last executing test programs: 1.885860893s ago: executing program 4 (id=3634): bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1100000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB="0000a984ad5e24a935b5206255000070a4176c2ee470454ed7df91533e73fabd3cad40eb7a4003897fc8aeef480d203cced00fc7a034660b20aa62ff86379b0ee756905e02ab3e85f53990d897c83598c725843ed65f9c515b38c01b3847727bb79f61ce44a8c3c93fd486004013da67e25ffda39d52c3c3b59b33377432605d75d5a20201805dae547f96ca4204efe2891d4e3f402abe11ac4d", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) recvmsg$unix(0xffffffffffffffff, 0x0, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000"], 0xfdef) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000680)="e0b9547e8a87cae9abc89b6f5bff", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="090000008ebcb574dfb32a070000000080000001", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1200f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0xfffffffffffffffc}, 0x0, 0x6, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, r4, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@ifindex, 0xd, 0x0, 0xd, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180), &(0x7f0000000200)=[0x0, 0x0, 0x0], 0x0}, 0x40) r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) sendmsg$unix(r7, &(0x7f0000000040)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) write$cgroup_subtree(r6, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000002b00)=ANY=[@ANYBLOB="b702000007000000bfa300000000000007030000f0ffffff7a0af0ff0020000079a4f0ff00000000b706000000000081ad64020000000000450404000100ff0f1704000001130a00b7050000000000006a0af2fe0000000085000000a3000000b700000000000000950000000000000000e154cd8445974b26ffffffe4fbffffff55bb2007ee51050512b5b42128aa090a79507df79f298129daa7a6b2f91af50342115e17392ac627c87867c000006146001e04aeacea799a22a2fa798b5adc43eb27d53319d0ad229e5752548300000000dbc2777df150b7cdd77b85b941092314fd085f028f2ed1a4535550614e09d6378198a6097a670838337af2abd55a87ac0394b2f92ffab7d153d62058d0a413b2173619ccf55520f22c9ca8b6712f3024b7041b1df65b3e1b9bf115646d14ce53d13d0ccacda1ef0900094fa737c28b99938512c816fdcceaede3faedc51d29a47fc813a2ec00f4c7a53ac271d6d7f4ea6bf97f2f33e2ea2e534300bcb3fdc4b4861004eefbda7f54f82a804da4f86bb47a4a69bf9bc5fa96ee293fbd165a5a68488e40b030166565a097b1b44b451de736bb6d43db8db03d4b7745fef1d04ec633dee254a6d491b849a55b000000c4fd21a18986252a70f8f92eb6f0e8c7db4bf23242a1f2d90addedc28159f09943b1b0452d1b72183aacf4a84f9130b775dd4e9e3070756f97ad91935a6ddfa8f90e79321a0574fb30ff0000801989328c8ddc20ea011bf5742e0e0d4334db8b20ce3f9f16cb7fc20fb4791ec85821d0c48fb657c29b309c73f0977e7cde65a82b94c461d7962b0d2277a84af326f37f3e2c25a61ec45c3af97a8f17da954aff3fc8c108755f75ca13fb7c8bbd8b6e7dac1aba4b20dc7de058a4dfa7e85a8bdf1d41a2d8bda74d66f47cc180f82c5f573c1f860d050d694cc7806d294d3665016a7b29da0fde4745db06753a7ac74a2d32f7528751313694bf5700b20ef0c248ddd3da32396a614cacad4aff2066bb5d40887c58559b7dcb98a6273b8c651e57f727041c62cea5b7bd24d9f679e4fbe948dfb4cc4a389469608241630459f0123fd39206000000000000eb55dad46de56ef907b059b90b8aa49afb9a79ae5498f6589880ed6eea7b9c670012be05e7de0940313c5870786554df26236ebced9390cb6941b83720eca291963eb2d537d8ee4de5c183c960119451c31539b22809e1d7f0cda06a9fa87d64cb89872a2cd8a104e16bb1a2bacf13464ca03aff14a9aa4bd9539f5096412b92012e095b84c20243ff98df3347f0e399d1b9f27e3c33269c0e153b28b2d4410572bc45b9d3fa02208d304d455c36300000000022320178b00cc6ed7966130b547dbf8b497af002000000cd1d0000002000000000000000000000000928ee53595a779d243a48cea769470424d28804c04b2c4324ab7f4a5c81921f0128dfd70b438af60b060000000000000056642b49b745f3bf2cf7908b6d7d748308eea09fc361b4735efbf3411718d6ee7aebed161980f2fde4f9ef679dbfae9fb4a79f8a836804ed3a1079b0282a12043408cd60b687dcff91af19010000000000000000456f7d2a42bd13da202274f20675eb781925441578e93046aaddea8ec4ca37f71c2710a7ea8ae0dc214e1cc275b26adfa892e6de92000000000000000000ddff004cff9ec780f535e62f4eeee50e5bafecea4d4134d006c8d6883eca5c9c58c9e9338c73de2f04f15d005387577f480000ea65559eb00e76e9d0ada201bcbb5c252b28a60ca770663da451790cc36000906d5a9fad98c308e39bd5ffb6151d79c1cee1cd102e3c8e63e9fba05e3633be3f00000015762e5f5a3a0bc33fdbe28a5ffc83f2b485185cc92fe7f791e8f6429309d6adab4b7e508e4bf024ed8f8a005f2bbf96c89739f5cf1e750d50517a59a3ad09e8802c8f4f535447cc0fc9d5f99a73145dfcedad69da9cd4375c624600e78f4458542b14f29611f95d4a31838eeb20c20bb82aa31771cd379ec83554cea5e6539db7384e1f58d81f2f2653c4d9818708e27c89b552d7fcd116bce9c764c714c9402c21d181aac59efb28d4f91652f6750b6ec962802c0320f8059195729d60c534ee8e8ff0755b67fe4c25edb85bcff24c757aa8090000000000008c420eb4304f66e3a37aaf000000c42a570f0e9dd5fd545470f862f8c3c14fa9ecd1e877b0d8ca84c044859e85e6158f9184bc61a9a284db80e4636c25b96174327d82761c26e329555f9290af4100000000000000ff0ffd3763655500344bae34137f5ab0d534b8d63e4ca3b671f2de1cdf519192c6b59a601fd419adc16e2055b85058f793484305d7a1759782e4c571ee855a47bc00edf5e9020c09ab004321610b857e8717764b633b21cb32f0e03280e09758bd445ab91d20baca005452b79d7b574a247f1d2fe45b3c4e93da3d51de647c10dd49944dc87c92332af0be61e58c79d497247d278888901d442ad7f8536607a644e9e3d769db497c3960dfde12182334caee994adc38a436367a54b9e182b78e9a0ceb9a2c4f63902c1ad1a7c5a08d0920a23c2a86abbdf357849a651733e57f31019876026888c8ccb85c86b4f8ffffff7f000000002c331fca0e541b7ca211c28ed61c525708a13d115b43f8b1894c8fa8a14dc4810f61ae96c18cc7130000000000002100000000000000000001000027c9a46157a3609b6fd9843ee19ec647249a9375de5858818f3c4a4fa6ce46f4d42b07199de8b99231ace58c77819ee214e49666c464d35ca9b5143ed3b3dc8c17a23692759ccf5a205311b7ab22532697b861dfb54609fd88e6043bd52ae84c1bb0c8a6c769f952283a1f4e3842edb3d42c68a27ef6a1296dfff4a979369b0e8ebc62887aa46e820a74f91381dcc198e353047db70686d147357024eb3cb94f1e89cb5ba0a56aa046b4dc521a3d9356b4b8b5917c4c860495b240e80063bde261fd00000000007271e28ef6806bc8e139c49b91c76bea3858f7f05b47d3e519f1634e8fbd8d31330d89069f9648a2ff93060ff073b3a113e47edf76f7d116d2b0976cf2ec447c030931651dd315003b7a6a5433a2bb560ae99e85b227eda2e63a1c31a2c2bd48a822cbe92b6524e0cd8020ecaa34e19e7141d5e221509342bfe7d294d1eb3de6a50ca0301f89c2ee627e949c68b3a4a426a996d503a26e9a714ee5f72d8805dd1bfbd081f6a5359dbdfbf31a562395020becaf3fd1f1289dfe14cb9194e26a44fac273461fc5c0e0a33db7f2d43ea8086cf059f40fa2640b6bfb74dd35f5a31059c01517cf4b6641fce9a24b96767b837ca037a1199735c375c705c798e0e208e4a5259d0bfa526b462af45a6eab34000000000000000000000000c4426344ec1a3366515dee221e747f55d7dd02534bc503b9b28277c253e410986bef2111a99cc448d652929f8a67a6a1d3f00dcad91aff428aade3f85714a1d3ef29acd4d49b62339c10c2ec0dac4b28288e78980c1184d8223edbc4bf9258b7374e79a8f8bf3fb73c8c6dbb7bbdfc399847a11921f97eba0ea14c4fed9a71eedb97c02461792e3a49dac16c60c3fcaab222025d78963c3ac899fa8b63f58a30212c9b2d7fe751e2046b78f86e22861b6504c667350244dd6d9189a8b9c45f8aaff9db694811ca86ed978f23eed7459c0382074170cf1e25b0e9ba3d1cc309353eea4cd8ab96bafda393276bdd8d32ead8db9e1b54d2d3d50e2815268fc1a6ec566981bc8ca2a4583f3d40e817433d0f4f25cfe6cc1897449ba5f26a9d66ac73e6f5c401376f23a314e0b9ff997d22f3e34b5524642c248aa813edaa626f0000000000000000000000000000000003ba5bac34b611569a451564d3a5400f9097ffe7a37e765bc652be71ee246d9cf19878dd62c53062d6000c40bde6a6135eae8a00000000008d797190a26c933f933aff5c521eeb7a84a62d148a846e74e76b515b6b8be29e8b69310fa130cf6d6b74f33205d3cc218ca554ed8085ae044f5bf2e89ad07963acbd4dd4dc5b4552591edde7a22ad06f7567e6fec2f65011b579bf609d61a3ff4d6f490824bb035995449fc34106ae6889f036d67b6aaee784f855ebc746ac871b5d2031ac0a252ac1f86e93e245f3793cea80b6de773899d49d11d3b1ed79163b111c976cf840a2ef6214a43338fba8c9edb6be26e68fcc5d47ed74a66ce8aba726ab955b9b32ab1890e84a5e2d7476252af25e5c95c5a8b2b1b5c8a2645b01b823c0f169d6ab529cc889bb07889d9e155114cf3e26a50c527ec6d4021cd2cacfea6d7e41e39e26b3967cad65c648b170f12ea9cc69dcee64be0c27b1f4f7f5ce3e62c35602c9d2921326891901661c85b988494f094abb91ed813b42828aa93105896e0aee851a8087e169a1d69e841257d9053d0cdc3a6ac4f12084cc6470abebe8b344b1f56690a2687b428686c854c21831da277e8b8a21b7b91a46d22ba083eca7b1f8268048cde7d6f237dca42035881b29ca9c8c2937971821b613894297ff6f7796053a4de1fd77e180cc22b205d43bb4a1b59962c1f605ea1b74585cf5e8d579f157cb45561c357f9976cec6a43388b3049a0d9c171ff6145266ba119d00000000001ef3794a930eb12f3a6215c510bf0bca70c127e9c70cc7bef921249a7f18a0034ce3264a9e96656b47233e2ed7c76520e649c3fd550bdafd77c5cd72b4446d3e157ddd97e7622a6891fb739acd3b2cdaf65ac78490f0641be6e8c6f55bf3d228786895ff5fd5970faacd8a5025aca0aa1931f477ba06aa60051298c8bf7f3b399194f98dc3f4e8513ad06da09dc393c1284515986b8c70ac69512f6c0c04f42edb3a097a11f2ab480e3e391abffae097752300576337c6dd24c4a98280684aa1fe8c7b43ee8bce05fe979b34da18cdb44dbb030b8009cd3b3b44fd8e7b534acd3f1839cb54817668ab446d3d47848429ea831a57f222c714870582a8832c2a326c5d1e406c8b05dedddceb24483f8f998b05c3ddf85c3799c9000000000000000000000000001e57cf839eb3150d6a076fb7b86fae98dbb46014f483aecb4ec4f0877371bcae8912c78aff857c669760f0e55041563c5c3e8ee4a0eef885fd43fe34a1febc82370d1d07fdfe705ada47288e41e7e6ee82d66b99ae4b0889fe949e7342ca97c1a64dcc7f6a0c0da07de8c808b4caec54820f856889fc5f1af3d675206e3257f974d6e45ff1e905c2f0fc0173ac6714acaaca2397bee23630ecaa2c1c6ddc3085689a033d6d41a1a7ac59baec299158faa52308856805f2130863f4668e27b8bbef4f4cd43a2fd294b5b0bf2b0e4afbe570c54aa214579ca0caf54231d00a94eda2be6f037e2befdd03bf152f696ca1d1ea86eb7ee1f021062ad71246dae1580c4f959a320912032ed468a8ed9f27a2258ddf465de77a51b4713bc6b789a0e8b203f0f592ddb27aa90989a9e0cb624bc34e7d6ebf156ea251e3a2f83ada9f0b70035e8ed200a52b00"/3910], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r9, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={r10}, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000380)=ANY=[@ANYRES32=r6, @ANYRES32=r0, @ANYBLOB="1b0000001200000000000000", @ANYRES32=r10, @ANYRES64=r5], 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 1.768097103s ago: executing program 4 (id=3636): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0xc, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1804000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780), &(0x7f0000000840), 0x400, r0}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_kthread_work_queue_work\x00', r1}, 0x10) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0600000004000000030000000500000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/19], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x6, 0x40, 0x40, 0x41, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000180), 0x1003, r4}, 0x38) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="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"/287], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x310b, 0x42, 0x0, 0xa299, 0x1, 0x10000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @value=r5, @void, @void, @value}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0}, 0x48) 1.703455542s ago: executing program 2 (id=3640): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0xf754, 0x9, 0x2, 0x2e609, 0x1, 0x2675, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @value, @void, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r5 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000001c0)='cpu&\"0\t&&') bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', r1, r2, 0x4, 0x1, 0x3, 0x0, @void, @value, @void, @value}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x47, 0x9, 0x5, 0x2, 0x0, 0x0, 0x4a018, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb76, 0x2, @perf_config_ext={0xfffffffffffffffb, 0xc1}, 0x4, 0x4, 0x6, 0x3, 0x5, 0xa2e0, 0x4, 0x0, 0x3c, 0x0, 0x400}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x6) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, r8, 0x0) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 1.464157612s ago: executing program 0 (id=3644): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r2}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) close(r0) 1.463186282s ago: executing program 2 (id=3646): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffff7f850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r0, 0x3c, 0x0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000084"], 0x0, 0x26, 0x0, 0x0, 0x20, 0x0, @void, @value}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000006000000040000000000000f020000000000000000000001050000018000000000000000010000850200000000000000010000000000000400000000da"], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') ioctl$TUNSETIFF(r2, 0xb701, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x1200, 0x300, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x2000000}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000721f0759b59100"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r4, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYRESOCT=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x47) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r8}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r10}, 0x10) write$cgroup_int(r9, &(0x7f0000000200), 0x43451) 1.448136352s ago: executing program 1 (id=3647): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x101}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0xf, 0x0, 0x2, &(0x7f00000001c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000280)={'wg2\x00'}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r3 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2000000000000}, 0x1000}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYRESDEC], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000000)='mm_lru_insertion\x00'}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0e000000040000000800", @ANYRES32, @ANYRESOCT=r3, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, r7, 0x0) 1.427595262s ago: executing program 0 (id=3648): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e02000fffff000000000000000000000604000000002e"], 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1, 0x0, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000570000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f00000004c0), 0x75, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r2, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) 1.055907271s ago: executing program 0 (id=3650): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000001c0)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r4}, 0x10) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r6}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 971.772291ms ago: executing program 4 (id=3651): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x18000000000002a0, 0xa, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r2) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x89e1, &(0x7f00000005c0)={'bridge_slave_1\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0x2a) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000005000000000400000d00000001000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00868cf82070338addf3ff00000006000000fdeb4beebf40495c320712c826f5b8ea290926817a73e2588570b3770c39ab5f6942a55fd5cfeac02c895a173eeb07c8c23238f63c3f522b2c1eedb30f481f3eb760e05eba07033292"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r6, 0x0, 0x12, 0x300, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200, 0x300, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x2000000}, 0x28) 940.096101ms ago: executing program 2 (id=3652): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='btrfs_cow_block\x00', r0}, 0xffffff68) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000e1ffff9400000000000000bf91000000000000b70200000000000085000000b7000000000000009500"/96], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[], 0xfdef) 939.523931ms ago: executing program 0 (id=3653): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x589}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB="0000000000000000000097000000fe75b2d60000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/17], 0x48) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000100)=ANY=[@ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="0500000000000000"], 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 834.334901ms ago: executing program 3 (id=3654): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0xfff, 0x4, 0x105, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) 833.636121ms ago: executing program 1 (id=3655): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0xf754, 0x9, 0x2, 0x2e609, 0x1, 0x2675, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @value, @void, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r5 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000001c0)='cpu&\"0\t&&') bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', r1, r2, 0x4, 0x1, 0x3, 0x0, @void, @value, @void, @value}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x47, 0x9, 0x5, 0x2, 0x0, 0x0, 0x4a018, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb76, 0x2, @perf_config_ext={0xfffffffffffffffb, 0xc1}, 0x4, 0x4, 0x6, 0x3, 0x5, 0xa2e0, 0x4, 0x0, 0x3c, 0x0, 0x400}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x6) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, r8, 0x0) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000008"], 0xfdef) 833.194221ms ago: executing program 2 (id=3656): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5a, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x10, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYRES16=r2, @ANYRES32=0x0, @ANYBLOB="141862fc5b8e1c5337d7105a4cda37e0fe2f4b090803f88540e98d53ddb0f1a5d0d458ffb4d2a95be85544a9ad5690b09006df24e3fd669fc6eccab4d3686d7a8040639b9f61a8e36be140c05350fc429ed89802a62742cb70729d7f36", @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000780)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB='&\x00'/12, @ANYRES32, @ANYBLOB="c7560baf4d06880a90fba269004292f374521044993278fe1010de2d38a0b49bd9e5f60f9b41c4d44118838af2b295639fd6a22e8c44f58b070cd041cda32b7638359ac5aa934e5dd70897dcbd89f7415291b5dd8b50033e1940d780a3e91c34a20350dbeb2cecd0518771f6b8a517b0ad5541862bc083eb492a990f", @ANYRES64=0x0], 0x10) socketpair$unix(0x1, 0x1, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x24004044) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="2e0000000000000000000000000000002f110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000001c00"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x25, &(0x7f0000000540)=r8, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180200000000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x32, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r11}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r12) 761.712571ms ago: executing program 4 (id=3657): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0xfff, 0x4, 0x105, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair(0x1, 0x1, 0x0, &(0x7f0000000340)) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) 709.706431ms ago: executing program 1 (id=3658): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r2}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) close(r0) 633.31853ms ago: executing program 2 (id=3659): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x9, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000001000000018110000", @ANYRES64=r2, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=r3, @ANYBLOB="a1a433ef8d63c6bbf40cbd43565692f6ecd53b8b4d856b", @ANYRES64=0x0], 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2d) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/pid_for_children\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0600000004000000ff13000007000000000000004ec705b61212428309fb86d162ee72ac3c9aaa9e1cb322e893ced90068ab831e0258195a252ae5a2abfcaa66cf5cf1b513e0c58116c30164c9224b84242077d4176c837e837b007714569baaeacda1cd9eaa57708a32756750ca4744ce29079de2c6bcfa313546fba31d893e6f85e7cfcd93e9963339c505c8166cc77f132ae40b28a2f78b2792379d2ae49df9f30962bbcce8a3", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01000000f357d6f49945771e1bdc00ac959314efefd43075f98f8a73ee4626dd6ef3a8376ec702006a4463828b4e37f2913347d8ba073148fa5055278a1fd5bbf32dc1b816d32160e0b0772d92223715bfb458cbe43622b553886e99f913c566dbdc", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={0x0, r5}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$unix(r4, 0x0, 0x81) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 632.710471ms ago: executing program 1 (id=3660): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) (fail_nth: 13) 320.0737ms ago: executing program 4 (id=3661): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x80040, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001740)={&(0x7f0000001580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000000b5c0)={0x8, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000000080)='syzkaller\x00', 