last executing test programs: 5.071402918s ago: executing program 0 (id=950): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x20, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x4, @perf_bp={&(0x7f0000001080)}, 0x10000, 0x8, 0x0, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xd1a40, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079d}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x7, 0x4, 0x100, 0x1, 0x28}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000001000)='sys_enter\x00', r2}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) mkdir(&(0x7f0000000580)='./file0\x00', 0xaa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) 4.82583397s ago: executing program 0 (id=952): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB="000000000000f1ffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r2}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r4}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00'}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.207608134s ago: executing program 0 (id=959): perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x800) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r1, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) 3.863386126s ago: executing program 0 (id=963): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea", 0x2e}], 0x1, 0x0, 0x0, 0x3d00}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)}, 0x41fe) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001180)=ANY=[@ANYBLOB="1100000004000000040000000a00000000000000238ec1", @ANYBLOB="0085db02f4422d15bf7c4ce60043b7486cdf8d7d461fe6ef0a0a8556aa8cf64c85181824578116d5fb5109e22964af95c84ea7d467733606032eaca14c636508e60e6da3aa7a8bdac7244c1a565e5b90b4a2392cc0f9b94b36bb34f13886ef734ef83707e13816871f", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRESOCT=r1, @ANYBLOB="000000000200"/28], 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r5 = perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x80, 0x2, 0x3d, 0x2, 0x1b, 0x0, 0x6, 0x20000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x2000, 0x100, 0x7ff, 0x5, 0x7fffffff, 0x9, 0x0, 0x0, 0x100, 0x0, 0x5}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x2c, 0x2, 0x3, &(0x7f0000000300)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000791218000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc0, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2620}, 0x80) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000ec0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r4, @ANYBLOB='\t\x00'/20, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="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"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1700000000000000040000000300000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000004e0000000000000000000000010000000000008a4700000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x13, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffa}, 0x94) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="9f580000005800000006000000100000000000000e05000000000000000800000000000012050000000a0000000000000a030000000c00000000000008050000000f000000000000080200000000000000000000030000000004000000050000000500000000612e616f00"], &(0x7f0000000b40)=""/246, 0x76, 0xf6, 0x1, 0x8001}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x11, 0x12, &(0x7f0000001040)=ANY=[@ANYBLOB="1800000029050000000000000800000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b703000000000000a400000083000000bf0900000000000055090100000000009500000000000000181400009329377e024c4ad06a44a855e4720e874ccbb34d425ed0a1f0988d81a7366a84756d1ddd84672c1529318ef614444be0fd4199b1ab2a526b4b637a6bf143466177a480c3f3e16937a6f00b9b2788e7e7202f607ec1130ded0b6cbc72ec9fb94758882ed6a8fba296f0c6a4e9b3f6542936aae0c33e1b07d4aa10235bacaa9b00019249b6fcd3d987bfc6147003ca8f814ed0f85d52b2186707333f3f37b0a60e420ecfd53a5d7600", @ANYRES32=r6, @ANYBLOB="00000000000000000499001001000080bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000580)='GPL\x00', 0xfffffd77, 0x1000, &(0x7f0000001340)=""/4096, 0x41000, 0x10, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000a00)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000cc0)=[{0x3, 0x2, 0xb, 0xc}, {0x2, 0x5, 0xc, 0xc}, {0x5, 0x5, 0x10, 0x3}, {0x0, 0x8, 0x8001, 0x6}, {0x4, 0x1, 0xf, 0x5}], 0x10, 0x7f}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, @perf_bp={0x0}, 0x440}, 0x0, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e00)={0x18, 0x4000, &(0x7f0000000780)=ANY=[@ANYBLOB="e0678d1f2f384414ae5131f328a7a97e06c429f7ab61c49562452611e7d8a879b44c9c90b8060fe87c1b83f6ddd3d060d99187fe8a100e35c766880be5e03a7137d8173c8874c3a95bdc41bd873cecc5506367639c609aed", @ANYBLOB="ba0dfee74d3ee56d2ee40ebd7e72d634848bc5f3ab63a133b8d0a81650425690fab8cd0e5f4b4a5912790cbefef828fa4d23f4cd2e4fdceb19242eb1bf2568efc987fa15ad633c5a887ea194329065428b3a1c00319c8f81112d741315b68c6831d6de06cb5512035639f0e780d869fddc0d527cbe06850dd262a03850ff93863d0ee4cc2cdc06b3002e265867f4340568ce53892358df076879d60429396e78edc910962da749742eaf7c099e7e80636a86c3f36c8eea271b83592a00c637dd44d2093941aa68db1ddf5e6e83d652a64928f63c7666128de75bfd2b22e9aeaa1fdc558b2455653fdd4ae51f", @ANYRES64=r2], &(0x7f0000000100)='GPL\x00', 0xc, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, r7}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bf"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 3.29691959s ago: executing program 4 (id=972): r0 = bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r2, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000001000)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000060000000500000000000008020000000009030000000a0000000000000b05000000000000000000000801000000006161612e00"], &(0x7f0000001080)=""/106, 0x4e, 0x6a, 0x0, 0xffff, 0x10000}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000001140)=ANY=[@ANYBLOB="1e0000000100ffffffffff7f0400000000010000", @ANYRES32=r0, @ANYBLOB="0300000085000000", @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="05000000030000000100"/28], 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001300)=ANY=[@ANYRES32=r1, @ANYRES64=r1], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x3, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000009800000095"], &(0x7f0000000680)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x90430, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={0xffffffffffffffff, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r10}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x862a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x144a8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r11, &(0x7f0000000980), 0x20000992) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r6, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000240)="d2ff03066003008cb89e08d988a8", 0x0, 0xd5b4, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000011c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r12}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000001200)=0x7f, 0x12) r13 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r13, 0x40082406, &(0x7f00000001c0)='(pu&00\t&&') ioctl$TUNSETFILTEREBPF(r11, 0x800454e1, &(0x7f00000012c0)=r7) 2.196190017s ago: executing program 4 (id=978): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000071102f00000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000fb"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0xa}]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x4d, 0x1, 0x3}]}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 2.011983548s ago: executing program 3 (id=980): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x74, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d329", 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000500)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000004c0)='ns/pid_for_children\x00') socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128, 0x803e0000}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x24004000) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r7, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x40000002) ioctl$TUNSETFILTEREBPF(r2, 