last executing test programs: 4.374763395s ago: executing program 3 (id=2518): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002300)={&(0x7f0000000780)=ANY=[@ANYBLOB], 0x0, 0x31}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000380), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/48, 0x30}], 0x1, &(0x7f00000003c0)=""/183, 0xb7}, 0x140) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a3, &(0x7f0000000080)) 4.130683007s ago: executing program 3 (id=2521): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0xca) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x6}, 0x0, 0x0, 0xfffffffe, 0x5, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000002780)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4, 0x40000}, 0x8, 0x10, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x10, 0x7b17}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0xa, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000039000000000000000400000018490000f8ffffff0000000000000000c350f4ff000000001837000005000000000000000000000018230000", @ANYRES32=r1, @ANYBLOB="00000000f60500008b609500000000004be91460961f82c06b1537ca6096d35c0332faeab74ad17851cfcc57bca1ae1db220ef969638adec7c7f3f6d6a8d3c44b37091117e70f864ebb0cf67927a27688e6d67ccc5c0804da0e393bf4ded83921a23b1485622f42a0aa248ba9b80e6625b9726d5bbdd7915595cda7833b1d2ecc0c6b735a1a63702e00751f5753077abbdf041fb9c5dbfecbdaf924f9b48efedf27b08ba0f565b7b316e822a49f3ee0df19547c9fc08ba2b53823e7733ed8a4c11d8dbb6874828dcc49db5907e70fc4229e61f0174f8d3f496aab0416b763ed2e9601ec1d7ec0b5a3c496c5fae199a4f98a6"], &(0x7f0000000040)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x9, '\x00', 0x0, 0xf}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='freezer.state\x00', 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="62030000002072"], 0x8) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000280), 0x9) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x30, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x3f, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x18, 0x0, 0x8400, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, r4, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r6, 0x0, 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000500)={r6, 0x0, 0x20000000}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r6}, 0x0, 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f0000000000), &(0x7f0000000200), &(0x7f0000000b00)="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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='inet_sk_error_report\x00', r5}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) 3.356300365s ago: executing program 2 (id=2532): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000180)='percpu_free_percpu\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.self_freezing\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESDEC=r3, @ANYBLOB="000800000000000000080000000000007b8af8ff00000000bfa2000000000000070200003a3cffffb703000008000010b704100000000000850000000300000095d4fac98de3e143a356ec3f9a4e77d0caff7edda4c49fbe06c6a1c2e1647334445a20e3675938a5c14fc1f8aa0da6868d761a96d9562b6a8a02ee15833ff0e513456193b4c4076021bfaceeae3fe4761c69f667a6d7276b410cf3a1da4b1dcfb1174ae0"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r6, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) unlink(0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_remove_blocks\x00', r7}, 0x10) write$cgroup_int(r4, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r4, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) socketpair(0x1a, 0x3, 0x5, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0x1, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x204, 0x4, 0x4, 0x1810, 0xffffffffffffffff, 0x0, '\x00', r9, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYRES8=r8], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xc, 0x3, 0x4, 0xf, 0x2201, 0x1, 0xc, '\x00', 0x0, r1, 0x0, 0x2, 0x3}, 0x48) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xa, 0x4, 0x69ee, 0x1, 0xd0}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, r12}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="000000000000000000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r11}, &(0x7f0000000080), &(0x7f0000000280)}, 0x20) 2.916573805s ago: executing program 2 (id=2537): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x144000, 0x7fe2, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000000)={r2, &(0x7f0000000180), 0x0}, 0x20) 2.767664458s ago: executing program 0 (id=2539): r0 = syz_clone(0x2000000, &(0x7f0000000180)="b92212ed60ae04bf89c1d03fff0f6255d223e0b9db0fc46ab2d8026886ebfa16d58258246e6db9a17b5f54465bc497f7683fd2da11afc6908797e1d2ef6caf80f1bfb83b2ae5d9edb73419bec39d8157d81ad793c5a546e08e8e9cf75deadf31029b05614922fab4", 0x68, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000280)="d73ad066f7c080650ae0b8e056deadfaf7e5f9d7d41d6d43aa854045a6e785e60041e835fddd6498b8f28d895ac95f45dbc8e975c9efe117e4ed53591e757df4") syz_open_procfs$namespace(r0, &(0x7f0000000380)='ns/user\x00') (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800e5ffffff0000000000000020000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="186800000006", @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4b}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r3}, 0x10) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) 2.737368121s ago: executing program 2 (id=2541): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xa2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x7, 0xad, 0x400000, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x19, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x4000, 0x2}, 0x10}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) 2.63077091s ago: executing program 2 (id=2542): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x5421, 0x110e22fff7) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x9fd, 0x0, 0x1}, 0x48) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000400)={0x1, 0x9, [@multicast, @multicast, @local, @empty, @broadcast, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x36}, @broadcast, @random="6e27a8c2847c", @empty]}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000700), 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x53, '\x00', 0x0, 0x22, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r4, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f00000002c0)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000003c0), &(0x7f00000004c0), 0x8, 0x0, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={0x0, &(0x7f0000000880)=""/230, 0x0, 0xe6, 0x0, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x1a, 0x9, 0x6418, 0x1003, 0x2, r5, 0x2, '\x00', r6, r7, 0x4, 0x405}, 0x48) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x700}, 0x2c) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) sendmsg$inet(r9, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="54000000000000000000000400000000000000600000000100010001000000010000000700000007442cc05000000000000000010000ee06000000080000000100000e4a0000002000650e0300000005000000080000000030000000000000000100000001"], 0x88}, 0x0) recvmsg$unix(r10, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1c00e9000000181100000000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x30, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r11}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.508265201s ago: executing program 0 (id=2544): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f00000002c0)={'veth0_vlan\x00', @remote}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000202300800000000000000000850000007b00000095"], 0x0, 0x4}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x19) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) 2.488227343s ago: executing program 2 (id=2545): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000009500"/88], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r1, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000340)=[0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0], 0x0, 0x8a, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f0000000500), 0x8, 0x82, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8, [{0x0, 0x2}]}, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}, @restrict={0x0, 0x0, 0x0, 0x4}]}}, 0x0, 0x4a}, 0x20) 2.39801713s ago: executing program 2 (id=2546): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x86, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x0, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', 0x0, r0, 0x4, 0x4, 0x2}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000380)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r2, 0x18000000000002a0, 0xe40, 0x2e, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x5}]}}, 0x0, 0x26}, 0x20) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001080)=ANY=[@ANYBLOB="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", @ANYRESHEX=r5], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfd9b}, 0x48) 2.373693982s ago: executing program 0 (id=2548): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000002000000000000000000850000009e00000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x24}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000fae00000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) close(r1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xfffff}, 0x80) 1.93362409s ago: executing program 0 (id=2552): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)='cpu.weight.nice\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x3, 0x0, 0x1, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1000008}, 0x9141, 0x3, 0x80, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="07396d589300000071105e08"], 0x0}, 0x90) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x20001439) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0x4004743d, 0x2000000b) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r6, 0x5}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r5, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r9}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) 1.713884389s ago: executing program 4 (id=2556): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x5421, 0x110e22fff7) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x9fd, 0x0, 0x1}, 0x48) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000400)={0x1, 0x9, [@multicast, @multicast, @local, @empty, @broadcast, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x36}, @broadcast, @remote, @empty]}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000700), 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x53, '\x00', 0x0, 0x22, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r4, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f00000002c0)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000003c0), &(0x7f00000004c0), 0x8, 0x0, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={0x0, &(0x7f0000000880)=""/230, 0x0, 0xe6, 0x0, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x1a, 0x9, 0x6418, 0x1003, 0x2, r5, 0x2, '\x00', r6, r7, 0x4, 0x405}, 0x48) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x700}, 0x2c) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) sendmsg$inet(r9, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="54000000000000000000000400000000000000600000000100010001000000010000000700000007442cc05000000000000000010000ee06000000080000000100000e4a0000002000650e0300000005000000080000000030000000000000000100000001"], 0x88}, 0x0) recvmsg$unix(r10, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1c00e9000000181100000000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x30, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r11}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.639691126s ago: executing program 4 (id=2557): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000009500"/88], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r1, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000340)=[0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0], 0x0, 0x8a, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f0000000500), 0x8, 0x82, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8, [{0x0, 0x2}]}, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}, @restrict={0x0, 0x0, 0x0, 0x4}]}}, 0x0, 0x4a}, 0x20) 1.571347612s ago: executing program 4 (id=2558): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r0}, 0x4) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x2, 0x1, 0x40}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) close(r3) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) write$cgroup_subtree(r3, 0x0, 0x9) openat$cgroup_freezer_state(r3, &(0x7f0000000000), 0x2, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r2, 0x80047441, 0x2000000c) 1.246046691s ago: executing program 4 (id=2559): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f00000002c0)={'veth0_vlan\x00', @remote}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000202300800000000000000000850000007b00000095"], 0x0, 0x4}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x19) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) 1.220742844s ago: executing program 4 (id=2561): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x17, 0x8, &(0x7f0000001340)=ANY=[@ANYBLOB="71f07126b5e1da94d31ed75ee3f70879be3b828e9969ee184e5f155110ad1125cc65ee8d99fb3e8114e1fe64d02df3cc77bce0baa9d56a69b47b7a7316160a09568a7ad6299730bcb36f7e3716e5492de7fb60fa7fca6506397d5a3b7aba0c9e73c07e7affb5e93e80f5ba6611f13322fc92224b27bff4f19d4a176e27d144f024bce4793b283223351871a3c4da1f72e61eaf5d1795d7092c8cce11d5611a3f6eca39c0ca03f883205753b21c7377862ad7f13c70d291ad514a1c06ecdb3dce1669fb6e7b94cb070b2232fe2e95203eaa912391ae4f590839debde496978b3806738a0e1912a534276e1eda607a86bd3ca3c2f1bb62b053dd813cbc687e21e48a776c459e1218daa23e7e6c8ba53addc376f744d277225b8b0ce7d146bd11f754c58c3619ae2c0b6cd3ff2d1be6504f219754360d1882c0a0fac2c668ebae66e5ecee94b7312b4cea4669505f194adcc31a16311d944ca97e875d844dbe44c434e5491efe27473f9a18153f0b4f5c137219b8b1ac64075219666b5c15eafe2103ef85851e90a54da6ee3c4814325711b1bb45cb472bc2b70ca91f3f1ce9acca02a7e1d4344dd82a4d4dde20497c17f90c0a2151ed3a3b458c9b49a9970e4170912a38e7f72118951eb321c39a1d5d53e10d104c931b2008fcda4467ae41f754827691a72cf4062986bf498e712d2c6e28e13c05a4f7b7a60a54fd263a3aea9410d35314b2ad9de78687f121c676dde97142e6a685677636c417effc837c717224a73e2d0dc1f5165bf640b69fe78312d0a5a404cc4289340d3984afe02a990b96f86b60543b38c2d38a02949f05e6fcebfa68399f0e6c817d68c1565079c6bccc3441cb12f7281fc856e6417b563702ffb673e387ed3f969eb06926ed1d75287960a652adebe51c3317ca3b8a09b675dde3aa2e5b88f95ac92162535e1f3cae9c2c926e6278e776278be13525661694c663a1609e9a5412a7a88959db561a8aba8b842106d778bb3a46015a9bca313d03b3765fa6eb12b6e036214895df0e8210c6864b74c53f55206e7e0842cdb4de7331d3a83c04fd33b654d01fef8b6c9b3862a207099d7ad7fe5e06199ab2c1156c010fc3e7445bef32a38eddfd0444f4526db1623b506e8159f6151d91a3ba1c034738ec7c67c92ff518dad74e2a2089865ab4be177276b0a32b14e42966e7d6ae59e926c2058f15430f476b12c1ea71745740074cb7e80ebffbd44cfc8a568a32c47913433552b42baf272cff8d4d8cc88bec8c91b4f8ac699dde850d3d6d96c0cd97b36b2fab8617f5de3227386f9b62cc78616086d5e3a13271c16ca9fbffc8b25daf02ae2166fe840f2ef4692a4a791082a088e6d9ef2bbde795a937698da4733d30860e299121a5a3164499eb342d883994ef4c39b9a41d7e367becf1c03d5591ce77377d4cff40ae9af1ef98b785540608f6152e4b8194751a9b078579a55ab38f4144e2067247079e28db225240a4e907e4ffda79a2536628fb5a57260263b9447d5c586b5c9d5ec35f89f83d9294ef65e183914fee3fa74b047a98496ac36059b5ce198104a0524f1f14fbf7a9026e9cd360ed159d35300ee2f0aa5bb45afec56ec3eeac25aff757c96dfd7b3171f186d4394cadab6b65c71483a01d326c8fb9cf1ae806e6ed4cbeafa749038e2c2eecefa3f17e111a897e380d355b96cb05176fcc07524c6289c23b3365c8330a7e70a62bcee9bde4c68b842b6c2901edf30a8dc87c78a094e3d5b21e60e3ee4ac5ea1c6c2b5da9ebe12d1ffb0fc918d7b7941ce9a602da0670dc56b79b8decd0c3f4465faea4d7e076d30108845e1a27b5a4a24b28d6f30aee5070b6923f05297bba67baff1c4d74a2a26859192606b6048ff2f7b5baafc49cfb0809dc67ec89af2e09bdb279dadaa6a19114676b6e653d2b69dfb747a4bf5f97d77116d1ab0dcb6af72fa617df0bbaec01e02967f9b9c555e12e501fb82b122d1226e5fdc965bd3a15dd4447a33bcd89fb848a00c3695e6eee9d6841c68543b4f1350c2678e72aa72c46cb8c31fad17625967df85d7852f1f27eb9358d58869c3f227fa9b3d6d252cf58dbc74d21af854d92bd978cac1dc1a5f9e0fa99e511c519d2b834b5ee7a85be8675e5157e1af0131fb521b185fe3019c7f24252881e08658f9772959138171bf2cd48344cc7dd8652b6643f4a80c6a368c5ad29e70f6a3c2b53fd6e9dc73e8b7b3b5393daa09788da4336b2425a02c8914b21c2f08be73c538e46ae404af4db2cb05ad82efa17e8f9ca1abd7d5826668709b1b98875989029cbedc0746d3441982a38dc19dafa9e5ceabb2c5f9d0daed935185fe7a9e2c82433690ce2c0a955bba8f2721f540e88694ce76183a93b976e49a1e501ff2c12f3c11c95b2ce3ff27fed57816dd1472e8a7e77ead940df7545c8cf2c8449f08a208e26facb152651df94566abe66688cea7e3304b29b4015bd040076457978f34a0def097e33f2fbf1a68b66ffac2648b9f0eaa145a849a0a78c5bd3623dc9985c23434ddf72eed30b45035cdc0756169aea2d3d9ba8a8e422441aaabd0e0310eb1aea6ebeba27f171518391ef729495a85554eb62a7550607f3dbe877b052b6e8bd3181782d766ef4eef50da31daae34b1da71d65d467de822f8b60480a50ce8386b6eb80719e85142be092305b76a01488e6147519107f696e1d43ca6a4bb1309bf0e5a81904c7aef6828d0189113ce24a39201172b3a00b7658b70e1b5d1865d1387110b1b3f849e8237b8ca290407a5e2f82d3de381ea9c79116e004a8b8445c2984b543370f1b5ca8dbe7714bd1b48888e0bf21f755a1ff4c827dec788e71e84799c1ecb11e5a05a73c43cf74fc7d4bd05967ed229063336d11a9b39e5b55e069d1ccecd48f6b33be56a4d86260155481bca0d0646c8c41d35ce278467895449d040fee7800bfe9923b5a435b95ce83a7978b806020d16beb68a3b58b674edd0a4365e866dc7bec09590268c3726b0a6fb77fa9463e6036417d2bac83397abeb338567def59abca64d7282590a285e8c6016b4714074bc154c7a29a97a1f312f783dcb4a48bbabd02f8e362f226f4674e333faae29613cfb97318e9c665ca28f87a6a054edf51654e86b1260356e27f8fb6c936183a01fba2abf12433b90c671ea4f0071fd149e2a3abf1dba305a300888821c2f2114434bb8f85c9396f041d956ba06976b2fd94716bd68b74e2db5949ca42fc831f67fbeba93b70e267be99e08327a6dfa27dbab4dae2f0e229d9cdca4312ac6119583b60429f956383ef3c4f4cd2c6224400e3ac92c24b0431f7c9494fa050033605c05fd8b4d236a6a2bd8c26cb7d7b52c75dd1ea15c9fd4558387e4febaf880e69d7c06b96cb002096af574e296e7c528364931e8582c21e24a8fb4ee0ff61129ec57522e52b367cbd6f5685bb92388658ce53443a363040f747fd592b31baab7f96a579a83618dbe426e8c660b618d68508dd5c90c3cd128371465d4fd2e3d00fdcc6969101f587dd996a102868bb2d65e18ed20767c44742f27c94bd0087893f66266e153c8cd3a093e530a2268aa008c7c1bd1997051cb93e3da6dd530a8229554b808733a3d9b414cb597cf5f5cd088b77774bcbb05cc6ed1cb46160c589690fd195df8ba82785025280864abb7d75001747b3eb66170b781c0f6eca1bc4434d652a