0x7, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)) openat$cgroup_int(r2, &(0x7f0000000240)='io.bfq.weight\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="61158800000000006113500000000000bfa000000000000007000000ee0016055e15010000000000160500000000000069163e0000000000bf07000000000000260507000fff07206706000020000000150600000ee60060bf500000000000002f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05002000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ace0600006e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc0da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44e2a2235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d00c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932fb3bba54b3a6aa57f1ad2e99e0e67ab9ff16d20000009f0f53acbb40b4f8e2738270001562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000007b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000815266b2c9e1bfadc7498e9dda5d000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631822a11dc3c693962895496d4f6e9cc54db6c7205a6b26f92121ef53e553acdf42068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710eec53f1b11cced7bc3c8da0c44d2fbf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db80300c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f8709d87b27f8a5d9121fdc058447b728f134f72062fc4b1ca0780b1a7af137ff7b4ff139604faf0453b65586f65c7943d56b52f06c870edf0c5d744b5272b44c23480b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca871073f6bd61940aabc86b94f8cbde4d47060400e722a6a2af483ad0d3415ed0f9db009acaba9eaea93f811d434e00000000000000000000d154672fea96aedf346279ec00000000000000000000d535d41b0067f01e2e54b9154d876020b669640ead4ca44631fadf7c4ac39a1b331dbdcd52b36df021b731ef1f92330d347f88ced5c1aaadbcdd8d2257e3a9a7c7494fadf9be36f7a2334ee6e9446fa1fd486f85d672a77dc5bd21463994d49f12016305a1e394d292b66840fe32b40ad665d241a8b8a32b3100450c32832789aa8a096f41201b585cd76631c88cf958e9e9047f5af1730c5e83db12460a0768fd4b62be6c41eed307048bac8d1f7f164574241e06027654b248dcc38749eee0c1ee7c61b3f6411a559c3d45637b11e440ed5a99109b8e71d28c3d677af5f0499c6d3fc6a129775056958c9df824ebe5fa9fb306b24a8a8334910627d03efe69d4b61c4345f048c5da8aca16cea848fa77d2507c920a6bd654b00e07789382ed902c80deeff2fd5c78f42e4353e5360c3e55962efd1331e6736eaf4ee27736fa54803ee8ec1a15266ffcd8b30368740b584c2559e691e542cab3d49db327db62328f159d1e0900b3e23e84dedcd1377aa15dbeab7db181bd66980c3557c7d9f7377fcb6023accb5c368a121acf70e5f4c3f2a0ea07011c7149ea979cab2ee65cf7ffa29152b7a8fed89575e6e6fd77d4d9463d21775abac886ee6a1f2d7d8523840438a73d6307a87e2f525867fc3af7ab74520a773ae26bae74cdd405a211e8833e1ba523cde51d04a7ca6732"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000600000000001ee094ac5038177abac8a3ef0000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 261.32807ms ago: executing program 1 (id=3662): r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYRESOCT=r2, @ANYRESHEX=r2], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x2, 0x4, 0x6, 0x1, 0x1000, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r4, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) close(r6) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1202, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x20001400) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="80fd", @ANYRES16=r7], 0x9) openat$cgroup_ro(r6, &(0x7f00000003c0)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x70) close(r8) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x20001400) write$cgroup_pid(r8, &(0x7f00000000c0)=0xffffffffffffffff, 0x12) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x8, '\x00', r5, r8, 0x5, 0x3, 0x4, 0x0, @void, @value, @void, @value}, 0x50) ioctl$TUNGETDEVNETNS(r1, 0x8982, 0x20000000) 161.27571ms ago: executing program 3 (id=3663): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000001c0)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r4}, 0x10) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r6}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 104.13686ms ago: executing program 3 (id=3664): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001180)=ANY=[@ANYBLOB="61154c00000000006113500000000000bfa00000000000001503000008004e002d35010000000000950041000000000069163a0000000000bf67000000000000350605000fff07206706000005000000160302000ee60060bf670000000000000f650000000008006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ff3d4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe01c5473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc2300000008ac86d8a297dff0445a15f21dce4de9f29eff65aadc841848c9b562a31e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076ebae3f55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932c9a6aa57f1ad2e99e0e67ab93716d20000009fbb0f53acbb40b4f8e2739670b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc401000000cc43010000207b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000f4000000000000000000000000c1eb2d91fb79ea00000000000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c6939628950000000000000001c7205a6b068fff496d2da7d632bd1f61b007e1ff5f1be19637302f3b41eae50509fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b30410856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db88aa3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fb9fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff010404faf0a4da65396174b4563d54b52f06c870edf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202ee1192b81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2b517dc4a29b9b5a8ded5de8206c812439ab129ae818837ee1562078fc524a3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da23c00d9ef418cf19e7a8c4c328be0ce95798adc2dca871073f6bd61dc18402cde8b0100010000000000abc86b94f8cbde4d470667bee722a6a2af483ad0d3415ed0f9db059acaba9eaea93f811d434e00000000000000000000d154ba10a8e51489a614e69722bac30000000000000000000000000000c5dfd188ff555285b9743d3aac000583f42d168613151d681a2f71373f20d92c9048407c91fabecfe8b3f2d545ffffffff00000000a1cfc4336324c86f3dcb43e9a58208077e90f6ec1c7ac756f61dcc372cdd30b82507489f0bbfbd3c3f21752e81319c0161e154ceb16e00bc7f5a6962dff317f4d014786e432817064874d69a39cb0da31bcc5f81894d8a80756447322207b4007dff12eb95066cc6bc256f0a12282224d718b06ca80b57aa183dd0c3eee45891441f2b89b4c67aa9882281393954972046974f18df232cd7fca610e33f51c2d062020f403d85ff36c26e2f6bd1d82f4d3ceb3472d9a77e0057a3bfe697d9ab7585f4a1b381343d2cf857689232f4fc5135790662dc1419a374be9d7b3e5be2886d23add90d862f1a682ff11c798e338af3e5bb0f9d3952b15bf3e0c618c89d20ca1e18a031397693bf3cfbd8417e5b55e641c898c280356f2da222d5d68919d98158578dcf18efa404e508bcbbb8cfcf70086821ebdf34c9a1dff45af873df904c2bdbef81f246d26f4b40df949e12bdac18533d4e11c608cc31d60cb591c40a7b386fa1c753336d7220a35118d4919b45eff32aab684ee54c0a263c806aabac2f66cb052f847c62c6691de14e97aa7e9dc8ecf0cd50540246d2b746e41e5b4e2c095039dfe0f71db6265f7580d098be40ef36faee5d1695830d4242a23e541e6ce9fa1998d8961ef4fe3c8e8fbb566f148c8befc229614a4b7f80d237b8abc6fc0407de31d6e5532f360d379f20f054692b47207922fe6c14eba96c9a7ae906abc1ae1ae8c4fae92883cfa1978a04bb000000000000000000000000000000884efcecca45ea4ab2ec097668456a6ff12854997f5aed737d5205ace5c0b64f87ef10784d0479cb44ca077e0c4ce6ff880e2ce3de63853a9740e9233683bfc8636bee293aeeb680b399a296e6f44c07b5fc5d9d359af007f23004a7acb6df23664ea209620b4fe0f4df81c33bd8ca2335cb4b50881937379b45a301175c3e8eb32970564ec8e25c46ee3bae079faedaad94276cfa251be8256c4c37fc84a25c3a2feb39e94a5266a10716d4a3cef499fa176018054e9149a1c9d20a809ce3"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 100.73899ms ago: executing program 0 (id=3674): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000001c0)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r4}, 0x10) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r6}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 54.241419ms ago: executing program 2 (id=3665): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r3, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) (fail_nth: 5) 53.259979ms ago: executing program 1 (id=3666): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=@framed={{0x18, 0x2}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r1, 0x0, 0x817c}, 0x18) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) openat$ppp(0xffffffffffffff9c, &(0x7f00000004c0), 0x20000, 0x0) (async) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000d7c900000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="a8ed00000800"/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) (async) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@fwd={0x7}]}, {0x0, [0x5f, 0x30, 0x61, 0x61]}}, &(0x7f00000003c0)=""/238, 0x2a, 0xee, 0x0, 0x5, 0x0, @void, @value}, 0x28) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x3, &(0x7f0000000480)=@framed, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f0000000640)=r6}, 0x1c) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX=0x0, @ANYRESHEX=r7], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r10, &(0x7f0000000200)=0x1, 0x12) (async) write$cgroup_pid(r10, &(0x7f0000000140), 0x12) (async) openat$cgroup_int(r10, &(0x7f0000000300)='hugetlb.2MB.rsvd.failcnt\x00', 0x2, 0x0) (async) socketpair(0x1d, 0x0, 0x4, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000002c0)='mm_page_alloc\x00', r8}, 0x63) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r11, 0x1, 0x32, &(0x7f0000000340)=r8, 0x4) 52.92274ms ago: executing program 0 (id=3667): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x18000000000002a0, 0xa, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r2) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x89e1, &(0x7f00000005c0)={'bridge_slave_1\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0x2a) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000005000000000400000d00000001000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00868cf82070338addf3ff00000006000000fdeb4beebf40495c320712c826f5b8ea290926817a73e2588570b3770c39ab5f6942a55fd5cfeac02c895a173eeb07c8c23238f63c3f522b2c1eedb30f481f3eb760e05eba07033292"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="85000000130000005d0000000000000095000000000000000a621cf434b9eaafdc2a00e9bfde908990817b364e51afe9c8dab05b16a6437211f9f0570759f1cae63487ff68fffffffffffe8e3932e2b75a25a4cf8a9456aa8a701c318c67edb6e9330b53c0eeba8644311ba7541189070000f50c000000d8e5b1dc91c5499be2097784a94b6cc2d272ac751d8bce5db4862c1b2eab7007ceea158dbc329bab5f8450147b2b9629fdd6cdb5507d3a76dbaf6f93d161caa513f8aa41f795507856ea0015166c56ea0103220ed5a66834be086ef206a8606b04fc8462cbbe8233f381b4eefbdbdac708c1f4959cb6c008397006da8e243ec9fb19f3fab2b0f46d73a9f2d7c674cdbe4d7f76f5fbd05043e81f435fccf5063a93aa9b4c7f68670594"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r6, 0x0, 0x12, 0x300, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200, 0x300, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x2000000}, 0x28) 51.37822ms ago: executing program 3 (id=3668): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 948.869µs ago: executing program 4 (id=3669): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x7, 0x6, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b70500000000000b61107600000000000700000000000000950000000000"], &(0x7f00000002c0)='GPL\x00', 0x5, 0xbc, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='mm_page_free\x00'}, 0x10) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xb, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x8}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x71, 0xd5b1c52c00aec414]}}, 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000380)={'veth0_vlan\x00', @random="010000201000"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000008500000005", @ANYRES32], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r5, @ANYRES16=0x0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r6}, 0x10) syz_clone(0x3001000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64, @ANYRES32, @ANYRESOCT=r3, @ANYRES64=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='netlink_extack\x00', r8}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 636.079µs ago: executing program 3 (id=3670): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) 0s ago: executing program 3 (id=3671): bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005000000", @ANYRES32, @ANYRES32=0x0], 0x48) (rerun: 64) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r0, 0xffffffffffffffff}, &(0x7f00000005c0), &(0x7f0000000600)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) (async) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 32) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000811f0348a2f56d7000000000f88b7cb6e27d6e3800000000000000"], 0x48) (rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r5, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x40010) (async) openat$cgroup_procs(r7, &(0x7f0000002c40)='tasks\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r3, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x4, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xa, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xca, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb964418000000000000003000000030000000040000000000000000000009000000000000000000000003000000000200000005000000060000000a0000000000000a0200000000006100"], &(0x7f0000000780)=""/244, 0x4c, 0xf4, 0x0, 0x1, 0x0, @void, @value}, 0x28) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000980)={r2, 0x20, &(0x7f0000000940)={&(0x7f0000001a00)=""/4096, 0x1000, 0x0, &(0x7f0000002a00)=""/204, 0xcc}}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100004b028ee7000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005000000000000", @ANYBLOB, @ANYRES32=0x0], 0x48) kernel console output (not intermixed with test programs): 81.673163][ T2366] bridge0: port 3(veth0_to_batadv) entered disabled state [ 81.769095][ T2366] device veth0_to_batadv entered promiscuous mode [ 81.819681][ T2366] bridge0: port 3(veth0_to_batadv) entered blocking state [ 81.826863][ T2366] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 82.387203][ T30] audit: type=1400 audit(1736786274.901:143): avc: denied { create } for pid=2381 comm="syz.0.710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 84.072924][ T30] audit: type=1400 audit(1736786276.601:144): avc: denied { create } for pid=2429 comm="syz.1.726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 85.794858][ T2501] device pim6reg1 entered promiscuous mode [ 85.988584][ T2506] device pim6reg1 entered promiscuous mode [ 86.664586][ T2542] device pim6reg1 entered promiscuous mode [ 86.953163][ T2558] device sit0 left promiscuous mode [ 87.243835][ T2566] device sit0 entered promiscuous mode [ 87.617180][ T2591] FAULT_INJECTION: forcing a failure. [ 87.617180][ T2591] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 87.698484][ T2591] CPU: 1 PID: 2591 Comm: syz.1.789 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 87.709652][ T2591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 87.719534][ T2591] Call Trace: [ 87.722665][ T2591] [ 87.725433][ T2591] dump_stack_lvl+0x151/0x1c0 [ 87.729948][ T2591] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 87.735595][ T2591] ? io_uring_drop_tctx_refs+0x190/0x190 [ 87.741052][ T2591] ? __wake_up_klogd+0xd5/0x110 [ 87.745737][ T2591] dump_stack+0x15/0x20 [ 87.749731][ T2591] should_fail+0x3c6/0x510 [ 87.753984][ T2591] should_fail_usercopy+0x1a/0x20 [ 87.758843][ T2591] strncpy_from_user+0x24/0x2d0 [ 87.763538][ T2591] bpf_prog_load+0x185/0x1b50 [ 87.768048][ T2591] ? map_freeze+0x370/0x370 [ 87.772386][ T2591] ? selinux_bpf+0xcb/0x100 [ 87.776724][ T2591] ? security_bpf+0x82/0xb0 [ 87.781062][ T2591] __sys_bpf+0x4bc/0x760 [ 87.785141][ T2591] ? fput_many+0x160/0x1b0 [ 87.789392][ T2591] ? bpf_link_show_fdinfo+0x300/0x300 [ 87.794606][ T2591] __x64_sys_bpf+0x7c/0x90 [ 87.798855][ T2591] x64_sys_call+0x87f/0x9a0 [ 87.803283][ T2591] do_syscall_64+0x3b/0xb0 [ 87.807529][ T2591] ? clear_bhb_loop+0x35/0x90 [ 87.812043][ T2591] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 87.817776][ T2591] RIP: 0033:0x7f3521a91d29 [ 87.822033][ T2591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 87.841470][ T2591] RSP: 002b:00007f3520103038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 87.849716][ T2591] RAX: ffffffffffffffda RBX: 00007f3521c81fa0 RCX: 00007f3521a91d29 [ 87.857527][ T2591] RDX: 0000000000000070 RSI: 00000000200000c0 RDI: 0000000000000005 [ 87.865345][ T2591] RBP: 00007f3520103090 R08: 0000000000000000 R09: 0000000000000000 [ 87.873183][ T2591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 87.880961][ T2591] R13: 0000000000000000 R14: 00007f3521c81fa0 R15: 00007ffea64fcb58 [ 87.888778][ T2591] [ 87.927882][ T30] audit: type=1400 audit(1736786280.431:145): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 88.100790][ T30] audit: type=1400 audit(1736786280.431:146): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 88.162143][ T2595] device veth0_vlan left promiscuous mode [ 88.195597][ T2595] device veth0_vlan entered promiscuous mode [ 88.329952][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 88.338210][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 88.394993][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 89.823617][ T2632] device pim6reg1 entered promiscuous mode [ 91.054812][ T2664] device pim6reg1 entered promiscuous mode [ 91.242622][ T2672] syz.4.820 (2672) used obsolete PPPIOCDETACH ioctl [ 91.285040][ T2678] FAULT_INJECTION: forcing a failure. [ 91.285040][ T2678] name failslab, interval 1, probability 0, space 0, times 1 [ 91.463597][ T2678] CPU: 1 PID: 2678 Comm: syz.0.824 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 91.474650][ T2678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 91.484540][ T2678] Call Trace: [ 91.487660][ T2678] [ 91.490442][ T2678] dump_stack_lvl+0x151/0x1c0 [ 91.495382][ T2678] ? io_uring_drop_tctx_refs+0x190/0x190 [ 91.500855][ T2678] dump_stack+0x15/0x20 [ 91.504843][ T2678] should_fail+0x3c6/0x510 [ 91.509102][ T2678] __should_failslab+0xa4/0xe0 [ 91.513695][ T2678] should_failslab+0x9/0x20 [ 91.518034][ T2678] slab_pre_alloc_hook+0x37/0xd0 [ 91.522911][ T2678] kmem_cache_alloc_trace+0x48/0x270 [ 91.528031][ T2678] ? __get_vm_area_node+0x117/0x360 [ 91.533065][ T2678] ? __kasan_slab_free+0x11/0x20 [ 91.537838][ T2678] __get_vm_area_node+0x117/0x360 [ 91.542699][ T2678] __vmalloc_node_range+0xe2/0x8d0 [ 91.547646][ T2678] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 91.553025][ T2678] ? selinux_capset+0xf0/0xf0 [ 91.557537][ T2678] ? kstrtouint_from_user+0x20a/0x2a0 [ 91.562750][ T2678] ? kstrtol_from_user+0x310/0x310 [ 91.567696][ T2678] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 91.573074][ T2678] __vmalloc+0x7a/0x90 [ 91.576980][ T2678] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 91.582371][ T2678] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 91.587569][ T2678] ? bpf_prog_alloc+0x15/0x1e0 [ 91.592300][ T2678] bpf_prog_alloc+0x1f/0x1e0 [ 91.596731][ T2678] bpf_prog_load+0x800/0x1b50 [ 91.601235][ T2678] ? map_freeze+0x370/0x370 [ 91.605586][ T2678] ? selinux_bpf+0xcb/0x100 [ 91.609912][ T2678] ? security_bpf+0x82/0xb0 [ 91.614254][ T2678] __sys_bpf+0x4bc/0x760 [ 91.618344][ T2678] ? fput_many+0x160/0x1b0 [ 91.622581][ T2678] ? bpf_link_show_fdinfo+0x300/0x300 [ 91.627800][ T2678] ? debug_smp_processor_id+0x17/0x20 [ 91.633002][ T2678] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 91.638900][ T2678] __x64_sys_bpf+0x7c/0x90 [ 91.643167][ T2678] x64_sys_call+0x87f/0x9a0 [ 91.647502][ T2678] do_syscall_64+0x3b/0xb0 [ 91.651745][ T2678] ? clear_bhb_loop+0x35/0x90 [ 91.656256][ T2678] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 91.661985][ T2678] RIP: 0033:0x7f270d238d29 [ 91.666239][ T2678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.685771][ T2678] RSP: 002b:00007f270b8aa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 91.694009][ T2678] RAX: ffffffffffffffda RBX: 00007f270d428fa0 RCX: 00007f270d238d29 [ 91.701822][ T2678] RDX: 0000000000000070 RSI: 00000000200000c0 RDI: 0000000000000005 [ 91.709634][ T2678] RBP: 00007f270b8aa090 R08: 0000000000000000 R09: 0000000000000000 [ 91.717443][ T2678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.725257][ T2678] R13: 0000000000000000 R14: 00007f270d428fa0 R15: 00007ffeb7bf6458 [ 91.733075][ T2678] [ 91.853862][ T2678] syz.0.824: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 91.870358][ T2678] CPU: 0 PID: 2678 Comm: syz.0.824 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 91.881377][ T2678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 91.891273][ T2678] Call Trace: [ 91.894396][ T2678] [ 91.897175][ T2678] dump_stack_lvl+0x151/0x1c0 [ 91.901690][ T2678] ? io_uring_drop_tctx_refs+0x190/0x190 [ 91.907153][ T2678] ? pr_cont_kernfs_name+0xf0/0x100 [ 91.912189][ T2678] dump_stack+0x15/0x20 [ 91.916180][ T2678] warn_alloc+0x21a/0x390 [ 91.920346][ T2678] ? zone_watermark_ok_safe+0x270/0x270 [ 91.925732][ T2678] ? kmem_cache_alloc_trace+0x11a/0x270 [ 91.931107][ T2678] ? __get_vm_area_node+0x117/0x360 [ 91.936153][ T2678] ? __get_vm_area_node+0x347/0x360 [ 91.941182][ T2678] __vmalloc_node_range+0x2c1/0x8d0 [ 91.946211][ T2678] ? selinux_capset+0xf0/0xf0 [ 91.950725][ T2678] ? kstrtouint_from_user+0x20a/0x2a0 [ 91.955946][ T2678] ? kstrtol_from_user+0x310/0x310 [ 91.960891][ T2678] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 91.966259][ T2678] __vmalloc+0x7a/0x90 [ 91.970169][ T2678] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 91.975546][ T2678] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 91.980757][ T2678] ? bpf_prog_alloc+0x15/0x1e0 [ 91.985353][ T2678] bpf_prog_alloc+0x1f/0x1e0 [ 91.989788][ T2678] bpf_prog_load+0x800/0x1b50 [ 91.994297][ T2678] ? map_freeze+0x370/0x370 [ 91.998666][ T2678] ? selinux_bpf+0xcb/0x100 [ 92.002975][ T2678] ? security_bpf+0x82/0xb0 [ 92.007316][ T2678] __sys_bpf+0x4bc/0x760 [ 92.011393][ T2678] ? fput_many+0x160/0x1b0 [ 92.015734][ T2678] ? bpf_link_show_fdinfo+0x300/0x300 [ 92.020971][ T2678] ? debug_smp_processor_id+0x17/0x20 [ 92.026148][ T2678] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 92.032051][ T2678] __x64_sys_bpf+0x7c/0x90 [ 92.036307][ T2678] x64_sys_call+0x87f/0x9a0 [ 92.040642][ T2678] do_syscall_64+0x3b/0xb0 [ 92.044895][ T2678] ? clear_bhb_loop+0x35/0x90 [ 92.049408][ T2678] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 92.055139][ T2678] RIP: 0033:0x7f270d238d29 [ 92.059392][ T2678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 92.078845][ T2678] RSP: 002b:00007f270b8aa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 92.087076][ T2678] RAX: ffffffffffffffda RBX: 00007f270d428fa0 RCX: 00007f270d238d29 [ 92.094888][ T2678] RDX: 0000000000000070 RSI: 00000000200000c0 RDI: 0000000000000005 [ 92.102702][ T2678] RBP: 00007f270b8aa090 R08: 0000000000000000 R09: 0000000000000000 [ 92.110518][ T2678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.118322][ T2678] R13: 0000000000000000 R14: 00007f270d428fa0 R15: 00007ffeb7bf6458 [ 92.126144][ T2678] [ 92.160097][ T2678] Mem-Info: [ 92.163063][ T2678] active_anon:88 inactive_anon:4572 isolated_anon:0 [ 92.163063][ T2678] active_file:13772 inactive_file:5336 isolated_file:0 [ 92.163063][ T2678] unevictable:0 dirty:217 writeback:0 [ 92.163063][ T2678] slab_reclaimable:7358 slab_unreclaimable:73645 [ 92.163063][ T2678] mapped:28550 shmem:214 pagetables:552 bounce:0 [ 92.163063][ T2678] kernel_misc_reclaimable:0 [ 92.163063][ T2678] free:1547136 free_pcp:25191 free_cma:0 [ 92.212779][ T2678] Node 0 active_anon:352kB inactive_anon:18288kB active_file:55088kB inactive_file:21344kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:114200kB dirty:868kB writeback:0kB shmem:856kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4392kB pagetables:2108kB all_unreclaimable? no [ 92.248865][ T2678] DMA32 free:2974676kB min:62568kB low:78208kB high:93848kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2978952kB mlocked:0kB bounce:0kB free_pcp:4276kB local_pcp:0kB free_cma:0kB [ 92.286355][ T2678] lowmem_reserve[]: 0 3941 3941 [ 92.291346][ T2678] Normal free:3213868kB min:84884kB low:106104kB high:127324kB reserved_highatomic:0KB active_anon:352kB inactive_anon:18288kB active_file:55088kB inactive_file:21344kB unevictable:0kB writepending:868kB present:5242880kB managed:4035584kB mlocked:0kB bounce:0kB free_pcp:96240kB local_pcp:52028kB free_cma:0kB [ 92.389789][ T2678] lowmem_reserve[]: 0 0 0 [ 92.399922][ T2678] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 723*4096kB (M) = 2974676kB [ 92.476332][ T2678] Normal: 243*4kB (UME) 218*8kB (UM) 217*16kB (UME) 334*32kB (UME) 111*64kB (UME) 27*128kB (UE) 15*256kB (UME) 8*512kB (UME) 4*1024kB (UE) 0*2048kB 775*4096kB (UM) = 3213868kB [ 92.547462][ T2678] 19597 total pagecache pages [ 92.576797][ T2678] 0 pages in swap cache [ 92.611434][ T2678] Swap cache stats: add 0, delete 0, find 0/0 [ 92.634755][ T2678] Free swap = 124996kB [ 92.642034][ T2678] Total swap = 124996kB [ 92.650232][ T2678] 2097051 pages RAM [ 92.658998][ T2678] 0 pages HighMem/MovableOnly [ 92.676744][ T2678] 343417 pages reserved [ 92.710466][ T2678] 0 pages cma reserved [ 92.721986][ T2708] device sit0 entered promiscuous mode [ 92.768425][ T30] audit: type=1400 audit(1736786285.291:147): avc: denied { create } for pid=2709 comm="syz.1.831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 92.807815][ T2712] device pim6reg1 entered promiscuous mode [ 92.828238][ T2718] device pim6reg1 entered promiscuous mode [ 93.223071][ T2732] device sit0 left promiscuous mode [ 93.689389][ T2755] device pim6reg1 entered promiscuous mode [ 93.721439][ T2761] device pim6reg1 entered promiscuous mode [ 93.856196][ T2773] device pim6reg1 entered promiscuous mode [ 94.882932][ T2828] device pim6reg1 entered promiscuous mode [ 96.051351][ T2862] syz.3.886[2862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.051457][ T2862] syz.3.886[2862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.472599][ T2879] device pim6reg1 entered promiscuous mode [ 96.548071][ T2881] device pim6reg1 entered promiscuous mode [ 97.024321][ T2896] device veth0_vlan left promiscuous mode [ 97.047650][ T2896] device veth0_vlan entered promiscuous mode [ 97.109556][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.118111][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.134346][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.241939][ T2908] device veth0_to_batadv left promiscuous mode [ 97.309700][ T2908] bridge0: port 3(veth0_to_batadv) entered disabled state [ 97.593724][ T30] audit: type=1400 audit(1736786290.121:148): avc: denied { create } for pid=2941 comm="syz.0.919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 97.702595][ T2950] device veth0_to_batadv left promiscuous mode [ 97.710731][ T2950] bridge0: port 3(veth0_to_batadv) entered disabled state [ 97.876590][ T2963] syz.3.928[2963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.876698][ T2963] syz.3.928[2963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.239400][ T2973] device pim6reg1 entered promiscuous mode [ 98.846301][ T3007] device pim6reg1 entered promiscuous mode [ 98.986917][ T3025] device sit0 left promiscuous mode [ 99.103659][ T3029] device pim6reg1 entered promiscuous mode [ 103.598745][ T3198] bridge0: port 3(veth0_to_batadv) entered blocking state [ 103.606418][ T3198] bridge0: port 3(veth0_to_batadv) entered disabled state [ 103.659120][ T3198] device veth0_to_batadv entered promiscuous mode [ 103.677215][ T3198] bridge0: port 3(veth0_to_batadv) entered blocking state [ 103.684426][ T3198] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 103.911745][ T3228] device wg2 entered promiscuous mode [ 104.270734][ T3247] device pim6reg1 entered promiscuous mode [ 104.392954][ T3251] device sit0 left promiscuous mode [ 105.619281][ T3307] device pim6reg1 entered promiscuous mode [ 106.007495][ T3323] device pim6reg1 entered promiscuous mode [ 106.303908][ T3326] device pim6reg1 entered promiscuous mode [ 106.592007][ T3361] device sit0 left promiscuous mode [ 106.740182][ T3368] device sit0 entered promiscuous mode [ 106.753777][ T3371] device pim6reg1 entered promiscuous mode [ 107.070242][ T3389] device pim6reg1 entered promiscuous mode [ 107.638297][ T3407] device pim6reg1 entered promiscuous mode [ 108.843870][ T30] audit: type=1400 audit(1736786301.371:149): avc: denied { create } for pid=3452 comm="syz.0.1118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 108.866323][ T3453] device veth1_macvtap left promiscuous mode [ 109.837334][ T3492] device pim6reg1 entered promiscuous mode [ 110.224543][ T3520] syz.0.1143[3520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.224657][ T3520] syz.0.1143[3520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.549023][ T3532] device pim6reg1 entered promiscuous mode [ 111.549633][ T3550] device pim6reg1 entered promiscuous mode [ 112.068469][ T3566] device pim6reg1 entered promiscuous mode [ 112.423517][ T3588] device pim6reg1 entered promiscuous mode [ 112.831999][ T3606] device veth0_vlan left promiscuous mode [ 112.959264][ T3606] device veth0_vlan entered promiscuous mode [ 114.129717][ T3629] device pim6reg1 entered promiscuous mode [ 114.293338][ T3638] bridge0: port 3(veth0_to_batadv) entered blocking state [ 114.356699][ T3638] bridge0: port 3(veth0_to_batadv) entered disabled state [ 114.372380][ T3638] device veth0_to_batadv entered promiscuous mode [ 114.381395][ T3638] bridge0: port 3(veth0_to_batadv) entered blocking state [ 114.388566][ T3638] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 116.384500][ T3734] device pim6reg1 entered promiscuous mode [ 116.402824][ T3734] bond_slave_1: mtu greater than device maximum [ 116.763864][ T3755] device syzkaller0 entered promiscuous mode [ 116.949569][ T3755] device syzkaller0 left promiscuous mode [ 117.001977][ T30] audit: type=1400 audit(1736786309.531:150): avc: denied { create } for pid=3753 comm="syz.2.1230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 117.274091][ T3772] device veth1_macvtap left promiscuous mode [ 117.484260][ T3776] device pim6reg1 entered promiscuous mode [ 119.985939][ T3887] device pim6reg1 entered promiscuous mode [ 121.203430][ T3922] device pim6reg1 entered promiscuous mode [ 123.049526][ T3954] device pim6reg1 entered promiscuous mode [ 123.288167][ T3984] device pim6reg1 entered promiscuous mode [ 123.358135][ T3982] device veth1_macvtap left promiscuous mode [ 123.677453][ T4007] device pim6reg1 entered promiscuous mode [ 123.734067][ T3998] device pim6reg1 entered promiscuous mode [ 123.906490][ T4026] device pim6reg1 entered promiscuous mode [ 124.292454][ T4073] device pim6reg1 entered promiscuous mode [ 124.436173][ T4083] device pim6reg1 entered promiscuous mode [ 125.271544][ T4122] device pim6reg1 entered promiscuous mode [ 125.576655][ T4147] device pim6reg1 entered promiscuous mode [ 125.744018][ T4158] device pim6reg1 entered promiscuous mode [ 125.905861][ T30] audit: type=1400 audit(1736786318.431:151): avc: denied { create } for pid=4169 comm="syz.0.1384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 126.106192][ T4182] device pim6reg1 entered promiscuous mode [ 126.921155][ T30] audit: type=1400 audit(1736786319.451:152): avc: denied { create } for pid=4203 comm="syz.3.1396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 127.119651][ T4212] device pim6reg1 entered promiscuous mode [ 127.622425][ T30] audit: type=1400 audit(1736786320.151:153): avc: denied { tracepoint } for pid=4235 comm="syz.2.1409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 128.231612][ T4271] device veth0_vlan left promiscuous mode [ 128.253157][ T4271] device veth0_vlan entered promiscuous mode [ 128.382469][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 128.404834][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 128.480200][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 129.041281][ T4297] device pim6reg1 entered promiscuous mode [ 129.330913][ T4298] device pim6reg1 entered promiscuous mode [ 131.426905][ T4381] device sit0 left promiscuous mode [ 132.236563][ T4420] device syzkaller0 entered promiscuous mode [ 133.313727][ T30] audit: type=1400 audit(1736786325.841:154): avc: denied { write } for pid=4448 comm="syz.1.1487" name="cgroup.subtree_control" dev="cgroup2" ino=191 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 133.358497][ T30] audit: type=1400 audit(1736786325.871:155): avc: denied { open } for pid=4448 comm="syz.1.1487" path="" dev="cgroup2" ino=191 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 133.535411][ T4463] FAULT_INJECTION: forcing a failure. [ 133.535411][ T4463] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 133.687440][ T4463] CPU: 1 PID: 4463 Comm: syz.3.1491 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 133.698663][ T4463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 133.708562][ T4463] Call Trace: [ 133.711675][ T4463] [ 133.714466][ T4463] dump_stack_lvl+0x151/0x1c0 [ 133.718969][ T4463] ? io_uring_drop_tctx_refs+0x190/0x190 [ 133.724438][ T4463] ? kstrtouint_from_user+0x20a/0x2a0 [ 133.729643][ T4463] ? kstrtol_from_user+0x310/0x310 [ 133.734587][ T4463] ? avc_has_perm_noaudit+0x348/0x430 [ 133.739796][ T4463] dump_stack+0x15/0x20 [ 133.743793][ T4463] should_fail+0x3c6/0x510 [ 133.748058][ T4463] should_fail_usercopy+0x1a/0x20 [ 133.752904][ T4463] strncpy_from_user+0x24/0x2d0 [ 133.757593][ T4463] bpf_prog_load+0x185/0x1b50 [ 133.762110][ T4463] ? map_freeze+0x370/0x370 [ 133.766450][ T4463] ? selinux_bpf+0xcb/0x100 [ 133.770783][ T4463] ? security_bpf+0x82/0xb0 [ 133.775124][ T4463] __sys_bpf+0x4bc/0x760 [ 133.779201][ T4463] ? fput_many+0x160/0x1b0 [ 133.783457][ T4463] ? bpf_link_show_fdinfo+0x300/0x300 [ 133.788668][ T4463] ? debug_smp_processor_id+0x17/0x20 [ 133.793870][ T4463] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 133.799781][ T4463] __x64_sys_bpf+0x7c/0x90 [ 133.804023][ T4463] x64_sys_call+0x87f/0x9a0 [ 133.808364][ T4463] do_syscall_64+0x3b/0xb0 [ 133.812619][ T4463] ? clear_bhb_loop+0x35/0x90 [ 133.817131][ T4463] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 133.822879][ T4463] RIP: 0033:0x7f55bac53d29 [ 133.827111][ T4463] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 133.846553][ T4463] RSP: 002b:00007f55b92c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 133.854796][ T4463] RAX: ffffffffffffffda RBX: 00007f55bae43fa0 RCX: 00007f55bac53d29 [ 133.862608][ T4463] RDX: 0000000000000070 RSI: 00000000200000c0 RDI: 0000000000000005 [ 133.870425][ T4463] RBP: 00007f55b92c5090 R08: 0000000000000000 R09: 0000000000000000 [ 133.878234][ T4463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 133.886042][ T4463] R13: 0000000000000000 R14: 00007f55bae43fa0 R15: 00007fff48594ab8 [ 133.893861][ T4463] [ 135.138154][ T4521] device pim6reg1 entered promiscuous mode [ 135.811481][ T4551] device veth0_vlan left promiscuous mode [ 135.823618][ T4551] device veth0_vlan entered promiscuous mode [ 135.839558][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 135.854800][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 135.862541][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 135.921175][ T4557] device pim6reg1 entered promiscuous mode [ 136.615145][ T4594] device pim6reg1 entered promiscuous mode [ 137.685442][ T4635] syz.1.1554[4635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.685548][ T4635] syz.1.1554[4635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.791642][ T4641] device pim6reg1 entered promiscuous mode [ 139.215339][ T4703] device pim6reg1 entered promiscuous mode [ 139.578774][ T4724] device pim6reg1 entered promiscuous mode [ 140.061026][ T4735] device syzkaller0 entered promiscuous mode [ 141.632815][ T4778] device pim6reg1 entered promiscuous mode [ 142.374394][ T4813] device pim6reg1 entered promiscuous mode [ 142.612908][ T4819] device pim6reg1 entered promiscuous mode [ 142.764659][ T4834] device syzkaller0 entered promiscuous mode [ 142.797928][ T4834] device pim6reg1 entered promiscuous mode [ 142.897265][ T4842] device sit0 entered promiscuous mode [ 143.854656][ T4867] device pim6reg1 entered promiscuous mode [ 143.925430][ T4881] device syzkaller0 entered promiscuous mode [ 144.570977][ T4930] device pim6reg1 entered promiscuous mode [ 145.689384][ T4969] device pim6reg1 entered promiscuous mode [ 146.865854][ T5009] device pim6reg1 entered promiscuous mode [ 146.881998][ T5023] device pim6reg1 entered promiscuous mode [ 147.352792][ T5055] device pim6reg1 entered promiscuous mode [ 147.724165][ T5098] device pim6reg1 entered promiscuous mode [ 148.729350][ T101] udevd[101]: worker [313] terminated by signal 33 (Unknown signal 33) [ 148.770968][ T5140] device sit0 entered promiscuous mode [ 148.783463][ T101] udevd[101]: worker [313] failed while handling '/devices/virtual/block/loop1' [ 148.950125][ T101] udevd[101]: worker [824] terminated by signal 33 (Unknown signal 33) [ 148.978694][ T101] udevd[101]: worker [824] failed while handling '/devices/virtual/block/loop3' [ 149.002539][ T5147] device sit0 left promiscuous mode [ 149.162108][ T5165] device sit0 entered promiscuous mode [ 149.296670][ T30] audit: type=1400 audit(1736786341.821:156): avc: denied { create } for pid=5173 comm="syz.1.1760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 149.898432][ T30] audit: type=1400 audit(1736786342.421:157): avc: denied { append } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 150.143271][ T30] audit: type=1400 audit(1736786342.421:158): avc: denied { open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 150.193209][ T5204] device sit0 entered promiscuous mode [ 150.309978][ T30] audit: type=1400 audit(1736786342.421:159): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 150.457177][ T5214] device pim6reg1 entered promiscuous mode [ 151.143682][ T5229] device pim6reg1 entered promiscuous mode [ 151.918193][ T5284] device pim6reg1 entered promiscuous mode [ 152.230741][ T5294] device veth0_vlan left promiscuous mode [ 152.261536][ T5294] device veth0_vlan entered promiscuous mode [ 152.702550][ T5313] device pim6reg1 entered promiscuous mode [ 152.879727][ T5332] device pim6reg1 entered promiscuous mode [ 153.734326][ T5368] device pim6reg1 entered promiscuous mode [ 155.302364][ T5445] device pim6reg1 entered promiscuous mode [ 156.561129][ T5496] device sit0 entered promiscuous mode [ 157.124176][ T5519] ÿÿÿÿÿÿ‚qî: renamed from vlan1 [ 157.137890][ T5524] device pim6reg1 entered promiscuous mode [ 157.254255][ T5541] device veth0_vlan left promiscuous mode [ 157.277723][ T5541] device veth0_vlan entered promiscuous mode [ 157.323877][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 157.334544][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 157.344414][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ‚qî: link becomes ready [ 157.352895][ T5545] device pim6reg1 entered promiscuous mode [ 157.371627][ T5548] : renamed from ipvlan1 [ 158.297296][ T5576] device sit0 left promiscuous mode [ 158.811060][ T5596] device sit0 entered promiscuous mode [ 159.101806][ T5598] device pim6reg1 entered promiscuous mode [ 161.613155][ T5715] device sit0 entered promiscuous mode [ 161.944542][ T5729] device syzkaller0 entered promiscuous mode [ 163.718431][ T5820] device sit0 left promiscuous mode [ 164.594302][ T5869] device pim6reg1 entered promiscuous mode [ 166.199523][ T5933] device pim6reg1 entered promiscuous mode [ 166.378998][ T5954] syz.3.2049[5954] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.380034][ T5954] syz.3.2049[5954] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.546344][ T5966] device pim6reg1 entered promiscuous mode [ 167.014645][ T5984] device syzkaller0 entered promiscuous mode [ 167.333672][ T6007] device pim6reg1 entered promiscuous mode [ 167.681491][ T6023] device pim6reg1 entered promiscuous mode [ 167.711534][ T6028] device veth1_macvtap left promiscuous mode [ 168.345430][ T6067] device pim6reg1 entered promiscuous mode [ 169.326914][ T6113] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 169.387066][ T6124] syz.3.2113[6124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.387170][ T6124] syz.3.2113[6124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.298172][ T6209] device pim6reg1 entered promiscuous mode [ 172.624697][ T101] udevd[101]: worker [5618] terminated by signal 33 (Unknown signal 33) [ 172.688352][ T101] udevd[101]: worker [5618] failed while handling '/devices/virtual/block/loop2' [ 174.999646][ T6362] device syzkaller0 entered promiscuous mode [ 175.065146][ T6369] device veth0_vlan left promiscuous mode [ 175.103959][ T6369] device veth0_vlan entered promiscuous mode [ 175.150600][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 175.165010][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 175.172686][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ‚qî: link becomes ready [ 175.315892][ T6376] device syzkaller0 entered promiscuous mode [ 176.107129][ T6450] device syzkaller0 entered promiscuous mode [ 177.419237][ T6497] device syzkaller0 entered promiscuous mode [ 177.895225][ T6528] device sit0 left promiscuous mode [ 178.280329][ T6535] device sit0 entered promiscuous mode [ 178.515992][ T6558] tun0: tun_chr_ioctl cmd 1074025677 [ 178.521274][ T6558] tun0: linktype set to 776 [ 178.561560][ T6556] device syzkaller0 entered promiscuous mode [ 