0xb702, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r9}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800fbffffffffffffff000085000000030000009500000000000000"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x8}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r11}, 0x10) close(r10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r9}, &(0x7f0000000040), &(0x7f0000000080)=r11}, 0x20) socketpair(0x2b, 0x1, 0x40000000, &(0x7f0000000200)) 2.011176348s ago: executing program 4 (id=981): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0600000004000500080000000c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000067b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x862a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x144a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r5, &(0x7f0000000980), 0x20000992) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r7}, 0x10) syz_clone(0x500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000004080)={{r2}, &(0x7f0000004000), &(0x7f0000004040)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2004}, 0x80) r9 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f00000001c0)='c(u&\'\'\t|\t') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r10 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000b00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000d2000c00000000000000bf91000000000000b7020000000000008500000095000000b7000000000000009500"], &(0x7f0000000200)='syzkaller\x00', 0x2, 0x100b, &(0x7f0000001e40)=""/4107}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r0, 0x58, &(0x7f0000000740)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.759183579s ago: executing program 3 (id=982): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000240)=ANY=[@ANYBLOB='1-1'], 0x31) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x6, &(0x7f0000000280)=ANY=[@ANYBLOB="b40000000000000073119a000000000085100000020040008500000000e09f2d072fddddfefc62557200000095000000000000009500000000000000d1136c4305ee0d36ef5b69cdc6e86368b03c78c8d642e6527f45"], &(0x7f0000000080)='GPL\x00', 0x9, 0xc3, &(0x7f000000cf3d)=""/195, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8, 0x2, 0x58c4, 0x0, 0xd39f}, 0x0, 0xffffffffffffffff, r2, 0xa) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff", @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, 0x0, &(0x7f0000000040)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r5}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x40010) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000015435a4fd600"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.739995979s ago: executing program 3 (id=983): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e00000085000000500000"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x9) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000280)={&(0x7f0000000000)=@name={0x1e, 0x2, 0x2, {{0x41, 0x1}, 0x4}}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000180)="a71e11573c640c2a68fd05365cf82ce4f4162ba5d7663117b2ef643f0f730a8d15682dec093e7923298383c8eb97814fb2c4a8ddabf75e3cb5091a3e6ea91cf2869576ac450ffe0be63b59f1d90534f31fcb50353b91d2b3d5effc0666ecb19ed5bfb3c2ef82087a2cacdcafb99cbbd4f8921428be733472ec999bdb63f669f7fa58ec37cfebeb150b4e17517485021d4fb00205fefd5fcae49d6d4160660eb1de68f472a590d184787871f95d0751a26e8039d88153034d2a42563b16e3d64b85da", 0xc2}], 0x1, &(0x7f00000003c0)="caf1df345ef79a99b5a11a890b4e773577571ddaa817ea21dff9f23770eb89a33284bf2992b2a806e7ca69f14f73d2a7db289ef160d77503606a3ff92c1690939d63b7140896a7b35508053cce2a5c86dd99dbe335c3746aaecef7007821b65d2aeec6c70298acd5acc2fbae34e92b01a1a1f2a97cc7912bf149c2ce5dbfd5058ad578c59ec169938b35851b08c44558a5dfeb91c1afedc42716eaf64281499528a6eac0cc49aca97c2e9d8adb0cfc55ccaef332484b1324563a90823652b5c2dfadb06646b6f26b7526ac6edd6ed5f66b8f34801768498ed2348d0f9ebb4edc6edbb87144ec433af1d68205b5fd91b2b839cc16", 0xf4, 0x104}, 0x40800) 1.7154638s ago: executing program 2 (id=984): socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="611230000000000061134c0000000000bf2000000000000015000500511b48013d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702000003000000360600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586162c17600674290ca9d8d6413b8199e34f67ceaaa78710f9f8aba4765c91382f497585ca39c595b21afa6bce62b5ab0d44e9c32ad6f0349d92962a58d39494a19a9183362382792ac85578d3de07b7e155cf4ee5e3dd51212d2831bd8e2655b2fbd88791e4c66c832a774919b28b8a62711f0f156e636804e1d3f44a5ff3d63a3a51f0c7ec0c8c25e072194ddd83aa155a537e15c0d91f502deef03f83e826718705c9aef9613ac4a325a428d147c1749196e94226671fd9573ab0d079d44b13b56f793e98ab571c58e98e022f18a3be3f318e0690fff93f44f22473dc8004fc758218349bd3f0516a72a7ea913bfa7603063ed3118b2d680cbc"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000ff0f00000000000009000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000008385000000710000009500000000000000d1b33014833c21d39b3bcdf7830010119ea64205abb0bd25262c807b7a40823f14da4cb984b1"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7ffd}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r1}, 0x10) socketpair(0x29, 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0xe7, 0x0, 0x0, 0x0, 0x4, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x8000000000000000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000}, 0x28) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000b80)=ANY=[@ANYBLOB="1806000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095000000000000001dcdd739364f4105a460085d42722957cb87f0078e0a13d26307a4e2898ce065b7dc8a536e81d93a631c1d516277e53d2f7119589a1c3016bed8bb077ad13dee038aab4bf3daa05afb971becbb4e2d2b2358157f5b8eb71aad52fcbcc50c4d93b81400"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000200), &(0x7f00000003c0)=r2}, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000100, 0x7, 0x5, 0x0, 0x200000, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)=r2}, 0x20) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x265}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r3, 0x58, &(0x7f0000000800)}, 0x10) 1.67489819s ago: executing program 3 (id=985): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839", 0x5}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x1419e) write$cgroup_subtree(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697"], 0xfdef) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x800) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r7, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) 1.58256964s ago: executing program 1 (id=986): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1900000004000000040000000600000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000008000000000000000002000000000"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xd, &(0x7f0000000d40)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000080), &(0x7f0000000180)=r1}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r7}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000380)=""/70, 0x4}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)=ANY=[@ANYRES16=0x0, @ANYRESHEX=r3], 0x50) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) perf_event_open$cgroup(&(0x7f00000004c0)={0x5, 0x80, 0x8, 0x9, 0x4, 0x2, 0x0, 0xfff, 0xa4f6e35545c750fa, 0x18, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xbd5a, 0x4, @perf_config_ext={0x8, 0x400}, 0x100, 0x0, 0x1, 0x9, 0x5, 0x2, 0xe03d, 0x0, 0x3, 0x0, 0x10000}, 0xffffffffffffffff, 0xb, r5, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r9, &(0x7f0000000000), 0x2a979d) 1.540306731s ago: executing program 4 (id=987): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x29, 0x0, 0x0, 0x0, 0x100000000007, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xe}, 0x40, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a0603000000230000000000000000ff000000ac1414aa6c"], 0xfdef) 1.301268673s ago: executing program 4 (id=988): r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = getpid() perf_event_open(0x0, r1, 0x0, r0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x9, 0x8, 0x4, 0x4009, 0xa}, 0x48) (fail_nth: 85) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.284013833s ago: executing program 2 (id=989): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000200), &(0x7f00000003c0)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, 0x0, 