7e3bda761a3e620a3c516f5e3cadfca3a729cfb3f17316f313ed0dde85346e7a9eb3245325c10a4a3bbf3ef442272d6444f92c1575176cf71f8eda099357c07696cbfa5862c2ad0b3c59ff21fb3001cf6541c004ff6407e1051cb20af14436f7f9c69e7e1d018b6342910e369888efa7e26ba984e553de6870a7f4790dc786080814fd48d036a99dda3e2c8f9b73b3eebc22a47a6fa49ad5573d6f06efbaa9306c9f09b75a39765848628c4146425e0ad10862813aefc625da85bd9d70c13adaa7dffcd044b2b8a8ab2b335be777dcfda78a8a865943cb94909430f6c8aa37699b7f85bdc4e4920cbb81310e6c0dbac27082904b270d8b7442785b00b1318f9c11ed5a6b34a1e3bc78e47c1959b5b93cb5f31db5d06309a507c071d65a2756371389908d4dd2f63e9af3908b993a0e516b80dcfe21ef041df69dd8972fa26acdfaa77c1b51c4643ebe42d2dbec40e983c19bfdf221ac114d5c408f05e25b08b6a29be763c28b8ad25f816e7967c32f4bc0f70bf6b79c517612ca9f770e58f48673e28b40333da108d6ecf978dda1e50b8acb3221f1cb858a9c3c51ca551095991af39e61eac529566890c3c8d442fee3679cdf01ff5893a18a030e0bd8ecbc0740eae347a823b627dbf25b43a64d1dcb9d74f180428b10077b8ffc4338ae0e6dff9c12681fc453f3fd4bc196d7577c3ed05fc7c7af4178500c420a7175927bcffefc5631df0d3d2e9bcc1963c773efa833170914a97247c0108366a56fa536406f59cdd1ca9bbd869afd8d7962d19fa203c4e6577b6986579f5f7dfa9a6acfeddc14a7620173708b67b21a4e9746ea1db860be87936dd3d208d9071529526a67be9c12173084b74e9fcb9ecbb2deffb0df724fd8d6d97e9ec06d60f4add63ecdffe54a30b8c2e68d3551bee19e3bbd397fa0f800589f34c196b1f68dcf9e177bd7852395e39ed7c1e39c5d4dfb56dffbdadaf79dc5f1a72f721b9ab50c0b3af8a9051bfd028abbd5339839a793c8949e72ea6ec99a868b26ced06c690a2c5526e09abcc1b6ec28ea46a71f97b6eb9cca90a317820cb999ab306d52b1518087e9ddda1721002599c1b2988451b3d49c4cd8617e9021a63218b3586a8924024d968830e84ec6621bf3ec44df4e1d4ca2ddcbfadf261595304d1bcbf35624993a3a218881ab3b0d7542d8d06eea07542c406f6d60cf6f8ce7b204c3b2cc8026e3fc0b13cbf328772a4bb785f360cbe28e205bdc52e27b3a29be0e11a2f9f30816123a70ff9cabcc18189251f9f92fbc27a94ddce36c20bcdfdd2a0ee8ee840908b8e0fbbc4ac5bcdef204688de3ceb921d917d5774441f5ec330273a13fa9030c8297c23dba2950c407b0e19402783b57fbefb5fcd2995400cd9fd31048ff884e0781fe2aa1063c8e6213c848490aef38e0f112bcad8d3b76c527987174a74c85b6be2e050148350f023bf43527f34f64ef86bddc167993c724c4c0a45c3d70dbdd36bba826b4d7cd0e0a0f9b10d642ceeb0b79b02adad66a9683e88717fd2bb9a27add62ffea69892d99dd61cbada0d70b9ae85030ecb45e8284e341e47c82242b3cc59f3fdcadbb827f1d27793f6fcf16131527756670383bcf1e2b63050122fe7a28ad1c7d38c0c4bb9c8a04ca92ab1ad620c77b053123b7780f4b9363feaa04bdf53ee4df90484790455c7f356f26c1189f8350b7988fe7cc0b7eb6353820e07629eca8c9f8438bfea13f531ea8b4ebf4e69b1394a7ef857510d642d8b70956e03ae6b49480e1361e5eb5af83bdc1cea879ff82403afe2413095618e8216b106614a8a04c64fd5a6185e56cca87485f91b6cccbf3f065821dd6a942322e480ef5a1badfa13469fbbcfe683824d10e4ec7a48443ac3ffe9bdf7778a53d2c69ae86c73b671603c1b13da27f3e0299f64945915f6eb88414ba9aec8eb24b3589b4e6b10a51568675101b0934f5b819cffc8cbb56c0e50fc56edbeaa64c7c8d055747fb64eed881632480ae6d49afa8dfedf85a4fc3b2ae86dc8faff2ae9d05cdcca357cc02897b74fc87e7f952e88f3e1a721dc5ae71c7434c0a4211dca6186b32d4e493acc7e2e4", @ANYRESHEX=r3], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r2}, &(0x7f0000000540), &(0x7f0000000580)=r4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff007059b542f9f9a3d8bdeb00f1000000bfa200000000000007020000f8ffffffb75f000000000f00000000000000000085000000030000009500000000000000108bfc8a72ce2cc4be7e14a2e4a0a5e83ae17ecd1228ef8dbefe68e6772543eeaec3daa04b2de0ed2e7e2bc98bac71"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xa, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r2, &(0x7f0000000780)}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r5, 0x4004743c, 0x2000000c) 764.053004ms ago: executing program 4 (id=2564): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)='cpu.weight.nice\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x3, 0x0, 0x1, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1000008}, 0x9141, 0x3, 0x80, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func={0x5, 0x0, 0x0, 0xc, 0x5}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x8, 0x3}, {0xe}, {0x8, 0x3}, {0x10, 0x2}, {0x7, 0x1}]}, @enum={0x7, 0x2, 0x0, 0x6, 0x4, [{0x5, 0x80000001}, {0xb, 0x18000}]}, @typedef={0xd, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x2e, 0x0, 0x2e, 0x30, 0x72, 0x5f, 0x5f]}}, &(0x7f00000009c0)=""/222, 0x89, 0xde, 0x0, 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x28, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, 0xffffffffffffffff, 0x5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r4, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000002000000000000000000850000009e00000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x24}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r7}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xfffff}, 0x80) 751.834305ms ago: executing program 0 (id=2565): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd63720000000000000000e97158b33dffec877f1b6d76745b686158bbcfe8875a0000000100000000000000000502"], 0xfdef) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0xfdef) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000280)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xf7, &(0x7f0000000680)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000340), &(0x7f0000000400), 0x8, 0x62, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) (async) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='blkio.throttle.io_service_bytes_recursive\x00', 0x26e1, 0x0) openat$cgroup_ro(r3, 0x0, 0x7a05, 0x1700) (async, rerun: 32) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)=@o_path={&(0x7f00000005c0)='./file0\x00', 0x0, 0x10, r1}, 0x18) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1e, 0x7, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0xfffffff7}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @exit, @alu={0x0, 0x1, 0x2, 0x7, 0x1, 0xfffffffffffffffe, 0xfffffffffffffff0}]}, &(0x7f0000000140)='GPL\x00', 0x6, 0x42, &(0x7f0000000180)=""/66, 0x40f00, 0x7c, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0x1, 0x1, 0x5}, 0x10, r2, r0, 0x0, &(0x7f0000000640)=[r3, r4], &(0x7f0000000680), 0x10, 0xfff}, 0x90) 574.8692ms ago: executing program 3 (id=2568): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xa2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x7, 0xad, 0x400000, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x19, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x4000, 0x2}, 0x10}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0xfffffffffffffda7) ioctl$SIOCSIFHWADDR(r1, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) 473.974749ms ago: executing program 1 (id=2569): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000008500000072000000955c08ff2b06c406760f272da41d0a321c099e928c7afd85ca81ac0f149af2c202a9c417aab441a9f87a7b5db543bddc0de5b46dc84148395a5c8b1d553e1186c18b09323b69e7b2ebdaa9edce9c180ef11ceea7b70c2001be9d245ba78f00a51cd7b0e3"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000f40)=ANY=[@ANYBLOB="180000000000ed00000085000f00000018010000646c012500000000000000007b1af8ff00000000bfa18e04477a1954c79c29a100000007010000f8ffffffb702000008000000b7030000008000ca3c5f6cd7394b4a63000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x3, 0x800, 0x1ff, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000d80)={r1, 0x0, 0x0}, 0x10) sendmsg$inet(r3, &(0x7f0000000f00)={&(0x7f0000000b80)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000cc0)=[{&(0x7f0000000bc0)="e29f20e8f970436d62eed0ebb1d93248b035401d28a442723adcfbd615e099cc649d9115ff836ab27c61b3ee110671df7ba9964b21caf987494092a665daeebc69650ca47509e7d2f9a3ff9ba31fcfb0205562c15a31f6369b456b548f235e4b65f478f86fdae1166c93956ce63a4f641f47f50762c8fde4e1faa108ecf7527024d005bfe74e02cbcbd6998d6bf35c529667b3a8d06e726a930188a50997a3a05ad484146553b1fe8d2f93449f25cc1c0fa8876537ace96625388c50a85dba1e6662c91eb3ec87a7e76ed2242196c8b8431fd9cc08fff8ff77271f3a7bf6954e5007c4ff407e1d266d67f7aa3a791a9a5932", 0xf2}], 0x1, &(0x7f0000000dc0)=ANY=[@ANYBLOB="28000000000000000000000007000000441843e000000004fa099f14000000090000000100008000110000000000000000000000010000003d000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="64010101e00000010000000068000000000000000000000007000000862a000000030003ae0708bfb172cabaaa001118103aede63b3b84700518340924a105082f20cd002c8d018907f3e00000018606293987794420c88000000003000000ff000002008000000000000fff0000000800000d4914000000000000000000000001000000db68000000000000140000000000000000000000010000005609000000000000"], 0xf8}, 0x4004000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r2}, 0x10) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x70, 0x3, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r4, &(0x7f0000000380), 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r4, &(0x7f0000000700), 0x20000000, 0x2}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x61}, @printk={@s, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r7, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r8, 0x5}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x40001) write$cgroup_type(r9, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) 408.708855ms ago: executing program 1 (id=2570): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB="180600200000000056bf8e10851100002020702500000000002020f3004cec5e7412b600bfa100080000000007010000f8ffffffb702000003000000b703b9379158d73e03d7dfce1967f47ed6e62155f16ff5f07afc8195f1d3f5113f8aec9aba4df0c08df41c2a4aef589a856eb53decc126652a84e212d9d543fc638c1164ea2e4e3b9537589b37098580b6471a52f8e04233d2d87095867aec454ccd14ad087fa311606b8f1504825eba2babb3b4b89f6d103ad64811b58a821285168fddfbac6a3b621c60d142bade0bc280ab943d62c0f18472256c6f6a39c12d03"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async, rerun: 32) recvmsg(r6, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) (async, rerun: 32) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) (rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002300)={&(0x7f0000000780)=ANY=[@ANYBLOB], 0x0, 0x31}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40800000000000173114100000000008510000002000000b7000000000000009500c200000000009500001200000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195}, 0x70) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000380), 0x2, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) 306.884983ms ago: executing program 1 (id=2571): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f00000002c0)={'veth0_vlan\x00', @remote}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000202300800000000000000000850000007b00000095"], 0x0, 0x4}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x19) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) 270.297596ms ago: executing program 1 (id=2572): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000009500"/88], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r1, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000340)=[0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0], 0x0, 0x8a, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f0000000500), 0x8, 0x82, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8, [{0x0, 0x2}]}, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}, @restrict={0x0, 0x0, 0x0, 0x4}]}}, 0x0, 0x4a}, 0x20) 226.096121ms ago: executing program 0 (id=2573): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x7}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'macvtap0\x00', 0x112}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'geneve1\x00', 0x400}) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000080)={'ip6gre0\x00'}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x153, 0x3ff, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r4}, &(0x7f00000000c0), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r4, &(0x7f0000000080)='F', 0x0}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xb, &(0x7f00000002c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000007112ef4c12467d9c5f8acfea76060000000000954c0ef0fa07a9b2cc5469d5c0c7f9412a8a1eaeb04ed5c4887c609d418277253ef404261801b47822d11b46982d24eeb70180"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0xffffff71, 0x0, 0x0, 0x2c, '\x00', 0x0, 0x1d}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r7 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x5, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r9}, 0x10) write$cgroup_subtree(r7, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 209.919592ms ago: executing program 1 (id=2574): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r2}, &(0x7f0000000540), &(0x7f0000000580)=r4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff007059b542f9f9a3d8bdeb00f1000000bfa200000000000007020000f8ffffffb75f000000000f00000000000000000085000000030000009500000000000000108bfc8a72ce2cc4be7e14a2e4a0a5e83ae17ecd1228ef8dbefe68e6772543eeaec3daa04b2de0ed2e7e2bc98bac71"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xa, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r2, &(0x7f0000000780)}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r5, 0x4004743c, 0x2000000c) 58.930856ms ago: executing program 3 (id=2575): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x502, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 27.415868ms ago: executing program 1 (id=2576): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x6, 0x4, 0x6}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r1, &(0x7f0000000200), 0x20000000}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x8c, 0x5, 0x2, 0x0, 0x0, 0x100, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x10e40, 0x8000000000000000, 0x0, 0x2, 0x6, 0x1, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x19) perf_event_open(&(0x7f0000000580)={0x4, 0x80, 0x9, 0x8, 0x1, 0x5, 0x0, 0x4, 0x801, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x480b, 0x8000000000000000, 0x80000001, 0x3, 0x5, 0xffffffff, 0xc0, 0x0, 0x10001}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000480)={{}, &(0x7f0000000380), &(0x7f0000000400)=r6}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r5, @ANYRES32, @ANYRES64=r5], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0xe}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = perf_event_open$cgroup(&(0x7f0000000940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5358e62e572f8d52, @perf_config_ext, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r7, 0x4008240b, &(0x7f00000013c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f00000016c0)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0xc2, &(0x7f0000000600)=[{&(0x7f0000000fc0)="2a6f21eaf5be821bdb1061eec2f330ed93c1f9ee3879750e99a96fd9abfe4f021c55aeadbaa1476539ac528267705f09e0068133227df49aae917fdc7ce31bf7e980bcf7e8c567c26fea3c09e5a766b5df8f9f24d083918085427f7ade0164c9349675f47915ab67131d7fb089b6eb00fd2a3b8c40b707c7c47bd82768b3d3ae7b38f4173a3c9a612659a3631c2ac570940d9f228b8f994f8524ee64f40e66d42d5d7b5955a3fb5f4957cf63d824764e391d13efa2e241205094e890f1c4f52d2f44deeb43b22204bc437a5a71"}, {&(0x7f0000000680)="f5fbbac82b18b24c5aca5e75c2793880d93ebf3231269cd05b970fcf50788b10212cc97dc477bd214360a7302b4a203667a52d3401b42784d21eb108a81eda88adecc47262010f8ff7ed9d3bd03fbe6d75d69aa9d3f6768e3f5622d503fa1cfe8b10c80611168d9a3c35a3dd8efd8a4b533c3e8ac934ec6325ee33ce53d6b371e6207ed31cd62153182a359189662d74533c04f723a2dc7faebd0f1d682ab23629a201a6f9cee26308952129c7075689ecb9957a6b660641d0dc4cba4e31a91586401049f10ecd39667b484f69311589c81ce3dc8ce18127bf06431f31d453b86167f614e08c421c8bfd1682f711ad7eb947f10b422d43c14f299c2f5de08cf040f453a8e1c7d9fd7a1f90de5067b231a07191d206cbf2449ce32ca4f2c376ddffbda789cbdb3c540d24527f0e0014541e10501a391e86aba99c5d887e57d57a424a28920e8fc9febc94d0f41581b122ad2f1598353f3e4afca41d1399fe772af0d9c55dad2d45dc8f8fdc6fb815270c8c7e5812e9f0f8422a1916023b69b698ce60fcfefc6728a3fdee167e2b7fb48cd18bf84f3adcc7693f8fa536d0e56692d0269c72bc9c2d67a1baabc030ca70c74b6f8ca3c2c07c617036b1b2be997d19bb7ce4333ccfb20e33a318edccfdc8e1ada8285787a2d6ce33e3cab18f31d9e8a363eb5db503af479c6a6e70aa2d45518a13287ecbfd3f7dc5b1e91431c8d5b6ffe7d678ab7c3aa7dd4c1b5383add0729d99f887fba6eb4b821ecd798319305c64524cc0cc85289f8d98586b88b7114d4625af8ce33bcde1cfab9f529a7511db68798e323ab31278029824bba6fdb16fa384f20b635ddfa0e23cecb41ec04ba61d67f840b1e78b98155b19df8dd27f5068af0bf6834afda0749e5f2de74425483956fb1d8aa7123ba3d249414c5ba01d3dfc94fdb224ecfac1aef7bf9c0607617995fd5a51496bbe57ddcb75758f52dc696bcf7069332a6dbdc48faeba4dc8fcd814759db94f5bb89714143fb048e5d055f906ae682933d8fc66716cc37f6eae012c7c442da9f6eef968755318bda52d25a75b0f0092825e05ac87d69a5d636ef38bba224cad614813e7dab01b8751c26f956142deb1be0a84290669842cc357b3aee2e996c8df51c7ca6e36ab99a3f879472fd8a14eade7a5d1b78a3fdb6f73b43c398f18255758dfe62d966447f4cb235a85d1607e7462a29ec8819c33eef163f62dd3d23c5b59bf721a3d1cd1f1ec17ae3afe0ba42b287c41ff0ba303af7e0d1039d6d2bf9f0ac5c61e6d2dfc9844588a70343c1152bbd8015bc89922d6e268668ea28c7c22a88f92a30c404d28b5918e2d33999094676375f16574ecb942b52ec87d9daf10bafc9a3348c4e15a547a30275f8db19285d1ad164fa966e1b43052f8031691cc31c713e59dec770c3f3afa7bb620f513357e9e9e45387e4f76", 0x400}, {&(0x7f0000000500)="3fc0ae4ae44d96d5", 0x8}, {&(0x7f0000000ac0)="e81fb94f11475988fc3f4d030d595e31070ae42be044a70b456122492530b1ba3009ee0d589a8dec34f6b6ded71120233ee689f7", 0x2c}], 0x4}, 0xc0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x1, 0x9, 0xae}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r9}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 26.940068ms ago: executing program 3 (id=2577): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0xffffffffffffffb1, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdf9, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r1, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) 0s ago: executing program 3 (id=2578): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x7}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'macvtap0\x00', 0x112}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'geneve1\x00', 0x400}) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000080)={'ip6gre0\x00'}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x153, 0x3ff, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r4}, &(0x7f00000000c0), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r4, &(0x7f0000000080)='F', 0x0}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xb, &(0x7f00000002c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000007112ef4c12467d9c5f8acfea76060000000000954c0ef0fa07a9b2cc5469d5c0c7f9412a8a1eaeb04ed5c4887c609d418277253ef404261801b47822d11b46982d24eeb70180"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0xffffff71, 0x0, 0x0, 0x2c, '\x00', 0x0, 