178.585586][ T6562] syz.1.2282[6562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.585693][ T6562] syz.1.2282[6562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.525450][ T6600] device syzkaller0 entered promiscuous mode [ 180.467234][ T6644] device pim6reg1 entered promiscuous mode [ 180.558679][ T6647] device pim6reg1 entered promiscuous mode [ 180.605005][ T6647] FAULT_INJECTION: forcing a failure. [ 180.605005][ T6647] name failslab, interval 1, probability 0, space 0, times 0 [ 180.661497][ T6647] CPU: 1 PID: 6647 Comm: syz.2.2316 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 180.672720][ T6647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 180.682630][ T6647] Call Trace: [ 180.685739][ T6647] [ 180.688520][ T6647] dump_stack_lvl+0x151/0x1c0 [ 180.693033][ T6647] ? io_uring_drop_tctx_refs+0x190/0x190 [ 180.698499][ T6647] dump_stack+0x15/0x20 [ 180.702490][ T6647] should_fail+0x3c6/0x510 [ 180.706743][ T6647] __should_failslab+0xa4/0xe0 [ 180.711519][ T6647] should_failslab+0x9/0x20 [ 180.715855][ T6647] slab_pre_alloc_hook+0x37/0xd0 [ 180.720633][ T6647] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 180.725925][ T6647] __kmalloc_track_caller+0x6c/0x2c0 [ 180.731045][ T6647] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 180.736341][ T6647] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 180.741634][ T6647] __alloc_skb+0x10c/0x550 [ 180.745887][ T6647] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 180.751013][ T6647] rtmsg_ifinfo+0x78/0x120 [ 180.755264][ T6647] dev_close_many+0x2a6/0x530 [ 180.759775][ T6647] ? __dev_open+0x4e0/0x4e0 [ 180.764113][ T6647] ? __kasan_check_read+0x11/0x20 [ 180.768974][ T6647] unregister_netdevice_many+0x492/0x17c0 [ 180.774528][ T6647] ? kmem_cache_free+0x115/0x330 [ 180.779307][ T6647] ? __kasan_check_write+0x14/0x20 [ 180.784250][ T6647] ? slab_free_freelist_hook+0xbd/0x190 [ 180.789639][ T6647] ? alloc_netdev_mqs+0xc90/0xc90 [ 180.794511][ T6647] ? __kasan_check_read+0x11/0x20 [ 180.799350][ T6647] unregister_netdevice_queue+0x2e6/0x350 [ 180.804906][ T6647] ? linkwatch_urgent_event+0x335/0x4d0 [ 180.810288][ T6647] ? list_netdevice+0x4c0/0x4c0 [ 180.814981][ T6647] __tun_detach+0xd14/0x1510 [ 180.819401][ T6647] ? wait_for_completion_killable_timeout+0x10/0x10 [ 180.825827][ T6647] ? tun_chr_open+0x530/0x530 [ 180.830336][ T6647] tun_chr_close+0x92/0x140 [ 180.834701][ T6647] __fput+0x228/0x8c0 [ 180.838499][ T6647] ____fput+0x15/0x20 [ 180.842311][ T6647] task_work_run+0x129/0x190 [ 180.846743][ T6647] exit_to_user_mode_loop+0xc4/0xe0 [ 180.851773][ T6647] exit_to_user_mode_prepare+0x5a/0xa0 [ 180.857068][ T6647] syscall_exit_to_user_mode+0x26/0x160 [ 180.862453][ T6647] do_syscall_64+0x47/0xb0 [ 180.866794][ T6647] ? clear_bhb_loop+0x35/0x90 [ 180.871304][ T6647] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 180.877030][ T6647] RIP: 0033:0x7fa1c9bebd29 [ 180.881288][ T6647] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 180.900726][ T6647] RSP: 002b:00007fa1c825d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 180.908969][ T6647] RAX: 0000000000000000 RBX: 00007fa1c9ddbfa0 RCX: 00007fa1c9bebd29 [ 180.916781][ T6647] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 180.924590][ T6647] RBP: 00007fa1c825d090 R08: 0000000000000000 R09: 0000000000000000 [ 180.932405][ T6647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 180.940214][ T6647] R13: 0000000000000000 R14: 00007fa1c9ddbfa0 R15: 00007ffd05fde1b8 [ 180.948030][ T6647] [ 181.391902][ T6662] device pim6reg1 entered promiscuous mode [ 181.588693][ T6685] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 181.633469][ T6685] device syzkaller0 entered promiscuous mode [ 182.248991][ T6713] device syzkaller0 entered promiscuous mode [ 184.433503][ T6805] device pim6reg1 entered promiscuous mode [ 184.467434][ T6805] FAULT_INJECTION: forcing a failure. [ 184.467434][ T6805] name failslab, interval 1, probability 0, space 0, times 0 [ 185.295495][ T6805] CPU: 1 PID: 6805 Comm: syz.0.2376 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 185.306621][ T6805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 185.316520][ T6805] Call Trace: [ 185.319637][ T6805] [ 185.322415][ T6805] dump_stack_lvl+0x151/0x1c0 [ 185.326925][ T6805] ? io_uring_drop_tctx_refs+0x190/0x190 [ 185.332393][ T6805] ? memcpy+0x56/0x70 [ 185.336214][ T6805] dump_stack+0x15/0x20 [ 185.340208][ T6805] should_fail+0x3c6/0x510 [ 185.344458][ T6805] __should_failslab+0xa4/0xe0 [ 185.349059][ T6805] should_failslab+0x9/0x20 [ 185.353399][ T6805] slab_pre_alloc_hook+0x37/0xd0 [ 185.358175][ T6805] ? netlink_trim+0x19b/0x230 [ 185.362688][ T6805] __kmalloc_track_caller+0x6c/0x2c0 [ 185.367807][ T6805] ? netlink_trim+0x19b/0x230 [ 185.372320][ T6805] ? netlink_trim+0x19b/0x230 [ 185.376838][ T6805] pskb_expand_head+0x113/0x1240 [ 185.381610][ T6805] netlink_trim+0x19b/0x230 [ 185.385945][ T6805] netlink_broadcast_filtered+0x66/0x1220 [ 185.391501][ T6805] ? __kasan_kmalloc+0x9/0x10 [ 185.396014][ T6805] ? rtmsg_ifinfo_build_skb+0xd4/0x180 [ 185.401311][ T6805] nlmsg_notify+0x101/0x1c0 [ 185.405647][ T6805] rtmsg_ifinfo+0xe7/0x120 [ 185.409899][ T6805] dev_close_many+0x2a6/0x530 [ 185.414416][ T6805] ? __dev_open+0x4e0/0x4e0 [ 185.418753][ T6805] ? __kasan_check_read+0x11/0x20 [ 185.423613][ T6805] unregister_netdevice_many+0x492/0x17c0 [ 185.429169][ T6805] ? __kasan_check_write+0x14/0x20 [ 185.434115][ T6805] ? slab_free_freelist_hook+0xbd/0x190 [ 185.439495][ T6805] ? alloc_netdev_mqs+0xc90/0xc90 [ 185.444358][ T6805] ? add_timer+0x68/0x80 [ 185.448435][ T6805] ? __queue_delayed_work+0x16d/0x1f0 [ 185.453645][ T6805] ? __kasan_check_read+0x11/0x20 [ 185.458503][ T6805] unregister_netdevice_queue+0x2e6/0x350 [ 185.464078][ T6805] ? linkwatch_urgent_event+0x335/0x4d0 [ 185.469443][ T6805] ? list_netdevice+0x4c0/0x4c0 [ 185.474131][ T6805] __tun_detach+0xd14/0x1510 [ 185.478551][ T6805] ? wait_for_completion_killable_timeout+0x10/0x10 [ 185.484977][ T6805] ? tun_chr_open+0x530/0x530 [ 185.489487][ T6805] tun_chr_close+0x92/0x140 [ 185.493838][ T6805] __fput+0x228/0x8c0 [ 185.497652][ T6805] ____fput+0x15/0x20 [ 185.501468][ T6805] task_work_run+0x129/0x190 [ 185.505892][ T6805] exit_to_user_mode_loop+0xc4/0xe0 [ 185.511016][ T6805] exit_to_user_mode_prepare+0x5a/0xa0 [ 185.516308][ T6805] syscall_exit_to_user_mode+0x26/0x160 [ 185.521688][ T6805] do_syscall_64+0x47/0xb0 [ 185.525940][ T6805] ? clear_bhb_loop+0x35/0x90 [ 185.530456][ T6805] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 185.536184][ T6805] RIP: 0033:0x7f270d238d29 [ 185.540439][ T6805] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 185.559879][ T6805] RSP: 002b:00007f270b8aa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 185.568122][ T6805] RAX: 0000000000000000 RBX: 00007f270d428fa0 RCX: 00007f270d238d29 [ 185.575935][ T6805] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 185.583745][ T6805] RBP: 00007f270b8aa090 R08: 0000000000000000 R09: 0000000000000000 [ 185.591556][ T6805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 185.599369][ T6805] R13: 0000000000000000 R14: 00007f270d428fa0 R15: 00007ffeb7bf6458 [ 185.607187][ T6805] [ 186.059385][ T6835] device sit0 left promiscuous mode [ 186.290018][ T6842] device sit0 entered promiscuous mode [ 186.824532][ T6855] device pim6reg1 entered promiscuous mode [ 187.222188][ T6874] device syzkaller0 entered promiscuous mode [ 187.750228][ T6891] device sit0 left promiscuous mode [ 188.254211][ T6903] device sit0 entered promiscuous mode [ 189.694646][ T6951] device syzkaller0 entered promiscuous mode [ 189.769968][ T6953] device sit0 left promiscuous mode [ 190.318429][ T7005] device syzkaller0 entered promiscuous mode [ 190.798129][ T7021] device syzkaller0 entered promiscuous mode [ 190.813788][ T7024] device pim6reg1 entered promiscuous mode [ 191.362559][ T7053] syz.1.2470[7053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.362665][ T7053] syz.1.2470[7053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.597376][ T101] udevd[101]: worker [5157] terminated by signal 33 (Unknown signal 33) [ 191.648287][ T101] udevd[101]: worker [5157] failed while handling '/devices/virtual/block/loop0' [ 192.023001][ T7079] device pim6reg1 entered promiscuous mode [ 192.126884][ T7091] device sit0 left promiscuous mode [ 193.470426][ T7139] device sit0 entered promiscuous mode [ 193.629762][ T7149] device pim6reg1 entered promiscuous mode [ 193.656969][ T7149] FAULT_INJECTION: forcing a failure. [ 193.656969][ T7149] name failslab, interval 1, probability 0, space 0, times 0 [ 193.669428][ T7149] CPU: 1 PID: 7149 Comm: syz.1.2506 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 193.680502][ T7149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 193.690403][ T7149] Call Trace: [ 193.693514][ T7149] [ 193.696294][ T7149] dump_stack_lvl+0x151/0x1c0 [ 193.700808][ T7149] ? io_uring_drop_tctx_refs+0x190/0x190 [ 193.706281][ T7149] dump_stack+0x15/0x20 [ 193.710269][ T7149] should_fail+0x3c6/0x510 [ 193.714522][ T7149] __should_failslab+0xa4/0xe0 [ 193.719119][ T7149] ? __alloc_skb+0xbe/0x550 [ 193.723459][ T7149] should_failslab+0x9/0x20 [ 193.727795][ T7149] slab_pre_alloc_hook+0x37/0xd0 [ 193.732577][ T7149] ? __alloc_skb+0xbe/0x550 [ 193.736910][ T7149] kmem_cache_alloc+0x44/0x250 [ 193.741514][ T7149] __alloc_skb+0xbe/0x550 [ 193.745679][ T7149] inet6_rt_notify+0x2db/0x550 [ 193.750279][ T7149] ? rt6_nh_dump_exceptions+0x650/0x650 [ 193.755665][ T7149] fib6_del+0xce0/0x1060 [ 193.759745][ T7149] ? fib6_locate+0x560/0x560 [ 193.764165][ T7149] ? enqueue_task_fair+0xd31/0x2650 [ 193.769200][ T7149] fib6_clean_node+0x2ed/0x550 [ 193.773810][ T7149] ? node_free_rcu+0x30/0x30 [ 193.778237][ T7149] ? psi_task_change+0x22c/0x360 [ 193.783179][ T7149] fib6_walk_continue+0x52d/0x720 [ 193.788039][ T7149] fib6_walk+0x172/0x2d0 [ 193.792112][ T7149] fib6_clean_all+0x202/0x2c0 [ 193.796625][ T7149] ? rt6_sync_down_dev+0x170/0x170 [ 193.801574][ T7149] ? fib6_del+0x1060/0x1060 [ 193.805910][ T7149] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 193.811557][ T7149] ? node_free_rcu+0x30/0x30 [ 193.815981][ T7149] ? rt6_sync_down_dev+0x170/0x170 [ 193.820927][ T7149] ? try_invoke_on_locked_down_task+0x2a0/0x2a0 [ 193.827006][ T7149] rt6_disable_ip+0x153/0x730 [ 193.831514][ T7149] ? wake_up_process+0x10/0x20 [ 193.836117][ T7149] ? insert_work+0x299/0x320 [ 193.840544][ T7149] ? fib6_ifdown+0x510/0x510 [ 193.844969][ T7149] ? __kasan_check_read+0x11/0x20 [ 193.849828][ T7149] addrconf_ifdown+0x160/0x1ae0 [ 193.854517][ T7149] ? wq_worker_last_func+0x50/0x50 [ 193.859465][ T7149] ? addrconf_cleanup+0x1b0/0x1b0 [ 193.864322][ T7149] ? mutex_unlock+0xb2/0x260 [ 193.868748][ T7149] ? __mutex_lock_slowpath+0x10/0x10 [ 193.873871][ T7149] ? nf_nat_masq_schedule+0x620/0x620 [ 193.879075][ T7149] ? masq_device_event+0xd0/0xd0 [ 193.883851][ T7149] addrconf_notify+0x37d/0xdd0 [ 193.888453][ T7149] raw_notifier_call_chain+0x8c/0xf0 [ 193.893572][ T7149] dev_close_many+0x37c/0x530 [ 193.898083][ T7149] ? __dev_open+0x4e0/0x4e0 [ 193.902427][ T7149] ? mutex_unlock+0xb2/0x260 [ 193.906893][ T7149] ? __kasan_check_read+0x11/0x20 [ 193.911713][ T7149] unregister_netdevice_many+0x492/0x17c0 [ 193.917267][ T7149] ? __kasan_check_write+0x14/0x20 [ 193.922212][ T7149] ? synchronize_rcu+0x120/0x120 [ 193.926987][ T7149] ? alloc_netdev_mqs+0xc90/0xc90 [ 193.931846][ T7149] ? locks_remove_file+0x41a/0x1180 [ 193.936883][ T7149] ? __kasan_check_read+0x11/0x20 [ 193.941741][ T7149] unregister_netdevice_queue+0x2e6/0x350 [ 193.947305][ T7149] ? linkwatch_urgent_event+0x335/0x4d0 [ 193.952679][ T7149] ? list_netdevice+0x4c0/0x4c0 [ 193.957369][ T7149] __tun_detach+0xd14/0x1510 [ 193.961789][ T7149] ? wait_for_completion_killable_timeout+0x10/0x10 [ 193.968218][ T7149] ? tun_chr_open+0x530/0x530 [ 193.972727][ T7149] tun_chr_close+0x92/0x140 [ 193.977067][ T7149] __fput+0x228/0x8c0 [ 193.980889][ T7149] ____fput+0x15/0x20 [ 193.984702][ T7149] task_work_run+0x129/0x190 [ 193.989133][ T7149] exit_to_user_mode_loop+0xc4/0xe0 [ 193.994167][ T7149] exit_to_user_mode_prepare+0x5a/0xa0 [ 193.999470][ T7149] syscall_exit_to_user_mode+0x26/0x160 [ 194.004842][ T7149] do_syscall_64+0x47/0xb0 [ 194.009092][ T7149] ? clear_bhb_loop+0x35/0x90 [ 194.013607][ T7149] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 194.019333][ T7149] RIP: 0033:0x7f3521a91d29 [ 194.023588][ T7149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 194.043125][ T7149] RSP: 002b:00007f3520103038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 194.051371][ T7149] RAX: 0000000000000000 RBX: 00007f3521c81fa0 RCX: 00007f3521a91d29 [ 194.059179][ T7149] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 194.066991][ T7149] RBP: 00007f3520103090 R08: 0000000000000000 R09: 0000000000000000 [ 194.074802][ T7149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 194.082613][ T7149] R13: 0000000000000000 R14: 00007f3521c81fa0 R15: 00007ffea64fcb58 [ 194.090431][ T7149] [ 194.213490][ T7167] device pim6reg1 entered promiscuous mode [ 196.049818][ C0] sched: RT throttling activated [ 197.105650][ T7172] bond_slave_1: mtu greater than device maximum [ 197.113282][ T7162] device pim6reg1 left promiscuous mode [ 197.138350][ T7183] FAULT_INJECTION: forcing a failure. [ 197.138350][ T7183] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 197.151389][ T7183] CPU: 1 PID: 7183 Comm: syz.1.2517 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 197.162502][ T7183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 197.172399][ T7183] Call Trace: [ 197.175509][ T7183] [ 197.178292][ T7183] dump_stack_lvl+0x151/0x1c0 [ 197.182805][ T7183] ? io_uring_drop_tctx_refs+0x190/0x190 [ 197.188274][ T7183] dump_stack+0x15/0x20 [ 197.192262][ T7183] should_fail+0x3c6/0x510 [ 197.196515][ T7183] should_fail_usercopy+0x1a/0x20 [ 197.201375][ T7183] _copy_from_user+0x20/0xd0 [ 197.205801][ T7183] __sys_bpf+0x1e9/0x760 [ 197.209878][ T7183] ? fput_many+0x160/0x1b0 [ 197.214131][ T7183] ? bpf_link_show_fdinfo+0x300/0x300 [ 197.219343][ T7183] ? debug_smp_processor_id+0x17/0x20 [ 197.224592][ T7183] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 197.230457][ T7183] __x64_sys_bpf+0x7c/0x90 [ 197.234706][ T7183] x64_sys_call+0x87f/0x9a0 [ 197.239040][ T7183] do_syscall_64+0x3b/0xb0 [ 197.243379][ T7183] ? clear_bhb_loop+0x35/0x90 [ 197.247893][ T7183] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 197.253622][ T7183] RIP: 0033:0x7f3521a91d29 [ 197.257878][ T7183] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 197.277318][ T7183] RSP: 002b:00007f3520103038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 197.285659][ T7183] RAX: ffffffffffffffda RBX: 00007f3521c81fa0 RCX: 00007f3521a91d29 [ 197.293461][ T7183] RDX: 0000000000000048 RSI: 0000000020000080 RDI: 0000000000000005 [ 197.301285][ T7183] RBP: 00007f3520103090 R08: 0000000000000000 R09: 0000000000000000 [ 197.309086][ T7183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.316900][ T7183] R13: 0000000000000001 R14: 00007f3521c81fa0 R15: 00007ffea64fcb58 [ 197.324718][ T7183] [ 198.103029][ T7202] bridge0: port 3(veth0_to_batadv) entered disabled state [ 198.113034][ T7202] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.124474][ T7202] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.273290][ T7207] bridge0: port 3(veth0_to_batadv) entered blocking state [ 198.280285][ T7207] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 198.287510][ T7207] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.294406][ T7207] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.301503][ T7207] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.308477][ T7207] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.317928][ T7207] device bridge0 entered promiscuous mode [ 199.342555][ T7227] syz.3.2533[7227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.342634][ T7227] syz.3.2533[7227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.435772][ T7237] device pim6reg1 entered promiscuous mode [ 199.496769][ T7235] device sit0 entered promiscuous mode [ 199.565877][ T7237] FAULT_INJECTION: forcing a failure. [ 199.565877][ T7237] name failslab, interval 1, probability 0, space 0, times 0 [ 199.578378][ T7237] CPU: 1 PID: 7237 Comm: syz.1.2538 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 199.589410][ T7237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 199.599307][ T7237] Call Trace: [ 199.602432][ T7237] [ 199.605209][ T7237] dump_stack_lvl+0x151/0x1c0 [ 199.609720][ T7237] ? io_uring_drop_tctx_refs+0x190/0x190 [ 199.615195][ T7237] dump_stack+0x15/0x20 [ 199.619178][ T7237] should_fail+0x3c6/0x510 [ 199.623439][ T7237] __should_failslab+0xa4/0xe0 [ 199.628038][ T7237] should_failslab+0x9/0x20 [ 199.632374][ T7237] slab_pre_alloc_hook+0x37/0xd0 [ 199.637150][ T7237] ? inet6_rt_notify+0x2db/0x550 [ 199.641918][ T7237] __kmalloc_track_caller+0x6c/0x2c0 [ 199.647039][ T7237] ? inet6_rt_notify+0x2db/0x550 [ 199.651817][ T7237] ? inet6_rt_notify+0x2db/0x550 [ 199.656588][ T7237] __alloc_skb+0x10c/0x550 [ 199.660854][ T7237] inet6_rt_notify+0x2db/0x550 [ 199.665444][ T7237] ? rt6_nh_dump_exceptions+0x650/0x650 [ 199.670828][ T7237] fib6_del+0xce0/0x1060 [ 199.674908][ T7237] ? fib6_locate+0x560/0x560 [ 199.679328][ T7237] ? enqueue_task_fair+0xd31/0x2650 [ 199.684369][ T7237] fib6_clean_node+0x2ed/0x550 [ 199.689054][ T7237] ? node_free_rcu+0x30/0x30 [ 199.693476][ T7237] ? psi_task_change+0x22c/0x360 [ 199.698255][ T7237] fib6_walk_continue+0x52d/0x720 [ 199.703114][ T7237] fib6_walk+0x172/0x2d0 [ 199.707189][ T7237] fib6_clean_all+0x202/0x2c0 [ 199.711702][ T7237] ? rt6_sync_down_dev+0x170/0x170 [ 199.716648][ T7237] ? fib6_del+0x1060/0x1060 [ 199.720989][ T7237] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 199.726632][ T7237] ? node_free_rcu+0x30/0x30 [ 199.731058][ T7237] ? rt6_sync_down_dev+0x170/0x170 [ 199.736006][ T7237] ? try_invoke_on_locked_down_task+0x2a0/0x2a0 [ 199.742081][ T7237] rt6_disable_ip+0x153/0x730 [ 199.746595][ T7237] ? wake_up_process+0x10/0x20 [ 199.751205][ T7237] ? insert_work+0x299/0x320 [ 199.755621][ T7237] ? fib6_ifdown+0x510/0x510 [ 199.760047][ T7237] ? __kasan_check_read+0x11/0x20 [ 199.764906][ T7237] addrconf_ifdown+0x160/0x1ae0 [ 199.769595][ T7237] ? wq_worker_last_func+0x50/0x50 [ 199.774543][ T7237] ? addrconf_cleanup+0x1b0/0x1b0 [ 199.779400][ T7237] ? mutex_unlock+0xb2/0x260 [ 199.783828][ T7237] ? __mutex_lock_slowpath+0x10/0x10 [ 199.788947][ T7237] ? nf_nat_masq_schedule+0x620/0x620 [ 199.794159][ T7237] ? masq_device_event+0xd0/0xd0 [ 199.798937][ T7237] addrconf_notify+0x37d/0xdd0 [ 199.803532][ T7237] raw_notifier_call_chain+0x8c/0xf0 [ 199.808649][ T7237] dev_close_many+0x37c/0x530 [ 199.813165][ T7237] ? __dev_open+0x4e0/0x4e0 [ 199.817503][ T7237] ? __kasan_check_read+0x11/0x20 [ 199.822385][ T7237] unregister_netdevice_many+0x492/0x17c0 [ 199.827919][ T7237] ? kmem_cache_free+0x115/0x330 [ 199.832694][ T7237] ? __kasan_check_write+0x14/0x20 [ 199.837647][ T7237] ? alloc_netdev_mqs+0xc90/0xc90 [ 199.842503][ T7237] ? __kasan_check_read+0x11/0x20 [ 199.847363][ T7237] unregister_netdevice_queue+0x2e6/0x350 [ 199.852916][ T7237] ? linkwatch_urgent_event+0x335/0x4d0 [ 199.858299][ T7237] ? list_netdevice+0x4c0/0x4c0 [ 199.862984][ T7237] __tun_detach+0xd14/0x1510 [ 199.867410][ T7237] ? wait_for_completion_killable_timeout+0x10/0x10 [ 199.873836][ T7237] ? tun_chr_open+0x530/0x530 [ 199.878349][ T7237] tun_chr_close+0x92/0x140 [ 199.882689][ T7237] __fput+0x228/0x8c0 [ 199.886506][ T7237] ____fput+0x15/0x20 [ 199.890323][ T7237] task_work_run+0x129/0x190 [ 199.894749][ T7237] exit_to_user_mode_loop+0xc4/0xe0 [ 199.899782][ T7237] exit_to_user_mode_prepare+0x5a/0xa0 [ 199.905083][ T7237] syscall_exit_to_user_mode+0x26/0x160 [ 199.910460][ T7237] do_syscall_64+0x47/0xb0 [ 199.914709][ T7237] ? clear_bhb_loop+0x35/0x90 [ 199.919225][ T7237] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 199.924952][ T7237] RIP: 0033:0x7f3521a91d29 [ 199.929206][ T7237] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 199.948731][ T7237] RSP: 002b:00007f3520103038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 199.956976][ T7237] RAX: 0000000000000000 RBX: 00007f3521c81fa0 RCX: 00007f3521a91d29 [ 199.965048][ T7237] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 199.972860][ T7237] RBP: 00007f3520103090 R08: 0000000000000000 R09: 0000000000000000 [ 199.980670][ T7237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 199.988491][ T7237] R13: 0000000000000000 R14: 00007f3521c81fa0 R15: 00007ffea64fcb58 [ 199.996302][ T7237] [ 200.539492][ T7258] device pim6reg1 entered promiscuous mode [ 201.879594][ T7295] device pim6reg1 entered promiscuous mode [ 201.909322][ T30] audit: type=1400 audit(1736786394.431:160): avc: denied { create } for pid=7292 comm="syz.3.2559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 201.983047][ T7301] device pim6reg1 entered promiscuous mode [ 201.991693][ T30] audit: type=1400 audit(1736786394.431:161): avc: denied { create } for pid=7292 comm="syz.3.2559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 202.412620][ T7326] : port 1(ip6gretap0) entered blocking state [ 202.449883][ T7326] : port 1(ip6gretap0) entered disabled state [ 202.456403][ T7326] device ip6gretap0 entered promiscuous mode [ 202.691155][ T7339] device syzkaller0 entered promiscuous mode [ 202.845600][ T7338] device syzkaller0 entered promiscuous mode [ 205.115702][ T7354] device sit0 left promiscuous mode [ 205.919891][ T7390] device syzkaller0 entered promiscuous mode [ 207.101959][ T7427] device sit0 left promiscuous mode [ 207.636901][ T7449] device veth0_vlan left promiscuous mode [ 207.649763][ T7449] device veth0_vlan entered promiscuous mode [ 207.815806][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 207.834654][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 207.903263][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 208.440260][ T7470] FAULT_INJECTION: forcing a failure. [ 208.440260][ T7470] name failslab, interval 1, probability 0, space 0, times 0 [ 208.452774][ T7470] CPU: 1 PID: 7470 Comm: syz.3.2619 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 208.463881][ T7470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 208.473774][ T7470] Call Trace: [ 208.476898][ T7470] [ 208.479676][ T7470] dump_stack_lvl+0x151/0x1c0 [ 208.484190][ T7470] ? io_uring_drop_tctx_refs+0x190/0x190 [ 208.489657][ T7470] ? __alloc_pages+0x27e/0x8f0 [ 208.494258][ T7470] dump_stack+0x15/0x20 [ 208.498260][ T7470] should_fail+0x3c6/0x510 [ 208.502513][ T7470] __should_failslab+0xa4/0xe0 [ 208.507104][ T7470] ? xas_create+0x5ce/0x15d0 [ 208.511530][ T7470] should_failslab+0x9/0x20 [ 208.515871][ T7470] slab_pre_alloc_hook+0x37/0xd0 [ 208.520640][ T7470] ? xas_create+0x5ce/0x15d0 [ 208.525066][ T7470] kmem_cache_alloc+0x44/0x250 [ 208.529667][ T7470] xas_create+0x5ce/0x15d0 [ 208.533926][ T7470] xas_create_range+0x1fc/0x720 [ 208.538609][ T7470] ? xas_start+0x2bd/0x3f0 [ 208.542863][ T7470] shmem_add_to_page_cache+0x7fc/0xe90 [ 208.548161][ T7470] ? put_page+0xc0/0xc0 [ 208.552151][ T7470] shmem_getpage_gfp+0x1559/0x23c0 [ 208.557102][ T7470] ? shmem_getpage+0xa0/0xa0 [ 208.561524][ T7470] ? fault_in_safe_writeable+0x240/0x240 [ 208.566991][ T7470] shmem_write_begin+0xca/0x1b0 [ 208.571676][ T7470] generic_perform_write+0x2de/0x750 [ 208.576794][ T7470] ? __mark_inode_dirty+0x54e/0xa50 [ 208.581833][ T7470] ? grab_cache_page_write_begin+0xa0/0xa0 [ 208.587559][ T7470] ? file_remove_privs+0x610/0x610 [ 208.592508][ T7470] ? rwsem_write_trylock+0x153/0x340 [ 208.597637][ T7470] ? rwsem_mark_wake+0x770/0x770 [ 208.602412][ T7470] __generic_file_write_iter+0x25b/0x4b0 [ 208.607956][ T7470] generic_file_write_iter+0xaf/0x1c0 [ 208.613163][ T7470] vfs_write+0xd5d/0x1110 [ 208.617327][ T7470] ? __traceiter_kmem_cache_free+0x32/0x50 [ 208.622974][ T7470] ? file_end_write+0x1c0/0x1c0 [ 208.627657][ T7470] ? mutex_lock+0xb6/0x1e0 [ 208.631910][ T7470] ? wait_for_completion_killable_timeout+0x10/0x10 [ 208.638336][ T7470] ? __fdget_pos+0x2e7/0x3a0 [ 208.642760][ T7470] ? ksys_write+0x77/0x2c0 [ 208.647013][ T7470] ksys_write+0x199/0x2c0 [ 208.651178][ T7470] ? __ia32_sys_read+0x90/0x90 [ 208.655780][ T7470] ? debug_smp_processor_id+0x17/0x20 [ 208.660987][ T7470] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 208.666889][ T7470] __x64_sys_write+0x7b/0x90 [ 208.671315][ T7470] x64_sys_call+0x2f/0x9a0 [ 208.675565][ T7470] do_syscall_64+0x3b/0xb0 [ 208.679826][ T7470] ? clear_bhb_loop+0x35/0x90 [ 208.684332][ T7470] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 208.690060][ T7470] RIP: 0033:0x7f55bac53d29 [ 208.694314][ T7470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 208.713754][ T7470] RSP: 002b:00007f55b92c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 208.722002][ T7470] RAX: ffffffffffffffda RBX: 00007f55bae43fa0 RCX: 00007f55bac53d29 [ 208.729815][ T7470] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000007 [ 208.737621][ T7470] RBP: 00007f55b92c5090 R08: 0000000000000000 R09: 0000000000000000 [ 208.745432][ T7470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 208.753247][ T7470] R13: 0000000000000000 R14: 00007f55bae43fa0 R15: 00007fff48594ab8 [ 208.761062][ T7470] [ 210.786846][ T7537] device sit0 left promiscuous mode [ 211.426279][ T7553] device pim6reg1 entered promiscuous mode [ 212.829674][ T7656] syz.0.2690[7656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.829788][ T7656] syz.0.2690[7656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.093744][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.113257][ T7688] FAULT_INJECTION: forcing a failure. [ 213.113257][ T7688] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 213.126170][ T7688] CPU: 1 PID: 7688 Comm: syz.0.2701 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 213.137222][ T7688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 213.147143][ T7688] Call Trace: [ 213.150237][ T7688] [ 213.153017][ T7688] dump_stack_lvl+0x151/0x1c0 [ 213.157527][ T7688] ? io_uring_drop_tctx_refs+0x190/0x190 [ 213.162999][ T7688] ? __kasan_check_read+0x11/0x20 [ 213.167904][ T7688] dump_stack+0x15/0x20 [ 213.171848][ T7688] should_fail+0x3c6/0x510 [ 213.176105][ T7688] should_fail_usercopy+0x1a/0x20 [ 213.180961][ T7688] copy_page_from_iter_atomic+0x423/0x10e0 [ 213.186703][ T7688] ? pipe_zero+0x4e0/0x4e0 [ 213.190949][ T7688] generic_perform_write+0x360/0x750 [ 213.196068][ T7688] ? grab_cache_page_write_begin+0xa0/0xa0 [ 213.201705][ T7688] ? file_remove_privs+0x610/0x610 [ 213.206652][ T7688] ? rwsem_write_trylock+0x153/0x340 [ 213.211776][ T7688] ? rwsem_mark_wake+0x770/0x770 [ 213.216549][ T7688] __generic_file_write_iter+0x25b/0x4b0 [ 213.222024][ T7688] generic_file_write_iter+0xaf/0x1c0 [ 213.227225][ T7688] vfs_write+0xd5d/0x1110 [ 213.231389][ T7688] ? __traceiter_kmem_cache_free+0x32/0x50 [ 213.237050][ T7688] ? file_end_write+0x1c0/0x1c0 [ 213.241721][ T7688] ? mutex_lock+0xb6/0x1e0 [ 213.245974][ T7688] ? wait_for_completion_killable_timeout+0x10/0x10 [ 213.252408][ T7688] ? __fdget_pos+0x2e7/0x3a0 [ 213.256819][ T7688] ? ksys_write+0x77/0x2c0 [ 213.261073][ T7688] ksys_write+0x199/0x2c0 [ 213.265240][ T7688] ? __ia32_sys_read+0x90/0x90 [ 213.269835][ T7688] ? debug_smp_processor_id+0x17/0x20 [ 213.275129][ T7688] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 213.281032][ T7688] __x64_sys_write+0x7b/0x90 [ 213.285463][ T7688] x64_sys_call+0x2f/0x9a0 [ 213.289707][ T7688] do_syscall_64+0x3b/0xb0 [ 213.293962][ T7688] ? clear_bhb_loop+0x35/0x90 [ 213.298474][ T7688] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 213.304205][ T7688] RIP: 0033:0x7f270d238d29 [ 213.308464][ T7688] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 213.327985][ T7688] RSP: 002b:00007f270b8aa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 213.336229][ T7688] RAX: ffffffffffffffda RBX: 00007f270d428fa0 RCX: 00007f270d238d29 [ 213.344158][ T7688] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000007 [ 213.351966][ T7688] RBP: 00007f270b8aa090 R08: 0000000000000000 R09: 0000000000000000 [ 213.359772][ T7688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 213.367586][ T7688] R13: 0000000000000000 R14: 00007f270d428fa0 R15: 00007ffeb7bf6458 [ 213.375406][ T7688] [ 213.382575][ T7691] bond_slave_1: mtu greater than device maximum [ 213.758486][ T30] audit: type=1400 audit(1736786406.281:162): avc: denied { create } for pid=7736 comm="syz.1.2723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 217.823834][ T30] audit: type=1400 audit(1736786410.341:163): avc: denied { create } for pid=7797 comm="syz.4.2745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 217.863694][ T7798] device veth1_macvtap entered promiscuous mode [ 217.947683][ T7798] device macsec0 entered promiscuous mode [ 218.069032][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 218.084699][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 218.503043][ T7820] device pim6reg1 entered promiscuous mode [ 218.890250][ T7869] device sit0 entered promiscuous mode [ 219.221759][ T7894] bond_slave_1: mtu less than device minimum [ 219.239186][ T7905] syz.0.2787[7905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.239295][ T7905] syz.0.2787[7905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.333519][ T7924] FAULT_INJECTION: forcing a failure. [ 219.333519][ T7924] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 219.359614][ T7924] CPU: 1 PID: 7924 Comm: syz.4.2793 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 219.370735][ T7924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 219.380630][ T7924] Call Trace: [ 219.383749][ T7924] [ 219.386529][ T7924] dump_stack_lvl+0x151/0x1c0 [ 219.391052][ T7924] ? io_uring_drop_tctx_refs+0x190/0x190 [ 219.396514][ T7924] ? __stack_depot_save+0x34/0x470 [ 219.401462][ T7924] dump_stack+0x15/0x20 [ 219.405452][ T7924] should_fail+0x3c6/0x510 [ 219.409704][ T7924] should_fail_alloc_page+0x5a/0x80 [ 219.414736][ T7924] prepare_alloc_pages+0x15c/0x700 [ 219.419688][ T7924] ? __alloc_pages_bulk+0xd80/0xd80 [ 219.424717][ T7924] __alloc_pages+0x18c/0x8f0 [ 219.429144][ T7924] ? prep_new_page+0x110/0x110 [ 219.433755][ T7924] shmem_alloc_and_acct_page+0x4bd/0xa80 [ 219.439213][ T7924] ? shmem_swapin_page+0x1680/0x1680 [ 219.444335][ T7924] ? xas_start+0x32c/0x3f0 [ 219.448583][ T7924] ? xas_load+0x2b7/0x2d0 [ 219.452753][ T7924] ? pagecache_get_page+0xdc2/0xeb0 [ 219.457802][ T7924] ? page_cache_prev_miss+0x410/0x410 [ 219.462999][ T7924] shmem_getpage_gfp+0x1388/0x23c0 [ 219.467949][ T7924] ? shmem_getpage+0xa0/0xa0 [ 219.472376][ T7924] ? fault_in_safe_writeable+0x240/0x240 [ 219.477845][ T7924] shmem_write_begin+0xca/0x1b0 [ 219.482539][ T7924] generic_perform_write+0x2de/0x750 [ 219.487652][ T7924] ? grab_cache_page_write_begin+0xa0/0xa0 [ 219.493284][ T7924] ? file_remove_privs+0x610/0x610 [ 219.498231][ T7924] ? rwsem_write_trylock+0x153/0x340 [ 219.503350][ T7924] ? rwsem_mark_wake+0x770/0x770 [ 219.508134][ T7924] __generic_file_write_iter+0x25b/0x4b0 [ 219.513606][ T7924] generic_file_write_iter+0xaf/0x1c0 [ 219.518813][ T7924] vfs_write+0xd5d/0x1110 [ 219.522971][ T7924] ? file_end_write+0x1c0/0x1c0 [ 219.527660][ T7924] ? mutex_lock+0xb6/0x1e0 [ 219.531905][ T7924] ? wait_for_completion_killable_timeout+0x10/0x10 [ 219.538328][ T7924] ? __fdget_pos+0x2e7/0x3a0 [ 219.542777][ T7924] ? ksys_write+0x77/0x2c0 [ 219.547010][ T7924] ksys_write+0x199/0x2c0 [ 219.551178][ T7924] ? __ia32_sys_read+0x90/0x90 [ 219.555777][ T7924] ? debug_smp_processor_id+0x17/0x20 [ 219.560989][ T7924] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 219.566883][ T7924] __x64_sys_write+0x7b/0x90 [ 219.571310][ T7924] x64_sys_call+0x2f/0x9a0 [ 219.575560][ T7924] do_syscall_64+0x3b/0xb0 [ 219.579814][ T7924] ? clear_bhb_loop+0x35/0x90 [ 219.584329][ T7924] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 219.590055][ T7924] RIP: 0033:0x7f9c6dcb4d29 [ 219.594312][ T7924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 219.613755][ T7924] RSP: 002b:00007f9c6c326038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 219.621997][ T7924] RAX: ffffffffffffffda RBX: 00007f9c6dea4fa0 RCX: 00007f9c6dcb4d29 [ 219.629809][ T7924] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000007 [ 219.637745][ T7924] RBP: 00007f9c6c326090 R08: 0000000000000000 R09: 0000000000000000 [ 219.645557][ T7924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 219.653367][ T7924] R13: 0000000000000000 R14: 00007f9c6dea4fa0 R15: 00007fff855eabc8 [ 219.661187][ T7924] [ 219.665390][ T7926] device sit0 left promiscuous mode [ 219.730014][ T7932] device sit0 entered promiscuous mode [ 219.918805][ T7947] 8ûÅ: renamed from syzkaller0 [ 219.983537][ T7960] tun0: tun_chr_ioctl cmd 1074812117 [ 220.039491][ T7968] syz.1.2810[7968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.039569][ T7968] syz.1.2810[7968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.404386][ T290] syz-executor (290) used greatest stack depth: 20624 bytes left [ 220.620699][ T7993] device syzkaller0 entered promiscuous mode [ 220.873109][ T7987] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.880057][ T7987] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.887197][ T7987] device bridge_slave_0 entered promiscuous mode [ 220.894136][ T7987] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.901271][ T7987] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.908949][ T7987] device bridge_slave_1 entered promiscuous mode [ 220.965061][ T8008] device syzkaller0 entered promiscuous mode [ 221.718908][ T8037] device syzkaller0 entered promiscuous mode [ 221.738473][ T45] device ip6gretap0 left promiscuous mode [ 221.744079][ T45] : port 1(ip6gretap0) entered disabled state [ 221.979057][ T30] audit: type=1400 audit(1736786414.501:164): avc: denied { create } for pid=7987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 222.047845][ T30] audit: type=1400 audit(1736786414.501:165): avc: denied { write } for pid=7987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 222.107264][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.114594][ T30] audit: type=1400 audit(1736786414.501:166): avc: denied { read } for pid=7987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 222.139945][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.159328][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.175414][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.202045][ T949] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.208941][ T949] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.278142][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.317069][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.334292][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.343156][ T949] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.350038][ T949] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.416562][ T8074] device syzkaller0 entered promiscuous mode [ 222.551441][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.559440][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.570363][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.579593][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.645040][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 222.655362][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 222.706376][ T7987] device veth0_vlan entered promiscuous mode [ 222.770360][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 222.790561][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.859087][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.866693][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.901627][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 222.909989][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 222.920824][ T7987] device veth1_macvtap entered promiscuous mode [ 223.041644][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 223.049291][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 223.057831][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 223.066337][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 223.074785][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 223.135383][ T8104] device pim6reg1 entered promiscuous mode [ 223.172880][ T45] device veth0_to_batadv left promiscuous mode [ 223.179936][ T30] audit: type=1400 audit(1736786415.701:167): avc: denied { mounton } for pid=7987 comm="syz-executor" path="/root/syzkaller.2i33cn/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 223.182086][ T45] bridge0: port 3(veth0_to_batadv) entered disabled state [ 223.226060][ T30] audit: type=1400 audit(1736786415.711:168): avc: denied { mount } for pid=7987 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 223.227261][ T45] device bridge_slave_1 left promiscuous mode [ 223.255025][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.262641][ T45] device bridge_slave_0 left promiscuous mode [ 223.268741][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.277549][ T45] device veth0_vlan left promiscuous mode [ 223.283231][ T30] audit: type=1400 audit(1736786415.741:169): avc: denied { mounton } for pid=7987 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 223.434644][ T8121] device syzkaller0 entered promiscuous mode [ 224.389887][ T8188] syz.1.2892[8188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.390013][ T8188] syz.1.2892[8188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.454452][ T8192] device syzkaller0 entered promiscuous mode [ 224.777365][ T8208] device syzkaller0 entered promiscuous mode [ 225.105207][ T8237] FAULT_INJECTION: forcing a failure. [ 225.105207][ T8237] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 225.118100][ T8237] CPU: 1 PID: 8237 Comm: syz.4.2910 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 225.129180][ T8237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 225.139073][ T8237] Call Trace: [ 225.142196][ T8237] [ 225.144977][ T8237] dump_stack_lvl+0x151/0x1c0 [ 225.149487][ T8237] ? io_uring_drop_tctx_refs+0x190/0x190 [ 225.154956][ T8237] ? __kasan_check_read+0x11/0x20 [ 225.159817][ T8237] dump_stack+0x15/0x20 [ 225.163808][ T8237] should_fail+0x3c6/0x510 [ 225.168069][ T8237] should_fail_usercopy+0x1a/0x20 [ 225.172917][ T8237] copy_page_from_iter_atomic+0x423/0x10e0 [ 225.178565][ T8237] ? pipe_zero+0x4e0/0x4e0 [ 225.182817][ T8237] generic_perform_write+0x360/0x750 [ 225.187939][ T8237] ? grab_cache_page_write_begin+0xa0/0xa0 [ 225.193575][ T8237] ? file_remove_privs+0x610/0x610 [ 225.198520][ T8237] ? rwsem_write_trylock+0x153/0x340 [ 225.203646][ T8237] ? rwsem_mark_wake+0x770/0x770 [ 225.208413][ T8237] __generic_file_write_iter+0x25b/0x4b0 [ 225.213886][ T8237] generic_file_write_iter+0xaf/0x1c0 [ 225.219102][ T8237] vfs_write+0xd5d/0x1110 [ 225.223263][ T8237] ? file_end_write+0x1c0/0x1c0 [ 225.227956][ T8237] ? mutex_lock+0xb6/0x1e0 [ 225.232198][ T8237] ? wait_for_completion_killable_timeout+0x10/0x10 [ 225.238623][ T8237] ? __fdget_pos+0x2e7/0x3a0 [ 225.243045][ T8237] ? ksys_write+0x77/0x2c0 [ 225.247302][ T8237] ksys_write+0x199/0x2c0 [ 225.251469][ T8237] ? __ia32_sys_read+0x90/0x90 [ 225.256072][ T8237] __x64_sys_write+0x7b/0x90 [ 225.260494][ T8237] x64_sys_call+0x2f/0x9a0 [ 225.264744][ T8237] do_syscall_64+0x3b/0xb0 [ 225.268998][ T8237] ? clear_bhb_loop+0x35/0x90 [ 225.273512][ T8237] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 225.279237][ T8237] RIP: 0033:0x7f9c6dcb4d29 [ 225.283499][ T8237] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 225.303023][ T8237] RSP: 002b:00007f9c6c326038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 225.311268][ T8237] RAX: ffffffffffffffda RBX: 00007f9c6dea4fa0 RCX: 00007f9c6dcb4d29 [ 225.319083][ T8237] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000007 [ 225.326888][ T8237] RBP: 00007f9c6c326090 R08: 0000000000000000 R09: 0000000000000000 [ 225.334826][ T8237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 225.342631][ T8237] R13: 0000000000000000 R14: 00007f9c6dea4fa0 R15: 00007fff855eabc8 [ 225.350449][ T8237] [ 225.693320][ T8253] device syzkaller0 entered promiscuous mode [ 230.149440][ T8370] device veth0_vlan left promiscuous mode [ 230.234905][ T8370] device veth0_vlan entered promiscuous mode [ 231.361686][ T8392] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.368622][ T8392] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.376002][ T8392] device bridge_slave_0 entered promiscuous mode [ 231.385543][ T8392] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.397232][ T8392] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.404678][ T8392] device bridge_slave_1 entered promiscuous mode [ 231.814378][ T8432] device syzkaller0 entered promiscuous mode [ 232.181931][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.193330][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.249663][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.285798][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.346028][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.352939][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.439894][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.491996][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.500108][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.506956][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.514426][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.558197][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 