0x48) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r2, &(0x7f0000003000), 0x201, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[], 0x48) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 1.225882443s ago: executing program 0 (id=990): socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000ff0f00000000000009000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000008385000000710000009500000000000000d1b33014833c21d39b3bcdf7830010119ea64205abb0bd25262c807b7a40823f14da4cb984b1"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7ffd}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r1}, 0x10) socketpair(0x29, 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0xe7, 0x0, 0x0, 0x0, 0x4, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x8000000000000000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000}, 0x28) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000b80)=ANY=[@ANYBLOB="1806000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095000000000000001dcdd739364f4105a460085d42722957cb87f0078e0a13d26307a4e2898ce065b7dc8a536e81d93a631c1d516277e53d2f7119589a1c3016bed8bb077ad13dee038aab4bf3daa05afb971becbb4e2d2b2358157f5b8eb71aad52fcbcc50c4d93b81400"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000200), &(0x7f00000003c0)=r2}, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000100, 0x7, 0x5, 0x0, 0x200000, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)=r2}, 0x20) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x265}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r3, 0x58, &(0x7f0000000800)}, 0x10) 983.232574ms ago: executing program 2 (id=991): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000071102f00000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000fb"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0xa}]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x4d, 0x1, 0x3}]}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 909.105135ms ago: executing program 4 (id=992): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000000) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)=@o_path={0x0, 0xffffffffffffffff, 0x4000, r0}, 0x18) socketpair(0xf, 0x3, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000d0000000000000000000000004000000bb7f1a00c600feff0000000a95000000000000004ed8b178ca2ef3bf2a06da4e5dca7f6d9c025d7ec017585514e30aa35fc203fe2d9e4c2661d65f55306cbb30b893f3143f114230c412b8ddcd6bee2d6084a94b870c2788f124b2990d8a5077df969c4fd59a401eb679f738631f74a6468cf6ea0441dc88df48a5f3a27c7e04dddf"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 908.431304ms ago: executing program 1 (id=993): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000240)=ANY=[@ANYBLOB='1-1'], 0x31) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x6, &(0x7f0000000280)=ANY=[@ANYBLOB="b40000000000000073119a000000000085100000020040008500000000e09f2d072fddddfefc62557200000095000000000000009500000000000000d1136c4305ee0d36ef5b69cdc6e86368b03c78c8d642e6527f45"], &(0x7f0000000080)='GPL\x00', 0x9, 0xc3, &(0x7f000000cf3d)=""/195, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8, 0x2, 0x58c4, 0x0, 0xd39f}, 0x0, 0xffffffffffffffff, r2, 0xa) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff", @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, 0x0, &(0x7f0000000040)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r5}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x40010) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000015435a4fd600"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 885.081125ms ago: executing program 1 (id=994): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB="000000000000f1ffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00'}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 848.728215ms ago: executing program 2 (id=995): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e0000008500000050000000"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x9) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000280)={&(0x7f0000000000)=@name={0x1e, 0x2, 0x2, {{0x41, 0x1}, 0x4}}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000180)="a71e11573c640c2a68fd05365cf82ce4f4162ba5d7663117b2ef643f0f730a8d15682dec093e7923298383c8eb97814fb2c4a8ddabf75e3cb5091a3e6ea91cf2869576ac450ffe0be63b59f1d90534f31fcb50353b91d2b3d5effc0666ecb19ed5bfb3c2ef82087a2cacdcafb99cbbd4f8921428be733472ec999bdb63f669f7fa58ec37cfebeb150b4e17517485021d4fb00205fefd5fcae49d6d4160660eb1de68f472a590d184787871f95d0751a26e8039d88153034d2a42563b16e3d64b85da", 0xc2}], 0x1, &(0x7f00000003c0)="caf1df345ef79a99b5a11a890b4e773577571ddaa817ea21dff9f23770eb89a33284bf2992b2a806e7ca69f14f73d2a7db289ef160d77503606a3ff92c1690939d63b7140896a7b35508053cce2a5c86dd99dbe335c3746aaecef7007821b65d2aeec6c70298acd5acc2fbae34e92b01a1a1f2a97cc7912bf149c2ce5dbfd5058ad578c59ec169938b35851b08c44558a5dfeb91c1afedc42716eaf64281499528a6eac0cc49aca97c2e9d8adb0cfc55ccaef332484b1324563a90823652b5c2dfadb06646b6f26b7526ac6edd6ed5f66b8f34801768498ed2348d0f9ebb4edc6edbb87144ec433af1d68205b5fd91b2b839cc16", 0xf4, 0x104}, 0x40800) 830.812425ms ago: executing program 3 (id=996): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000580)='ns/pid_for_children\x00') (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='memory.stat\x00', 0x26e1, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="b702000011000000bfa300000000000007030000407effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca7ebfcd0cd00006ed3d09a6175037958e271b60dedf8937f02008b6d83923dd29c034055d47dafe6c8dc3d5d78c07f34e4d5b3185b310efd4989147a00000000f110026e6d2ef831ab7ea0c34f17e3adeef3bb622003b538dfd8e012e71f6420b90adddff61b5b0a341a2d7cbdb90000bdb2ca76050000003a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132658555cf476619f28d9961b626c57c2691208171656d60a17e3c1c4b751ca532e6ea09c346df3d7cb4ebd31a08b32808b80200000000000000334d83239d1d2e9ff10ff2d27080e71113610e10c358e8327e7050b6c860dac12233f9a1fb9c2aec61ce63a38d316ef49b66d6e42fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a5f3d74ca891c4594e8a4399e01eadd3964663e88535c133f7130856f75643619f567d2e24f29e5dad9326edb697a6ea0182babc18cefd07e002cab5ebfcaad34732181feb215139f15eadddcb0c7cbe31fbae7c34d5ac5e7e64c21add9191eadd6e1795ad6a0f7f8cd3fccbdc3dec04b25dfc17975238345d4f71af35910b158e56657b7218baaa7cbf781c0a99bd50499ccff0f000000000000c7beba3da8223fe5308e4e2833baace04f4087c4f0da0d9a88f9dbb593ddeb3f0932a4d0175b889b8eccf707882042e716df9b57b290c661d4e85031086e97bcc5ca0e221a0e34323c129102b7b7a643e82e88a1940b3c02ed9c92d6f64b1282dc519b00159830d7617001154c46bd3ca96318c570f0721fc7aa2a580900000000000000b4f22cdf550ef091a78098534f0d973058594119d06d5ea9a8d085734000000000000000c12346e47ad97f4ead7cf754a52e4b2d0f22d428bd705414888700a30e2366c6a06b3367a389ca39059787790017b0689a1f3db9c24db65c1e00015c1d573dab18fd0600885f1ea8f2fd299fc3cdafda323e9c7080397bc49d70c060d57bc88fbe09baa058b040360ab9261503d2f363fb099408885afc2bf9a4f8c3506b669e889f5e4be1b8e0d634ebc1057b7e98186fc5141bd670dba6f43279f73db9dec75070cd9ab0fd969169ef6d2857b6bf955012cf7fe50d133da86e0477e42b98a6cc999dc21c3ef408e633dfa35f14d6e734837d365e63845f3c1092f8e34fc7eac9e8af3904ea0f3698cd9492794b82649b50d726bff873339c4cad4ead1348474250eda2c8067ab730c1d85969b95a2a5687f2ed690000522a0b7426000000000000000000000000000000000000000093fc7a82b98f99d9dedf7ba17f5f0b6d15e552fbd21f7eecff10243a43af03eea84c4304a5d3f93c02000000000000000043e1ed82b9aa0ae92a499984a009000000937523f5292d12659906005cde64f903c3415c458a2b32c2318f0858f19c6def80e1481e8e1c0098fc3f38b7a57211adb15d824cfdcf229628c0de49860a44286fe0e257cfa4ce50f3d10763d442824414a73c06837fe08de62f8710ca977960b74d0000ce73da6022a8671d1a3575b4e18c28c73203bf134686dd65808452cb6b76fcb134252c78de9b240de7b4cd015a77f76bb6470c05fc980b3d8f3f964f432a4bf6cddd6222c2da006b6fdb9c8468ae1d986a893b9519444d16a6dfa92c04331a6698507048fab5ae402acd05fe621f22712dfd09004770b4278fa14547d8ce3c21188e5e4e2baacd98e8e451d6aaaf090000006ed1d9018000008dd952595d78e9583bf4ea5de36099e3cddcb24ebb6eddb9e87c9ece87a42c0000abdfc6ea55887dfa18d0aea1b6eca5a883702b0bf3aeebb225895db90e237157a34e9f447237ea5b391bddd1290f7ce987a0e36b8e71b1779bbe95ffa9c3e0f6ba66e4d48e75253e3d633811e4b3220616aafbe7a3a18375ae593eb58fd500426286472466823cb8e1800aaaa0d9463c0c4ea5541a55df6eeffec0b66482228816cdfccb98374c644eea45de7867a0efbad0ab2bc33b350440a90b791b2b33f74a112