_fail+0x3c6/0x510 [ 359.072703][T10975] __should_failslab+0xa4/0xe0 [ 359.077301][T10975] ? __alloc_skb+0xbe/0x550 [ 359.081636][T10975] should_failslab+0x9/0x20 [ 359.085977][T10975] slab_pre_alloc_hook+0x37/0xd0 [ 359.090751][T10975] ? __alloc_skb+0xbe/0x550 [ 359.095091][T10975] kmem_cache_alloc+0x44/0x250 [ 359.099690][T10975] __alloc_skb+0xbe/0x550 [ 359.103946][T10975] inet6_rt_notify+0x2db/0x550 [ 359.108545][T10975] ? x64_sys_call+0x98/0x9a0 [ 359.112972][T10975] ? rt6_nh_dump_exceptions+0x650/0x650 [ 359.118482][T10975] fib6_add+0x23ac/0x3df0 [ 359.122659][T10975] ? skb_gro_incr_csum_unnecessary+0x260/0x260 [ 359.128640][T10975] ? ipv6_addr_prefix+0x42/0x180 [ 359.133501][T10975] ? fib6_update_sernum_stub+0x1a0/0x1a0 [ 359.138967][T10975] ? __kasan_check_write+0x14/0x20 [ 359.143910][T10975] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 359.148771][T10975] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 359.153975][T10975] ip6_route_add+0x8a/0x130 [ 359.158304][T10975] addrconf_add_dev+0x415/0x610 [ 359.162989][T10975] ? local_bh_enable+0x30/0x30 [ 359.167593][T10975] ? __kasan_check_read+0x11/0x20 [ 359.172447][T10975] addrconf_init_auto_addrs+0xad0/0x1060 [ 359.177928][T10975] ? addrconf_dad_run+0x610/0x610 [ 359.182776][T10975] ? __local_bh_enable_ip+0x58/0x80 [ 359.187814][T10975] ? _raw_write_unlock_bh+0x32/0x48 [ 359.192848][T10975] ? addrconf_permanent_addr+0xb40/0xba0 [ 359.198317][T10975] ? __kasan_check_write+0x14/0x20 [ 359.203274][T10975] ? addrconf_notify+0xdd0/0xdd0 [ 359.208035][T10975] ? igmpv3_del_delrec+0x740/0x740 [ 359.212979][T10975] ? __local_bh_enable_ip+0x58/0x80 [ 359.218029][T10975] ? __kasan_check_write+0x14/0x20 [ 359.222962][T10975] ? mutex_unlock+0xb2/0x260 [ 359.227385][T10975] ? tun_device_event+0x3ef/0xf80 [ 359.232246][T10975] ? __mutex_lock_slowpath+0x10/0x10 [ 359.237365][T10975] ? macsec_notify+0x101/0x4c0 [ 359.241969][T10975] ? addrconf_link_ready+0xfb/0x1e0 [ 359.247126][T10975] addrconf_notify+0x91d/0xdd0 [ 359.251729][T10975] raw_notifier_call_chain+0x8c/0xf0 [ 359.256852][T10975] __dev_notify_flags+0x304/0x610 [ 359.261704][T10975] ? __dev_change_flags+0x6e0/0x6e0 [ 359.266735][T10975] ? __dev_change_flags+0x569/0x6e0 [ 359.271776][T10975] ? avc_denied+0x1b0/0x1b0 [ 359.276116][T10975] ? dev_get_flags+0x1e0/0x1e0 [ 359.280715][T10975] dev_change_flags+0xf0/0x1a0 [ 359.285310][T10975] dev_ifsioc+0x147/0x10c0 [ 359.289570][T10975] ? dev_ioctl+0xe70/0xe70 [ 359.293818][T10975] ? mutex_lock+0x135/0x1e0 [ 359.298156][T10975] ? wait_for_completion_killable_timeout+0x10/0x10 [ 359.304581][T10975] dev_ioctl+0x54d/0xe70 [ 359.308660][T10975] sock_do_ioctl+0x34f/0x5a0 [ 359.313090][T10975] ? sock_show_fdinfo+0xa0/0xa0 [ 359.317771][T10975] ? selinux_file_ioctl+0x3cc/0x540 [ 359.322803][T10975] sock_ioctl+0x455/0x740 [ 359.326975][T10975] ? sock_poll+0x400/0x400 [ 359.331222][T10975] ? __fget_files+0x31e/0x380 [ 359.335742][T10975] ? security_file_ioctl+0x84/0xb0 [ 359.340804][T10975] ? sock_poll+0x400/0x400 [ 359.345038][T10975] __se_sys_ioctl+0x114/0x190 [ 359.349554][T10975] __x64_sys_ioctl+0x7b/0x90 [ 359.353984][T10975] x64_sys_call+0x98/0x9a0 [ 359.358229][T10975] do_syscall_64+0x3b/0xb0 [ 359.362482][T10975] ? clear_bhb_loop+0x35/0x90 [ 359.366998][T10975] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 359.372726][T10975] RIP: 0033:0x7fbc1c2af169 [ 359.376981][T10975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 359.396583][T10975] RSP: 002b:00007fbc1a919038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 359.404945][T10975] RAX: ffffffffffffffda RBX: 00007fbc1c4c7fa0 RCX: 00007fbc1c2af169 [ 359.412748][T10975] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 0000000000000008 [ 359.420559][T10975] RBP: 00007fbc1a919090 R08: 0000000000000000 R09: 0000000000000000 [ 359.428378][T10975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 359.436184][T10975] R13: 0000000000000000 R14: 00007fbc1c4c7fa0 R15: 00007fffdef818d8 [ 359.444003][T10975] [ 359.652627][T10980] device pim6reg1 entered promiscuous mode [ 359.658950][T10980] FAULT_INJECTION: forcing a failure. [ 359.658950][T10980] name failslab, interval 1, probability 0, space 0, times 0 [ 359.671661][T10980] CPU: 0 PID: 10980 Comm: syz.0.3254 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 359.681459][T10980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 359.691358][T10980] Call Trace: [ 359.694473][T10980] [ 359.697255][T10980] dump_stack_lvl+0x151/0x1c0 [ 359.701769][T10980] ? io_uring_drop_tctx_refs+0x190/0x190 [ 359.707235][T10980] ? memcpy+0x56/0x70 [ 359.711053][T10980] dump_stack+0x15/0x20 [ 359.715044][T10980] should_fail+0x3c6/0x510 [ 359.719296][T10980] __should_failslab+0xa4/0xe0 [ 359.723899][T10980] should_failslab+0x9/0x20 [ 359.728234][T10980] slab_pre_alloc_hook+0x37/0xd0 [ 359.733007][T10980] ? netlink_trim+0x19b/0x230 [ 359.737523][T10980] __kmalloc_track_caller+0x6c/0x2c0 [ 359.742645][T10980] ? netlink_trim+0x19b/0x230 [ 359.747155][T10980] ? netlink_trim+0x19b/0x230 [ 359.751668][T10980] pskb_expand_head+0x113/0x1240 [ 359.756446][T10980] netlink_trim+0x19b/0x230 [ 359.760869][T10980] netlink_broadcast_filtered+0x66/0x1220 [ 359.766422][T10980] ? __kasan_kmalloc+0x9/0x10 [ 359.771025][T10980] ? rtmsg_ifinfo_build_skb+0xd4/0x180 [ 359.776321][T10980] nlmsg_notify+0x101/0x1c0 [ 359.780658][T10980] rtmsg_ifinfo+0xe7/0x120 [ 359.784910][T10980] __dev_notify_flags+0xdd/0x610 [ 359.789686][T10980] ? __dev_change_flags+0x6e0/0x6e0 [ 359.794717][T10980] ? __dev_change_flags+0x569/0x6e0 [ 359.799752][T10980] ? avc_denied+0x1b0/0x1b0 [ 359.804092][T10980] ? dev_get_flags+0x1e0/0x1e0 [ 359.808696][T10980] dev_change_flags+0xf0/0x1a0 [ 359.813400][T10980] dev_ifsioc+0x147/0x10c0 [ 359.817655][T10980] ? dev_ioctl+0xe70/0xe70 [ 359.821905][T10980] ? mutex_lock+0x135/0x1e0 [ 359.826245][T10980] ? wait_for_completion_killable_timeout+0x10/0x10 [ 359.832671][T10980] dev_ioctl+0x54d/0xe70 [ 359.836759][T10980] sock_do_ioctl+0x34f/0x5a0 [ 359.841178][T10980] ? sock_show_fdinfo+0xa0/0xa0 [ 359.845865][T10980] ? selinux_file_ioctl+0x3cc/0x540 [ 359.850898][T10980] sock_ioctl+0x455/0x740 [ 359.855059][T10980] ? sock_poll+0x400/0x400 [ 359.859311][T10980] ? __fget_files+0x31e/0x380 [ 359.863829][T10980] ? security_file_ioctl+0x84/0xb0 [ 359.868776][T10980] ? sock_poll+0x400/0x400 [ 359.873026][T10980] __se_sys_ioctl+0x114/0x190 [ 359.877541][T10980] __x64_sys_ioctl+0x7b/0x90 [ 359.881968][T10980] x64_sys_call+0x98/0x9a0 [ 359.886217][T10980] do_syscall_64+0x3b/0xb0 [ 359.890472][T10980] ? clear_bhb_loop+0x35/0x90 [ 359.894985][T10980] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 359.900719][T10980] RIP: 0033:0x7f1d9be69169 [ 359.904969][T10980] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 359.924407][T10980] RSP: 002b:00007f1d9a4d3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 359.932651][T10980] RAX: ffffffffffffffda RBX: 00007f1d9c081fa0 RCX: 00007f1d9be69169 [ 359.940463][T10980] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 000000000000000b [ 359.948271][T10980] RBP: 00007f1d9a4d3090 R08: 0000000000000000 R09: 0000000000000000 [ 359.956083][T10980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 359.963898][T10980] R13: 0000000000000000 