0x1d}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x5, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x10) write$cgroup_subtree(r6, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.18' (ED25519) to the list of known hosts. [ 20.793801][ T30] audit: type=1400 audit(1725706909.096:66): avc: denied { integrity } for pid=278 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 20.817683][ T30] audit: type=1400 audit(1725706909.116:67): avc: denied { mounton } for pid=278 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.819556][ T278] cgroup: Unknown subsys name 'net' [ 20.840620][ T30] audit: type=1400 audit(1725706909.116:68): avc: denied { mount } for pid=278 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.868083][ T278] cgroup: Unknown subsys name 'devices' [ 20.868152][ T30] audit: type=1400 audit(1725706909.146:69): avc: denied { unmount } for pid=278 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.071142][ T278] cgroup: Unknown subsys name 'hugetlb' [ 21.076584][ T278] cgroup: Unknown subsys name 'rlimit' [ 21.210375][ T30] audit: type=1400 audit(1725706909.516:70): avc: denied { setattr } for pid=278 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.233671][ T30] audit: type=1400 audit(1725706909.516:71): avc: denied { mounton } for pid=278 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.258339][ T30] audit: type=1400 audit(1725706909.516:72): avc: denied { mount } for pid=278 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.265305][ T281] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 21.290302][ T30] audit: type=1400 audit(1725706909.596:73): avc: denied { relabelto } for pid=281 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.316006][ T30] audit: type=1400 audit(1725706909.596:74): avc: denied { write } for pid=281 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.367758][ T30] audit: type=1400 audit(1725706909.666:75): avc: denied { read } for pid=278 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.368258][ T278] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.883045][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.890037][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.897309][ T288] device bridge_slave_0 entered promiscuous mode [ 21.905437][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.912369][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.919497][ T288] device bridge_slave_1 entered promiscuous mode [ 22.037868][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.044779][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.052113][ T293] device bridge_slave_0 entered promiscuous mode [ 22.070355][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.077208][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.084579][ T292] device bridge_slave_0 entered promiscuous mode [ 22.091244][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.098081][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.105413][ T293] device bridge_slave_1 entered promiscuous mode [ 22.116835][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.123945][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.131212][ T289] device bridge_slave_0 entered promiscuous mode [ 22.137868][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.144775][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.152089][ T289] device bridge_slave_1 entered promiscuous mode [ 22.158469][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.165347][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.172574][ T292] device bridge_slave_1 entered promiscuous mode [ 22.253505][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.260386][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.267533][ T291] device bridge_slave_0 entered promiscuous mode [ 22.290946][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.298006][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.305305][ T291] device bridge_slave_1 entered promiscuous mode [ 22.332233][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.339108][ T288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.346229][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.353073][ T288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.456018][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.462908][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.470003][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.476771][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.491699][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.498888][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.506164][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.513345][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.521317][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.528746][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.547571][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.555755][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.562611][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.584760][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.593019][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.599874][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.622881][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.630471][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.638395][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.645274][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.666466][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.674524][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.681473][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.688654][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.696958][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.705355][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.737244][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.745695][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.754521][ T63] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.761507][ T63] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.768682][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.776718][ T63] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.783857][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.791066][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.798801][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.806612][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.820414][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.827809][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.835589][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.853199][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.861095][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.868930][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.877570][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.885872][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.893227][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.901626][ T293] device veth0_vlan entered promiscuous mode [ 22.919015][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.927169][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.935476][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.942474][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.949699][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.957975][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.966035][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.972877][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.980193][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.988132][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.996010][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.003889][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.011858][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.020109][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.029656][ T292] device veth0_vlan entered promiscuous mode [ 23.039894][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.047344][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.055251][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.063080][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.071271][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.079817][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.087126][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.095885][ T293] device veth1_macvtap entered promiscuous mode [ 23.109129][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.116611][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.124970][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.135946][ T292] device veth1_macvtap entered promiscuous mode [ 23.149572][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.157083][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.165044][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.173162][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.181324][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.189707][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.196975][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.205735][ T288] device veth0_vlan entered promiscuous mode [ 23.215340][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.223516][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.231698][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.240166][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.255154][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.263418][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.271634][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.279734][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.292100][ T289] device veth0_vlan entered promiscuous mode [ 23.311896][ T288] device veth1_macvtap entered promiscuous mode [ 23.319901][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.327773][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.336173][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.344687][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.352813][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.360392][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.367576][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.380905][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.389650][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.398204][ T289] device veth1_macvtap entered promiscuous mode [ 23.426227][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.436305][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.444692][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.453524][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.461650][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.504708][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.512806][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.520583][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.528926][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.537500][ T63] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.544398][ T63] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.553208][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.561430][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.569729][ T63] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.576663][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.584454][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.592570][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.601028][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.610117][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.618609][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.649334][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.657264][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.670354][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.678297][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.698933][ T291] device veth0_vlan entered promiscuous mode [ 23.720129][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.729768][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.737991][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.766147][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.775538][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.783119][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.789982][ C0] hrtimer: interrupt took 26258 ns [ 23.822078][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.840751][ T291] device veth1_macvtap entered promiscuous mode [ 23.857578][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.866301][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.008054][ T326] device syzkaller0 entered promiscuous mode [ 24.053763][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.079604][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.038953][ C1] sched: RT throttling activated [ 27.206932][ T30] kauditd_printk_skb: 37 callbacks suppressed [ 27.206950][ T30] audit: type=1400 audit(1725706915.506:113): avc: denied { read } for pid=355 comm="syz.1.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.288838][ T354] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.312044][ T30] audit: type=1400 audit(1725706915.616:114): avc: denied { create } for pid=358 comm="syz.3.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 27.964501][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.465536][ T30] audit: type=1400 audit(1725706916.766:115): avc: denied { relabelfrom } for pid=383 comm="syz.3.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.587685][ T30] audit: type=1400 audit(1725706916.766:116): avc: denied { relabelto } for pid=383 comm="syz.3.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.619905][ T30] audit: type=1400 audit(1725706916.826:117): avc: denied { create } for pid=385 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 29.268986][ T30] audit: type=1400 audit(1725706917.566:118): avc: denied { create } for pid=408 comm="syz.3.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 29.417653][ T30] audit: type=1400 audit(1725706917.716:119): avc: denied { read } for pid=408 comm="syz.3.30" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.471242][ T30] audit: type=1400 audit(1725706917.726:120): avc: denied { open } for pid=408 comm="syz.3.30" path="/dev/ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.494213][ T30] audit: type=1400 audit(1725706917.746:121): avc: denied { ioctl } for pid=408 comm="syz.3.30" path="/dev/ppp" dev="devtmpfs" ino=133 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.528849][ T415] device pim6reg1 entered promiscuous mode [ 29.617978][ T419] syz.4.32 (419) used obsolete PPPIOCDETACH ioctl [ 29.738701][ T415] device veth0_vlan left promiscuous mode [ 29.751628][ T30] audit: type=1400 audit(1725706918.056:122): avc: denied { read } for pid=82 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 29.790091][ T415] device veth0_vlan entered promiscuous mode [ 31.031912][ T466] syz.2.47[466] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.032127][ T466] syz.2.47[466] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.881910][ T554] syz.1.72[554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.989609][ T554] syz.1.72[554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.278978][ T520] syz.2.63 (520) used greatest stack depth: 21800 bytes left [ 35.663717][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 35.663734][ T30] audit: type=1400 audit(1725706923.966:126): avc: denied { create } for pid=647 comm="syz.2.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 36.261575][ T674] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.320415][ T30] audit: type=1400 audit(1725706924.626:127): avc: denied { create } for pid=672 comm="syz.2.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 36.370242][ T679] device bridge_slave_1 left promiscuous mode [ 36.393205][ T679] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.411590][ T679] device bridge_slave_0 left promiscuous mode [ 36.417764][ T679] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.033639][ T713] device syzkaller0 entered promiscuous mode [ 38.556163][ T710] syz.0.120 (710) used greatest stack depth: 21080 bytes left [ 39.427579][ T30] audit: type=1400 audit(1725706927.726:128): avc: denied { create } for pid=754 comm="syz.0.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 40.020910][ T30] audit: type=1400 audit(1725706928.326:129): avc: denied { append } for pid=773 comm="syz.0.139" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 40.544997][ T790] device sit0 entered promiscuous mode [ 41.654354][ T819] bridge0: port 3(veth0_to_batadv) entered blocking state [ 41.770715][ T819] bridge0: port 3(veth0_to_batadv) entered disabled state [ 41.908434][ T819] device veth0_to_batadv entered promiscuous mode [ 41.998163][ T819] bridge0: port 3(veth0_to_batadv) entered blocking state [ 42.005263][ T819] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 42.923181][ T884] device syzkaller0 entered promiscuous mode [ 42.951502][ T887] tun0: tun_chr_ioctl cmd 2147767506 [ 43.024129][ T30] audit: type=1400 audit(1725706931.326:130): avc: denied { create } for pid=891 comm="syz.4.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 43.842849][ T928] device sit0 entered promiscuous mode [ 44.364613][ T30] audit: type=1400 audit(1725706932.666:131): avc: denied { write } for pid=977 comm="syz.2.203" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 44.620143][ T30] audit: type=1400 audit(1725706932.926:132): avc: denied { ioctl } for pid=983 comm="syz.2.206" path="pid:[4026532455]" dev="nsfs" ino=4026532455 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 45.295407][ T1025] device syzkaller0 entered promiscuous mode [ 46.560290][ T1097] device syzkaller0 entered promiscuous mode [ 46.810841][ T1130] device bridge_slave_0 entered promiscuous mode [ 46.838783][ T30] audit: type=1400 audit(1725706935.136:133): avc: denied { create } for pid=1132 comm="syz.1.