232.629489][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.709943][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 232.752740][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.777696][ T8392] device veth0_vlan entered promiscuous mode [ 232.790235][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 232.807904][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 232.837395][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 232.845567][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 232.856787][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.876342][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.896070][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 232.907004][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 232.923276][ T8392] device veth1_macvtap entered promiscuous mode [ 232.960592][ T8464] device pim6reg1 entered promiscuous mode [ 232.974291][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 232.982888][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 232.992575][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 233.010852][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 233.019091][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 233.065245][ T8470] device syzkaller0 entered promiscuous mode [ 233.088765][ T8472] device syzkaller0 entered promiscuous mode [ 233.649170][ T8494] device pim6reg1 entered promiscuous mode [ 233.716161][ T949] device veth0_to_team left promiscuous mode [ 233.723551][ T949] Ÿë: port 1(veth0_to_team) entered disabled state [ 233.745819][ T949] device veth0_to_batadv left promiscuous mode [ 233.753707][ T949] bridge0: port 3(veth0_to_batadv) entered disabled state [ 233.763693][ T949] device bridge_slave_1 left promiscuous mode [ 233.769711][ T949] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.777478][ T949] device bridge_slave_0 left promiscuous mode [ 233.783776][ T949] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.816810][ T949] device veth0_vlan left promiscuous mode [ 234.135567][ T8487] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.175263][ T8487] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.184356][ T8487] device bridge_slave_0 entered promiscuous mode [ 234.226352][ T8487] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.234291][ T8487] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.241695][ T8487] device bridge_slave_1 entered promiscuous mode [ 234.283767][ T8522] device syzkaller0 entered promiscuous mode [ 234.811246][ T8551] FAULT_INJECTION: forcing a failure. [ 234.811246][ T8551] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 234.824199][ T8551] CPU: 0 PID: 8551 Comm: syz.0.3030 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 234.835215][ T8551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 234.845110][ T8551] Call Trace: [ 234.848231][ T8551] [ 234.851010][ T8551] dump_stack_lvl+0x151/0x1c0 [ 234.855523][ T8551] ? io_uring_drop_tctx_refs+0x190/0x190 [ 234.861107][ T8551] ? __kasan_check_read+0x11/0x20 [ 234.865967][ T8551] dump_stack+0x15/0x20 [ 234.869956][ T8551] should_fail+0x3c6/0x510 [ 234.874206][ T8551] should_fail_usercopy+0x1a/0x20 [ 234.879079][ T8551] copy_page_from_iter_atomic+0x423/0x10e0 [ 234.884717][ T8551] ? pipe_zero+0x4e0/0x4e0 [ 234.888973][ T8551] generic_perform_write+0x360/0x750 [ 234.894087][ T8551] ? grab_cache_page_write_begin+0xa0/0xa0 [ 234.899732][ T8551] ? file_remove_privs+0x610/0x610 [ 234.904668][ T8551] ? rwsem_write_trylock+0x153/0x340 [ 234.909800][ T8551] ? rwsem_mark_wake+0x770/0x770 [ 234.914566][ T8551] __generic_file_write_iter+0x25b/0x4b0 [ 234.920034][ T8551] generic_file_write_iter+0xaf/0x1c0 [ 234.925243][ T8551] vfs_write+0xd5d/0x1110 [ 234.929410][ T8551] ? file_end_write+0x1c0/0x1c0 [ 234.934096][ T8551] ? mutex_lock+0xb6/0x1e0 [ 234.938349][ T8551] ? wait_for_completion_killable_timeout+0x10/0x10 [ 234.944769][ T8551] ? __fdget_pos+0x2e7/0x3a0 [ 234.949232][ T8551] ? ksys_write+0x77/0x2c0 [ 234.953535][ T8551] ksys_write+0x199/0x2c0 [ 234.957613][ T8551] ? __ia32_sys_read+0x90/0x90 [ 234.962223][ T8551] ? debug_smp_processor_id+0x17/0x20 [ 234.967420][ T8551] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 234.973326][ T8551] __x64_sys_write+0x7b/0x90 [ 234.977748][ T8551] x64_sys_call+0x2f/0x9a0 [ 234.982002][ T8551] do_syscall_64+0x3b/0xb0 [ 234.986254][ T8551] ? clear_bhb_loop+0x35/0x90 [ 234.990768][ T8551] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 234.996499][ T8551] RIP: 0033:0x7f09cb203d29 [ 235.000758][ T8551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 235.020197][ T8551] RSP: 002b:00007f09c9875038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 235.028438][ T8551] RAX: ffffffffffffffda RBX: 00007f09cb3f3fa0 RCX: 00007f09cb203d29 [ 235.036249][ T8551] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000007 [ 235.044062][ T8551] RBP: 00007f09c9875090 R08: 0000000000000000 R09: 0000000000000000 [ 235.051870][ T8551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 235.059681][ T8551] R13: 0000000000000000 R14: 00007f09cb3f3fa0 R15: 00007ffd2822cc18 [ 235.067503][ T8551] [ 235.075234][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.129221][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.157392][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.165182][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.180331][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.194148][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.202901][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.209776][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.217028][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.225741][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.234343][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.241229][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.268887][ T8487] device veth0_vlan entered promiscuous mode [ 235.298026][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.335526][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 235.356316][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.364994][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.372411][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 235.410445][ T8487] device veth1_macvtap entered promiscuous mode [ 235.426550][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 235.454814][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 235.502667][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 235.528354][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 235.536835][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 235.546402][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 235.555160][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 235.794242][ T8594] device syzkaller0 entered promiscuous mode [ 235.934870][ T8602] FAULT_INJECTION: forcing a failure. [ 235.934870][ T8602] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 236.051291][ T8602] CPU: 0 PID: 8602 Comm: syz.0.3049 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 236.062443][ T8602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 236.072332][ T8602] Call Trace: [ 236.075456][ T8602] [ 236.078230][ T8602] dump_stack_lvl+0x151/0x1c0 [ 236.082748][ T8602] ? io_uring_drop_tctx_refs+0x190/0x190 [ 236.088213][ T8602] ? __stack_depot_save+0x34/0x470 [ 236.093164][ T8602] ? kmem_cache_free+0x115/0x330 [ 236.097935][ T8602] dump_stack+0x15/0x20 [ 236.101924][ T8602] should_fail+0x3c6/0x510 [ 236.106189][ T8602] should_fail_usercopy+0x1a/0x20 [ 236.111125][ T8602] _copy_from_user+0x20/0xd0 [ 236.115555][ T8602] __copy_msghdr_from_user+0xaf/0x7c0 [ 236.120763][ T8602] ? __ia32_sys_shutdown+0x70/0x70 [ 236.125716][ T8602] ___sys_sendmsg+0x166/0x2e0 [ 236.130224][ T8602] ? __sys_sendmsg+0x260/0x260 [ 236.134827][ T8602] ? putname+0xfa/0x150 [ 236.138841][ T8602] ? __fdget+0x1bc/0x240 [ 236.142896][ T8602] __se_sys_sendmsg+0x19a/0x260 [ 236.147582][ T8602] ? __x64_sys_sendmsg+0x90/0x90 [ 236.152352][ T8602] ? ksys_write+0x260/0x2c0 [ 236.156698][ T8602] ? debug_smp_processor_id+0x17/0x20 [ 236.161899][ T8602] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 236.167805][ T8602] __x64_sys_sendmsg+0x7b/0x90 [ 236.172402][ T8602] x64_sys_call+0x16a/0x9a0 [ 236.176739][ T8602] do_syscall_64+0x3b/0xb0 [ 236.180995][ T8602] ? clear_bhb_loop+0x35/0x90 [ 236.185508][ T8602] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 236.191233][ T8602] RIP: 0033:0x7f09cb203d29 [ 236.195489][ T8602] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 236.214932][ T8602] RSP: 002b:00007f09c9875038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 236.223178][ T8602] RAX: ffffffffffffffda RBX: 00007f09cb3f3fa0 RCX: 00007f09cb203d29 [ 236.231093][ T8602] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000006 [ 236.238987][ T8602] RBP: 00007f09c9875090 R08: 0000000000000000 R09: 0000000000000000 [ 236.246800][ T8602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 236.254609][ T8602] R13: 0000000000000000 R14: 00007f09cb3f3fa0 R15: 00007ffd2822cc18 [ 236.262426][ T8602] [ 236.282587][ T8603] device syzkaller0 entered promiscuous mode [ 236.474546][ T949] device veth0_to_batadv left promiscuous mode [ 236.482017][ T949] bridge0: port 3(veth0_to_batadv) entered disabled state [ 236.495007][ T949] device bridge_slave_1 left promiscuous mode [ 236.514476][ T949] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.536956][ T949] device bridge_slave_0 left promiscuous mode [ 236.549568][ T949] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.566751][ T949] device veth0_vlan left promiscuous mode [ 236.762508][ T8606] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.770558][ T8606] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.785720][ T8606] device bridge_slave_0 entered promiscuous mode [ 236.815476][ T8606] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.836675][ T8606] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.851016][ T8606] device bridge_slave_1 entered promiscuous mode [ 237.133332][ T8606] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.140261][ T8606] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.147345][ T8606] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.154143][ T8606] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.262472][ T8647] device sit0 entered promiscuous mode [ 237.334739][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.346349][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.365039][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.391487][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.400456][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.408633][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.415649][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.483760][ T8655] bridge0: port 3(veth0_to_batadv) entered blocking state [ 237.497857][ T8655] bridge0: port 3(veth0_to_batadv) entered disabled state [ 237.524859][ T8655] device veth0_to_batadv entered promiscuous mode [ 237.538896][ T8655] bridge0: port 3(veth0_to_batadv) entered blocking state [ 237.546623][ T8655] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 237.572027][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.580800][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.594539][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.601431][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.626075][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 237.634691][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.642704][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.651075][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.685278][ T8665] device syzkaller0 entered promiscuous mode [ 237.697301][ T8606] device veth0_vlan entered promiscuous mode [ 237.720159][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 237.728756][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 237.745854][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 237.773367][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 237.782178][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 237.789501][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.076990][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 238.102220][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 238.124303][ T8606] device veth1_macvtap entered promiscuous mode [ 238.141788][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 238.149706][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 238.167440][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 238.196354][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 238.214860][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 238.410829][ T8710] device sit0 entered promiscuous mode [ 238.470621][ T949] device veth0_to_batadv left promiscuous mode [ 238.478068][ T949] bridge0: port 3(veth0_to_batadv) entered disabled state [ 238.533970][ T949] device bridge_slave_1 left promiscuous mode [ 238.563855][ T949] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.573624][ T949] device bridge_slave_0 left promiscuous mode [ 238.580068][ T949] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.599553][ T949] device veth1_macvtap left promiscuous mode [ 238.609564][ T949] device veth0_vlan left promiscuous mode [ 238.809984][ T8720] device syzkaller0 entered promiscuous mode [ 238.862504][ T8743] bridge0: port 3(veth0_to_batadv) entered blocking state [ 238.870019][ T8743] bridge0: port 3(veth0_to_batadv) entered disabled state [ 238.913649][ T8743] device veth0_to_batadv entered promiscuous mode [ 238.924939][ T8743] bridge0: port 3(veth0_to_batadv) entered blocking state [ 238.932160][ T8743] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 238.956875][ T8747] device sit0 entered promiscuous mode [ 240.180501][ T8770] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.187481][ T8770] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.195000][ T8770] device bridge_slave_0 entered promiscuous mode [ 240.202543][ T8770] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.209397][ T8770] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.216871][ T8770] device bridge_slave_1 entered promiscuous mode [ 240.224091][ T8785] bridge0: port 3(veth0_to_batadv) entered blocking state [ 240.232961][ T8785] bridge0: port 3(veth0_to_batadv) entered disabled state [ 240.257830][ T8785] device veth0_to_batadv entered promiscuous mode [ 240.267834][ T8785] bridge0: port 3(veth0_to_batadv) entered blocking state [ 240.275233][ T8785] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 240.297837][ T8787] device syzkaller0 entered promiscuous mode [ 240.805801][ T949] device veth0_to_batadv left promiscuous mode [ 240.827569][ T949] bridge0: port 3(veth0_to_batadv) entered disabled state [ 240.871356][ T949] device bridge_slave_1 left promiscuous mode [ 240.917899][ T949] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.954913][ T949] device bridge_slave_0 left promiscuous mode [ 240.961094][ T949] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.972489][ T949] device veth0_vlan left promiscuous mode [ 241.029008][ T8819] syz.0.3129[8819] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.029115][ T8819] syz.0.3129[8819] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.173168][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 241.211866][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 241.247321][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.273915][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.295548][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.302446][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.384350][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.393061][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.401165][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.408018][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.513897][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.592260][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 241.690157][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 241.700865][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 241.708931][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 241.740694][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 241.756618][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 241.805943][ T8770] device veth0_vlan entered promiscuous mode [ 241.860555][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 241.910286][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.918713][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.926166][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 241.949143][ T8770] device veth1_macvtap entered promiscuous mode [ 241.966626][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 241.974969][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 241.983173][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 242.060722][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 242.128061][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 242.143664][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 242.184111][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 243.171308][ T8905] device sit0 entered promiscuous mode [ 243.478440][ T8931] device syzkaller0 entered promiscuous mode [ 243.851202][ T8940] device syzkaller0 entered promiscuous mode [ 243.905563][ T8947] device syzkaller0 entered promiscuous mode [ 244.105963][ T30] audit: type=1400 audit(1736786436.631:170): avc: denied { setattr } for pid=8965 comm="syz.0.3189" path="/dev/net/tun" dev="devtmpfs" ino=147 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 244.350344][ T8982] device syzkaller0 entered promiscuous mode [ 244.359288][ T8984] bridge0: port 3(veth0_to_batadv) entered blocking state [ 244.366973][ T8984] bridge0: port 3(veth0_to_batadv) entered disabled state [ 244.383698][ T8984] device veth0_to_batadv entered promiscuous mode [ 244.392476][ T8984] bridge0: port 3(veth0_to_batadv) entered blocking state [ 244.399814][ T8984] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 244.717248][ T9011] device sit0 entered promiscuous mode [ 244.832204][ T9027] device syzkaller0 entered promiscuous mode [ 245.341832][ T9068] FAULT_INJECTION: forcing a failure. [ 245.341832][ T9068] name failslab, interval 1, probability 0, space 0, times 0 [ 245.354435][ T9068] CPU: 0 PID: 9068 Comm: syz.3.3233 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 245.365543][ T9068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 245.375436][ T9068] Call Trace: [ 245.378559][ T9068] [ 245.381338][ T9068] dump_stack_lvl+0x151/0x1c0 [ 245.385938][ T9068] ? io_uring_drop_tctx_refs+0x190/0x190 [ 245.391403][ T9068] ? slab_post_alloc_hook+0x53/0x2c0 [ 245.396526][ T9068] ? security_inode_alloc+0x29/0x120 [ 245.401643][ T9068] ? inode_init_always+0x76d/0x9d0 [ 245.406601][ T9068] ? new_inode_pseudo+0x93/0x220 [ 245.411398][ T9068] ? proc_pid_make_inode+0x27/0x1d0 [ 245.416404][ T9068] ? proc_pident_instantiate+0x7a/0x2e0 [ 245.421781][ T9068] ? proc_pident_lookup+0x1c4/0x260 [ 245.426818][ T9068] ? proc_tid_base_lookup+0x2b/0x30 [ 245.431857][ T9068] dump_stack+0x15/0x20 [ 245.436080][ T9068] should_fail+0x3c6/0x510 [ 245.440324][ T9068] __should_failslab+0xa4/0xe0 [ 245.444927][ T9068] ? __alloc_skb+0xbe/0x550 [ 245.449257][ T9068] should_failslab+0x9/0x20 [ 245.453601][ T9068] slab_pre_alloc_hook+0x37/0xd0 [ 245.458382][ T9068] ? __alloc_skb+0xbe/0x550 [ 245.462713][ T9068] kmem_cache_alloc+0x44/0x250 [ 245.467319][ T9068] __alloc_skb+0xbe/0x550 [ 245.471478][ T9068] alloc_skb_with_frags+0xa6/0x680 [ 245.476424][ T9068] ? memcpy+0x56/0x70 [ 245.480249][ T9068] sock_alloc_send_pskb+0x915/0xa50 [ 245.485283][ T9068] ? sock_kzfree_s+0x60/0x60 [ 245.489712][ T9068] ? __kasan_check_write+0x14/0x20 [ 245.494661][ T9068] ? _raw_spin_lock+0xa4/0x1b0 [ 245.499251][ T9068] ? _raw_spin_trylock_bh+0x190/0x190 [ 245.504462][ T9068] unix_dgram_sendmsg+0x6fd/0x2090 [ 245.509422][ T9068] ? unix_dgram_poll+0x690/0x690 [ 245.514186][ T9068] ? kasan_set_track+0x5d/0x70 [ 245.518779][ T9068] ? kasan_set_track+0x4b/0x70 [ 245.523394][ T9068] ? security_socket_sendmsg+0x82/0xb0 [ 245.528676][ T9068] ? unix_dgram_poll+0x690/0x690 [ 245.533449][ T9068] ____sys_sendmsg+0x59e/0x8f0 [ 245.538051][ T9068] ? __sys_sendmsg_sock+0x40/0x40 [ 245.542911][ T9068] ? import_iovec+0xe5/0x120 [ 245.547339][ T9068] ___sys_sendmsg+0x252/0x2e0 [ 245.551854][ T9068] ? __sys_sendmsg+0x260/0x260 [ 245.556464][ T9068] ? putname+0xfa/0x150 [ 245.560447][ T9068] ? __fdget+0x1bc/0x240 [ 245.564522][ T9068] __se_sys_sendmsg+0x19a/0x260 [ 245.569208][ T9068] ? __x64_sys_sendmsg+0x90/0x90 [ 245.573981][ T9068] ? ksys_write+0x260/0x2c0 [ 245.578346][ T9068] ? debug_smp_processor_id+0x17/0x20 [ 245.583531][ T9068] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 245.589557][ T9068] __x64_sys_sendmsg+0x7b/0x90 [ 245.594145][ T9068] x64_sys_call+0x16a/0x9a0 [ 245.598479][ T9068] do_syscall_64+0x3b/0xb0 [ 245.602732][ T9068] ? clear_bhb_loop+0x35/0x90 [ 245.607251][ T9068] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 245.613061][ T9068] RIP: 0033:0x7fcfb62e9d29 [ 245.617318][ T9068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 245.636757][ T9068] RSP: 002b:00007fcfb495b038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 245.645000][ T9068] RAX: ffffffffffffffda RBX: 00007fcfb64d9fa0 RCX: 00007fcfb62e9d29 [ 245.652813][ T9068] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000006 [ 245.660629][ T9068] RBP: 00007fcfb495b090 R08: 0000000000000000 R09: 0000000000000000 [ 245.668435][ T9068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 245.676680][ T9068] R13: 0000000000000000 R14: 00007fcfb64d9fa0 R15: 00007ffc6d9b45d8 [ 245.684500][ T9068] [ 245.864963][ T9086] device syzkaller0 entered promiscuous mode [ 246.572906][ T9130] device pim6reg1 entered promiscuous mode [ 246.606363][ T9138] device syzkaller0 entered promiscuous mode [ 246.935047][ T9146] device syzkaller0 entered promiscuous mode [ 247.203977][ T9169] syz.2.3272[9169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.204061][ T9169] syz.2.3272[9169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.053536][ T9188] device veth0_vlan left promiscuous mode [ 248.113397][ T9188] device veth0_vlan entered promiscuous mode [ 248.172498][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 248.180827][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 248.188277][ T949] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 248.769941][ T9219] device syzkaller0 entered promiscuous mode [ 249.340944][ T9241] bridge0: port 3(veth0_to_batadv) entered blocking state [ 249.362367][ T9241] bridge0: port 3(veth0_to_batadv) entered disabled state [ 249.389255][ T9241] device veth0_to_batadv entered promiscuous mode [ 249.398779][ T9241] bridge0: port 3(veth0_to_batadv) entered blocking state [ 249.406016][ T9241] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 249.499074][ T9255] device syzkaller0 entered promiscuous mode [ 250.031897][ T9285] device syzkaller0 entered promiscuous mode [ 253.845413][ T30] audit: type=1400 audit(1736786446.371:171): avc: denied { create } for pid=9400 comm="syz.2.3360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 255.149381][ T9442] FAULT_INJECTION: forcing a failure. [ 255.149381][ T9442] name failslab, interval 1, probability 0, space 0, times 0 [ 255.204825][ T9442] CPU: 1 PID: 9442 Comm: syz.0.3375 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 255.215955][ T9442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 255.225853][ T9442] Call Trace: [ 255.228979][ T9442] [ 255.231763][ T9442] dump_stack_lvl+0x151/0x1c0 [ 255.236269][ T9442] ? io_uring_drop_tctx_refs+0x190/0x190 [ 255.241731][ T9442] ? __stack_depot_save+0x34/0x470 [ 255.246676][ T9442] dump_stack+0x15/0x20 [ 255.250674][ T9442] should_fail+0x3c6/0x510 [ 255.254922][ T9442] __should_failslab+0xa4/0xe0 [ 255.259521][ T9442] should_failslab+0x9/0x20 [ 255.263861][ T9442] slab_pre_alloc_hook+0x37/0xd0 [ 255.268638][ T9442] __kmalloc+0x6d/0x2c0 [ 255.272628][ T9442] ? bpf_ctx_init+0xbb/0x1c0 [ 255.277062][ T9442] ? kstrtouint_from_user+0x20a/0x2a0 [ 255.282276][ T9442] bpf_ctx_init+0xbb/0x1c0 [ 255.286517][ T9442] bpf_prog_test_run_sk_lookup+0x350/0x12a0 [ 255.292248][ T9442] ? __kasan_check_write+0x14/0x20 [ 255.297199][ T9442] ? proc_fail_nth_write+0x20b/0x290 [ 255.302320][ T9442] ? selinux_file_permission+0x2c4/0x570 [ 255.307785][ T9442] ? bpf_test_timer_leave+0xc0/0xc0 [ 255.312810][ T9442] ? fsnotify_perm+0x6a/0x5b0 [ 255.317330][ T9442] ? __kasan_check_write+0x14/0x20 [ 255.322272][ T9442] ? fput_many+0x160/0x1b0 [ 255.326523][ T9442] ? bpf_test_timer_leave+0xc0/0xc0 [ 255.331558][ T9442] bpf_prog_test_run+0x3b0/0x630 [ 255.336336][ T9442] ? bpf_prog_query+0x220/0x220 [ 255.341020][ T9442] ? selinux_bpf+0xd2/0x100 [ 255.345369][ T9442] ? security_bpf+0x82/0xb0 [ 255.349701][ T9442] __sys_bpf+0x525/0x760 [ 255.353791][ T9442] ? fput_many+0x160/0x1b0 [ 255.358043][ T9442] ? bpf_link_show_fdinfo+0x300/0x300 [ 255.363242][ T9442] ? debug_smp_processor_id+0x17/0x20 [ 255.368446][ T9442] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 255.374349][ T9442] __x64_sys_bpf+0x7c/0x90 [ 255.378601][ T9442] x64_sys_call+0x87f/0x9a0 [ 255.382944][ T9442] do_syscall_64+0x3b/0xb0 [ 255.387194][ T9442] ? clear_bhb_loop+0x35/0x90 [ 255.391705][ T9442] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 255.397434][ T9442] RIP: 0033:0x7f09cb203d29 [ 255.401699][ T9442] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 255.421154][ T9442] RSP: 002b:00007f09c9875038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 255.429374][ T9442] RAX: ffffffffffffffda RBX: 00007f09cb3f3fa0 RCX: 00007f09cb203d29 [ 255.437185][ T9442] RDX: 0000000000000048 RSI: 0000000020000440 RDI: 000000000000000a [ 255.444994][ T9442] RBP: 00007f09c9875090 R08: 0000000000000000 R09: 0000000000000000 [ 255.452809][ T9442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 255.460621][ T9442] R13: 0000000000000000 R14: 00007f09cb3f3fa0 R15: 00007ffd2822cc18 [ 255.468439][ T9442] [ 255.474482][ T30] audit: type=1400 audit(1736786448.001:172): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 255.491529][ T9444] device syzkaller0 entered promiscuous mode [ 255.501571][ T30] audit: type=1400 audit(1736786448.001:173): avc: denied { unlink } for pid=83 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 255.525337][ T30] audit: type=1400 audit(1736786448.001:174): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 255.799054][ T9456] device sit0 left promiscuous mode [ 256.358462][ T9521] bridge0: port 3(veth0_to_batadv) entered disabled state [ 256.365580][ T9521] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.372682][ T9521] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.407274][ T9521] syz.2.3408[9521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.407355][ T9521] syz.2.3408[9521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.622943][ T9542] FAULT_INJECTION: forcing a failure. [ 256.622943][ T9542] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 256.639238][ T9525] device syzkaller0 entered promiscuous mode [ 256.647154][ T9542] CPU: 0 PID: 9542 Comm: syz.1.3415 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 256.647186][ T9542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 256.647199][ T9542] Call Trace: [ 256.647205][ T9542] [ 256.647213][ T9542] dump_stack_lvl+0x151/0x1c0 [ 256.647240][ T9542] ? io_uring_drop_tctx_refs+0x190/0x190 [ 256.647264][ T9542] ? __kasan_check_read+0x11/0x20 [ 256.647289][ T9542] dump_stack+0x15/0x20 [ 256.647307][ T9542] should_fail+0x3c6/0x510 [ 256.647331][ T9542] should_fail_usercopy+0x1a/0x20 [ 256.647353][ T9542] copy_page_from_iter_atomic+0x423/0x10e0 [ 256.647383][ T9542] ? pipe_zero+0x4e0/0x4e0 [ 256.647409][ T9542] generic_perform_write+0x360/0x750 [ 256.647438][ T9542] ? grab_cache_page_write_begin+0xa0/0xa0 [ 256.647462][ T9542] ? file_remove_privs+0x610/0x610 [ 256.647486][ T9542] ? rwsem_write_trylock+0x153/0x340 [ 256.647511][ T9542] ? rwsem_mark_wake+0x770/0x770 [ 256.647534][ T9542] __generic_file_write_iter+0x25b/0x4b0 [ 256.647560][ T9542] generic_file_write_iter+0xaf/0x1c0 [ 256.647584][ T9542] vfs_write+0xd5d/0x1110 [ 256.647607][ T9542] ? file_end_write+0x1c0/0x1c0 [ 256.647628][ T9542] ? mutex_lock+0xb6/0x1e0 [ 256.647651][ T9542] ? wait_for_completion_killable_timeout+0x10/0x10 [ 256.647679][ T9542] ? __fdget_pos+0x2e7/0x3a0 [ 256.647699][ T9542] ? ksys_write+0x77/0x2c0 [ 256.647718][ T9542] ksys_write+0x199/0x2c0 [ 256.787600][ T9542] ? __ia32_sys_read+0x90/0x90 [ 256.792194][ T9542] ? perf_trace_sys_enter+0x129/0x140 [ 256.797400][ T9542] __x64_sys_write+0x7b/0x90 [ 256.801824][ T9542] x64_sys_call+0x2f/0x9a0 [ 256.806077][ T9542] do_syscall_64+0x3b/0xb0 [ 256.810330][ T9542] ? clear_bhb_loop+0x35/0x90 [ 256.814844][ T9542] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 256.820572][ T9542] RIP: 0033:0x7f5a69225d29 [ 256.824836][ T9542] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 256.844376][ T9542] RSP: 002b:00007f5a67897038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 256.852623][ T9542] RAX: ffffffffffffffda RBX: 00007f5a69415fa0 RCX: 00007f5a69225d29 [ 256.860433][ T9542] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000007 [ 256.868247][ T9542] RBP: 00007f5a67897090 R08: 0000000000000000 R09: 0000000000000000 [ 256.876057][ T9542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 256.883867][ T9542] R13: 0000000000000000 R14: 00007f5a69415fa0 R15: 00007ffe9ce6b9c8 [ 256.891685][ T9542] [ 257.103213][ T9563] device syzkaller0 entered promiscuous mode [ 257.695559][ T9596] device pim6reg1 entered promiscuous mode [ 258.152014][ T9630] device syzkaller0 entered promiscuous mode [ 258.972176][ T9663] FAULT_INJECTION: forcing a failure. [ 258.972176][ T9663] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 259.069491][ T9663] CPU: 1 PID: 9663 Comm: syz.2.3462 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 259.080620][ T9663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 259.090518][ T9663] Call Trace: [ 259.093637][ T9663] [ 259.096413][ T9663] dump_stack_lvl+0x151/0x1c0 [ 259.100933][ T9663] ? io_uring_drop_tctx_refs+0x190/0x190 [ 259.106400][ T9663] dump_stack+0x15/0x20 [ 259.110386][ T9663] should_fail+0x3c6/0x510 [ 259.114641][ T9663] should_fail_usercopy+0x1a/0x20 [ 259.119500][ T9663] _copy_from_user+0x20/0xd0 [ 259.123929][ T9663] bpf_ctx_init+0x143/0x1c0 [ 259.128353][ T9663] bpf_prog_test_run_sk_lookup+0x350/0x12a0 [ 259.134086][ T9663] ? __kasan_check_write+0x14/0x20 [ 259.139026][ T9663] ? proc_fail_nth_write+0x20b/0x290 [ 259.144147][ T9663] ? selinux_file_permission+0x2c4/0x570 [ 259.149624][ T9663] ? bpf_test_timer_leave+0xc0/0xc0 [ 259.154653][ T9663] ? fsnotify_perm+0x6a/0x5b0 [ 259.159169][ T9663] ? __kasan_check_write+0x14/0x20 [ 259.164111][ T9663] ? fput_many+0x160/0x1b0 [ 259.168360][ T9663] ? bpf_test_timer_leave+0xc0/0xc0 [ 259.173394][ T9663] bpf_prog_test_run+0x3b0/0x630 [ 259.178171][ T9663] ? bpf_prog_query+0x220/0x220 [ 259.182852][ T9663] ? selinux_bpf+0xd2/0x100 [ 259.187194][ T9663] ? security_bpf+0x82/0xb0 [ 259.191538][ T9663] __sys_bpf+0x525/0x760 [ 259.195612][ T9663] ? fput_many+0x160/0x1b0 [ 259.199866][ T9663] ? bpf_link_show_fdinfo+0x300/0x300 [ 259.205086][ T9663] ? debug_smp_processor_id+0x17/0x20 [ 259.210370][ T9663] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 259.216275][ T9663] __x64_sys_bpf+0x7c/0x90 [ 259.220525][ T9663] x64_sys_call+0x87f/0x9a0 [ 259.224865][ T9663] do_syscall_64+0x3b/0xb0 [ 259.229117][ T9663] ? clear_bhb_loop+0x35/0x90 [ 259.233633][ T9663] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 259.239454][ T9663] RIP: 0033:0x7f3c94776d29 [ 259.243699][ T9663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 259.263257][ T9663] RSP: 002b:00007f3c92de8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 259.271474][ T9663] RAX: ffffffffffffffda RBX: 00007f3c94966fa0 RCX: 00007f3c94776d29 [ 259.279292][ T9663] RDX: 0000000000000048 RSI: 0000000020000440 RDI: 000000000000000a [ 259.287094][ T9663] RBP: 00007f3c92de8090 R08: 0000000000000000 R09: 0000000000000000 [ 259.294907][ T9663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 259.302717][ T9663] R13: 0000000000000000 R14: 00007f3c94966fa0 R15: 00007fff12da65e8 [ 259.310630][ T9663] [ 259.446159][ T9665] device pim6reg1 entered promiscuous mode [ 259.807927][ T9690] syz.4.3470[9690] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.808011][ T9690] syz.4.3470[9690] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.932097][ T9701] syz.4.3470[9701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.947609][ T9701] syz.4.3470[9701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.971356][ T9699] device syzkaller0 entered promiscuous mode [ 260.004306][ T9690] device syzkaller0 entered promiscuous mode [ 260.500580][ T9726] device wg2 entered promiscuous mode [ 261.611706][ T9770] device syzkaller0 entered promiscuous mode [ 261.796682][ T9779] FAULT_INJECTION: forcing a failure. [ 261.796682][ T9779] name failslab, interval 1, probability 0, space 0, times 0 [ 261.811018][ T9779] CPU: 0 PID: 9779 Comm: syz.1.3504 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 261.822134][ T9779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 261.832030][ T9779] Call Trace: [ 261.835150][ T9779] [ 261.837927][ T9779] dump_stack_lvl+0x151/0x1c0 [ 261.842441][ T9779] ? io_uring_drop_tctx_refs+0x190/0x190 [ 261.847912][ T9779] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 261.853551][ T9779] ? __skb_try_recv_datagram+0x495/0x6a0 [ 261.859021][ T9779] dump_stack+0x15/0x20 [ 261.863032][ T9779] should_fail+0x3c6/0x510 [ 261.867266][ T9779] __should_failslab+0xa4/0xe0 [ 261.871871][ T9779] ? skb_clone+0x1d1/0x360 [ 261.876115][ T9779] should_failslab+0x9/0x20 [ 261.880454][ T9779] slab_pre_alloc_hook+0x37/0xd0 [ 261.885231][ T9779] ? skb_clone+0x1d1/0x360 [ 261.889481][ T9779] kmem_cache_alloc+0x44/0x250 [ 261.894083][ T9779] skb_clone+0x1d1/0x360 [ 261.898159][ T9779] sk_psock_verdict_recv+0x53/0x840 [ 261.903192][ T9779] ? avc_has_perm_noaudit+0x430/0x430 [ 261.908498][ T9779] unix_read_sock+0x132/0x370 [ 261.913003][ T9779] ? sk_psock_skb_redirect+0x440/0x440 [ 261.918298][ T9779] ? unix_stream_splice_actor+0x120/0x120 [ 261.923854][ T9779] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 261.929145][ T9779] ? unix_stream_splice_actor+0x120/0x120 [ 261.934842][ T9779] sk_psock_verdict_data_ready+0x147/0x1a0 [ 261.940480][ T9779] ? sk_psock_start_verdict+0xc0/0xc0 [ 261.945686][ T9779] ? _raw_spin_lock+0xa4/0x1b0 [ 261.950284][ T9779] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 261.955936][ T9779] ? skb_queue_tail+0xfb/0x120 [ 261.960524][ T9779] unix_dgram_sendmsg+0x15fa/0x2090 [ 261.965563][ T9779] ? unix_dgram_poll+0x690/0x690 [ 261.970338][ T9779] ? kasan_set_track+0x5d/0x70 [ 261.974929][ T9779] ? kasan_set_track+0x4b/0x70 [ 261.979633][ T9779] ? security_socket_sendmsg+0x82/0xb0 [ 261.984922][ T9779] ? unix_dgram_poll+0x690/0x690 [ 261.989696][ T9779] ____sys_sendmsg+0x59e/0x8f0 [ 261.994302][ T9779] ? __sys_sendmsg_sock+0x40/0x40 [ 261.999158][ T9779] ? import_iovec+0xe5/0x120 [ 262.003584][ T9779] ___sys_sendmsg+0x252/0x2e0 [ 262.008096][ T9779] ? __sys_sendmsg+0x260/0x260 [ 262.012700][ T9779] ? putname+0xfa/0x150 [ 262.016692][ T9779] ? __fdget+0x1bc/0x240 [ 262.020770][ T9779] __se_sys_sendmsg+0x19a/0x260 [ 262.025457][ T9779] ? __x64_sys_sendmsg+0x90/0x90 [ 262.030229][ T9779] ? ksys_write+0x260/0x2c0 [ 262.034573][ T9779] ? debug_smp_processor_id+0x17/0x20 [ 262.039773][ T9779] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 262.045682][ T9779] __x64_sys_sendmsg+0x7b/0x90 [ 262.050278][ T9779] x64_sys_call+0x16a/0x9a0 [ 262.054618][ T9779] do_syscall_64+0x3b/0xb0 [ 262.058874][ T9779] ? clear_bhb_loop+0x35/0x90 [ 262.063382][ T9779] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 262.069113][ T9779] RIP: 0033:0x7f5a69225d29 [ 262.073364][ T9779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 262.092804][ T9779] RSP: 002b:00007f5a67897038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 262.101051][ T9779] RAX: ffffffffffffffda RBX: 00007f5a69415fa0 RCX: 00007f5a69225d29 [ 262.108863][ T9779] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000006 [ 262.116760][ T9779] RBP: 00007f5a67897090 R08: 0000000000000000 R09: 0000000000000000 [ 262.124572][ T9779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 262.132390][ T9779] R13: 0000000000000000 R14: 00007f5a69415fa0 R15: 00007ffe9ce6b9c8 [ 262.140203][ T9779] [ 262.216803][ T9789] syz.1.3508[9789] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.216886][ T9789] syz.1.3508[9789] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.328956][ T9805] syz.0.3516[9805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.340372][ T9805] syz.0.3516[9805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.408453][ T9789] device syzkaller0 entered promiscuous mode [ 262.449671][ T9805] syz.0.3516[9805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.463025][ T9805] syz.0.3516[9805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.515284][ T9805] syz.0.3516[9805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.529438][ T9810] syz.1.3508[9810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.541959][ T9811] bridge0: port 3(veth0_to_batadv) entered disabled state [ 262.560157][ T9811] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.567151][ T9811] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.578330][ T9805] syz.0.3516[9805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.625780][ T9810] syz.1.3508[9810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.034706][ T9866] device syzkaller0 entered promiscuous mode [ 264.635617][ T9880] device syzkaller0 entered promiscuous mode [ 264.969305][ T9885] device syzkaller0 entered promiscuous mode [ 265.132499][ T9894] device sit0 entered promiscuous mode [ 265.199623][ T9897] device veth0_vlan left promiscuous mode [ 265.237196][ T9897] device veth0_vlan entered promiscuous mode [ 265.375347][ T9908] device syzkaller0 entered promiscuous mode [ 265.550805][ T9920] device syzkaller0 entered promiscuous mode [ 265.814133][ T9930] device syzkaller0 entered promiscuous mode [ 267.242913][ T9985] device syzkaller0 entered promiscuous mode [ 267.651798][T10012] device macsec0 entered promiscuous mode [ 267.816502][T10023] device syzkaller0 entered promiscuous mode [ 268.062501][T10028] device veth0_vlan left promiscuous mode [ 268.077732][T10028] device veth0_vlan entered promiscuous mode [ 268.134201][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.149484][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 268.158839][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 268.246034][T10040] device syzkaller0 entered promiscuous mode [ 268.811040][T10070] device sit0 left promiscuous mode [ 268.844759][T10072] device syzkaller0 entered promiscuous mode [ 269.175172][T10094] device syzkaller0 entered promiscuous mode [ 270.482435][T10166] device syzkaller0 entered promiscuous mode [ 270.731890][T10179] FAULT_INJECTION: forcing a failure. [ 270.731890][T10179] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 270.745189][T10179] CPU: 0 PID: 10179 Comm: syz.1.3660 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 270.756398][T10179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 270.766373][T10179] Call Trace: [ 270.769487][T10179] [ 270.772267][T10179] dump_stack_lvl+0x151/0x1c0 [ 270.776867][T10179] ? io_uring_drop_tctx_refs+0x190/0x190 [ 270.782344][T10179] ? __kasan_check_read+0x11/0x20 [ 270.787197][T10179] dump_stack+0x15/0x20 [ 270.791187][T10179] should_fail+0x3c6/0x510 [ 270.795440][T10179] should_fail_usercopy+0x1a/0x20 [ 270.800299][T10179] copy_page_from_iter_atomic+0x423/0x10e0 [ 270.805948][T10179] ? pipe_zero+0x4e0/0x4e0 [ 270.810199][T10179] generic_perform_write+0x360/0x750 [ 270.815321][T10179] ? __mark_inode_dirty+0x54e/0xa50 [ 270.820439][T10179] ? grab_cache_page_write_begin+0xa0/0xa0 [ 270.826079][T10179] ? file_remove_privs+0x610/0x610 [ 270.831025][T10179] ? rwsem_write_trylock+0x153/0x340 [ 270.836151][T10179] ? rwsem_mark_wake+0x770/0x770 [ 270.840921][T10179] __generic_file_write_iter+0x25b/0x4b0 [ 270.846389][T10179] generic_file_write_iter+0xaf/0x1c0 [ 270.851603][T10179] vfs_write+0xd5d/0x1110 [ 270.855770][T10179] ? file_end_write+0x1c0/0x1c0 [ 270.860451][T10179] ? mutex_lock+0xb6/0x1e0 [ 270.864700][T10179] ? wait_for_completion_killable_timeout+0x10/0x10 [ 270.871129][T10179] ? __fdget_pos+0x2e7/0x3a0 [ 270.875548][T10179] ? ksys_write+0x77/0x2c0 [ 