a3b91b40bed8db2df8633207f8387e04ca52ab0f3f7b058b13523b896800b992972d9609551c27a5916ea16069c5bf55b98d926d3c27e7945b2999600000000f857bc1332d200194f658b930780603134ae6b7f5092772bd5d880dbe21b790c475b14b7fe4fe002dffd651faa79bb0cee0cdac23c3218f2ddaa6f7ba04b696a30d313bed30ba8f35569a9b07ee7308da09c01a4b827aa17bc2213fc1572b0204dd456b11a454d1f3f14179974aae624ea59500f5e048b2780666de81a040663c57f49af25be909984aea1b81f33426f86b4b941c08dfe2bc8ec246ec1aae120c42405e428923f3a83d9ba5c373f5e8a54120b451e2806370f1ed60c9fd5d9af4d16cb0f413c324da52d4bd2e01d3ac2d578d72e2d63322dfc9245ce3e3a097fb82f4e3b61a57094616020f72f1c55ee3d325c7496a7c2f10cfea516ae436751227378f00ca0f1f6c1dcf879700dd90b96a330f92bff736c83ca53e7f02b734d1a9292896f5d7f244bfab4946c7042e88206f641eafcc5b4ba7a7880533cdeac995d1caf6936f356ecf07a0084e7adc2dc12417997b03087c7b3b44b06f6158a2a18ce0e56ffbeb22f40521dd9972583d413098aa80db98ef324a2bfb7961c07b47521973cf0bb6f5530f6216b447b35d6e06b72b22b29de42bb1bc8ce0a0e3500000000000000000000000000b92eb197e4149627920000008000000000801792756f90b37f0858efc387f559203f314a4b0ed750fa72e5948ac3fe5921c14ef578d413e7b2a9e2f87f7b44949fe14c00000000000047030c09f62d444b4981db81799776eeb444000000009705fa8b56779bc876ad4f8d8c8e50815c4c3b27487996c09121caf47f76158362c74904f89cbc588aae84567a83571ff72bb65c082b5a8dee145ff221159aed2768edc05a3167d84205d5af86553c21e1f023a51c0e179fccfbc201982e3ddcaa45613899d19082453b180ca0c525b8d3cfaf7d0bcddeb5d5c7166038f276a92941393ba5e51f77172822bd903d9f8b436656771774ed88daab0d0cfdd1bf4d30ab566e1a4cb3ad66d830e10f7c1de13218aea21e7def613204c2b7c1ad48b01c208f4032e93408000000000000e96db049b92fc32ee34fe7a3419c8fbf03d61c159dc5864e030000a2c55b614d622b8de966c97e1940026f96db3c78ca18c9f08d1c47edf1a4d7298109f31b6078711ee72eacab84213bf50000000000000000000000000000001217887d0452aa6d26e4614d511710abeec84b78c027c160ba375dfa55a49b832ce4dfb91122193d514ed992c07f8cd6d897b314907e15642da228dbc03429e6e0e7ac118ed351c3b0c44bf5d8b58be573f8333aa8cc2ec5b5e305b3dee2562d415b4b9ed530797f55f9fe8510423409629a09000000000000009a35d9ca93e4b4591679547b8de8af1782451f7b8e1de508f1e9e525210d62bc850f8035040ad9e562be58797515b737bfb21d35ac560f99dbd18dad5e6345a464955e8141d75b6177e4fa176a020b0000000000006e76f0294fee7d19a0f327f8796d77b6e24b8df4bb438b527d10e657d49b844198ea9f93c4fd6fd2daa9bd87fd1e02ecc8075dca1280c201043257e9bd3c9a7aa150eb1711632b76d4dc0555d4bfcfd057980136d6e9000003b24fa300ef90bfe4ad364256937796f941c2faad94785f48777941f0cd3dba54ab6a5d5e91e90ac9ae994c3d4108b2fe7eca9413ac9bc138c74800487eb19c48db3f79be964808f109b5e36fc7fdd41def361427b6b9c118e5c9a0a1d5ca24886e33a7f81b2188ec75a5fc9302e3695bdcc9ab11201ef940569c995c21eeaefe2e8fc02e0433dc7371d1f72124ba263e554c30fdd7cd8c2da1e8706417da9ad8916551a1182fac08603dfc2f2279ba161c13984cd753b54a85e6f3010975e9ff51318b09fa13e2d38ce013aab41524c298c3719e31bcb1f102eaeee69a19e006bcdb1acc2664efa949a1a07bb3d7848d5e1381fbe63c522053a3bb32eb6345e10f7a12bf84e0e196a00833f464dd2f6547f14ebf137fce33efeb813211f31ff24d7dbb00f2574ccda59b3ea068fc2a18c37ee579f5a9ecc47da73684bcadd209ae5bbb7147df74d027d8d0adcdb54182c9de8053fc8b1b9d19c16c53d34db6e26f6a88d449f6abf3010100007e206a758a3f02816b4e097cfa3d46e45e7949c5b10691d49b9693a798a330a1ccb32d49772e80862df36dc0156b3f72cd85083f8e96ca1697457ec722766bd46ee2424975a38149bd57e5c0eb4087fc243e7e51b0aca9f0ab0668d7f2ee9ad9f267d8804417aa7e36a64d489bb84a1483fd3c3ecb024060002858cbb1f7708f5b41fca2fee7c03b1f862ce88dc313d913e041dd7583a1ac41c466757c5dd07ea2c5d62a000000000000000019a4e9a9c2cbc906f97fd6eb71b18d09a5df123ebbdb2827b43aed6a29e9942e402c1ae52e9cb98f3019d364fc21ea12023db91ced3c2f06550cef8a79ed39091e4776001187d0ab2f82478431d36470cc008d745ce8fd64c9aa64da230bb080945a557081b767beb75b1ea856a55c71b8fda672289aa6088630d48ac8039f19fec3acbcc5944a4e6fd44af8f10110db730a8d0d41b4ea36f9510f843a471963bd4621b9e43f08d341bb69df430ac6398c1b28bdd33b69b4b86d7c5f30cf728294e8ea1861ce50c367498945285f73c94d91210652eb4f3077cab6be2a3512eddbcb63d091d69fb1b26c8ada9a9f9355aea34fe55fd0d3011cb83ac03268dc66dd108a4e9944241e1d4ba69212ee0e7526e72c19346d08d3c3c82cb987f1bd2fd9ce2c88082ea23abbf23c6bd43fc9f9f8ea7656e25d3d73cd056b1f782de1fe349fc33546558366ed99940c0fda039272d277a3576d4e0469779d711e10b6bf040f7274fd9577c1c33326d2e60ee611ae226ef00e2944fb727832dc8dad36a6072aacfc4bcefb808ab7b3b95e0f60616320b2a9e1f8fac812daac9983639b35184803b7d192ce1f226e97fa23c37df95d067a54a8b412644cad9ecc251fbe418a81aaf00cc8d15758ff0eb885a40630396ba76b8fadc09e62ef70c8a0121e7e8322cb8bc0f50ad33a17143a29c14ecadd1b6244e31b888d8f3fa03208d3e9a4826a98f31995509015ebdc89f2f3106e54d5898d3758b9bfc9e4924e9cedf7f8fd584e7185703cc5f23741ffb480b5a87cd7efcceb409d354bdab211ebd50ab12b13c1b8ce93093a59a0f952153c2efd10e72ec9ee5fa2a00f9637851ddb81d059f9a363c4ada68dd25f19ee9e4841acee7c1b35ad6f9d54cf4939ce78a55a04e655d7746a3989c6f33b02f8497aacb6bfca7456111900000000000000000048d35af24acb66fdd4d1fb150138f0ee6abfc7049c94346868ed76d3a5df7335184386a5c532d425f1a098ff93efd05e5dd8b765121fbdfe5ef44f6472b939c31883f45889142e82086c2448da60d7a40774d71c2da2e7f6d4fe5d36923213cc7b7d71a1c90006e8f8d84953f284b0eb4366beff5df5595827dcd736e8cfab28cfa416e83c06213ca7fd21af56e3de1d80e77060447e20a8b317a4c06e24e99239824d08abf670a685bc46c8168bee4cfc30cc6d0dc030a592925bad3e0f805f0d4b2b600dc3f0c4c6f75bb4e49982f4198ac90ab77c5572c956d415858bad5ee117b3e5f1507bbd0d7a30388865deb11106a93225a81feb08f5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r5}, 0x10) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x800000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000791200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r6, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) (async) close(r0) 801.423865ms ago: executing program 2 (id=997): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x89}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x702, 0xe, 0x700, &(0x7f0000000540)="e460334470b8d480eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc0, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2620}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) openat$cgroup_freezer_state(r2, &(0x7f00000005c0), 0x2, 0x0) r4 = openat$cgroup_freezer_state(r2, &(0x7f0000000340), 0x2, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) 750.748466ms ago: executing program 1 (id=998): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000200), &(0x7f00000003c0)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, 0x0, 0x48) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r2, &(0x7f0000003000), 0x201, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[], 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 651.644836ms ago: executing program 1 (id=999): socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="611230000000000061134c0000000000bf2000000000000015000500511b48013d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702000003000000360600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586162c17600674290ca9d8d6413b8199e34f67ceaaa78710f9f8aba4765c91382f497585ca39c595b21afa6bce62b5ab0d44e9c32ad6f0349d92962a58d39494a19a9183362382792ac85578d3de07b7e155cf4ee5e3dd51212d2831bd8e2655b2fbd88791e4c66c832a774919b28b8a62711f0f156e636804e1d3f44a5ff3d63a3a51f0c7ec0c8c25e072194ddd83aa155a537e15c0d91f502deef03f83e826718705c9aef9613ac4a325a428d147c1749196e94226671fd9573ab0d079d44b13b56f793e98ab571c58e98e022f18a3be3f318e0690fff93f44f22473dc8004fc758218349bd3f0516a72a7ea913bfa7603063ed3118b2d680cbc"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000ff0f00000000000009000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000008385000000710000009500000000000000d1b33014833c21d39b3bcdf7830010119ea64205abb0bd25262c807b7a40823f14da4cb984b1"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7ffd}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r1}, 0x10) socketpair(0x29, 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0xe7, 0x0, 0x0, 0x0, 0x4, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x8000000000000000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000}, 0x28) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000b80)=ANY=[@ANYBLOB="1806000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095000000000000001dcdd739364f4105a460085d42722957cb87f0078e0a13d26307a4e2898ce065b7dc8a536e81d93a631c1d516277e53d2f7119589a1c3016bed8bb077ad13dee038aab4bf3daa05afb971becbb4e2d2b2358157f5b8eb71aad52fcbcc50c4d93b81400"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000200), &(0x7f00000003c0)=r2}, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000100, 