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 47.369361][ T1142] device veth1_macvtap left promiscuous mode [ 49.655823][ T1242] device pim6reg1 entered promiscuous mode [ 51.432035][ T30] audit: type=1400 audit(1725706939.736:134): avc: denied { create } for pid=1307 comm="syz.0.307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 53.880221][ T1437] syz.4.344[1437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.880451][ T1437] syz.4.344[1437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.921025][ T1437] device veth1_macvtap left promiscuous mode [ 53.946603][ T1437] device macsec0 entered promiscuous mode [ 54.103574][ T1448] device sit0 left promiscuous mode [ 54.151930][ T1450] device sit0 entered promiscuous mode [ 54.609687][ T1470] device veth1_macvtap left promiscuous mode [ 54.625298][ T1481] device veth1_macvtap entered promiscuous mode [ 54.631581][ T1481] device macsec0 entered promiscuous mode [ 55.316003][ T30] audit: type=1400 audit(1725706943.616:135): avc: denied { ioctl } for pid=1510 comm="syz.0.370" path="socket:[18280]" dev="sockfs" ino=18280 ioctlcmd=0x54d5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 56.437248][ T1554] device pim6reg1 entered promiscuous mode [ 56.865643][ T1576] ªªªªªª: renamed from vlan0 [ 57.638020][ T30] audit: type=1400 audit(1725706945.936:136): avc: denied { create } for pid=1604 comm="syz.0.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 57.699305][ T30] audit: type=1400 audit(1725706945.986:137): avc: denied { write } for pid=1604 comm="syz.0.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 57.718894][ T30] audit: type=1400 audit(1725706945.986:138): avc: denied { read } for pid=1604 comm="syz.0.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 58.141829][ T1621] ªªªªªª: renamed from vlan0 [ 58.155088][ T1624] device macsec0 left promiscuous mode [ 58.676424][ T30] audit: type=1400 audit(1725706946.976:139): avc: denied { create } for pid=1649 comm="syz.3.412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 58.717501][ T30] audit: type=1400 audit(1725706946.996:140): avc: denied { setopt } for pid=1649 comm="syz.3.412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 58.983319][ T1661] tun0: tun_chr_ioctl cmd 1074812118 [ 59.364976][ T1696] ªªªªªª: renamed from vlan0 [ 63.561202][ T1865] device pim6reg1 entered promiscuous mode [ 63.723565][ T1853] €Â0: renamed from pim6reg1 [ 63.937764][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 64.454516][ T1888] device pim6reg1 entered promiscuous mode [ 64.651013][ T1878] device wg2 entered promiscuous mode [ 64.864655][ T30] audit: type=1400 audit(1725706953.166:141): avc: denied { create } for pid=1900 comm="syz.1.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 65.003139][ T1897] device syzkaller0 entered promiscuous mode [ 66.447400][ T1956] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.454445][ T1956] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.464054][ T1956] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.470923][ T1956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.478058][ T1956] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.484919][ T1956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.493216][ T1956] device bridge0 entered promiscuous mode [ 66.951266][ T1964] device syzkaller0 entered promiscuous mode [ 66.983546][ T1981] device sit0 left promiscuous mode [ 67.073836][ T1983] ref_ctr_offset mismatch. inode: 0x1be offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 68.176394][ T2033] device sit0 left promiscuous mode [ 68.246403][ T30] audit: type=1400 audit(1725706956.546:142): avc: denied { create } for pid=2031 comm="syz.0.526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 68.326575][ T30] audit: type=1400 audit(1725706956.616:143): avc: denied { create } for pid=2013 comm="syz.2.520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 70.756541][ T2105] device pim6reg1 entered promiscuous mode [ 71.760629][ T2141] ªªªªªª: renamed from vlan0 [ 71.801778][ T30] audit: type=1400 audit(1725706960.106:144): avc: denied { create } for pid=2150 comm="syz.0.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 72.126665][ T30] audit: type=1400 audit(1725706960.426:145): avc: denied { create } for pid=2166 comm="syz.1.569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 72.603296][ T2190] device syzkaller0 entered promiscuous mode [ 73.530613][ T2271] device veth1_macvtap entered promiscuous mode [ 73.537382][ T2271] device macsec0 entered promiscuous mode [ 75.046927][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 77.204810][ T30] audit: type=1400 audit(1725706965.506:146): avc: denied { create } for pid=2324 comm="syz.2.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 78.461318][ T2382] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 78.543481][ T2382] device syzkaller0 entered promiscuous mode [ 79.058882][ T30] audit: type=1400 audit(1725706967.356:147): avc: denied { create } for pid=2418 comm="syz.1.667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 80.474371][ T2482] ªªªªªª: renamed from vlan0 [ 80.525208][ T2485] syz.3.691[2485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.525283][ T2485] syz.3.691[2485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.673395][ T2491] device veth0_vlan left promiscuous mode [ 80.829384][ T2491] device veth0_vlan entered promiscuous mode [ 80.896894][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 80.907407][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 80.924751][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 81.946618][ T2592] device pim6reg1 entered promiscuous mode [ 83.054583][ T2686] device syzkaller0 entered promiscuous mode [ 84.633394][ T2718] device pim6reg1 entered promiscuous mode [ 85.348275][ T2754] tap0: tun_chr_ioctl cmd 2147767520 [ 85.582492][ T2785] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.148520][ T2918] bond_slave_1: mtu less than device minimum [ 87.154707][ T2919] bond_slave_1: mtu less than device minimum [ 87.580734][ T30] audit: type=1400 audit(1725706975.886:148): avc: denied { setattr } for pid=2945 comm="syz.3.849" path="/dev/net/tun" dev="devtmpfs" ino=131 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 87.882402][ T2956] device wg2 entered promiscuous mode [ 88.255479][ T2997] device pim6reg1 entered promiscuous mode [ 89.212941][ T3048] : renamed from ipvlan1 [ 89.953019][ T3106] syz.2.909[3106] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.953111][ T3106] syz.2.909[3106] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.267136][ T3128] device wg2 left promiscuous mode [ 90.717781][ T3127] device syzkaller0 entered promiscuous mode [ 90.996774][ T3174] syz.4.929[3174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.996849][ T3174] syz.4.929[3174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.658711][ T30] audit: type=1400 audit(1725706981.956:149): avc: denied { create } for pid=3312 comm="syz.1.974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 93.982302][ T3332] tap0: tun_chr_ioctl cmd 1074025692 [ 96.124419][ T3440] syz.4.1018[3440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.124498][ T3440] syz.4.1018[3440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.268066][ T3443] device veth0_vlan left promiscuous mode [ 96.306683][ T100] udevd[100]: worker [313] terminated by signal 33 (Unknown signal 33) [ 96.320495][ T3443] device veth0_vlan entered promiscuous mode [ 96.335780][ T100] udevd[100]: worker [313] failed while handling '/devices/virtual/block/loop1' [ 96.366492][ T100] udevd[100]: worker [992] terminated by signal 33 (Unknown signal 33) [ 96.389708][ T100] udevd[100]: worker [992] failed while handling '/devices/virtual/block/loop3' [ 96.422797][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.478807][ T100] udevd[100]: worker [3457] terminated by signal 33 (Unknown signal 33) [ 96.479844][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 96.487173][ T100] udevd[100]: worker [3457] failed while handling '/devices/virtual/block/loop0' [ 96.505110][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.613537][ T100] udevd[100]: worker [3476] terminated by signal 33 (Unknown signal 33) [ 96.625107][ T100] udevd[100]: worker [3476] failed while handling '/devices/virtual/block/loop2' [ 96.709174][ T100] udevd[100]: worker [3484] terminated by signal 33 (Unknown signal 33) [ 96.717480][ T100] udevd[100]: worker [3484] failed while handling '/devices/virtual/block/loop0' [ 97.687510][ T3544] device veth0_vlan left promiscuous mode [ 97.706138][ T3544] device veth0_vlan entered promiscuous mode [ 97.776479][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.801233][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 97.864825][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 99.111181][ T3629] device veth1_macvtap left promiscuous mode [ 99.123784][ T3629] device macsec0 entered promiscuous mode [ 100.569428][ T3703] device pim6reg1 entered promiscuous mode [ 101.680208][ T3722] tun0: tun_chr_ioctl cmd 1074025673 [ 103.963644][ T3850] FAULT_INJECTION: forcing a failure. [ 103.963644][ T3850] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 104.012553][ T3850] CPU: 0 PID: 3850 Comm: syz.4.1156 Not tainted 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 104.022294][ T3850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 104.032197][ T3850] Call Trace: [ 104.035323][ T3850] [ 104.038097][ T3850] dump_stack_lvl+0x151/0x1c0 [ 104.042602][ T3850] ? io_uring_drop_tctx_refs+0x190/0x190 [ 104.048071][ T3850] ? __kasan_check_write+0x14/0x20 [ 104.053015][ T3850] ? proc_fail_nth_write+0x20b/0x290 [ 104.058143][ T3850] ? selinux_file_permission+0x2c4/0x570 [ 104.063617][ T3850] dump_stack+0x15/0x20 [ 104.067597][ T3850] should_fail+0x3c6/0x510 [ 104.071853][ T3850] should_fail_usercopy+0x1a/0x20 [ 104.076712][ T3850] _copy_from_user+0x20/0xd0 [ 104.081138][ T3850] perf_copy_attr+0x163/0x880 [ 104.085654][ T3850] __se_sys_perf_event_open+0xd7/0x3ce0 [ 104.091035][ T3850] ? __kasan_check_write+0x14/0x20 [ 104.095980][ T3850] ? mutex_unlock+0xb2/0x260 [ 104.100407][ T3850] ? __mutex_lock_slowpath+0x10/0x10 [ 104.105531][ T3850] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 104.110998][ T3850] ? __ia32_sys_read+0x90/0x90 [ 104.115591][ T3850] ? debug_smp_processor_id+0x17/0x20 [ 104.120802][ T3850] __x64_sys_perf_event_open+0xbf/0xd0 [ 104.126095][ T3850] x64_sys_call+0x7de/0x9a0 [ 104.130435][ T3850] do_syscall_64+0x3b/0xb0 [ 104.134686][ T3850] ? clear_bhb_loop+0x35/0x90 [ 104.139199][ T3850] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 104.144940][ T3850] RIP: 0033:0x7f2a3d1ccef9 [ 104.149182][ T3850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 104.168623][ T3850] RSP: 002b:00007f2a3be47038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 104.176878][ T3850] RAX: ffffffffffffffda RBX: 00007f2a3d385f80 RCX: 00007f2a3d1ccef9 [ 104.184680][ T3850] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 104.192490][ T3850] RBP: 00007f2a3be47090 R08: 0000000000000000 R09: 0000000000000000 [ 104.200299][ T3850] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 104.208111][ T3850] R13: 0000000000000000 R14: 00007f2a3d385f80 R15: 00007ffe84e60018 [ 104.215928][ T3850] [ 104.795158][ T3885] FAULT_INJECTION: forcing a failure. [ 104.795158][ T3885] name failslab, interval 1, probability 0, space 0, times 1 [ 104.809983][ T3885] CPU: 0 PID: 3885 Comm: syz.2.1169 Not tainted 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 104.819711][ T3885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 104.829620][ T3885] Call Trace: [ 104.832726][ T3885] [ 104.835507][ T3885] dump_stack_lvl+0x151/0x1c0 [ 104.840017][ T3885] ? io_uring_drop_tctx_refs+0x190/0x190 [ 104.845491][ T3885] ? avc_has_perm_noaudit+0x2dd/0x430 [ 104.850693][ T3885] dump_stack+0x15/0x20 [ 104.854683][ T3885] should_fail+0x3c6/0x510 [ 104.858938][ T3885] __should_failslab+0xa4/0xe0 [ 104.863536][ T3885] ? perf_event_alloc+0x122/0x1b00 [ 104.868482][ T3885] should_failslab+0x9/0x20 [ 104.872823][ T3885] slab_pre_alloc_hook+0x37/0xd0 [ 104.877712][ T3885] ? perf_event_alloc+0x122/0x1b00 [ 104.882654][ T3885] kmem_cache_alloc+0x44/0x200 [ 104.887255][ T3885] perf_event_alloc+0x122/0x1b00 [ 104.892024][ T3885] ? _raw_spin_unlock+0x4d/0x70 [ 104.896715][ T3885] ? alloc_fd+0x4c6/0x590 [ 104.900885][ T3885] __se_sys_perf_event_open+0x7b4/0x3ce0 [ 104.906349][ T3885] ? __mutex_lock_slowpath+0x10/0x10 [ 104.911641][ T3885] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 104.917112][ T3885] ? __ia32_sys_read+0x90/0x90 [ 104.921710][ T3885] ? debug_smp_processor_id+0x17/0x20 [ 104.926915][ T3885] __x64_sys_perf_event_open+0xbf/0xd0 [ 104.932221][ T3885] x64_sys_call+0x7de/0x9a0 [ 104.936550][ T3885] do_syscall_64+0x3b/0xb0 [ 104.940804][ T3885] ? clear_bhb_loop+0x35/0x90 [ 104.945320][ T3885] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 104.951045][ T3885] RIP: 0033:0x7fb6a97f2ef9 [ 104.955415][ T3885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 104.974856][ T3885] RSP: 002b:00007fb6a846d038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 104.983193][ T3885] RAX: ffffffffffffffda RBX: 00007fb6a99abf80 RCX: 00007fb6a97f2ef9 [ 104.990995][ T3885] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 104.998807][ T3885] RBP: 00007fb6a846d090 R08: 0000000000000000 R09: 0000000000000000 [ 105.006619][ T3885] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 105.014426][ T3885] R13: 0000000000000000 R14: 00007fb6a99abf80 R15: 00007ffd15302dc8 [ 105.022244][ T3885] [ 106.251841][ T3949] geneve1: tun_chr_ioctl cmd 1074025681 [ 106.496226][ T3960] device sit0 entered promiscuous mode [ 107.189726][ T3987] FAULT_INJECTION: forcing a failure. [ 107.189726][ T3987] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 107.306551][ T3987] CPU: 1 PID: 3987 Comm: syz.0.1201 Not tainted 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 107.316290][ T3987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 107.326182][ T3987] Call Trace: [ 107.329306][ T3987] [ 107.332083][ T3987] dump_stack_lvl+0x151/0x1c0 [ 107.336594][ T3987] ? io_uring_drop_tctx_refs+0x190/0x190 [ 107.342064][ T3987] dump_stack+0x15/0x20 [ 107.346057][ T3987] should_fail+0x3c6/0x510 [ 107.350307][ T3987] should_fail_usercopy+0x1a/0x20 [ 107.355166][ T3987] _copy_from_user+0x20/0xd0 [ 107.359597][ T3987] strndup_user+0xb3/0x150 [ 107.363849][ T3987] perf_uprobe_init+0x66/0x1a0 [ 107.368449][ T3987] perf_uprobe_event_init+0x106/0x190 [ 107.373653][ T3987] perf_try_init_event+0x143/0x410 [ 107.378602][ T3987] perf_event_alloc+0x1256/0x1b00 [ 107.383466][ T3987] __se_sys_perf_event_open+0x7b4/0x3ce0 [ 107.388934][ T3987] ? __mutex_lock_slowpath+0x10/0x10 [ 107.394054][ T3987] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 107.399521][ T3987] ? __ia32_sys_read+0x90/0x90 [ 107.404132][ T3987] ? debug_smp_processor_id+0x17/0x20 [ 107.409347][ T3987] __x64_sys_perf_event_open+0xbf/0xd0 [ 107.414708][ T3987] x64_sys_call+0x7de/0x9a0 [ 107.419054][ T3987] do_syscall_64+0x3b/0xb0 [ 107.423301][ T3987] ? clear_bhb_loop+0x35/0x90 [ 107.427814][ T3987] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 107.433543][ T3987] RIP: 0033:0x7f3e52f39ef9 [ 107.437792][ T3987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 107.457234][ T3987] RSP: 002b:00007f3e51bb4038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 107.465569][ T3987] RAX: ffffffffffffffda RBX: 00007f3e530f2f80 RCX: 00007f3e52f39ef9 [ 107.473379][ T3987] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 107.481190][ T3987] RBP: 00007f3e51bb4090 R08: 0000000000000000 R09: 0000000000000000 [ 107.489002][ T3987] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 107.496811][ T3987] R13: 0000000000000000 R14: 00007f3e530f2f80 R15: 00007ffe8c9de768 [ 107.504627][ T3987] [ 108.134933][ T4022] FAULT_INJECTION: forcing a failure. [ 108.134933][ T4022] name failslab, interval 1, probability 0, space 0, times 0 [ 108.161518][ T4022] CPU: 1 PID: 4022 Comm: syz.2.1216 Not tainted 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 108.171260][ T4022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 108.181150][ T4022] Call Trace: [ 108.184272][ T4022] [ 108.187048][ T4022] dump_stack_lvl+0x151/0x1c0 [ 108.191564][ T4022] ? io_uring_drop_tctx_refs+0x190/0x190 [ 108.197031][ T4022] ? ____kasan_kmalloc+0xed/0x110 [ 108.201975][ T4022] ? __kasan_kmalloc+0x9/0x10 [ 108.206489][ T4022] ? __kmalloc_track_caller+0x139/0x260 [ 108.211874][ T4022] ? strndup_user+0x76/0x150 [ 108.216298][ T4022] ? perf_uprobe_init+0x66/0x1a0 [ 108.221072][ T4022] dump_stack+0x15/0x20 [ 108.225063][ T4022] should_fail+0x3c6/0x510 [ 108.229320][ T4022] __should_failslab+0xa4/0xe0 [ 108.233918][ T4022] ? getname_kernel+0x59/0x2e0 [ 108.238514][ T4022] should_failslab+0x9/0x20 [ 108.242858][ T4022] slab_pre_alloc_hook+0x37/0xd0 [ 108.247629][ T4022] ? getname_kernel+0x59/0x2e0 [ 108.252232][ T4022] kmem_cache_alloc+0x44/0x200 [ 108.256829][ T4022] getname_kernel+0x59/0x2e0 [ 108.261258][ T4022] kern_path+0x23/0x1a0 [ 108.265250][ T4022] create_local_trace_uprobe+0xa2/0x710 [ 108.270633][ T4022] ? bpf_get_uprobe_info+0x4e0/0x4e0 [ 108.275759][ T4022] ? __kasan_check_write+0x14/0x20 [ 108.280700][ T4022] perf_uprobe_init+0xfa/0x1a0 [ 108.285296][ T4022] perf_uprobe_event_init+0x106/0x190 [ 108.290505][ T4022] perf_try_init_event+0x143/0x410 [ 108.295455][ T4022] perf_event_alloc+0x1256/0x1b00 [ 108.300316][ T4022] __se_sys_perf_event_open+0x7b4/0x3ce0 [ 108.305783][ T4022] ? __mutex_lock_slowpath+0x10/0x10 [ 108.310911][ T4022] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 108.316461][ T4022] ? __ia32_sys_read+0x90/0x90 [ 108.321055][ T4022] ? debug_smp_processor_id+0x17/0x20 [ 108.326467][ T4022] __x64_sys_perf_event_open+0xbf/0xd0 [ 108.331735][ T4022] x64_sys_call+0x7de/0x9a0 [ 108.336074][ T4022] do_syscall_64+0x3b/0xb0 [ 108.340323][ T4022] ? clear_bhb_loop+0x35/0x90 [ 108.344848][ T4022] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 108.350565][ T4022] RIP: 0033:0x7fb6a97f2ef9 [ 108.354819][ T4022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 108.374261][ T4022] RSP: 002b:00007fb6a846d038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 108.382506][ T4022] RAX: ffffffffffffffda RBX: 00007fb6a99abf80 RCX: 00007fb6a97f2ef9 [ 108.390317][ T4022] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 108.398125][ T4022] RBP: 00007fb6a846d090 R08: 0000000000000000 R09: 0000000000000000 [ 108.405938][ T4022] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 108.413748][ T4022] R13: 0000000000000000 R14: 00007fb6a99abf80 R15: 00007ffd15302dc8 [ 108.421566][ T4022] [ 109.548013][ T4061] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 109.597189][ T4061] device syzkaller0 entered promiscuous mode [ 115.032225][ T4315] FAULT_INJECTION: forcing a failure. [ 115.032225][ T4315] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 115.098552][ T4315] CPU: 0 PID: 4315 Comm: syz.0.1324 Not tainted 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 115.108296][ T4315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 115.118449][ T4315] Call Trace: [ 115.121570][ T4315] [ 115.124347][ T4315] dump_stack_lvl+0x151/0x1c0 [ 115.128863][ T4315] ? io_uring_drop_tctx_refs+0x190/0x190 [ 115.134349][ T4315] dump_stack+0x15/0x20 [ 115.138326][ T4315] should_fail+0x3c6/0x510 [ 115.142582][ T4315] should_fail_usercopy+0x1a/0x20 [ 115.147436][ T4315] _copy_to_user+0x20/0x90 [ 115.151692][ T4315] simple_read_from_buffer+0xc7/0x150 [ 115.156904][ T4315] proc_fail_nth_read+0x1a3/0x210 [ 115.161756][ T4315] ? proc_fault_inject_write+0x390/0x390 [ 115.167225][ T4315] ? fsnotify_perm+0x470/0x5d0 [ 115.171822][ T4315] ? security_file_permission+0x86/0xb0 [ 115.177201][ T4315] ? proc_fault_inject_write+0x390/0x390 [ 115.182672][ T4315] vfs_read+0x27d/0xd40 [ 115.186665][ T4315] ? kernel_read+0x1f0/0x1f0 [ 115.191088][ T4315] ? __kasan_check_write+0x14/0x20 [ 115.196037][ T4315] ? mutex_lock+0xb6/0x1e0 [ 115.200298][ T4315] ? wait_for_completion_killable_timeout+0x10/0x10 [ 115.206713][ T4315] ? __fdget_pos+0x2e7/0x3a0 [ 115.211145][ T4315] ? ksys_read+0x77/0x2c0 [ 115.215303][ T4315] ksys_read+0x199/0x2c0 [ 115.219472][ T4315] ? vfs_write+0x1110/0x1110 [ 115.223896][ T4315] ? debug_smp_processor_id+0x17/0x20 [ 115.229122][ T4315] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 115.235107][ T4315] __x64_sys_read+0x7b/0x90 [ 115.239520][ T4315] x64_sys_call+0x28/0x9a0 [ 115.243866][ T4315] do_syscall_64+0x3b/0xb0 [ 115.248114][ T4315] ? clear_bhb_loop+0x35/0x90 [ 115.252623][ T4315] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 115.258352][ T4315] RIP: 0033:0x7f3e52f3893c [ 115.262611][ T4315] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 115.282047][ T4315] RSP: 002b:00007f3e51bb4030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 115.290291][ T4315] RAX: ffffffffffffffda RBX: 00007f3e530f2f80 RCX: 00007f3e52f3893c [ 115.298100][ T4315] RDX: 000000000000000f RSI: 00007f3e51bb40a0 RDI: 0000000000000005 [ 115.305917][ T4315] RBP: 00007f3e51bb4090 R08: 0000000000000000 R09: 0000000000000000 [ 115.313814][ T4315] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 115.321624][ T4315] R13: 0000000000000000 R14: 00007f3e530f2f80 R15: 00007ffe8c9de768 [ 115.329447][ T4315] [ 116.769242][ T4396] Â: renamed from pim6reg1 [ 119.064463][ T4496] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 119.079808][ T4496] device syzkaller0 entered promiscuous mode [ 121.087652][ T4616] device syzkaller0 entered promiscuous mode [ 121.359461][ T3179] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 121.377721][ T3179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 121.460519][ T4632] device wg2 left promiscuous mode [ 121.541619][ T4632] device wg2 entered promiscuous mode [ 122.099128][ T4638] device syzkaller0 entered promiscuous mode [ 123.026979][ T4667] device syzkaller0 entered promiscuous mode [ 123.045790][ T4670] FAULT_INJECTION: forcing a failure. [ 123.045790][ T4670] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 123.064742][ T4670] CPU: 0 PID: 4670 Comm: syz.2.1445 Not tainted 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 123.074474][ T4670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 123.084383][ T4670] Call Trace: [ 123.087489][ T4670] [ 123.090278][ T4670] dump_stack_lvl+0x151/0x1c0 [ 123.094785][ T4670] ? io_uring_drop_tctx_refs+0x190/0x190 [ 123.100250][ T4670] ? arch_stack_walk+0xf3/0x140 [ 123.104938][ T4670] dump_stack+0x15/0x20 [ 123.108931][ T4670] should_fail+0x3c6/0x510 [ 123.113184][ T4670] should_fail_alloc_page+0x5a/0x80 [ 123.118215][ T4670] prepare_alloc_pages+0x15c/0x700 [ 123.123169][ T4670] ? __stack_depot_save+0x34/0x470 [ 123.128108][ T4670] ? __alloc_pages_bulk+0xe40/0xe40 [ 123.133150][ T4670] ? ____kasan_kmalloc+0xed/0x110 [ 123.138001][ T4670] ? ____kasan_kmalloc+0xdb/0x110 [ 123.142861][ T4670] ? __kasan_kmalloc+0x9/0x10 [ 123.147377][ T4670] ? kmem_cache_alloc_trace+0x115/0x210 [ 123.152755][ T4670] ? slhc_init+0x77/0x7a0 [ 123.156927][ T4670] __alloc_pages+0x18c/0x8f0 [ 123.161353][ T4670] ? prep_new_page+0x110/0x110 [ 123.165954][ T4670] kmalloc_order+0x4a/0x160 [ 123.170289][ T4670] kmalloc_order_trace+0x1a/0xb0 [ 123.175062][ T4670] __kmalloc+0x19c/0x270 [ 123.179143][ T4670] ? slhc_init+0x77/0x7a0 [ 123.183307][ T4670] slhc_init+0xb6/0x7a0 [ 123.187304][ T4670] ppp_ioctl+0x13de/0x19a0 [ 123.191553][ T4670] ? __mutex_lock_slowpath+0x10/0x10 [ 123.196673][ T4670] ? ppp_poll+0x250/0x250 [ 123.200843][ T4670] ? __fget_files+0x31e/0x380 [ 123.205355][ T4670] ? security_file_ioctl+0x84/0xb0 [ 123.210387][ T4670] ? ppp_poll+0x250/0x250 [ 123.214551][ T4670] __se_sys_ioctl+0x114/0x190 [ 123.219075][ T4670] __x64_sys_ioctl+0x7b/0x90 [ 123.223511][ T4670] x64_sys_call+0x98/0x9a0 [ 123.227747][ T4670] do_syscall_64+0x3b/0xb0 [ 123.231996][ T4670] ? clear_bhb_loop+0x35/0x90 [ 123.236512][ T4670] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 123.242245][ T4670] RIP: 0033:0x7fb6a97f2ef9 [ 123.246494][ T4670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 123.265933][ T4670] RSP: 002b:00007fb6a846d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 123.274186][ T4670] RAX: ffffffffffffffda RBX: 00007fb6a99abf80 RCX: 00007fb6a97f2ef9 [ 123.281991][ T4670] RDX: 000000002000000c RSI: 0000000040047451 RDI: 0000000000000006 [ 123.289802][ T4670] RBP: 00007fb6a846d090 R08: 0000000000000000 R09: 0000000000000000 [ 123.297612][ T4670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 123.305425][ T4670] R13: 0000000000000000 R14: 00007fb6a99abf80 R15: 00007ffd15302dc8 [ 123.313243][ T4670] [ 123.913684][ T4695] device syzkaller0 entered promiscuous mode [ 125.447223][ T4751] device syzkaller0 entered promiscuous mode [ 127.047945][ T4846] bridge0: port 3(veth0_to_batadv) entered blocking state [ 127.071378][ T4846] bridge0: port 3(veth0_to_batadv) entered disabled state [ 127.134807][ T4846] device veth0_to_batadv entered promiscuous mode [ 127.223842][ T4846] bridge0: port 3(veth0_to_batadv) entered blocking state [ 127.231188][ T4846] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 128.027917][ T4905] device syzkaller0 entered promiscuous mode [ 154.775271][ T288] syz-executor (288) used greatest stack depth: 20704 bytes left [ 154.860579][ T4959] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.867434][ T4959] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.874837][ T4959] device bridge_slave_0 entered promiscuous mode [ 154.882776][ T4959] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.889706][ T4959] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.896837][ T4959] device bridge_slave_1 entered promiscuous mode [ 154.957216][ T4957] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.964103][ T4957] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.971542][ T4957] device bridge_slave_0 entered promiscuous mode [ 154.982854][ T4957] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.989930][ T4957] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.997208][ T4957] device bridge_slave_1 entered promiscuous mode [ 155.033638][ T4958] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.040510][ T4958] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.047707][ T4958] device bridge_slave_0 entered promiscuous mode [ 155.068038][ T4958] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.075194][ T4958] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.082538][ T4958] device bridge_slave_1 entered promiscuous mode [ 155.113988][ T4960] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.120968][ T4960] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.128246][ T4960] device bridge_slave_0 entered promiscuous mode [ 155.149418][ T4960] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.156267][ T4960] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.163862][ T4960] device bridge_slave_1 entered promiscuous mode [ 155.284758][ T4961] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.292893][ T4961] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.300241][ T4961] device bridge_slave_0 entered promiscuous mode [ 155.307198][ T4961] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.314111][ T4961] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.321518][ T4961] device bridge_slave_1 entered promiscuous mode [ 155.386541][ T4959] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.393537][ T4959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.400661][ T4959] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.407407][ T4959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.440772][ T4957] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.447626][ T4957] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.454770][ T4957] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.461528][ T4957] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.486900][ T4960] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.493769][ T4960] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.501022][ T4960] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.507867][ T4960] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.532095][ T45] device veth0_to_batadv left promiscuous mode [ 155.538315][ T45] bridge0: port 3(veth0_to_batadv) entered disabled state [ 155.545888][ T45] device bridge_slave_1 left promiscuous mode [ 155.551969][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.559334][ T45] device bridge_slave_0 left promiscuous mode [ 155.565264][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.573029][ T45] device veth1_macvtap left promiscuous mode [ 155.678452][ T4958] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.685333][ T4958] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.692546][ T4958] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.699397][ T4958] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.707699][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.715411][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.723746][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.731239][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.738399][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.746218][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.753312][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.760799][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.767884][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.780105][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.788320][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.796407][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.803266][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.823861][ T3179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 155.831367][ T3179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.851873][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 155.860070][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.867836][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 155.875858][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.897884][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 155.905362][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.912821][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.920978][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.929102][ T3177] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.935933][ T3177] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.943201][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.951408][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.959472][ T3177] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.966307][ T3177] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.973581][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.981840][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.989923][ T3177] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.996745][ T3177] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.015035][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 156.023124][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.030979][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 156.038816][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.046664][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.054798][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.062838][ T3177] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.069686][ T3177] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.103161][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.111700][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.136714][ T4957] device veth0_vlan entered promiscuous mode [ 156.145428][ T1605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 156.154020][ T30] audit: type=1400 audit(1725707044.456:150): avc: denied { remove_name } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 156.154524][ T1605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.176808][ T30] audit: type=1400 audit(1725707044.456:151): avc: denied { rename } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 156.185243][ T1605] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.212829][ T1605] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.220381][ T1605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.227542][ T1605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.234867][ T1605] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.242824][ T1605] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.249669][ T1605] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.257077][ T1605] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 156.279260][ T1605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 156.288210][ T1605] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.296274][ T1605] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.303124][ T1605] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.310827][ T1605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 156.319332][ T1605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 156.327539][ T1605] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.341357][ T4959] device veth0_vlan entered promiscuous mode [ 156.349265][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 156.357064][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.377119][ T4959] device veth1_macvtap entered promiscuous mode [ 156.385440][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 156.394970][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.402392][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.409855][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.417101][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.424397][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.432552][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.440611][ T3178] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.447439][ T3178] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.454669][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.462822][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.470822][ T3178] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.477741][ T3178] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.484995][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.494785][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 156.510202][ T4960] device veth0_vlan entered promiscuous mode [ 156.518673][ T4957] device veth1_macvtap entered promiscuous mode [ 156.525787][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 156.533929][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.542152][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.549630][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.559117][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 156.567180][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 156.589469][ T3179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 156.597332][ T3179] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.605272][ T3179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 156.613277][ T3179] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.631039][ T1605] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 156.639396][ T1605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 156.647645][ T1605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 156.663989][ T4961] device veth0_vlan entered promiscuous mode [ 156.673855][ T30] audit: type=1400 audit(1725707044.976:152): avc: denied { mounton } for pid=4959 comm="syz-executor" path="/root/syzkaller.3T6R5T/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 156.686440][ T4958] device veth0_vlan entered promiscuous mode [ 156.705969][ T30] audit: type=1400 audit(1725707044.976:153): avc: denied { mount } for pid=4959 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 156.728047][ T30] audit: type=1400 audit(1725707045.006:154): avc: denied { mounton } for pid=4959 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 156.751679][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.759991][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.767399][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.775105][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 156.783741][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.791559][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.798733][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.807752][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 156.815861][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 156.824112][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 156.832126][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 156.840302][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 156.879452][ T4961] device veth1_macvtap entered promiscuous mode [ 156.886565][ T4960] device veth1_macvtap entered promiscuous mode [ 156.901501][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 156.910070][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 156.918205][ T444] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 156.935191][ T4958] device veth1_macvtap entered promiscuous mode [ 156.974457][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 156.999332][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 