R14: 00007f1d9c081fa0 R15: 00007ffc75c8cbc8 [ 359.971808][T10980] [ 360.101782][T10986] device pim6reg1 entered promiscuous mode [ 361.158764][ T30] audit: type=1400 audit(1743551950.260:179): avc: denied { create } for pid=11011 comm="syz.0.3263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 361.829418][T11030] device pim6reg1 entered promiscuous mode [ 361.835817][T11030] FAULT_INJECTION: forcing a failure. [ 361.835817][T11030] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 361.848841][T11030] CPU: 1 PID: 11030 Comm: syz.4.3270 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 361.858640][T11030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 361.868532][T11030] Call Trace: [ 361.871653][T11030] [ 361.874431][T11030] dump_stack_lvl+0x151/0x1c0 [ 361.878942][T11030] ? io_uring_drop_tctx_refs+0x190/0x190 [ 361.884411][T11030] dump_stack+0x15/0x20 [ 361.888404][T11030] should_fail+0x3c6/0x510 [ 361.892660][T11030] should_fail_usercopy+0x1a/0x20 [ 361.897517][T11030] strncpy_from_user+0x24/0x2d0 [ 361.902206][T11030] ? __kernel_text_address+0x9b/0x110 [ 361.907415][T11030] strncpy_from_user_nofault+0x73/0x150 [ 361.912795][T11030] bpf_bprintf_prepare+0xc7c/0x1450 [ 361.917831][T11030] ? if6_seq_show+0x190/0x190 [ 361.922343][T11030] ? bpf_bprintf_cleanup+0xc0/0xc0 [ 361.927427][T11030] ? 0xffffffffa002a1c4 [ 361.931412][T11030] ? bpf_trace_printk+0x122/0x330 [ 361.936273][T11030] ? memcpy+0x56/0x70 [ 361.940087][T11030] bpf_trace_printk+0x13c/0x330 [ 361.944774][T11030] ? pskb_expand_head+0x36b/0x1240 [ 361.949722][T11030] ? bpf_probe_write_user+0xf0/0xf0 [ 361.954760][T11030] ? netlink_broadcast_filtered+0x66/0x1220 [ 361.960487][T11030] ? pskb_expand_head+0x36b/0x1240 [ 361.965431][T11030] ? dev_change_flags+0xf0/0x1a0 [ 361.970202][T11030] ? dev_ifsioc+0x147/0x10c0 [ 361.974745][T11030] ? dev_ioctl+0x54d/0xe70 [ 361.978991][T11030] ? sock_do_ioctl+0x34f/0x5a0 [ 361.983591][T11030] ? sock_ioctl+0x455/0x740 [ 361.987935][T11030] ? do_syscall_64+0x3b/0xb0 [ 361.992355][T11030] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 361.998267][T11030] ? pskb_expand_head+0x37c/0x1240 [ 362.003219][T11030] bpf_prog_7c77c7e0f6645ad8+0x35/0x77c [ 362.008591][T11030] bpf_trace_run2+0xec/0x210 [ 362.013027][T11030] ? bpf_trace_run1+0x1c0/0x1c0 [ 362.017714][T11030] ? pskb_expand_head+0x37c/0x1240 [ 362.022655][T11030] ? pskb_expand_head+0x37c/0x1240 [ 362.027600][T11030] __bpf_trace_kfree+0x6f/0x90 [ 362.032197][T11030] ? pskb_expand_head+0x37c/0x1240 [ 362.037143][T11030] kfree+0x1f8/0x270 [ 362.040877][T11030] pskb_expand_head+0x37c/0x1240 [ 362.045654][T11030] netlink_trim+0x19b/0x230 [ 362.049991][T11030] netlink_broadcast_filtered+0x66/0x1220 [ 362.055546][T11030] ? __kasan_kmalloc+0x9/0x10 [ 362.060060][T11030] ? rtmsg_ifinfo_build_skb+0xd4/0x180 [ 362.065355][T11030] nlmsg_notify+0x101/0x1c0 [ 362.069692][T11030] rtmsg_ifinfo+0xe7/0x120 [ 362.073945][T11030] __dev_notify_flags+0xdd/0x610 [ 362.078721][T11030] ? __dev_change_flags+0x6e0/0x6e0 [ 362.083749][T11030] ? __dev_change_flags+0x569/0x6e0 [ 362.088782][T11030] ? avc_denied+0x1b0/0x1b0 [ 362.093129][T11030] ? dev_get_flags+0x1e0/0x1e0 [ 362.097724][T11030] ? _kstrtoull+0x3a0/0x4a0 [ 362.102068][T11030] dev_change_flags+0xf0/0x1a0 [ 362.106669][T11030] dev_ifsioc+0x147/0x10c0 [ 362.110920][T11030] ? dev_ioctl+0xe70/0xe70 [ 362.115170][T11030] ? mutex_lock+0xb6/0x1e0 [ 362.119422][T11030] ? wait_for_completion_killable_timeout+0x10/0x10 [ 362.125853][T11030] dev_ioctl+0x54d/0xe70 [ 362.129925][T11030] sock_do_ioctl+0x34f/0x5a0 [ 362.134369][T11030] ? sock_show_fdinfo+0xa0/0xa0 [ 