0x7, 0x5, 0x0, 0x200000, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)=r2}, 0x20) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x265}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r3, 0x58, &(0x7f0000000800)}, 0x10) 574.760567ms ago: executing program 3 (id=1000): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1900000004000000040000000600000000000000", @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xd, &(0x7f0000000d40)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000080), &(0x7f0000000180)=r1}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\\\x00\x00\x00\x00\x00\x00', @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r5}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)=ANY=[@ANYRES16=0x0, @ANYRESHEX=r3], 0x50) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r7, &(0x7f0000000000), 0x2a979d) 568.637467ms ago: executing program 2 (id=1001): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fa, 0x22d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0x31, 0x8, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x14, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x80) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x18) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r3}, 0x8) write$cgroup_subtree(r4, 0x0, 0x9) r5 = syz_clone(0xf5175b90c0fd38f6, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f00000005c0)=ANY=[@ANYRES16, @ANYRESHEX=r0, @ANYRESHEX=r5, @ANYRESDEC], &(0x7f0000000240)='GPL\x00', 0x72, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r6}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="550a0000f50000006119500000000000180000000000000000000000000000009500000000000000530a74b6de9dcd1207ba5853520dfa954301a1b15a6795e7dd327025964549d0b42d45f70a3f75ceca5dbc35309a7b24703affc466d746420491cbc0574dee6850855cd07288368a4d5af44cb88c1e02c92833a20ccdc3423122b1b8f950bd3d7663f6dd3600153c3441854f229156534bc8fa8a9f2e1a701c1c4057c17f"], &(0x7f0000000000)='GPL\x00'}, 0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 271.548879ms ago: executing program 0 (id=1002): bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000800000004000000bb7f1ad04d00feff000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x4c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, 0x0) perf_event_open(0x0, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) 0s ago: executing program 1 (id=1003): r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = getpid() perf_event_open(0x0, r1, 0x0, r0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x9, 0x8, 0x4, 0x4009, 0xa}, 0x48) (fail_nth: 86) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) kernel console output (not intermixed with test programs): syzkaller syzkaller login: [ 14.459181][ T24] kauditd_printk_skb: 48 callbacks suppressed [ 14.459192][ T24] audit: type=1400 audit(1762335450.960:59): avc: denied { transition } for pid=217 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.468037][ T24] audit: type=1400 audit(1762335450.960:60): avc: denied { noatsecure } for pid=217 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.474002][ T24] audit: type=1400 audit(1762335450.960:61): avc: denied { write } for pid=217 comm="sh" path="pipe:[12619]" dev="pipefs" ino=12619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 14.485162][ T24] audit: type=1400 audit(1762335450.960:62): avc: denied { rlimitinh } for pid=217 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.504595][ T24] audit: type=1400 audit(1762335450.960:63): avc: denied { siginh } for pid=217 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.170' (ED25519) to the list of known hosts. [ 21.358783][ T24] audit: type=1400 audit(1762335457.860:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.359673][ T267] cgroup: Unknown subsys name 'net' [ 21.381463][ T24] audit: type=1400 audit(1762335457.860:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.408737][ T24] audit: type=1400 audit(1762335457.900:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.408895][ T267] cgroup: Unknown subsys name 'devices' [ 21.584281][ T267] cgroup: Unknown subsys name 'hugetlb' [ 21.589883][ T267] cgroup: Unknown subsys name 'rlimit' Setting up swapspace version 1, size = 127995904 bytes [ 21.756713][ T24] audit: type=1400 audit(1762335458.260:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.776841][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.779926][ T24] audit: type=1400 audit(1762335458.260:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.813150][ T24] audit: type=1400 audit(1762335458.260:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.813189][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.836274][ T24] audit: type=1400 audit(1762335458.300:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.870450][ T24] audit: type=1400 audit(1762335458.300:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.896062][ T24] audit: type=1400 audit(1762335458.310:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.921558][ T24] audit: type=1400 audit(1762335458.310:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.354637][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.361710][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.369129][ T276] device bridge_slave_0 entered promiscuous mode [ 22.376826][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.383944][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.391189][ T276] device bridge_slave_1 entered promiscuous mode [ 22.454433][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.461492][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.468988][ T278] device bridge_slave_0 entered promiscuous mode [ 22.477852][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.485195][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.492425][ T278] device bridge_slave_1 entered promiscuous mode [ 22.556846][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.564034][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.571407][ T275] device bridge_slave_0 entered promiscuous mode [ 22.578244][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.585314][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.592590][ T277] device bridge_slave_0 entered promiscuous mode [ 22.599442][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.606505][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.613871][ T277] device bridge_slave_1 entered promiscuous mode [ 22.634765][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.641815][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.649347][ T275] device bridge_slave_1 entered promiscuous mode [ 22.693429][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.700487][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.707790][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.714823][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.725710][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.732756][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.740013][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.747056][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.769445][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.776895][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.784341][ T279] device bridge_slave_0 entered promiscuous mode [ 22.793150][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.800177][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.807604][ T279] device bridge_slave_1 entered promiscuous mode [ 