157.007343][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 157.015296][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 157.023872][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 157.032308][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 157.040797][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 157.053606][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 157.063631][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 157.082870][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 157.111359][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 157.217444][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 157.244727][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 157.280523][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 157.288667][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 157.334271][ T4988] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 157.352201][ T4988] device syzkaller0 entered promiscuous mode [ 157.589558][ T5011] bridge0: port 3(veth0_to_batadv) entered blocking state [ 157.598431][ T5011] bridge0: port 3(veth0_to_batadv) entered disabled state [ 157.618924][ T5011] device veth0_to_batadv entered promiscuous mode [ 157.635106][ T5011] bridge0: port 3(veth0_to_batadv) entered blocking state [ 157.642605][ T5011] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 157.705272][ T5011] device veth0_to_batadv left promiscuous mode [ 157.720874][ T5011] bridge0: port 3(veth0_to_batadv) entered disabled state [ 158.216287][ T45] device veth0_to_batadv left promiscuous mode [ 158.223651][ T45] bridge0: port 3(veth0_to_batadv) entered disabled state [ 158.231587][ T45] device bridge_slave_1 left promiscuous mode [ 158.237714][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.245533][ T45] device bridge_slave_0 left promiscuous mode [ 158.251696][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.267318][ T45] device bridge_slave_1 left promiscuous mode [ 158.274487][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.282223][ T45] device bridge_slave_0 left promiscuous mode [ 158.288220][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.303697][ T45] device bridge_slave_1 left promiscuous mode [ 158.309789][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.320822][ T45] device bridge_slave_0 left promiscuous mode [ 158.326773][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.338808][ T45] device veth1_macvtap left promiscuous mode [ 158.345365][ T45] device veth1_macvtap left promiscuous mode [ 158.728020][ T5033] bridge0: port 3(veth0_to_batadv) entered blocking state [ 158.735570][ T5033] bridge0: port 3(veth0_to_batadv) entered disabled state [ 158.753628][ T5033] device veth0_to_batadv entered promiscuous mode [ 158.762237][ T5033] bridge0: port 3(veth0_to_batadv) entered blocking state [ 158.769388][ T5033] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 158.778686][ T5035] device veth0_to_batadv left promiscuous mode [ 158.785064][ T5035] bridge0: port 3(veth0_to_batadv) entered disabled state [ 158.985628][ T5046] device wg2 entered promiscuous mode [ 159.016757][ T5048] device pim6reg1 entered promiscuous mode [ 159.150182][ T5052] device sit0 entered promiscuous mode [ 159.216017][ T30] audit: type=1400 audit(1725707047.516:155): avc: denied { create } for pid=5060 comm="syz.2.1562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 160.216619][ T5077] ªªªªªª: renamed from vlan0 [ 160.915858][ T5096] device sit0 entered promiscuous mode [ 161.230025][ T5102] bridge0: port 3(veth0_to_batadv) entered blocking state [ 161.237316][ T5102] bridge0: port 3(veth0_to_batadv) entered disabled state [ 161.273973][ T5102] device veth0_to_batadv entered promiscuous mode [ 161.281514][ T5102] bridge0: port 3(veth0_to_batadv) entered blocking state [ 161.288494][ T5102] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 161.339540][ T5105] device veth0_to_batadv left promiscuous mode [ 161.350315][ T5105] bridge0: port 3(veth0_to_batadv) entered disabled state [ 161.599466][ T5122] ªªªªªª: renamed from vlan0 [ 162.212803][ T5137] device pim6reg1 entered promiscuous mode [ 162.429526][ T5146] device wg2 entered promiscuous mode [ 162.492565][ T5151] device sit0 entered promiscuous mode [ 162.869935][ T5164] bridge0: port 3(veth0_to_batadv) entered blocking state [ 162.877593][ T5164] bridge0: port 3(veth0_to_batadv) entered disabled state [ 162.905122][ T5164] device veth0_to_batadv entered promiscuous mode [ 162.920787][ T5164] bridge0: port 3(veth0_to_batadv) entered blocking state [ 162.927941][ T5164] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 162.960623][ T5166] device veth0_to_batadv left promiscuous mode [ 162.974348][ T5166] bridge0: port 3(veth0_to_batadv) entered disabled state [ 163.468384][ T5192] device wg2 entered promiscuous mode [ 163.608110][ T5202] bridge0: port 3(veth0_to_batadv) entered blocking state [ 163.617332][ T5202] bridge0: port 3(veth0_to_batadv) entered disabled state [ 163.642662][ T5202] device veth0_to_batadv entered promiscuous mode [ 163.663334][ T5202] bridge0: port 3(veth0_to_batadv) entered blocking state [ 163.670682][ T5202] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 163.689647][ T5206] device sit0 entered promiscuous mode [ 163.862507][ T5210] device veth0_to_batadv left promiscuous mode [ 163.869356][ T5210] bridge0: port 3(veth0_to_batadv) entered disabled state [ 163.915711][ T5213] device pim6reg1 entered promiscuous mode [ 164.060257][ T5221] bridge0: port 3(veth0_to_batadv) entered blocking state [ 164.067508][ T5221] bridge0: port 3(veth0_to_batadv) entered disabled state [ 164.090888][ T5221] device veth0_to_batadv entered promiscuous mode [ 164.100270][ T5221] bridge0: port 3(veth0_to_batadv) entered blocking state [ 164.107580][ T5221] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 164.152800][ T5224] device veth0_to_batadv left promiscuous mode [ 164.193765][ T5224] bridge0: port 3(veth0_to_batadv) entered disabled state [ 164.800061][ T5266] bridge0: port 3(veth0_to_batadv) entered blocking state [ 164.813183][ T5266] bridge0: port 3(veth0_to_batadv) entered disabled state [ 164.867453][ T5266] device veth0_to_batadv entered promiscuous mode [ 164.912027][ T5266] bridge0: port 3(veth0_to_batadv) entered blocking state [ 164.919239][ T5266] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 164.988723][ T5269] device veth0_to_batadv left promiscuous mode [ 164.995057][ T5269] bridge0: port 3(veth0_to_batadv) entered disabled state [ 165.289179][ T5281] ªªªªªª: renamed from vlan0 [ 165.769033][ T5324] ªªªªªª: renamed from vlan0 [ 166.325061][ T5353] device syzkaller0 entered promiscuous mode [ 166.828769][ T5364] device syzkaller0 entered promiscuous mode [ 167.289609][ T5381] ªªªªªª: renamed from vlan0 [ 169.741604][ T5477] device syzkaller0 entered promiscuous mode [ 172.264427][ T5530] device syzkaller0 entered promiscuous mode [ 172.424044][ T5541] tap0: tun_chr_ioctl cmd 1074812118 [ 172.719689][ T30] audit: type=1400 audit(1725707061.026:156): avc: denied { create } for pid=5565 comm="syz.1.1733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 173.780495][ T5618] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.787548][ T5618] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.807493][ T5632] syz.2.1753[5632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.807572][ T5632] syz.2.1753[5632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.872952][ T5631] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.891027][ T5631] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.898224][ T5631] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.905046][ T5631] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.912250][ T5631] device bridge0 entered promiscuous mode [ 173.918617][ T5627] tap0: tun_chr_ioctl cmd 2147767521 [ 173.924042][ T5632] tap0: tun_chr_ioctl cmd 1074025677 [ 173.930000][ T5632] tap0: linktype set to 4 [ 173.942912][ T5644] device syzkaller0 entered promiscuous mode [ 178.464216][ T5890] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.471180][ T5890] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.478122][ T5890] device bridge0 left promiscuous mode [ 179.631857][ T5970] device sit0 left promiscuous mode [ 179.680135][ T5970] device sit0 entered promiscuous mode [ 180.488816][ T5996] device syzkaller0 entered promiscuous mode [ 182.527758][ T30] audit: type=1400 audit(1725707070.826:157): avc: denied { ioctl } for pid=6183 comm="syz.3.1919" path="socket:[35109]" dev="sockfs" ino=35109 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 182.764505][ T6184] device syzkaller0 entered promiscuous mode [ 183.268828][ T6219] device pim6reg1 entered promiscuous mode [ 183.679318][ T6244] bridge0: port 3(veth0_to_batadv) entered blocking state [ 183.693712][ T6244] bridge0: port 3(veth0_to_batadv) entered disabled state [ 183.701767][ T6244] device veth0_to_batadv entered promiscuous mode [ 183.708107][ T6244] bridge0: port 3(veth0_to_batadv) entered blocking state [ 183.714980][ T6244] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 183.792742][ T6247] device veth0_to_batadv left promiscuous mode [ 183.805932][ T6247] bridge0: port 3(veth0_to_batadv) entered disabled state [ 184.502272][ T6264] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.509161][ T6264] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.516293][ T6264] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.523269][ T6264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.533418][ T6264] device bridge0 entered promiscuous mode [ 184.564111][ T6276] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.571344][ T6276] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.637926][ T6276] device bridge0 left promiscuous mode [ 184.722761][ T6285] device wg2 entered promiscuous mode [ 184.751290][ T6276] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.758183][ T6276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.765336][ T6276] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.772205][ T6276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.828174][ T6276] device bridge0 entered promiscuous mode [ 185.378275][ T6330] device sit0 left promiscuous mode [ 185.432963][ T5415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.486369][ T6330] device sit0 entered promiscuous mode [ 189.076621][ T6393] syzkaller0: refused to change device tx_queue_len [ 196.512678][ T6486] device sit0 left promiscuous mode [ 196.578238][ T6487] device sit0 entered promiscuous mode [ 198.093488][ T6519] syz.0.2041[6519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.136899][ T6519] syz.0.2041[6519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.129785][ T6662] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.151218][ T6662] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.261635][ T6670] device veth0_vlan left promiscuous mode [ 201.339202][ T6670] device veth0_vlan entered promiscuous mode [ 201.346211][ T3179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 201.369868][ T3179] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 201.377490][ T3179] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 202.811498][ T6734] device syzkaller0 entered promiscuous mode [ 203.241590][ T30] audit: type=1400 audit(1725707091.546:158): avc: denied { create } for pid=6750 comm="syz.3.2109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 203.769167][ T6769] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.777619][ T6769] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.904932][ T6774] FAULT_INJECTION: forcing a failure. [ 203.904932][ T6774] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 203.998331][ T6774] CPU: 0 PID: 6774 Comm: syz.0.2118 Not tainted 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 204.008075][ T6774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 204.017968][ T6774] Call Trace: [ 204.021094][ T6774] [ 204.023950][ T6774] dump_stack_lvl+0x151/0x1c0 [ 204.028473][ T6774] ? io_uring_drop_tctx_refs+0x190/0x190 [ 204.033934][ T6774] ? stack_trace_save+0x113/0x1c0 [ 204.038804][ T6774] dump_stack+0x15/0x20 [ 204.042790][ T6774] should_fail+0x3c6/0x510 [ 204.047043][ T6774] should_fail_alloc_page+0x5a/0x80 [ 204.052072][ T6774] prepare_alloc_pages+0x15c/0x700 [ 204.057025][ T6774] ? __alloc_pages_bulk+0xe40/0xe40 [ 204.062053][ T6774] ? x64_sys_call+0x2f/0x9a0 [ 204.066478][ T6774] ? do_syscall_64+0x3b/0xb0 [ 204.070903][ T6774] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 204.076816][ T6774] __alloc_pages+0x18c/0x8f0 [ 204.081307][ T6774] ? prep_new_page+0x110/0x110 [ 204.085840][ T6774] kmalloc_order+0x4a/0x160 [ 204.090174][ T6774] kmalloc_order_trace+0x1a/0xb0 [ 204.094946][ T6774] ? alloc_skb_with_frags+0xa6/0x680 [ 204.100071][ T6774] __kmalloc_track_caller+0x19b/0x260 [ 204.105277][ T6774] ? kmem_cache_alloc+0xf5/0x200 [ 204.110050][ T6774] ? alloc_skb_with_frags+0xa6/0x680 [ 204.115170][ T6774] __alloc_skb+0x10c/0x550 [ 204.119423][ T6774] alloc_skb_with_frags+0xa6/0x680 [ 204.124369][ T6774] ? 0xffffffffa00269fc [ 204.128380][ T6774] ? is_bpf_text_address+0x172/0x190 [ 204.133484][ T6774] sock_alloc_send_pskb+0x915/0xa50 [ 204.138533][ T6774] ? sock_kzfree_s+0x60/0x60 [ 204.142941][ T6774] ? stack_trace_save+0x113/0x1c0 [ 204.147805][ T6774] ? stack_trace_snprint+0xf0/0xf0 [ 204.152925][ T6774] tun_get_user+0xf1b/0x3aa0 [ 204.157353][ T6774] ? __x64_sys_openat+0x240/0x290 [ 204.162210][ T6774] ? x64_sys_call+0x6bf/0x9a0 [ 204.166726][ T6774] ? _kstrtoull+0x3a0/0x4a0 [ 204.171064][ T6774] ? tun_do_read+0x2010/0x2010 [ 204.175662][ T6774] ? kstrtouint_from_user+0x20a/0x2a0 [ 204.180874][ T6774] ? kstrtol_from_user+0x310/0x310 [ 204.185822][ T6774] ? avc_policy_seqno+0x1b/0x70 [ 204.190506][ T6774] ? selinux_file_permission+0x2c4/0x570 [ 204.195986][ T6774] tun_chr_write_iter+0x1e1/0x2e0 [ 204.200835][ T6774] vfs_write+0xd5d/0x1110 [ 204.205002][ T6774] ? putname+0xfa/0x150 [ 204.208996][ T6774] ? file_end_write+0x1c0/0x1c0 [ 204.213687][ T6774] ? __fdget_pos+0x209/0x3a0 [ 204.218105][ T6774] ? ksys_write+0x77/0x2c0 [ 204.222357][ T6774] ksys_write+0x199/0x2c0 [ 204.226524][ T6774] ? __ia32_sys_read+0x90/0x90 [ 204.231126][ T6774] ? debug_smp_processor_id+0x17/0x20 [ 204.236329][ T6774] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 204.242232][ T6774] __x64_sys_write+0x7b/0x90 [ 204.246660][ T6774] x64_sys_call+0x2f/0x9a0 [ 204.250913][ T6774] do_syscall_64+0x3b/0xb0 [ 204.255165][ T6774] ? clear_bhb_loop+0x35/0x90 [ 204.259692][ T6774] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 204.265409][ T6774] RIP: 0033:0x7fc31a64bef9 [ 204.269662][ T6774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 204.289103][ T6774] RSP: 002b:00007fc3192c6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 204.297431][ T6774] RAX: ffffffffffffffda RBX: 00007fc31a804f80 RCX: 00007fc31a64bef9 [ 204.305243][ T6774] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 204.313083][ T6774] RBP: 00007fc3192c6090 R08: 0000000000000000 R09: 0000000000000000 [ 204.320870][ T6774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 204.328678][ T6774] R13: 0000000000000000 R14: 00007fc31a804f80 R15: 00007ffe84162028 [ 204.336501][ T6774] [ 205.286700][ T6819] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.293754][ T6819] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.304092][ T6822] FAULT_INJECTION: forcing a failure. [ 205.304092][ T6822] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 205.325423][ T6822] CPU: 0 PID: 6822 Comm: syz.2.2132 Not tainted 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 205.335157][ T6822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 205.345051][ T6822] Call Trace: [ 205.348178][ T6822] [ 205.351039][ T6822] dump_stack_lvl+0x151/0x1c0 [ 205.355553][ T6822] ? io_uring_drop_tctx_refs+0x190/0x190 [ 205.361021][ T6822] ? __kasan_check_write+0x14/0x20 [ 205.365969][ T6822] ? __alloc_skb+0x355/0x550 [ 205.370397][ T6822] dump_stack+0x15/0x20 [ 205.374387][ T6822] should_fail+0x3c6/0x510 [ 205.378643][ T6822] should_fail_usercopy+0x1a/0x20 [ 205.383500][ T6822] _copy_from_iter+0x22f/0xdc0 [ 205.388099][ T6822] ? copy_mc_pipe_to_iter+0x760/0x760 [ 205.393308][ T6822] ? __check_object_size+0x2ec/0x3d0 [ 205.398427][ T6822] skb_copy_datagram_from_iter+0x100/0x6d0 [ 205.404161][ T6822] tun_get_user+0x112d/0x3aa0 [ 205.408676][ T6822] ? __x64_sys_openat+0x240/0x290 [ 205.413532][ T6822] ? x64_sys_call+0x6bf/0x9a0 [ 205.418043][ T6822] ? _kstrtoull+0x3a0/0x4a0 [ 205.422382][ T6822] ? tun_do_read+0x2010/0x2010 [ 205.426979][ T6822] ? kstrtouint_from_user+0x20a/0x2a0 [ 205.432193][ T6822] ? kstrtol_from_user+0x310/0x310 [ 205.437141][ T6822] ? avc_policy_seqno+0x1b/0x70 [ 205.441823][ T6822] ? selinux_file_permission+0x2c4/0x570 [ 205.447297][ T6822] tun_chr_write_iter+0x1e1/0x2e0 [ 205.452157][ T6822] vfs_write+0xd5d/0x1110 [ 205.456409][ T6822] ? putname+0xfa/0x150 [ 205.460400][ T6822] ? file_end_write+0x1c0/0x1c0 [ 205.465089][ T6822] ? __fdget_pos+0x209/0x3a0 [ 205.469507][ T6822] ? ksys_write+0x77/0x2c0 [ 205.473762][ T6822] ksys_write+0x199/0x2c0 [ 205.477931][ T6822] ? __ia32_sys_read+0x90/0x90 [ 205.482529][ T6822] ? debug_smp_processor_id+0x17/0x20 [ 205.487739][ T6822] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 205.493726][ T6822] __x64_sys_write+0x7b/0x90 [ 205.498411][ T6822] x64_sys_call+0x2f/0x9a0 [ 205.502669][ T6822] do_syscall_64+0x3b/0xb0 [ 205.506971][ T6822] ? clear_bhb_loop+0x35/0x90 [ 205.511430][ T6822] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 205.517159][ T6822] RIP: 0033:0x7f0392cf9ef9 [ 205.521411][ T6822] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 205.541027][ T6822] RSP: 002b:00007f0391974038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 205.549273][ T6822] RAX: ffffffffffffffda RBX: 00007f0392eb2f80 RCX: 00007f0392cf9ef9 [ 205.557081][ T6822] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 205.564894][ T6822] RBP: 00007f0391974090 R08: 0000000000000000 R09: 0000000000000000 [ 205.572706][ T6822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 205.580512][ T6822] R13: 0000000000000000 R14: 00007f0392eb2f80 R15: 00007ffe23696208 [ 205.588330][ T6822] [ 206.726591][ T6850] device syzkaller0 entered promiscuous mode [ 207.389932][ T6892] bridge0: port 3(veth0_to_batadv) entered blocking state [ 207.427005][ T6892] bridge0: port 3(veth0_to_batadv) entered disabled state [ 207.522308][ T6892] device veth0_to_batadv