362.139048][T11030] ? selinux_file_ioctl+0x3cc/0x540 [ 362.144077][T11030] sock_ioctl+0x455/0x740 [ 362.148239][T11030] ? sock_poll+0x400/0x400 [ 362.152490][T11030] ? __fget_files+0x31e/0x380 [ 362.157007][T11030] ? security_file_ioctl+0x84/0xb0 [ 362.161964][T11030] ? sock_poll+0x400/0x400 [ 362.166207][T11030] __se_sys_ioctl+0x114/0x190 [ 362.170721][T11030] __x64_sys_ioctl+0x7b/0x90 [ 362.175151][T11030] x64_sys_call+0x98/0x9a0 [ 362.179394][T11030] do_syscall_64+0x3b/0xb0 [ 362.183778][T11030] ? clear_bhb_loop+0x35/0x90 [ 362.188290][T11030] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 362.194021][T11030] RIP: 0033:0x7f0b63648169 [ 362.198276][T11030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 362.217717][T11030] RSP: 002b:00007f0b61cb2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 362.225961][T11030] RAX: ffffffffffffffda RBX: 00007f0b63860fa0 RCX: 00007f0b63648169 [ 362.233772][T11030] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 000000000000000b [ 362.241586][T11030] RBP: 00007f0b61cb2090 R08: 0000000000000000 R09: 0000000000000000 [ 362.249391][T11030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 362.257203][T11030] R13: 0000000000000000 R14: 00007f0b63860fa0 R15: 00007ffcc726b598 [ 362.265023][T11030] [ 362.345076][T11035] device pim6reg1 entered promiscuous mode [ 363.944850][T11094] -1: renamed from syzkaller0 [ 364.687268][T11145] device veth0_vlan left promiscuous mode [ 364.693668][T11145] device veth0_vlan entered promiscuous mode [ 364.723373][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 364.757753][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 364.777388][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 364.868259][T11148] tun0: tun_chr_ioctl cmd 2147767517 SYZFAIL: repeatedly failed to execute the program proc=5 req=3311 state=1 status=7 (errno 9: Bad file descriptor) [ 366.778573][ T10] device bridge_slave_1 left promiscuous mode [ 366.784524][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.791815][ T10] device bridge_slave_0 left promiscuous mode [ 366.797894][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.806004][ T10] device bridge_slave_1 left promiscuous mode [ 366.812099][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.819580][ T10] device bridge_slave_0 left promiscuous mode [ 366.825506][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.833433][ T10] device bridge_slave_1 left promiscuous mode [ 366.839645][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.847283][ T10] device bridge_slave_0 left promiscuous mode [ 366.853204][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.861103][ T10] device bridge_slave_1 left promiscuous mode [ 366.867053][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.874289][ T10] device bridge_slave_0 left promiscuous mode [ 366.880340][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.888786][ T10] device veth1_macvtap left promiscuous mode [ 366.894876][ T10] device veth1_macvtap left promiscuous mode [ 366.900761][ T10] device veth0_vlan left promiscuous mode [ 366.906529][ T10] device veth1_macvtap left promiscuous mode [ 366.912525][ T10] device veth1_macvtap left promiscuous mode [ 366.918542][ T10] device veth0_vlan left promiscuous mode [ 369.407535][ T10] device bridge_slave_1 left promiscuous mode [ 369.413557][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.420893][ T10] device bridge_slave_0 left promiscuous mode [ 369.426929][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.434554][ T10] device veth1_macvtap left promiscuous mode [ 369.440417][ T10] device veth0_vlan left promiscuous mode