270.879802][T10179] ksys_write+0x199/0x2c0 [ 270.883969][T10179] ? __ia32_sys_read+0x90/0x90 [ 270.888573][T10179] ? debug_smp_processor_id+0x17/0x20 [ 270.893775][T10179] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 270.899770][T10179] __x64_sys_write+0x7b/0x90 [ 270.904199][T10179] x64_sys_call+0x2f/0x9a0 [ 270.908444][T10179] do_syscall_64+0x3b/0xb0 [ 270.912696][T10179] ? clear_bhb_loop+0x35/0x90 [ 270.917212][T10179] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 270.922939][T10179] RIP: 0033:0x7f5a69225d29 [ 270.927192][T10179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 270.946634][T10179] RSP: 002b:00007f5a67897038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 270.954876][T10179] RAX: ffffffffffffffda RBX: 00007f5a69415fa0 RCX: 00007f5a69225d29 [ 270.962692][T10179] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000007 [ 270.970501][T10179] RBP: 00007f5a67897090 R08: 0000000000000000 R09: 0000000000000000 [ 270.978314][T10179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 270.986123][T10179] R13: 0000000000000000 R14: 00007f5a69415fa0 R15: 00007ffe9ce6b9c8 [ 270.994026][T10179] [ 271.301703][T10198] FAULT_INJECTION: forcing a failure. [ 271.301703][T10198] name failslab, interval 1, probability 0, space 0, times 0 [ 271.314324][T10198] CPU: 1 PID: 10198 Comm: syz.2.3665 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 271.325526][T10198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 271.335415][T10198] Call Trace: [ 271.338576][T10198] [ 271.341314][T10198] dump_stack_lvl+0x151/0x1c0 [ 271.345832][T10198] ? io_uring_drop_tctx_refs+0x190/0x190 [ 271.351298][T10198] dump_stack+0x15/0x20 [ 271.355285][T10198] should_fail+0x3c6/0x510 [ 271.359540][T10198] __should_failslab+0xa4/0xe0 [ 271.364145][T10198] should_failslab+0x9/0x20 [ 271.368478][T10198] slab_pre_alloc_hook+0x37/0xd0 [ 271.373254][T10198] kmem_cache_alloc_trace+0x48/0x270 [ 271.378376][T10198] ? sk_psock_skb_ingress_self+0x60/0x330 [ 271.383925][T10198] ? migrate_disable+0x190/0x190 [ 271.388701][T10198] sk_psock_skb_ingress_self+0x60/0x330 [ 271.394082][T10198] sk_psock_verdict_recv+0x66d/0x840 [ 271.399202][T10198] unix_read_sock+0x132/0x370 [ 271.403718][T10198] ? sk_psock_skb_redirect+0x440/0x440 [ 271.409008][T10198] ? unix_stream_splice_actor+0x120/0x120 [ 271.414561][T10198] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 271.419948][T10198] ? unix_stream_splice_actor+0x120/0x120 [ 271.425588][T10198] sk_psock_verdict_data_ready+0x147/0x1a0 [ 271.431228][T10198] ? sk_psock_start_verdict+0xc0/0xc0 [ 271.436434][T10198] ? _raw_spin_lock+0xa4/0x1b0 [ 271.441043][T10198] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 271.446683][T10198] ? skb_queue_tail+0xfb/0x120 [ 271.451279][T10198] unix_dgram_sendmsg+0x15fa/0x2090 [ 271.456321][T10198] ? unix_dgram_poll+0x690/0x690 [ 271.461084][T10198] ? kasan_set_track+0x5d/0x70 [ 271.465684][T10198] ? kasan_set_track+0x4b/0x70 [ 271.470438][T10198] ? security_socket_sendmsg+0x82/0xb0 [ 271.475727][T10198] ? unix_dgram_poll+0x690/0x690 [ 271.480632][T10198] ____sys_sendmsg+0x59e/0x8f0 [ 271.485193][T10198] ? __sys_sendmsg_sock+0x40/0x40 [ 271.490059][T10198] ? import_iovec+0xe5/0x120 [ 271.494485][T10198] ___sys_sendmsg+0x252/0x2e0 [ 271.498999][T10198] ? __sys_sendmsg+0x260/0x260 [ 271.503597][T10198] ? putname+0xfa/0x150 [ 271.507586][T10198] ? __fdget+0x1bc/0x240 [ 271.511660][T10198] __se_sys_sendmsg+0x19a/0x260 [ 271.516350][T10198] ? __x64_sys_sendmsg+0x90/0x90 [ 271.521119][T10198] ? ksys_write+0x260/0x2c0 [ 271.525461][T10198] ? debug_smp_processor_id+0x17/0x20 [ 271.530666][T10198] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 271.536579][T10198] __x64_sys_sendmsg+0x7b/0x90 [ 271.541171][T10198] x64_sys_call+0x16a/0x9a0 [ 271.545526][T10198] do_syscall_64+0x3b/0xb0 [ 271.549761][T10198] ? clear_bhb_loop+0x35/0x90 [ 271.554278][T10198] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 271.560005][T10198] RIP: 0033:0x7f3c94776d29 [ 271.564257][T10198] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 271.583833][T10198] RSP: 002b:00007f3c92de8038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 271.592077][T10198] RAX: ffffffffffffffda RBX: 00007f3c94966fa0 RCX: 00007f3c94776d29 [ 271.599889][T10198] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000006 [ 271.608392][T10198] RBP: 00007f3c92de8090 R08: 0000000000000000 R09: 0000000000000000 [ 271.616207][T10198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 271.624015][T10198] R13: 0000000000000000 R14: 00007f3c94966fa0 R15: 00007fff12da65e8 [ 271.631831][T10198] [ 271.650017][T10195] ================================================================== [ 271.657908][T10195] BUG: KASAN: use-after-free in consume_skb+0x3c/0x250 [ 271.664590][T10195] Read of size 4 at addr ffff88812481036c by task syz.2.3665/10195 [ 271.672317][T10195] [ 271.674483][T10195] CPU: 0 PID: 10195 Comm: syz.2.3665 Tainted: G W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 271.685681][T10195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 271.695577][T10195] Call Trace: [ 271.698700][T10195] [ 271.701487][T10195] dump_stack_lvl+0x151/0x1c0 [ 271.705993][T10195] ? io_uring_drop_tctx_refs+0x190/0x190 [ 271.711456][T10195] ? panic+0x760/0x760 [ 271.715626][T10195] print_address_description+0x87/0x3b0 [ 271.721004][T10195] ? bpf_ksym_del+0x145/0x150 [ 271.725529][T10195] kasan_report+0x179/0x1c0 [ 271.729856][T10195] ? consume_skb+0x3c/0x250 [ 271.734220][T10195] ? consume_skb+0x3c/0x250 [ 271.738624][T10195] kasan_check_range+0x293/0x2a0 [ 271.743397][T10195] __kasan_check_read+0x11/0x20 [ 271.748084][T10195] consume_skb+0x3c/0x250 [ 271.752250][T10195] __sk_msg_free+0x2dd/0x370 [ 271.756677][T10195] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 271.762320][T10195] sk_psock_stop+0x4e3/0x580 [ 271.766755][T10195] sk_psock_drop+0x219/0x310 [ 271.771173][T10195] sock_map_unref+0x3c6/0x430 [ 271.775680][T10195] ? _raw_spin_unlock_bh+0x51/0x60 [ 271.780635][T10195] sock_map_remove_links+0x41c/0x650 [ 271.785751][T10195] ? sock_map_unhash+0x120/0x120 [ 271.790535][T10195] ? locks_remove_posix+0x610/0x610 [ 271.795561][T10195] sock_map_close+0x114/0x530 [ 271.800097][T10195] ? unix_peer_get+0xe0/0xe0 [ 271.804497][T10195] ? sock_map_remove_links+0x650/0x650 [ 271.809795][T10195] ? rwsem_mark_wake+0x770/0x770 [ 271.814570][T10195] unix_release+0x82/0xc0 [ 271.818734][T10195] sock_close+0xdf/0x270 [ 271.822815][T10195] ? sock_mmap+0xa0/0xa0 [ 271.826897][T10195] __fput+0x228/0x8c0 [ 271.830728][T10195] ____fput+0x15/0x20 [ 271.834531][T10195] task_work_run+0x129/0x190 [ 271.839391][T10195] exit_to_user_mode_loop+0xc4/0xe0 [ 271.844422][T10195] exit_to_user_mode_prepare+0x5a/0xa0 [ 271.849719][T10195] syscall_exit_to_user_mode+0x26/0x160 [ 271.855102][T10195] do_syscall_64+0x47/0xb0 [ 271.859375][T10195] ? clear_bhb_loop+0x35/0x90 [ 271.863871][T10195] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 271.869598][T10195] RIP: 0033:0x7f3c94776d29 [ 271.873850][T10195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 271.893291][T10195] RSP: 002b:00007fff12da6748 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 271.901531][T10195] RAX: 0000000000000000 RBX: 00007f3c94968ba0 RCX: 00007f3c94776d29 [ 271.909350][T10195] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 271.917164][T10195] RBP: 00007f3c94968ba0 R08: 0000000000000000 R09: 00007fff12da6a3f [ 271.925143][T10195] R10: 000000000003fd90 R11: 0000000000000246 R12: 00000000000426de [ 271.933069][T10195] R13: 00007fff12da6850 R14: 0000000000000032 R15: ffffffffffffffff [ 271.940860][T10195] [ 271.943714][T10195] [ 271.945886][T10195] Allocated by task 10198: [ 271.950137][T10195] __kasan_slab_alloc+0xb1/0xe0 [ 271.954846][T10195] slab_post_alloc_hook+0x53/0x2c0 [ 271.959769][T10195] kmem_cache_alloc+0xf5/0x250 [ 271.964370][T10195] skb_clone+0x1d1/0x360 [ 271.968450][T10195] sk_psock_verdict_recv+0x53/0x840 [ 271.973491][T10195] unix_read_sock+0x132/0x370 [ 271.977999][T10195] sk_psock_verdict_data_ready+0x147/0x1a0 [ 271.983637][T10195] unix_dgram_sendmsg+0x15fa/0x2090 [ 271.988670][T10195] ____sys_sendmsg+0x59e/0x8f0 [ 271.993274][T10195] ___sys_sendmsg+0x252/0x2e0 [ 271.997787][T10195] __se_sys_sendmsg+0x19a/0x260 [ 272.002478][T10195] __x64_sys_sendmsg+0x7b/0x90 [ 272.007070][T10195] x64_sys_call+0x16a/0x9a0 [ 272.011411][T10195] do_syscall_64+0x3b/0xb0 [ 272.015667][T10195] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 272.021395][T10195] [ 272.023564][T10195] Freed by task 4056: [ 272.027383][T10195] kasan_set_track+0x4b/0x70 [ 272.031808][T10195] kasan_set_free_info+0x23/0x40 [ 272.036582][T10195] ____kasan_slab_free+0x126/0x160 [ 272.041528][T10195] __kasan_slab_free+0x11/0x20 [ 272.046127][T10195] slab_free_freelist_hook+0xbd/0x190 [ 272.051338][T10195] kmem_cache_free+0x115/0x330 [ 272.055937][T10195] kfree_skbmem+0x104/0x170 [ 272.060276][T10195] kfree_skb+0xc2/0x360 [ 272.064267][T10195] sk_psock_backlog+0xad1/0xdc0 [ 272.068954][T10195] process_one_work+0x6bb/0xc10 [ 272.073640][T10195] worker_thread+0xad5/0x12a0 [ 272.078157][T10195] kthread+0x421/0x510 [ 272.082062][T10195] ret_from_fork+0x1f/0x30 [ 272.086314][T10195] [ 272.088484][T10195] The buggy address belongs to the object at ffff888124810280 [ 272.088484][T10195] which belongs to the cache skbuff_head_cache of size 248 [ 272.102891][T10195] The buggy address is located 236 bytes inside of [ 272.102891][T10195] 248-byte region [ffff888124810280, ffff888124810378) [ 272.116087][T10195] The buggy address belongs to the page: [ 272.121556][T10195] page:ffffea0004920400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x124810 [ 272.131622][T10195] flags: 0x4000000000000200(slab|zone=1) [ 272.137098][T10195] raw: 4000000000000200 0000000000000000 0000000100000001 ffff8881081abb00 [ 272.145518][T10195] raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 [ 272.153925][T10195] page dumped because: kasan: bad access detected [ 272.160187][T10195] page_owner tracks the page as allocated [ 272.165731][T10195] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 8770, ts 241238585059, free_ts 241224430417 [ 272.181917][T10195] post_alloc_hook+0x1a3/0x1b0 [ 272.186511][T10195] prep_new_page+0x1b/0x110 [ 272.190850][T10195] get_page_from_freelist+0x3550/0x35d0 [ 272.196227][T10195] __alloc_pages+0x27e/0x8f0 [ 272.200654][T10195] new_slab+0x9a/0x4e0 [ 272.204561][T10195] ___slab_alloc+0x39e/0x830 [ 272.209073][T10195] __slab_alloc+0x4a/0x90 [ 272.213244][T10195] kmem_cache_alloc+0x139/0x250 [ 272.217928][T10195] __alloc_skb+0xbe/0x550 [ 272.222101][T10195] rtmsg_ifa+0x1e7/0x3a0 [ 272.226177][T10195] __inet_insert_ifa+0x8f2/0xb50 [ 272.230947][T10195] inet_rtm_newaddr+0x8fd/0x16e0 [ 272.235722][T10195] rtnetlink_rcv_msg+0x951/0xc40 [ 272.240497][T10195] netlink_rcv_skb+0x1cf/0x410 [ 272.245096][T10195] rtnetlink_rcv+0x1c/0x20 [ 272.249346][T10195] netlink_unicast+0x8df/0xac0 [ 272.253946][T10195] page last free stack trace: [ 272.258460][T10195] free_unref_page_prepare+0x7c8/0x7d0 [ 272.263755][T10195] free_unref_page_list+0x14b/0xa60 [ 272.268786][T10195] release_pages+0x1310/0x1370 [ 272.273413][T10195] free_pages_and_swap_cache+0x8a/0xa0 [ 272.278684][T10195] tlb_finish_mmu+0x177/0x320 [ 272.283203][T10195] exit_mmap+0x484/0x990 [ 272.287274][T10195] __mmput+0x95/0x310 [ 272.291094][T10195] mmput+0x5b/0x170 [ 272.294741][T10195] do_exit+0xb9c/0x2ca0 [ 272.298734][T10195] do_group_exit+0x141/0x310 [ 272.303253][T10195] get_signal+0x7a3/0x1630 [ 272.307503][T10195] arch_do_signal_or_restart+0xbd/0x1680 [ 272.312968][T10195] exit_to_user_mode_loop+0xa0/0xe0 [ 272.318042][T10195] exit_to_user_mode_prepare+0x5a/0xa0 [ 272.323295][T10195] syscall_exit_to_user_mode+0x26/0x160 [ 272.328675][T10195] do_syscall_64+0x47/0xb0 [ 272.332932][T10195] [ 272.335099][T10195] Memory state around the buggy address: [ 272.340579][T10195] ffff888124810200: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 272.348477][T10195] ffff888124810280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 272.356375][T10195] >ffff888124810300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc [ 272.364260][T10195] ^ [ 272.371552][T10195] ffff888124810380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 272.379455][T10195] ffff888124810400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 272.387435][T10195] ================================================================== [ 272.395335][T10195] Disabling lock debugging due to kernel taint [ 272.401413][T10195] ================================================================== [ 272.409228][T10195] BUG: KASAN: double-free or invalid-free in kmem_cache_free+0x115/0x330 [ 272.417476][T10195] [ 272.419640][T10195] CPU: 0 PID: 10195 Comm: syz.2.3665 Tainted: G B W 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 272.430948][T10195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 272.440838][T10195] Call Trace: [ 272.444056][T10195] [ 272.446835][T10195] dump_stack_lvl+0x151/0x1c0 [ 272.451340][T10195] ? io_uring_drop_tctx_refs+0x190/0x190 [ 272.456818][T10195] ? __wake_up_klogd+0xd5/0x110 [ 272.461496][T10195] ? panic+0x760/0x760 [ 272.465405][T10195] ? kmem_cache_free+0x115/0x330 [ 272.470172][T10195] print_address_description+0x87/0x3b0 [ 272.475554][T10195] ? asm_common_interrupt+0x27/0x40 [ 272.480588][T10195] ? kmem_cache_free+0x115/0x330 [ 272.485361][T10195] ? kmem_cache_free+0x115/0x330 [ 272.490133][T10195] kasan_report_invalid_free+0x6b/0xa0 [ 272.495586][T10195] ____kasan_slab_free+0x13e/0x160 [ 272.500522][T10195] __kasan_slab_free+0x11/0x20 [ 272.505139][T10195] slab_free_freelist_hook+0xbd/0x190 [ 272.510331][T10195] kmem_cache_free+0x115/0x330 [ 272.514927][T10195] ? kfree_skbmem+0x104/0x170 [ 272.519456][T10195] kfree_skbmem+0x104/0x170 [ 272.523782][T10195] consume_skb+0xb4/0x250 [ 272.527949][T10195] __sk_msg_free+0x2dd/0x370 [ 272.532375][T10195] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 272.538017][T10195] sk_psock_stop+0x4e3/0x580 [ 272.542441][T10195] sk_psock_drop+0x219/0x310 [ 272.546869][T10195] sock_map_unref+0x3c6/0x430 [ 272.551381][T10195] ? _raw_spin_unlock_bh+0x51/0x60 [ 272.556334][T10195] sock_map_remove_links+0x41c/0x650 [ 272.561450][T10195] ? sock_map_unhash+0x120/0x120 [ 272.566222][T10195] ? locks_remove_posix+0x610/0x610 [ 272.571258][T10195] sock_map_close+0x114/0x530 [ 272.575768][T10195] ? unix_peer_get+0xe0/0xe0 [ 272.580197][T10195] ? sock_map_remove_links+0x650/0x650 [ 272.585488][T10195] ? rwsem_mark_wake+0x770/0x770 [ 272.590266][T10195] unix_release+0x82/0xc0 [ 272.594430][T10195] sock_close+0xdf/0x270 [ 272.598510][T10195] ? sock_mmap+0xa0/0xa0 [ 272.602589][T10195] __fput+0x228/0x8c0 [ 272.606413][T10195] ____fput+0x15/0x20 [ 272.610227][T10195] task_work_run+0x129/0x190 [ 272.614654][T10195] exit_to_user_mode_loop+0xc4/0xe0 [ 272.619686][T10195] exit_to_user_mode_prepare+0x5a/0xa0 [ 272.624980][T10195] syscall_exit_to_user_mode+0x26/0x160 [ 272.630365][T10195] do_syscall_64+0x47/0xb0 [ 272.634616][T10195] ? clear_bhb_loop+0x35/0x90 [ 272.639127][T10195] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 272.644856][T10195] RIP: 0033:0x7f3c94776d29 [ 272.649111][T10195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 272.668551][T10195] RSP: 002b:00007fff12da6748 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 272.676796][T10195] RAX: 0000000000000000 RBX: 00007f3c94968ba0 RCX: 00007f3c94776d29 [ 272.684609][T10195] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 272.692420][T10195] RBP: 00007f3c94968ba0 R08: 0000000000000000 R09: 00007fff12da6a3f [ 272.700233][T10195] R10: 000000000003fd90 R11: 0000000000000246 R12: 00000000000426de [ 272.708043][T10195] R13: 00007fff12da6850 R14: 0000000000000032 R15: ffffffffffffffff [ 272.715859][T10195] [ 272.718719][T10195] [ 272.720886][T10195] Allocated by task 10198: [ 272.725142][T10195] __kasan_slab_alloc+0xb1/0xe0 [ 272.729824][T10195] slab_post_alloc_hook+0x53/0x2c0 [ 272.734774][T10195] kmem_cache_alloc+0xf5/0x250 [ 272.739376][T10195] skb_clone+0x1d1/0x360 [ 272.743451][T10195] sk_psock_verdict_recv+0x53/0x840 [ 272.748486][T10195] unix_read_sock+0x132/0x370 [ 272.753003][T10195] sk_psock_verdict_data_ready+0x147/0x1a0 [ 272.758656][T10195] unix_dgram_sendmsg+0x15fa/0x2090 [ 272.763674][T10195] ____sys_sendmsg+0x59e/0x8f0 [ 272.768272][T10195] ___sys_sendmsg+0x252/0x2e0 [ 272.772799][T10195] __se_sys_sendmsg+0x19a/0x260 [ 272.777476][T10195] __x64_sys_sendmsg+0x7b/0x90 [ 272.782076][T10195] x64_sys_call+0x16a/0x9a0 [ 272.786419][T10195] do_syscall_64+0x3b/0xb0 [ 272.790667][T10195] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 272.796394][T10195] [ 272.798565][T10195] Freed by task 4056: [ 272.802386][T10195] kasan_set_track+0x4b/0x70 [ 272.806816][T10195] kasan_set_free_info+0x23/0x40 [ 272.811583][T10195] ____kasan_slab_free+0x126/0x160 [ 272.816531][T10195] __kasan_slab_free+0x11/0x20 [ 272.821134][T10195] slab_free_freelist_hook+0xbd/0x190 [ 272.826341][T10195] kmem_cache_free+0x115/0x330 [ 272.830941][T10195] kfree_skbmem+0x104/0x170 [ 272.835279][T10195] kfree_skb+0xc2/0x360 [ 272.839271][T10195] sk_psock_backlog+0xad1/0xdc0 [ 272.843959][T10195] process_one_work+0x6bb/0xc10 [ 272.848647][T10195] worker_thread+0xad5/0x12a0 [ 272.853160][T10195] kthread+0x421/0x510 [ 272.857067][T10195] ret_from_fork+0x1f/0x30 [ 272.861317][T10195] [ 272.863487][T10195] The buggy address belongs to the object at ffff888124810280 [ 272.863487][T10195] which belongs to the cache skbuff_head_cache of size 248 [ 272.877896][T10195] The buggy address is located 0 bytes inside of [ 272.877896][T10195] 248-byte region [ffff888124810280, ffff888124810378) [ 272.890830][T10195] The buggy address belongs to the page: [ 272.896299][T10195] page:ffffea0004920400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x124810 [ 272.906361][T10195] flags: 0x4000000000000200(slab|zone=1) [ 272.911840][T10195] raw: 4000000000000200 0000000000000000 0000000100000001 ffff8881081abb00 [ 272.920257][T10195] raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 [ 272.928668][T10195] page dumped because: kasan: bad access detected [ 272.934921][T10195] page_owner tracks the page as allocated [ 272.940474][T10195] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 8770, ts 241238585059, free_ts 241224430417 [ 272.956442][T10195] post_alloc_hook+0x1a3/0x1b0 [ 272.961043][T10195] prep_new_page+0x1b/0x110 [ 272.965382][T10195] get_page_from_freelist+0x3550/0x35d0 [ 272.970765][T10195] __alloc_pages+0x27e/0x8f0 [ 272.975187][T10195] new_slab+0x9a/0x4e0 [ 272.979096][T10195] ___slab_alloc+0x39e/0x830 [ 272.983524][T10195] __slab_alloc+0x4a/0x90 [ 272.987687][T10195] kmem_cache_alloc+0x139/0x250 [ 272.992378][T10195] __alloc_skb+0xbe/0x550 [ 272.996539][T10195] rtmsg_ifa+0x1e7/0x3a0 [ 273.000618][T10195] __inet_insert_ifa+0x8f2/0xb50 [ 273.005392][T10195] inet_rtm_newaddr+0x8fd/0x16e0 [ 273.010165][T10195] rtnetlink_rcv_msg+0x951/0xc40 [ 273.014940][T10195] netlink_rcv_skb+0x1cf/0x410 [ 273.019540][T10195] rtnetlink_rcv+0x1c/0x20 [ 273.023793][T10195] netlink_unicast+0x8df/0xac0 [ 273.028394][T10195] page last free stack trace: [ 273.032905][T10195] free_unref_page_prepare+0x7c8/0x7d0 [ 273.038200][T10195] free_unref_page_list+0x14b/0xa60 [ 273.043234][T10195] release_pages+0x1310/0x1370 [ 273.047835][T10195] free_pages_and_swap_cache+0x8a/0xa0 [ 273.053128][T10195] tlb_finish_mmu+0x177/0x320 [ 273.057642][T10195] exit_mmap+0x484/0x990 [ 273.061739][T10195] __mmput+0x95/0x310 [ 273.065540][T10195] mmput+0x5b/0x170 [ 273.069188][T10195] do_exit+0xb9c/0x2ca0 [ 273.073180][T10195] do_group_exit+0x141/0x310 [ 273.077604][T10195] get_signal+0x7a3/0x1630 [ 273.081858][T10195] arch_do_signal_or_restart+0xbd/0x1680 [ 273.087324][T10195] exit_to_user_mode_loop+0xa0/0xe0 [ 273.092364][T10195] exit_to_user_mode_prepare+0x5a/0xa0 [ 273.097656][T10195] syscall_exit_to_user_mode+0x26/0x160 [ 273.103037][T10195] do_syscall_64+0x47/0xb0 [ 273.107289][T10195] [ 273.109458][T10195] Memory state around the buggy address: [ 273.114930][T10195] ffff888124810180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 273.122828][T10195] ffff888124810200: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 273.130727][T10195] >ffff888124810280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 273.138621][T10195] ^ [ 273.142527][T10195] ffff888124810300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc [ 273.150426][T10195] ffff888124810380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 273.158319][T10195] ==================================================================