entered promiscuous mode [ 207.548309][ T6892] bridge0: port 3(veth0_to_batadv) entered blocking state [ 207.555561][ T6892] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 207.698983][ T6902] device veth0_to_batadv left promiscuous mode [ 207.705170][ T6902] bridge0: port 3(veth0_to_batadv) entered disabled state [ 207.968009][ T6908] device syzkaller0 entered promiscuous mode [ 208.080322][ T30] audit: type=1400 audit(1725707096.386:159): avc: denied { create } for pid=6915 comm="syz.0.2164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 209.479797][ T30] audit: type=1400 audit(1725707097.786:160): avc: denied { append } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 209.523590][ T30] audit: type=1400 audit(1725707097.786:161): avc: denied { open } for pid=82 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 209.623655][ T30] audit: type=1400 audit(1725707097.786:162): avc: denied { getattr } for pid=82 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 211.480231][ T7012] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.197203][ T7046] FAULT_INJECTION: forcing a failure. [ 215.197203][ T7046] name failslab, interval 1, probability 0, space 0, times 0 [ 215.209669][ T7046] CPU: 0 PID: 7046 Comm: syz.2.2206 Not tainted 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 215.219359][ T7046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 215.229248][ T7046] Call Trace: [ 215.232374][ T7046] [ 215.235148][ T7046] dump_stack_lvl+0x151/0x1c0 [ 215.239660][ T7046] ? io_uring_drop_tctx_refs+0x190/0x190 [ 215.245141][ T7046] ? stack_trace_save+0x113/0x1c0 [ 215.249990][ T7046] ? __kernel_text_address+0x9b/0x110 [ 215.255197][ T7046] dump_stack+0x15/0x20 [ 215.259193][ T7046] should_fail+0x3c6/0x510 [ 215.263442][ T7046] __should_failslab+0xa4/0xe0 [ 215.268042][ T7046] ? __alloc_skb+0xbe/0x550 [ 215.272380][ T7046] should_failslab+0x9/0x20 [ 215.276722][ T7046] slab_pre_alloc_hook+0x37/0xd0 [ 215.281494][ T7046] ? __alloc_skb+0xbe/0x550 [ 215.285834][ T7046] kmem_cache_alloc+0x44/0x200 [ 215.290434][ T7046] ? ip6_local_out+0x1ff/0x480 [ 215.295045][ T7046] __alloc_skb+0xbe/0x550 [ 215.299201][ T7046] ndisc_alloc_skb+0xf3/0x2d0 [ 215.303716][ T7046] ndisc_send_ns+0x29d/0x830 [ 215.308142][ T7046] ? ndisc_send_skb+0xc90/0xc90 [ 215.312827][ T7046] ? ipv6_chk_addr_and_flags+0x3e/0x60 [ 215.318121][ T7046] ndisc_solicit+0x35e/0x4d0 [ 215.322552][ T7046] ? ndisc_cleanup+0x40/0x40 [ 215.326973][ T7046] ? skb_clone+0x205/0x360 [ 215.331227][ T7046] ? ndisc_cleanup+0x40/0x40 [ 215.335654][ T7046] __neigh_event_send+0xc4b/0x1160 [ 215.340598][ T7046] ? __kasan_kmalloc+0x9/0x10 [ 215.345115][ T7046] neigh_resolve_output+0x1cf/0x760 [ 215.350146][ T7046] ? selinux_ipv6_output+0x10/0x10 [ 215.355098][ T7046] ip6_finish_output2+0xf95/0x16e0 [ 215.360048][ T7046] ? __ip6_finish_output+0x7c0/0x7c0 [ 215.365160][ T7046] ? ip6t_do_table+0x1662/0x1850 [ 215.369941][ T7046] __ip6_finish_output+0x60f/0x7c0 [ 215.374883][ T7046] ip6_finish_output+0x31/0x210 [ 215.379571][ T7046] ? ip6_output+0x486/0x4d0 [ 215.383907][ T7046] ip6_output+0x1f7/0x4d0 [ 215.388074][ T7046] ? ac6_seq_show+0xf0/0xf0 [ 215.392415][ T7046] ? ip6_output+0x4d0/0x4d0 [ 215.396757][ T7046] ip6_local_out+0x1ff/0x480 [ 215.401182][ T7046] ? dst_output+0x80/0x80 [ 215.405349][ T7046] ? __ip6_local_out+0x410/0x410 [ 215.410118][ T7046] ? ip6_setup_cork+0xd29/0x12a0 [ 215.414894][ T7046] ip6_push_pending_frames+0x14a/0x290 [ 215.420189][ T7046] icmpv6_push_pending_frames+0x2b8/0x450 [ 215.425745][ T7046] icmp6_send+0x13d0/0x1d60 [ 215.430090][ T7046] ? icmpv6_push_pending_frames+0x450/0x450 [ 215.435813][ T7046] ? gre_parse_header+0xca7/0x16d0 [ 215.440759][ T7046] ? sock_alloc_send_pskb+0x915/0xa50 [ 215.445968][ T7046] ? skb_pull_rcsum+0x23b/0x3a0 [ 215.450654][ T7046] ? __iptunnel_pull_header+0x7bf/0x800 [ 215.456039][ T7046] gre_rcv+0xd16/0x1430 [ 215.460119][ T7046] ? erspan_build_header_v2+0x4c0/0x4c0 [ 215.465492][ T7046] ? rawv6_mh_filter_unregister+0x20/0x20 [ 215.471049][ T7046] ? ip6t_alloc_initial_table+0x630/0x630 [ 215.476607][ T7046] ip6_protocol_deliver_rcu+0xa85/0x13c0 [ 215.482075][ T7046] ip6_input+0xd9/0x260 [ 215.486063][ T7046] ? ip6_protocol_deliver_rcu+0x13c0/0x13c0 [ 215.491795][ T7046] ? ip6_input+0x260/0x260 [ 215.496047][ T7046] ? sk_setup_caps+0x430/0x430 [ 215.500648][ T7046] ip6_rcv_finish+0x186/0x350 [ 215.505158][ T7046] ipv6_rcv+0xeb/0x270 [ 215.509063][ T7046] ? ip6_rcv_finish+0x350/0x350 [ 215.513751][ T7046] ? refcount_add+0x80/0x80 [ 215.518110][ T7046] ? ip6_rcv_finish+0x350/0x350 [ 215.522776][ T7046] __netif_receive_skb+0x1c6/0x530 [ 215.527728][ T7046] ? deliver_ptype_list_skb+0x3b0/0x3b0 [ 215.533110][ T7046] ? _copy_from_iter+0x1e1/0xdc0 [ 215.537962][ T7046] netif_receive_skb+0xb0/0x480 [ 215.542667][ T7046] ? _copy_from_iter+0x34d/0xdc0 [ 215.547430][ T7046] ? netif_receive_skb_core+0x210/0x210 [ 215.552812][ T7046] tun_rx_batched+0x6d9/0x870 [ 215.557325][ T7046] ? eth_type_trans+0x2c6/0x600 [ 215.562023][ T7046] ? __check_object_size+0x2ec/0x3d0 [ 215.567216][ T7046] ? local_bh_enable+0x30/0x30 [ 215.571816][ T7046] tun_get_user+0x2cb7/0x3aa0 [ 215.576330][ T7046] ? __x64_sys_openat+0x240/0x290 [ 215.581188][ T7046] ? x64_sys_call+0x6bf/0x9a0 [ 215.585700][ T7046] ? _kstrtoull+0x3a0/0x4a0 [ 215.590044][ T7046] ? tun_do_read+0x2010/0x2010 [ 215.594641][ T7046] ? kstrtouint_from_user+0x20a/0x2a0 [ 215.599847][ T7046] ? kstrtol_from_user+0x310/0x310 [ 215.604802][ T7046] ? avc_policy_seqno+0x1b/0x70 [ 215.609482][ T7046] ? selinux_file_permission+0x2c4/0x570 [ 215.614950][ T7046] tun_chr_write_iter+0x1e1/0x2e0 [ 215.619814][ T7046] vfs_write+0xd5d/0x1110 [ 215.623986][ T7046] ? putname+0xfa/0x150 [ 215.627971][ T7046] ? file_end_write+0x1c0/0x1c0 [ 215.632660][ T7046] ? __fdget_pos+0x209/0x3a0 [ 215.637082][ T7046] ? ksys_write+0x77/0x2c0 [ 215.641338][ T7046] ksys_write+0x199/0x2c0 [ 215.645501][ T7046] ? __ia32_sys_read+0x90/0x90 [ 215.650099][ T7046] ? debug_smp_processor_id+0x17/0x20 [ 215.655309][ T7046] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 215.661214][ T7046] __x64_sys_write+0x7b/0x90 [ 215.665637][ T7046] x64_sys_call+0x2f/0x9a0 [ 215.669891][ T7046] do_syscall_64+0x3b/0xb0 [ 215.674142][ T7046] ? clear_bhb_loop+0x35/0x90 [ 215.678655][ T7046] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 215.684383][ T7046] RIP: 0033:0x7f0392cf9ef9 [ 215.688639][ T7046] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 215.708082][ T7046] RSP: 002b:00007f0391974038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 215.716324][ T7046] RAX: ffffffffffffffda RBX: 00007f0392eb2f80 RCX: 00007f0392cf9ef9 [ 215.724132][ T7046] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 215.731946][ T7046] RBP: 00007f0391974090 R08: 0000000000000000 R09: 0000000000000000 [ 215.739756][ T7046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 215.747570][ T7046] R13: 0000000000000000 R14: 00007f0392eb2f80 R15: 00007ffe23696208 [ 215.755384][ T7046] [ 215.758300][ T7046] ICMPv6: ndisc: ndisc_alloc_skb failed to allocate an skb [ 216.111735][ T7048] bridge0: port 3(veth0_to_batadv) entered blocking state [ 216.190012][ T7048] bridge0: port 3(veth0_to_batadv) entered disabled state [ 216.242970][ T7048] device veth0_to_batadv entered promiscuous mode [ 216.294541][ T7048] bridge0: port 3(veth0_to_batadv) entered blocking state [ 216.301959][ T7048] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 217.806644][ T7088] bridge0: port 3(veth0_to_batadv) entered blocking state [ 217.814803][ T7088] bridge0: port 3(veth0_to_batadv) entered disabled state [ 217.824495][ T7088] device veth0_to_batadv entered promiscuous mode [ 217.834973][ T7088] bridge0: port 3(veth0_to_batadv) entered blocking state [ 217.842127][ T7088] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 217.901059][ T7092] device veth0_to_batadv left promiscuous mode [ 217.907269][ T7092] bridge0: port 3(veth0_to_batadv) entered disabled state [ 217.915732][ T7103] bridge0: port 3(veth0_to_batadv) entered blocking state [ 217.923051][ T7103] bridge0: port 3(veth0_to_batadv) entered disabled state [ 217.936336][ T7103] device veth0_to_batadv entered promiscuous mode [ 218.186837][ T7128] syz.1.2235[7128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.186909][ T7128] syz.1.2235[7128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.260542][ T7128] device syzkaller0 entered promiscuous mode [ 219.417727][ T7148] device veth0_to_batadv left promiscuous mode [ 219.427368][ T7148] bridge0: port 3(veth0_to_batadv) entered disabled state [ 220.106050][ T7181] device pim6reg1 entered promiscuous mode [ 220.416038][ T7194] tap0: tun_chr_ioctl cmd 1074025677 [ 220.426798][ T7194] tap0: linktype set to 512 [ 222.081644][ T7245] syz.0.2278[7245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.085530][ T7245] syz.0.2278[7245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.130757][ T7246] device syzkaller0 entered promiscuous mode [ 222.327119][ T7249] device veth0_to_batadv left promiscuous mode [ 222.338058][ T7249] bridge0: port 3(veth0_to_batadv) entered disabled state [ 222.357422][ T7255] device sit0 left promiscuous mode [ 222.411157][ T7255] device sit0 entered promiscuous mode [ 224.468698][ T30] audit: type=1400 audit(1725707112.766:163): avc: denied { write } for pid=7326 comm="syz.0.2308" name="cgroup.subtree_control" dev="cgroup2" ino=383 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 224.510964][ T30] audit: type=1400 audit(1725707112.796:164): avc: denied { open } for pid=7326 comm="syz.0.2308" path="" dev="cgroup2" ino=383 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 227.131942][ T7414] device pim6reg1 entered promiscuous mode [ 227.499241][ T7429] device pim6reg1 entered promiscuous mode [ 228.579226][ T7474] tap0: tun_chr_ioctl cmd 2147767511 [ 229.784446][ T7524] device syzkaller0 entered promiscuous mode [ 230.243403][ T7548] device syzkaller0 entered promiscuous mode [ 232.511100][ T7673] syz.2.2433[7673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.511181][ T7673] syz.2.2433[7673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.668372][ T30] audit: type=1400 audit(1725707120.966:165): avc: denied { create } for pid=7681 comm="syz.4.2436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 232.958807][ T7689] ip6_vti0: mtu greater than device maximum [ 234.444748][ T7758] syz.4.2463[7758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.444831][ T7758] syz.4.2463[7758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.689366][ T7818] syz.3.2485[7818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.702161][ T7818] syz.3.2485[7818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.178620][ T30] audit: type=1400 audit(1725707125.416:166): avc: denied { create } for pid=7875 comm="syz.2.2506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 240.194437][ T8023] syz.4.2555[8023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.422993][ T8021] device syzkaller0 entered promiscuous mode [ 241.211428][ T8051] syz.4.2564[8051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.211514][ T8051] syz.4.2564[8051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.489191][ T8056] device syzkaller0 entered promiscuous mode [ 241.533402][ T30] audit: type=1400 audit(1725707129.836:167): avc: denied { create } for pid=8064 comm="syz.1.2569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 342.038813][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 342.045616][ C0] (detected by 0, t=10002 jiffies, g=33197, q=102) [ 342.052184][ C0] rcu: All QSes seen, last rcu_preempt kthread activity 10003 (4294971420-4294961417), jiffies_till_next_fqs=1, root ->qsmask 0x0 [ 342.065634][ C0] rcu: rcu_preempt kthread starved for 10004 jiffies! g33197 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 342.076658][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 342.086462][ C0] rcu: RCU grace-period kthread stack dump: [ 342.092193][ C0] task:rcu_preempt state:R running task stack:28328 pid: 14 ppid: 2 flags:0x00004000 [ 342.102785][ C0] Call Trace: [ 342.105991][ C0] [ 342.108770][ C0] __schedule+0xccc/0x1590 [ 342.113024][ C0] ? release_firmware_map_entry+0x190/0x190 [ 342.118752][ C0] ? __kasan_check_write+0x14/0x20 [ 342.123701][ C0] schedule+0x11f/0x1e0 [ 342.127691][ C0] schedule_timeout+0x18c/0x370 [ 342.132474][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 342.137592][ C0] ? console_conditional_schedule+0x30/0x30 [ 342.143316][ C0] ? update_process_times+0x200/0x200 [ 342.148522][ C0] ? prepare_to_swait_event+0x308/0x320 [ 342.153907][ C0] rcu_gp_fqs_loop+0x2af/0xf80 [ 342.158507][ C0] ? debug_smp_processor_id+0x17/0x20 [ 342.163706][ C0] ? __note_gp_changes+0x4ab/0x920 [ 342.168655][ C0] ? rcu_gp_init+0xc30/0xc30 [ 342.173085][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 342.178292][ C0] ? rcu_gp_init+0x9cf/0xc30 [ 342.182717][ C0] rcu_gp_kthread+0xa4/0x350 [ 342.187167][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 342.191919][ C0] ? wake_nocb_gp+0x1e0/0x1e0 [ 342.196521][ C0] ? __kasan_check_read+0x11/0x20 [ 342.201376][ C0] ? __kthread_parkme+0xb2/0x200 [ 342.206154][ C0] kthread+0x421/0x510 [ 342.210061][ C0] ? wake_nocb_gp+0x1e0/0x1e0 [ 342.214572][ C0] ? kthread_blkcg+0xd0/0xd0 [ 342.218999][ C0] ret_from_fork+0x1f/0x30 [ 342.223252][ C0] [ 342.226115][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 342.232298][ C0] NMI backtrace for cpu 0 [ 342.236446][ C0] CPU: 0 PID: 8091 Comm: syz.1.2576 Not tainted 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 342.246248][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 342.256143][ C0] Call Trace: [ 342.259272][ C0] [ 342.261956][ C0] dump_stack_lvl+0x151/0x1c0 [ 342.266472][ C0] ? io_uring_drop_tctx_refs+0x190/0x190 [ 342.272058][ C0] dump_stack+0x15/0x20 [ 342.276049][ C0] nmi_cpu_backtrace+0x2f7/0x300 [ 342.280819][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 342.286993][ C0] ? panic+0x760/0x760 [ 342.290895][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 342.296798][ C0] nmi_trigger_cpumask_backtrace+0x15d/0x270 [ 342.302616][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 342.308514][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 342.314241][ C0] rcu_check_gp_kthread_starvation+0x1e3/0x250 [ 342.320230][ C0] print_other_cpu_stall+0x112d/0x1340 [ 342.325526][ C0] ? print_cpu_stall+0x5f0/0x5f0 [ 342.330300][ C0] ? __kasan_check_read+0x11/0x20 [ 342.335163][ C0] rcu_sched_clock_irq+0xaec/0x12f0 [ 342.340194][ C0] ? rcu_boost_kthread_setaffinity+0x340/0x340 [ 342.346275][ C0] ? hrtimer_run_queues+0x15f/0x440 [ 342.351326][ C0] update_process_times+0x198/0x200 [ 342.356343][ C0] tick_sched_timer+0x188/0x240 [ 342.361034][ C0] ? tick_setup_sched_timer+0x480/0x480 [ 342.366416][ C0] __hrtimer_run_queues+0x41a/0xad0 [ 342.371452][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 342.376394][ C0] ? clockevents_program_event+0x236/0x300 [ 342.382037][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 342.387942][ C0] hrtimer_interrupt+0x40c/0xaa0 [ 342.392716][ C0] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 342.398441][ C0] sysvec_apic_timer_interrupt+0x95/0xc0 [ 342.403910][ C0] [ 342.406682][ C0] [ 342.409463][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 342.415277][ C0] RIP: 0010:__pv_queued_spin_lock_slowpath+0x5ba/0xc40 [ 342.421963][ C0] Code: 00 00 49 89 dc c6 03 00 48 8b 44 24 10 0f b6 04 10 84 c0 0f 85 48 01 00 00 48 8b 44 24 08 c6 00 01 bb 00 80 ff ff eb 06 f3 90 c3 74 5e 41 0f b6 44 15 00 84 c0 75 36 41 80 3f 00 75 ea 4c 89 [ 342.441677][ C0] RSP: 0018:ffffc90000af7460 EFLAGS: 00000206 [ 342.447648][ C0] RAX: 0000000000000000 RBX: 00000000ffffaf44 RCX: ffffffff81552fff [ 342.455550][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff888128af4d28 [ 342.463357][ C0] RBP: ffffc90000af7550 R08: dffffc0000000000 R09: ffffed102515e9a6 [ 342.471432][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881f7038ad4 [ 342.479243][ C0] R13: 1ffff1102515e9a5 R14: 1ffff1103ee00001 R15: ffff888128af4d28 [ 342.487069][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 342.493131][ C0] ? bpf_prog_load+0x800/0x1b50 [ 342.497817][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 342.504066][ C0] ? memset+0x35/0x40 [ 342.507884][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 342.512655][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 342.517781][ C0] ? stack_map_get_build_id_offset+0x900/0x900 [ 342.523768][ C0] sock_map_delete_elem+0x161/0x230 [ 342.528803][ C0] ? sock_map_update_elem+0x390/0x390 [ 342.534095][ C0] ? bpf_get_stack+0x31/0x40 [ 342.538543][ C0] ? bpf_get_stack_raw_tp+0x1b2/0x220 [ 342.543732][ C0] ? sock_map_unref+0x352/0x4d0 [ 342.548415][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x84c [ 342.553800][ C0] bpf_trace_run2+0xec/0x210 [ 342.558222][ C0] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 342.563863][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 342.568636][ C0] ? sock_map_unref+0x352/0x4d0 [ 342.573327][ C0] ? sock_map_unref+0x352/0x4d0 [ 342.578009][ C0] ? sock_map_unref+0x352/0x4d0 [ 342.582700][ C0] __bpf_trace_kfree+0x6f/0x90 [ 342.587301][ C0] ? sock_map_unref+0x352/0x4d0 [ 342.591985][ C0] __traceiter_kfree+0x2a/0x40 [ 342.596592][ C0] ? sock_map_unref+0x352/0x4d0 [ 342.601368][ C0] kfree+0x1f3/0x220 [ 342.605169][ C0] sock_map_unref+0x352/0x4d0 [ 342.609709][ C0] sock_map_delete_elem+0x191/0x230 [ 342.614749][ C0] ? sock_map_update_elem+0x390/0x390 [ 342.619943][ C0] ? bpf_get_stack+0x31/0x40 [ 342.624368][ C0] ? bpf_get_stack_raw_tp+0x1b2/0x220 [ 342.629576][ C0] ? selinux_bpf_prog_free+0x5b/0x70 [ 342.634698][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x84c [ 342.640084][ C0] bpf_trace_run2+0xec/0x210 [ 342.644506][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 342.649192][ C0] ? refcount_dec_not_one+0x18a/0x210 [ 342.654401][ C0] ? selinux_bpf_prog_free+0x5b/0x70 [ 342.659517][ C0] ? refcount_dec_if_one+0x140/0x140 [ 342.664640][ C0] ? selinux_bpf_prog_free+0x5b/0x70 [ 342.669762][ C0] __bpf_trace_kfree+0x6f/0x90 [ 342.674362][ C0] ? selinux_bpf_prog_free+0x5b/0x70 [ 342.679483][ C0] __traceiter_kfree+0x2a/0x40 [ 342.684080][ C0] ? selinux_bpf_prog_free+0x5b/0x70 [ 342.689204][ C0] kfree+0x1f3/0x220 [ 342.692936][ C0] selinux_bpf_prog_free+0x5b/0x70 [ 342.697883][ C0] security_bpf_prog_free+0x44/0x80 [ 342.702918][ C0] bpf_prog_load+0xcb2/0x1b50 [ 342.707440][ C0] ? map_freeze+0x370/0x370 [ 342.711774][ C0] ? selinux_bpf+0xcb/0x100 [ 342.716203][ C0] ? security_bpf+0x82/0xb0 [ 342.720555][ C0] __sys_bpf+0x4bc/0x760 [ 342.724623][ C0] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 342.729929][ C0] ? __kasan_check_read+0x11/0x20 [ 342.734783][ C0] __x64_sys_bpf+0x7c/0x90 [ 342.739031][ C0] x64_sys_call+0x87f/0x9a0 [ 342.743372][ C0] do_syscall_64+0x3b/0xb0 [ 342.747713][ C0] ? clear_bhb_loop+0x35/0x90 [ 342.752224][ C0] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 342.757949][ C0] RIP: 0033:0x7f9202a26ef9 [ 342.762345][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 342.781865][ C0] RSP: 002b:00007f92016a1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 342.790117][ C0] RAX: ffffffffffffffda RBX: 00007f9202bdff80 RCX: 00007f9202a26ef9 [ 342.797927][ C0] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 342.805734][ C0] RBP: 00007f9202a99046 R08: 0000000000000000 R09: 0000000000000000 [ 342.813810][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 342.821792][ C0] R13: 0000000000000000 R14: 00007f9202bdff80 R15: 00007ffd6030cf68 [ 342.829608][ C0] [ 353.093877][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 123s! [syz.2.2546:8000] [ 353.101958][ C1] Modules linked in: [ 353.105690][ C1] CPU: 1 PID: 8000 Comm: syz.2.2546 Not tainted 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 353.115425][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 353.125303][ C1] RIP: 0010:__pv_queued_spin_lock_slowpath+0x38b/0xc40 [ 353.131988][ C1] Code: 00 00 00 00 00 fc ff df 41 0f b6 04 16 84 c0 0f 85 ac 00 00 00 48 8b 44 24 08 83 38 00 0f 85 15 01 00 00 45 84 e4 74 09 f3 90 <41> ff cc 75 d9 eb 1b 48 8b 44 24 20 0f b6 04 10 84 c0 0f 85 cd 00 [ 353.152042][ C1] RSP: 0018:ffffc900001cf7c0 EFLAGS: 00000286 [ 353.157940][ C1] RAX: ffff8881f7138ac8 RBX: ffff8881f7138ad4 RCX: 0000000000000000 [ 353.165836][ C1] RDX: dffffc0000000000 RSI: 0000000000000001 RDI: ffff8881f7138ad4 [ 353.173646][ C1] RBP: ffffc900001cf8b0 R08: dffffc0000000000 R09: ffffed103ee2715b [ 353.181733][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000004cfc [ 353.189539][ C1] R13: 1ffff1102515e9a5 R14: 1ffff1103ee27159 R15: ffff888128af4d28 [ 353.197364][ C1] FS: 00007f03919746c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 353.206118][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 353.212643][ C1] CR2: 0000001b3191fffc CR3: 0000000117055000 CR4: 00000000003506a0 [ 353.220451][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 353.228259][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 353.236073][ C1] Call Trace: [ 353.239211][ C1] [ 353.242502][ C1] ? show_regs+0x58/0x60 [ 353.246572][ C1] ? watchdog_timer_fn+0x4b1/0x5f0 [ 353.251609][ C1] ? proc_watchdog_cpumask+0xd0/0xd0 [ 353.256729][ C1] ? __hrtimer_run_queues+0x41a/0xad0 [ 353.261943][ C1] ? hrtimer_interrupt+0xaa0/0xaa0 [ 353.266882][ C1] ? clockevents_program_event+0x236/0x300 [ 353.272525][ C1] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 353.278428][ C1] ? hrtimer_interrupt+0x40c/0xaa0 [ 353.283431][ C1] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 353.289275][ C1] ? sysvec_apic_timer_interrupt+0x44/0xc0 [ 353.294916][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 353.300912][ C1] ? __pv_queued_spin_lock_slowpath+0x38b/0xc40 [ 353.306980][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 353.312637][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 353.318896][ C1] ? memset+0x35/0x40 [ 353.322692][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 353.327581][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 353.333379][ C1] ? stack_map_get_build_id_offset+0x900/0x900 [ 353.339451][ C1] sock_map_delete_elem+0x161/0x230 [ 353.344486][ C1] ? sock_map_update_elem+0x390/0x390 [ 353.349691][ C1] ? bpf_get_stack+0x31/0x40 [ 353.354117][ C1] ? bpf_get_stack_raw_tp+0x1b2/0x220 [ 353.359426][ C1] ? skb_release_data+0x8a9/0xa80 [ 353.364445][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x84c [ 353.369828][ C1] bpf_trace_run2+0xec/0x210 [ 353.374256][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 353.378938][ C1] ? skb_release_data+0x8a9/0xa80 [ 353.383803][ C1] ? hrtimer_interrupt+0x867/0xaa0 [ 353.388747][ C1] ? skb_release_data+0x8a9/0xa80 [ 353.393607][ C1] __bpf_trace_kfree+0x6f/0x90 [ 353.398217][ C1] ? skb_release_data+0x8a9/0xa80 [ 353.403069][ C1] __traceiter_kfree+0x2a/0x40 [ 353.407676][ C1] ? skb_release_data+0x8a9/0xa80 [ 353.412528][ C1] kfree+0x1f3/0x220 [ 353.416260][ C1] ? debug_smp_processor_id+0x17/0x20 [ 353.421468][ C1] ? irqtime_account_irq+0xdc/0x3c0 [ 353.426508][ C1] skb_release_data+0x8a9/0xa80 [ 353.431193][ C1] __kfree_skb+0x50/0x70 [ 353.435278][ C1] tcp_rtx_queue_unlink_and_free+0x203/0x720 [ 353.441085][ C1] tcp_ack+0x23e0/0x68a0 [ 353.445176][ C1] ? tcp_rcv_established+0x1ac0/0x1ac0 [ 353.450461][ C1] ? hrtimer_interrupt+0x867/0xaa0 [ 353.455407][ C1] ? sched_clock+0x9/0x10 [ 353.459569][ C1] ? sched_clock_cpu+0x18/0x3b0 [ 353.464258][ C1] ? ktime_get+0x12f/0x160 [ 353.468511][ C1] tcp_rcv_established+0xcd6/0x1ac0 [ 353.473551][ C1] ? tcp_check_space+0x9d0/0x9d0 [ 353.478420][ C1] ? __kasan_check_read+0x11/0x20 [ 353.483279][ C1] ? ipv4_dst_check+0xe3/0x150 [ 353.487979][ C1] tcp_v4_do_rcv+0x3d7/0xa00 [ 353.492423][ C1] tcp_v4_rcv+0x23dd/0x2a70 [ 353.496769][ C1] ? irqtime_account_irq+0xdc/0x3c0 [ 353.501797][ C1] ? tcp_filter+0x90/0x90 [ 353.505962][ C1] ? __irq_exit_rcu+0x5c/0xf0 [ 353.510471][ C1] ? irqentry_exit+0x30/0x40 [ 353.514899][ C1] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 353.520541][ C1] ip_protocol_deliver_rcu+0x32f/0x710 [ 353.525843][ C1] ip_local_deliver+0x2c6/0x590 [ 353.530524][ C1] ? ip_protocol_deliver_rcu+0x710/0x710 [ 353.535990][ C1] ? ip_rcv_finish_core+0xb0d/0x1490 [ 353.541115][ C1] ip_sublist_rcv+0x7e2/0x980 [ 353.545629][ C1] ? ip_list_rcv+0x470/0x470 [ 353.550053][ C1] ? memset+0x35/0x40 [ 353.553867][ C1] ? ip_rcv_core+0x736/0xb50 [ 353.558386][ C1] ip_list_rcv+0x422/0x470 [ 353.563073][ C1] ? ip_rcv_finish+0xd0/0xd0 [ 353.567535][ C1] ? ip_rcv_finish+0xd0/0xd0 [ 353.571919][ C1] __netif_receive_skb_list_core+0x6b1/0x890 [ 353.577744][ C1] ? __netif_receive_skb+0x530/0x530 [ 353.582876][ C1] ? receive_buf+0x37ce/0x5720 [ 353.587742][ C1] netif_receive_skb_list_internal+0x967/0xcc0 [ 353.593808][ C1] ? hrtimer_interrupt+0x867/0xaa0 [ 353.598753][ C1] ? virtnet_poll_tx+0x500/0x500 [ 353.603529][ C1] ? netif_receive_skb_list+0x2d0/0x2d0 [ 353.608907][ C1] ? sched_clock+0x9/0x10 [ 353.613077][ C1] ? sched_clock_cpu+0x18/0x3b0 [ 353.617792][ C1] ? debug_smp_processor_id+0x17/0x20 [ 353.623404][ C1] ? detach_buf_split+0x71a/0xae0 [ 353.628268][ C1] napi_complete_done+0x344/0x770 [ 353.633129][ C1] ? __napi_schedule_irqoff+0x280/0x280 [ 353.638502][ C1] ? virtqueue_enable_cb_prepare+0x2c6/0x5b0 [ 353.644321][ C1] virtnet_poll+0xbee/0x1260 [ 353.648747][ C1] ? refill_work+0x220/0x220 [ 353.653177][ C1] __napi_poll+0xc4/0x5a0 [ 353.657341][ C1] net_rx_action+0x47d/0xc50 [ 353.661769][ C1] ? net_tx_action+0x550/0x550 [ 353.666371][ C1] __do_softirq+0x26d/0x5bf [ 353.670706][ C1] __irq_exit_rcu+0x50/0xf0 [ 353.675043][ C1] irq_exit_rcu+0x9/0x10 [ 353.679123][ C1] common_interrupt+0xb4/0xd0 [ 353.683637][ C1] [ 353.686412][ C1] [ 353.689193][ C1] asm_common_interrupt+0x27/0x40 [ 353.694052][ C1] RIP: 0010:nf_ct_iterate_cleanup+0x99/0x370 [ 353.699882][ C1] Code: c8 4c 89 7d d0 4e 8d 34 fd 00 00 00 00 4c 03 35 6d e0 13 03 4d 89 f7 49 c1 ef 03 43 80 3c 27 00 74 08 4c 89 f7 e8 17 c1 9c fd <49> 8b 1e 48 89 de 48 83 e6 01 31 ff e8 f6 73 5a fd 48 83 e3 01 0f [ 353.719307][ C1] RSP: 0018:ffffc90000fcf818 EFLAGS: 00000246 [ 353.725303][ C1] RAX: ffffffff86a0e0e0 RBX: 00000000000175f8 RCX: 0000000000040000 [ 353.733205][ C1] RDX: ffffc90006e13000 RSI: 000000000003ffff RDI: 0000000000040000 [ 353.741031][ C1] RBP: ffffc90000fcf860 R08: ffffffff8415fd4a R09: fffff520001f9ef5 [ 353.748880][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 353.756626][ C1] R13: ffffffff841607c0 R14: ffff88810b2bafc0 R15: 1ffff110216575f8 [ 353.764439][ C1] ? nf_conntrack_cleanup_net_list+0x2c0/0x2c0 [ 353.770432][ C1] ? nf_ct_iterate_cleanup+0xaa/0x370 [ 353.775638][ C1] ? nf_ct_iterate_cleanup+0x324/0x370 [ 353.780946][ C1] nf_conntrack_cleanup_net_list+0xf1/0x2c0 [ 353.786660][ C1] nf_conntrack_pernet_exit+0x18f/0x1a0 [ 353.792125][ C1] ? nf_conntrack_pernet_init+0xc50/0xc50 [ 353.797697][ C1] setup_net+0x7ec/0xb50 [ 353.801851][ C1] ? copy_net_ns+0x5b0/0x5b0 [ 353.806276][ C1] ? kmem_cache_alloc_trace+0x115/0x210 [ 353.812036][ C1] copy_net_ns+0x35c/0x5b0 [ 353.816286][ C1] create_new_namespaces+0x416/0x670 [ 353.821405][ C1] copy_namespaces+0x1d1/0x220 [ 353.826004][ C1] copy_process+0x1174/0x3290 [ 353.830521][ C1] ? timerqueue_add+0x250/0x270 [ 353.835204][ C1] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 353.840148][ C1] ? enqueue_hrtimer+0xca/0x240 [ 353.844921][ C1] ? __hrtimer_run_queues+0x46b/0xad0 [ 353.850131][ C1] kernel_clone+0x21e/0x9e0 [ 353.854471][ C1] ? create_io_thread+0x1e0/0x1e0 [ 353.859335][ C1] ? clockevents_program_event+0x22f/0x300 [ 353.865081][ C1] __x64_sys_clone+0x23f/0x290 [ 353.869678][ C1] ? __do_sys_vfork+0x130/0x130 [ 353.874367][ C1] ? switch_fpu_return+0x1ed/0x3d0 [ 353.879314][ C1] ? __kasan_check_read+0x11/0x20 [ 353.884173][ C1] ? exit_to_user_mode_prepare+0x7e/0xa0 [ 353.889640][ C1] x64_sys_call+0x1b0/0x9a0 [ 353.893982][ C1] do_syscall_64+0x3b/0xb0 [ 353.898234][ C1] ? clear_bhb_loop+0x35/0x90 [ 353.902754][ C1] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 353.908479][ C1] RIP: 0033:0x7f0392cf9ef9 [ 353.912727][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 353.932256][ C1] RSP: 002b:00007f0391973fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 353.940501][ C1] RAX: ffffffffffffffda RBX: 00007f0392eb2f80 RCX: 00007f0392cf9ef9 [ 353.948309][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 353.956120][ C1] RBP: 00007f0392d6c046 R08: 0000000000000000 R09: 0000000000000000 [ 353.963934][ C1] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 353.971744][ C1] R13: 0000000000000000 R14: 00007f0392eb2f80 R15: 00007ffe23696208 [ 353.979562][ C1] [ 353.982425][ C1] Sending NMI from CPU 1 to CPUs 0: [ 353.987467][ C0] NMI backtrace for cpu 0 [ 353.987478][ C0] CPU: 0 PID: 8091 Comm: syz.1.2576 Not tainted 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 353.987496][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 353.987506][ C0] RIP: 0010:perf_callchain_kernel+0x414/0x640 [ 353.987529][ C0] Code: 48 8b 44 24 50 42 0f b6 04 20 84 c0 0f 85 0c 01 00 00 48 8b 44 24 28 0f b6 18 31 ff 89 de e8 e3 4f 6f 00 85 db 48 8b 5c 24 38 <4c> 8d bc 24 80 00 00 00 0f 85 63 01 00 00 48 8b 44 24 48 42 80 3c [ 353.987544][ C0] RSP: 0018:ffffc90000007600 EFLAGS: 00000046 [ 353.987559][ C0] RAX: 0000000000010605 RBX: ffffc900000077c0 RCX: ffff8881362ccf00 [ 353.987573][ C0] RDX: ffff8881362ccf00 RSI: 0000000000000000 RDI: 0000000000000000 [ 353.987584][ C0] RBP: ffffc90000007750 R08: ffffffff81011fad R09: ffffc90000007680 [ 353.987602][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 353.987613][ C0] R13: 1ffff92000000ecc R14: ffffffff83ff5561 R15: 0000000000000009 [ 353.987626][ C0] FS: 00007f92016a16c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 353.987641][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 353.987654][ C0] CR2: 0000000000000000 CR3: 000000010c3f2000 CR4: 00000000003506b0 [ 353.987668][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 353.987678][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 353.987689][ C0] Call Trace: [ 353.987693][ C0] [ 353.987698][ C0] ? show_regs+0x58/0x60 [ 353.987716][ C0] ? nmi_cpu_backtrace+0x29f/0x300 [ 353.987739][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 353.987761][ C0] ? perf_callchain_kernel+0x414/0x640 [ 353.987778][ C0] ? perf_callchain_kernel+0x414/0x640 [ 353.987796][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 353.987815][ C0] ? nmi_handle+0xa8/0x280 [ 353.987833][ C0] ? perf_callchain_kernel+0x414/0x640 [ 353.987852][ C0] ? default_do_nmi+0x69/0x160 [ 353.987870][ C0] ? exc_nmi+0xad/0x100 [ 353.987884][ C0] ? end_repeat_nmi+0x16/0x31 [ 353.987899][ C0] ? sock_map_delete_elem+0x191/0x230 [ 353.987920][ C0] ? perf_callchain_kernel+0x40d/0x640 [ 353.987939][ C0] ? perf_callchain_kernel+0x414/0x640 [ 353.987957][ C0] ? perf_callchain_kernel+0x414/0x640 [ 353.987975][ C0] ? perf_callchain_kernel+0x414/0x640 [ 353.987993][ C0] [ 353.987998][ C0] [ 353.988005][ C0] ? arch_perf_update_userpage+0x450/0x450 [ 353.988026][ C0] ? sock_map_delete_elem+0x191/0x230 [ 353.988045][ C0] ? debug_smp_processor_id+0x17/0x20 [ 353.988061][ C0] ? get_callchain_entry+0x170/0x390 [ 353.988081][ C0] get_perf_callchain+0x579/0x810 [ 353.988101][ C0] ? put_callchain_entry+0xb0/0xb0 [ 353.988122][ C0] ? __perf_event_header__init_id+0x467/0x590 [ 353.988139][ C0] ? kvm_is_in_guest+0x28/0x40 [ 353.988157][ C0] perf_prepare_sample+0x359/0x1a80 [ 353.988176][ C0] ? perf_callchain+0x190/0x190 [ 353.988190][ C0] ? try_to_wake_up+0x697/0x1160 [ 353.988212][ C0] perf_event_output_forward+0xdb/0x1b0 [ 353.988229][ C0] ? perf_get_page_size+0x4c0/0x4c0 [ 353.988248][ C0] ? __this_cpu_preempt_check+0x13/0x20 [ 353.988265][ C0] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 353.988283][ C0] __perf_event_overflow+0x20b/0x390 [ 353.988301][ C0] perf_swevent_hrtimer+0x3fd/0x560 [ 353.988319][ C0] ? __raise_softirq_irqoff+0xe0/0xe0 [ 353.988337][ C0] ? __kasan_check_read+0x11/0x20 [ 353.988357][ C0] ? cpu_clock_event_read+0x50/0x50 [ 353.988384][ C0] ? timerqueue_add+0x250/0x270 [ 353.988402][ C0] ? timerqueue_del+0xb4/0x100 [ 353.988418][ C0] ? cpu_clock_event_read+0x50/0x50 [ 353.988437][ C0] __hrtimer_run_queues+0x41a/0xad0 [ 353.988458][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 353.988474][ C0] ? clockevents_program_event+0x22f/0x300 [ 353.988492][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 353.988511][ C0] hrtimer_interrupt+0x40c/0xaa0 [ 353.988534][ C0] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 353.988553][ C0] sysvec_apic_timer_interrupt+0x95/0xc0 [ 353.988569][ C0] [ 353.988574][ C0] [ 353.988579][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 353.988601][ C0] RIP: 0010:__pv_queued_spin_lock_slowpath+0x5c4/0xc40 [ 353.988622][ C0] Code: 44 24 10 0f b6 04 10 84 c0 0f 85 48 01 00 00 48 8b 44 24 08 c6 00 01 bb 00 80 ff ff eb 06 f3 90 ff c3 74 5e 41 0f b6 44 15 00 <84> c0 75 36 41 80 3f 00 75 ea 4c 89 ff be 02 00 00 00 e8 d5 90 5d [ 353.988635][ C0] RSP: 0018:ffffc90000af7460 EFLAGS: 00000282 [ 353.988649][ C0] RAX: 0000000000000000 RBX: 00000000ffffc901 RCX: ffffffff81552fff [ 353.988661][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff888128af4d28 [ 353.988673][ C0] RBP: ffffc90000af7550 R08: dffffc0000000000 R09: ffffed102515e9a6 [ 353.988686][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881f7038ad4 [ 353.988698][ C0] R13: 1ffff1102515e9a5 R14: 1ffff1103ee00001 R15: ffff888128af4d28 [ 353.988713][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 353.988734][ C0] ? bpf_prog_load+0x800/0x1b50 [ 353.988754][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 353.988775][ C0] ? memset+0x35/0x40 [ 353.988792][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 353.988810][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 353.988828][ C0] ? stack_map_get_build_id_offset+0x900/0x900 [ 353.988850][ C0] sock_map_delete_elem+0x161/0x230 [ 353.988870][ C0] ? sock_map_update_elem+0x390/0x390 [ 353.988888][ C0] ? bpf_get_stack+0x31/0x40 [ 353.988905][ C0] ? bpf_get_stack_raw_tp+0x1b2/0x220 [ 353.988925][ C0] ? sock_map_unref+0x352/0x4d0 [ 353.988943][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x84c [ 353.988958][ C0] bpf_trace_run2+0xec/0x210 [ 353.988975][ C0] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 353.988992][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 353.989010][ C0] ? sock_map_unref+0x352/0x4d0 [ 353.989029][ C0] ? sock_map_unref+0x352/0x4d0 [ 353.989047][ C0] ? sock_map_unref+0x352/0x4d0 [ 353.989066][ C0] __bpf_trace_kfree+0x6f/0x90 [ 353.989083][ C0] ? sock_map_unref+0x352/0x4d0 [ 353.989101][ C0] __traceiter_kfree+0x2a/0x40 [ 353.989115][ C0] ? sock_map_unref+0x352/0x4d0 [ 353.989133][ C0] kfree+0x1f3/0x220 [ 353.989153][ C0] sock_map_unref+0x352/0x4d0 [ 353.989174][ C0] sock_map_delete_elem+0x191/0x230 [ 353.989193][ C0] ? sock_map_update_elem+0x390/0x390 [ 353.989212][ C0] ? bpf_get_stack+0x31/0x40 [ 353.989228][ C0] ? bpf_get_stack_raw_tp+0x1b2/0x220 [ 353.989247][ C0] ? selinux_bpf_prog_free+0x5b/0x70 [ 353.989266][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x84c [ 353.989279][ C0] bpf_trace_run2+0xec/0x210 [ 353.989297][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 353.989315][ C0] ? refcount_dec_not_one+0x18a/0x210 [ 353.989331][ C0] ? selinux_bpf_prog_free+0x5b/0x70 [ 353.989347][ C0] ? refcount_dec_if_one+0x140/0x140 [ 353.989364][ C0] ? selinux_bpf_prog_free+0x5b/0x70 [ 353.989381][ C0] __bpf_trace_kfree+0x6f/0x90 [ 353.989397][ C0] ? selinux_bpf_prog_free+0x5b/0x70 [ 353.989413][ C0] __traceiter_kfree+0x2a/0x40 [ 353.989428][ C0] ? selinux_bpf_prog_free+0x5b/0x70 [ 353.989444][ C0] kfree+0x1f3/0x220 [ 353.989463][ C0] selinux_bpf_prog_free+0x5b/0x70 [ 353.989480][ C0] security_bpf_prog_free+0x44/0x80 [ 353.989498][ C0] bpf_prog_load+0xcb2/0x1b50 [ 353.989518][ C0] ? map_freeze+0x370/0x370 [ 353.989539][ C0] ? selinux_bpf+0xcb/0x100 [ 353.989555][ C0] ? security_bpf+0x82/0xb0 [ 353.989572][ C0] __sys_bpf+0x4bc/0x760 [ 353.989595][ C0] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 353.989616][ C0] ? __kasan_check_read+0x11/0x20 [ 353.989635][ C0] __x64_sys_bpf+0x7c/0x90 [ 353.989652][ C0] x64_sys_call+0x87f/0x9a0 [ 353.989667][ C0] do_syscall_64+0x3b/0xb0 [ 353.989684][ C0] ? clear_bhb_loop+0x35/0x90 [ 353.989700][ C0] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 353.989719][ C0] RIP: 0033:0x7f9202a26ef9 [ 353.989732][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 353.989746][ C0] RSP: 002b:00007f92016a1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 353.989762][ C0] RAX: ffffffffffffffda RBX: 00007f9202bdff80 RCX: 00007f9202a26ef9 [ 353.989775][ C0] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 353.989786][ C0] RBP: 00007f9202a99046 R08: 0000000000000000 R09: 0000000000000000 [ 353.989797][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 353.989807][ C0] R13: 0000000000000000 R14: 00007f9202bdff80 R15: 00007ffd6030cf68 [ 353.989823][ C0]