22.878494][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.885561][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.892779][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.899807][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.907491][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.914817][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.922032][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.929441][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.936740][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.944387][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.951951][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.959395][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.979396][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.987001][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.995476][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.002486][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.009996][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.018472][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.025510][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.032782][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.040960][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.047979][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.067434][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.075589][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.082597][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.089991][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.119479][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.127429][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.135658][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.150001][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.178911][ T278] device veth0_vlan entered promiscuous mode [ 23.185570][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.193858][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.201183][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.208847][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.216996][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.224411][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.231707][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.240078][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.247439][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.255716][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.264043][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.271049][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.278587][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.286792][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.293822][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.301116][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.309333][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.316362][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.323708][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.331772][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.338804][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.346156][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.354297][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.361311][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.368780][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.376635][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.384549][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.393059][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.400784][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.422007][ T275] device veth0_vlan entered promiscuous mode [ 23.432527][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.441944][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.450147][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.457182][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.464945][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.473090][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.480930][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.489124][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.497126][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.505608][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.513893][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.521662][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.529638][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.537594][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.545654][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.553215][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.560884][ T276] device veth0_vlan entered promiscuous mode [ 23.568324][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.576478][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.585663][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.593824][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.608566][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.617008][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.626748][ T275] device veth1_macvtap entered promiscuous mode [ 23.638708][ T276] device veth1_macvtap entered promiscuous mode [ 23.647089][ T277] device veth0_vlan entered promiscuous mode [ 23.654797][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.662395][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.670621][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.678851][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.686608][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.694696][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.702649][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.710249][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.719729][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.728235][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.739842][ T278] device veth1_macvtap entered promiscuous mode [ 23.756113][ T279] device veth0_vlan entered promiscuous mode [ 23.764281][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.772456][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.780949][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.788906][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.797165][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.805618][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.813914][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.822088][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.830295][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.838585][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.846809][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.855073][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.863168][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.873539][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.880975][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.894774][ T275] request_module fs-gadgetfs succeeded, but still no fs? [ 23.908620][ T275] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 23.909046][ T277] device veth1_macvtap entered promiscuous mode [ 23.925778][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.934487][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.943793][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.951995][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.960806][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.969870][ T279] device veth1_macvtap entered promiscuous mode [ 23.995372][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.003595][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.011892][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.022390][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.031471][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.040035][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.053433][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.061826][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.070463][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.112561][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.124343][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.150135][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.162613][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.170099][ C1] hrtimer: interrupt took 25176 ns [ 24.182176][ T311] device sit0 entered promiscuous mode [ 24.380446][ T313] device sit0 entered promiscuous mode [ 25.133134][ T352] device syzkaller0 entered promiscuous mode [ 26.230386][ T395] cgroup: syz.4.25 (395) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 26.300451][ T395] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 26.551470][ T403] device syzkaller0 entered promiscuous mode [ 27.179808][ T430] FAULT_INJECTION: forcing a failure. [ 27.179808][ T430] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 27.202070][ T430] CPU: 1 PID: 430 Comm: syz.3.34 Not tainted syzkaller #0 [ 27.209222][ T430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 27.219287][ T430] Call Trace: [ 27.222587][ T430] __dump_stack+0x21/0x24 [ 27.226927][ T430] dump_stack_lvl+0x169/0x1d8 [ 27.231605][ T430] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 27.237755][ T430] ? show_regs_print_info+0x18/0x18 [ 27.242945][ T430] ? dump_stack+0x9/0x1c [ 27.247182][ T430] dump_stack+0x15/0x1c [ 27.251325][ T430] should_fail+0x3c1/0x510 [ 27.255732][ T430] should_fail_alloc_page+0x4f/0x60 [ 27.260918][ T430] __alloc_pages_nodemask+0x109/0x5f0 [ 27.266280][ T430] ? irq_exit_rcu+0x9/0x10 [ 27.270682][ T430] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 27.276219][ T430] ? _raw_spin_trylock_bh+0x130/0x130 [ 27.281583][ T430] __get_free_pages+0xe/0x30 [ 27.286162][ T430] kasan_populate_vmalloc_pte+0x29/0x120 [ 27.291781][ T430] __apply_to_page_range+0x74e/0x9e0 [ 27.297056][ T430] ? kasan_populate_vmalloc+0x70/0x70 [ 27.302415][ T430] ? kasan_populate_vmalloc+0x70/0x70 [ 27.307777][ T430] apply_to_page_range+0x3b/0x50 [ 27.312706][ T430] kasan_populate_vmalloc+0x60/0x70 [ 27.317894][ T430] alloc_vmap_area+0x1734/0x1870 [ 27.322822][ T430] ? vm_map_ram+0x9c0/0x9c0 [ 27.327317][ T430] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 27.332851][ T430] ? __get_vm_area_node+0x113/0x450 [ 27.338045][ T430] __get_vm_area_node+0x147/0x450 [ 27.343056][ T430] __vmalloc_node_range+0xe0/0x780 [ 27.348154][ T430] ? htab_map_alloc+0x4b6/0x970 [ 27.353004][ T430] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 27.358801][ T430] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 27.364943][ T430] bpf_map_area_alloc+0xd5/0xe0 [ 27.369790][ T430] ? htab_map_alloc+0x4b6/0x970 [ 27.374626][ T430] htab_map_alloc+0x4b6/0x970 [ 27.379292][ T430] map_create+0x44e/0x2090 [ 27.383698][ T430] __se_sys_bpf+0x203/0x680 [ 27.388190][ T430] ? __x64_sys_bpf+0x90/0x90 [ 27.392769][ T430] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 27.398822][ T430] ? debug_smp_processor_id+0x17/0x20 [ 27.404183][ T430] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 27.410238][ T430] __x64_sys_bpf+0x7b/0x90 [ 27.414643][ T430] do_syscall_64+0x31/0x40 [ 27.419046][ T430] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 27.424925][ T430] RIP: 0033:0x7fddf67266c9 [ 27.429339][ T430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 27.448931][ T430] RSP: 002b:00007fddf518e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 27.457336][ T430] RAX: ffffffffffffffda RBX: 00007fddf697cfa0 RCX: 00007fddf67266c9 [ 27.465296][ T430] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 27.473257][ T430] RBP: 00007fddf518e090 R08: 0000000000000000 R09: 0000000000000000 [ 27.481216][ T430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 27.489176][ T430] R13: 00007fddf697d038 R14: 00007fddf697cfa0 R15: 00007ffe3f9b82e8 [ 27.684456][ T24] kauditd_printk_skb: 41 callbacks suppressed [ 27.684466][ T24] audit: type=1400 audit(1762335464.190:115): avc: denied { create } for pid=428 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 28.048319][ T24] audit: type=1400 audit(1762335464.550:116): avc: denied { create } for pid=446 comm="syz.2.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 28.190398][ T475] FAULT_INJECTION: forcing a failure. [ 28.190398][ T475] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 28.212913][ T475] CPU: 1 PID: 475 Comm: syz.3.47 Not tainted syzkaller #0 [ 28.220056][ T475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 28.230117][ T475] Call Trace: [ 28.233415][ T475] __dump_stack+0x21/0x24 [ 28.237752][ T475] dump_stack_lvl+0x169/0x1d8 [ 28.242436][ T475] ? show_regs_print_info+0x18/0x18 [ 28.247650][ T475] dump_stack+0x15/0x1c [ 28.251824][ T475] should_fail+0x3c1/0x510 [ 28.256253][ T475] should_fail_alloc_page+0x4f/0x60 [ 28.261455][ T475] __alloc_pages_nodemask+0x109/0x5f0 [ 28.266833][ T475] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 28.272383][ T475] ? _raw_spin_trylock_bh+0x130/0x130 [ 28.277758][ T475] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 28.283919][ T475] __get_free_pages+0xe/0x30 [ 28.288510][ T475] kasan_populate_vmalloc_pte+0x29/0x120 [ 28.294139][ T475] __apply_to_page_range+0x74e/0x9e0 [ 28.299414][ T475] ? kasan_populate_vmalloc+0x70/0x70 [ 28.304775][ T475] ? kasan_populate_vmalloc+0x70/0x70 [ 28.310134][ T475] apply_to_page_range+0x3b/0x50 [ 28.315060][ T475] kasan_populate_vmalloc+0x60/0x70 [ 28.320245][ T475] alloc_vmap_area+0x1734/0x1870 [ 28.325177][ T475] ? vm_map_ram+0x9c0/0x9c0 [ 28.329669][ T475] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 28.335203][ T475] ? __get_vm_area_node+0x113/0x450 [ 28.340388][ T475] __get_vm_area_node+0x147/0x450 [ 28.345402][ T475] __vmalloc_node_range+0xe0/0x780 [ 28.350500][ T475] ? htab_map_alloc+0x4b6/0x970 [ 28.355343][ T475] bpf_map_area_alloc+0xd5/0xe0 [ 28.360179][ T475] ? htab_map_alloc+0x4b6/0x970 [ 28.365020][ T475] htab_map_alloc+0x4b6/0x970 [ 28.369689][ T475] map_create+0x44e/0x2090 [ 28.374093][ T475] __se_sys_bpf+0x203/0x680 [ 28.378584][ T475] ? __x64_sys_bpf+0x90/0x90 [ 28.383169][ T475] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 28.389223][ T475] ? debug_smp_processor_id+0x17/0x20 [ 28.394586][ T475] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 28.400647][ T475] __x64_sys_bpf+0x7b/0x90 [ 28.405051][ T475] do_syscall_64+0x31/0x40 [ 28.409456][ T475] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 28.415335][ T475] RIP: 0033:0x7fddf67266c9 [ 28.419739][ T475] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 28.439330][ T475] RSP: 002b:00007fddf518e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 28.447733][ T475] RAX: ffffffffffffffda RBX: 00007fddf697cfa0 RCX: 00007fddf67266c9 [ 28.455696][ T475] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 28.463655][ T475] RBP: 00007fddf518e090 R08: 0000000000000000 R09: 0000000000000000 [ 28.471616][ T475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 28.479577][ T475] R13: 00007fddf697d038 R14: 00007fddf697cfa0 R15: 00007ffe3f9b82e8 [ 28.830337][ T496] device pim6reg1 entered promiscuous mode [ 28.962450][ T24] audit: type=1400 audit(1762335465.460:117): avc: denied { write } for pid=510 comm="syz.4.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 29.291229][ T24] audit: type=1400 audit(1762335465.790:118): avc: denied { create } for pid=506 comm="syz.3.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 46.666275][ T24] audit: type=1400 audit(1762335483.170:119): avc: denied { create } for pid=627 comm="syz.1.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 47.291671][ T398] syz.1.24 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 47.402434][ T398] CPU: 1 PID: 398 Comm: syz.1.24 Not tainted syzkaller #0 [ 47.409589][ T398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 47.419644][ T398] Call Trace: [ 47.422937][ T398] __dump_stack+0x21/0x24 [ 47.427269][ T398] dump_stack_lvl+0x169/0x1d8 [ 47.431952][ T398] ? show_regs_print_info+0x18/0x18 [ 47.437163][ T398] ? ___ratelimit+0x3d1/0x560 [ 47.441854][ T398] ? __kasan_check_write+0x14/0x20 [ 47.446983][ T398] ? _raw_spin_lock+0x8e/0xe0 [ 47.451666][ T398] dump_stack+0x15/0x1c [ 47.455827][ T398] dump_header+0xdd/0x650 [ 47.460158][ T398] oom_kill_process+0x1fa/0x2c0 [ 47.465010][ T398] out_of_memory+0x94a/0xd70 [ 47.469604][ T398] ? unregister_oom_notifier+0x20/0x20 [ 47.475063][ T398] ? mutex_lock_killable+0x8c/0xe0 [ 47.480172][ T398] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 47.486678][ T398] mem_cgroup_out_of_memory+0x260/0x310 [ 47.492223][ T398] ? mem_cgroup_oom_trylock+0x350/0x350 [ 47.497778][ T398] ? _raw_spin_lock+0x8e/0xe0 [ 47.502469][ T398] ? _raw_spin_trylock_bh+0x130/0x130 [ 47.507842][ T398] ? _raw_spin_unlock+0x4d/0x70 [ 47.512699][ T398] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 47.518247][ T398] ? _raw_spin_unlock_irq+0x4e/0x70 [ 47.523452][ T398] try_charge+0xf61/0x14e0 [ 47.527880][ T398] ? __memcg_kmem_charge+0x140/0x140 [ 47.533164][ T398] ? percpu_counter_add_batch+0x13c/0x160 [ 47.538883][ T398] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 47.544425][ T398] __mem_cgroup_charge+0x14c/0x6d0 [ 47.549540][ T398] shmem_add_to_page_cache+0x55e/0xe10 [ 47.555005][ T398] ? shmem_alloc_page+0x300/0x300 [ 47.560036][ T398] ? _raw_spin_lock_irqsave+0x110/0x110 [ 47.565588][ T398] ? find_lock_entry+0x4b/0x200 [ 47.570440][ T398] ? lru_cache_add+0x164/0x380 [ 47.575205][ T398] ? shmem_getpage_gfp+0x8f3/0x2110 [ 47.580402][ T398] shmem_getpage_gfp+0x8e8/0x2110 [ 47.585438][ T398] shmem_write_begin+0xce/0x1b0 [ 47.590296][ T398] generic_perform_write+0x2be/0x510 [ 47.595585][ T398] ? atime_needs_update+0x5b0/0x5b0 [ 47.600797][ T398] ? grab_cache_page_write_begin+0xb0/0xb0 [ 47.606614][ T398] ? file_remove_privs+0x580/0x580 [ 47.611733][ T398] ? __kasan_check_write+0x14/0x20 [ 47.616844][ T398] ? down_write+0xac/0x110 [ 47.621261][ T398] __generic_file_write_iter+0x24b/0x480 [ 47.626892][ T398] ? generic_write_checks+0x3d4/0x480 [ 47.632282][ T398] generic_file_write_iter+0xa9/0x1d0 [ 47.637669][ T398] __kernel_write+0x55a/0x910 [ 47.642353][ T398] ? vfs_read+0xa10/0xa10 [ 47.646683][ T398] ? populate_vma_page_range+0xf0/0xf0 [ 47.652141][ T398] ? __kasan_check_write+0x14/0x20 [ 47.657244][ T398] ? get_dump_page+0x46b/0x5b0 [ 47.661999][ T398] dump_emit+0x240/0x360 [ 47.666234][ T398] ? wait_for_dump_helpers+0x390/0x390 [ 47.671684][ T398] dump_user_range+0x6a/0x1a0 [ 47.676350][ T398] elf_core_dump+0x278a/0x2bc0 [ 47.681104][ T398] ? load_elf_binary+0x2890/0x2890 [ 47.686206][ T398] ? kvmalloc_node+0x88/0x130 [ 47.690879][ T398] ? _raw_spin_unlock+0x4d/0x70 [ 47.695737][ T398] ? __kasan_check_write+0x14/0x20 [ 47.700857][ T398] ? put_files_struct+0x23b/0x330 [ 47.705893][ T398] do_coredump+0x1ac9/0x27f0 [ 47.710480][ T398] ? simple_acl_create+0x1c0/0x1c0 [ 47.715580][ T398] ? debug_smp_processor_id+0x17/0x20 [ 47.720940][ T398] ? kmem_cache_free+0x100/0x2d0 [ 47.725863][ T398] ? ____kasan_slab_free+0x130/0x160 [ 47.731142][ T398] ? get_signal+0xb98/0x12e0 [ 47.735719][ T398] ? kmem_cache_free+0x100/0x2d0 [ 47.740647][ T398] get_signal+0xf23/0x12e0 [ 47.745056][ T398] arch_do_signal_or_restart+0xbf/0x10f0 [ 47.750682][ T398] ? __bad_area_nosemaphore+0x2b0/0x420 [ 47.756220][ T398] ? down_read_trylock+0x100/0x150 [ 47.761317][ T398] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 47.766934][ T398] ? bad_area+0x6a/0x80 [ 47.771083][ T398] exit_to_user_mode_loop+0xa2/0xe0 [ 47.776268][ T398] exit_to_user_mode_prepare+0x76/0xa0 [ 47.781713][ T398] irqentry_exit_to_user_mode+0x9/0x10 [ 47.787160][ T398] irqentry_exit+0x12/0x60 [ 47.791566][ T398] exc_page_fault+0x67/0xc0 [ 47.796058][ T398] ? asm_exc_page_fault+0x8/0x30 [ 47.800982][ T398] asm_exc_page_fault+0x1e/0x30 [ 47.805820][ T398] RIP: 0033:0xd3 [ 47.809366][ T398] Code: Unable to access opcode bytes at RIP 0xa9. [ 47.815853][ T398] RSP: 002b:0000200000000028 EFLAGS: 00010217 [ 47.821912][ T398] RAX: 0000000000000000 RBX: 00007fc39f292090 RCX: 00007fc39f03b6c9 [ 47.829872][ T398] RDX: 0000200000000040 RSI: 0000200000000020 RDI: 0000000082000400 [ 47.837842][ T398] RBP: 00007fc39f0bdf91 R08: 00002000000000c0 R09: 00002000000000c0 [ 47.845808][ T398] R10: 0000200000000080 R11: 0000000000000206 R12: 0000000000000000 [ 47.853788][ T398] R13: 00007fc39f292128 R14: 00007fc39f292090 R15: 00007fff25fa75e8 [ 47.862377][ T398] memory: usage 307200kB, limit 307200kB, failcnt 11764 [ 47.869374][ T398] memory+swap: usage 430920kB, limit 9007199254740988kB, failcnt 0 [ 47.877345][ T398] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 47.890646][ T398] Memory cgroup stats for /syz1: [ 47.890762][ T398] anon 946176 [ 47.890762][ T398] file 312238080 [ 47.890762][ T398] kernel_stack 0 [ 47.890762][ T398] percpu 0 [ 47.890762][ T398] sock 0 [ 47.890762][ T398] shmem 312102912 [ 47.890762][ T398] file_mapped 135168 [ 47.890762][ T398] file_dirty 0 [ 47.890762][ T398] file_writeback 0 [ 47.890762][ T398] anon_thp 0 [ 47.890762][ T398] inactive_anon 313647104 [ 47.890762][ T398] active_anon 540672 [ 47.890762][ T398] inactive_file 94208 [ 47.890762][ T398] active_file 65536 [ 47.890762][ T398] unevictable 0 [ 47.890762][ T398] slab_reclaimable 0 [ 47.890762][ T398] slab_unreclaimable 0 [ 47.890762][ T398] slab 0 [ 47.890762][ T398] workingset_refault_anon 33 [ 47.890762][ T398] workingset_refault_file 363 [ 47.890762][ T398] workingset_activate_anon 0 [ 47.890762][ T398] workingset_activate_file 165 [ 47.890762][ T398] workingset_restore_anon 0 [ 47.890762][ T398] workingset_restore_file 99 [ 48.178596][ T398] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz.1.24,pid=414,uid=0 [ 48.193607][ T398] Memory cgroup out of memory: Killed process 414 (syz.1.24) total-vm:90164kB, anon-rss:1168kB, file-rss:53440kB, shmem-rss:0kB, UID:0 pgtables:192kB oom_score_adj:1000 [ 48.384808][ T392] syz.1.24 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 48.487417][ T392] CPU: 0 PID: 392 Comm: syz.1.24 Not tainted syzkaller #0 [ 48.494574][ T392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 48.504641][ T392] Call Trace: [ 48.507935][ T392] __dump_stack+0x21/0x24 [ 48.512261][ T392] dump_stack_lvl+0x169/0x1d8 [ 48.516929][ T392] ? show_regs_print_info+0x18/0x18 [ 48.522116][ T392] ? ___ratelimit+0x3d1/0x560 [ 48.526785][ T392] ? __kasan_check_write+0x14/0x20 [ 48.531888][ T392] ? _raw_spin_lock+0x8e/0xe0 [ 48.536554][ T392] dump_stack+0x15/0x1c [ 48.540702][ T392] dump_header+0xdd/0x650 [ 48.545021][ T392] oom_kill_process+0x1fa/0x2c0 [ 48.549857][ T392] out_of_memory+0x94a/0xd70 [ 48.554435][ T392] ? unregister_oom_notifier+0x20/0x20 [ 48.559884][ T392] ? mutex_lock_killable+0xd3/0xe0 [ 48.564983][ T392] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 48.571474][ T392] mem_cgroup_out_of_memory+0x260/0x310 [ 48.577009][ T392] ? mem_cgroup_oom_trylock+0x350/0x350 [ 48.582544][ T392] ? _raw_spin_lock+0x8e/0xe0 [ 48.587209][ T392] ? _raw_spin_trylock_bh+0x130/0x130 [ 48.592568][ T392] ? _raw_spin_unlock+0x4d/0x70 [ 48.597409][ T392] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 48.602940][ T392] ? _raw_spin_unlock_irq+0x4e/0x70 [ 48.608127][ T392] try_charge+0xf61/0x14e0 [ 48.612535][ T392] ? __memcg_kmem_charge+0x140/0x140 [ 48.617808][ T392] ? percpu_counter_add_batch+0x13c/0x160 [ 48.623517][ T392] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 48.629050][ T392] __mem_cgroup_charge+0x14c/0x6d0 [ 48.634149][ T392] shmem_add_to_page_cache+0x55e/0xe10 [ 48.639596][ T392] ? shmem_alloc_page+0x300/0x300 [ 48.644629][ T392] ? find_lock_entry+0x4b/0x200 [ 48.649466][ T392] ? lru_cache_add+0x164/0x380 [ 48.654218][ T392] shmem_getpage_gfp+0x8e8/0x2110 [ 48.659233][ T392] shmem_write_begin+0xce/0x1b0 [ 48.664071][ T392] generic_perform_write+0x2be/0x510 [ 48.669346][ T392] ? atime_needs_update+0x5b0/0x5b0 [ 48.674538][ T392] ? grab_cache_page_write_begin+0xb0/0xb0 [ 48.680330][ T392] ? file_remove_privs+0x580/0x580 [ 48.685428][ T392] ? __kasan_check_write+0x14/0x20 [ 48.690523][ T392] ? down_write+0xac/0x110 [ 48.694931][ T392] __generic_file_write_iter+0x24b/0x480 [ 48.700549][ T392] ? generic_write_checks+0x3d4/0x480 [ 48.705911][ T392] generic_file_write_iter+0xa9/0x1d0 [ 48.711271][ T392] __kernel_write+0x55a/0x910 [ 48.715989][ T392] ? vfs_read+0xa10/0xa10 [ 48.720340][ T392] ? populate_vma_page_range+0xf0/0xf0 [ 48.725799][ T392] ? __kasan_check_write+0x14/0x20 [ 48.730903][ T392] ? get_dump_page+0x46b/0x5b0 [ 48.735656][ T392] dump_emit+0x240/0x360 [ 48.739890][ T392] ? wait_for_dump_helpers+0x390/0x390 [ 48.745358][ T392] dump_user_range+0x6a/0x1a0 [ 48.750044][ T392] elf_core_dump+0x278a/0x2bc0 [ 48.754808][ T392] ? load_elf_binary+0x2890/0x2890 [ 48.759915][ T392] ? __kasan_check_read+0x11/0x20 [ 48.764928][ T392] ? schedule_preempt_disabled+0x20/0x20 [ 48.770553][ T392] ? _raw_spin_unlock+0x4d/0x70 [ 48.775392][ T392] ? __kasan_check_write+0x14/0x20 [ 48.780495][ T392] ? put_files_struct+0x23b/0x330 [ 48.785510][ T392] do_coredump+0x1ac9/0x27f0 [ 48.790094][ T392] ? simple_acl_create+0x1c0/0x1c0 [ 48.795191][ T392] ? debug_smp_processor_id+0x17/0x20 [ 48.800553][ T392] ? kmem_cache_free+0x100/0x2d0 [ 48.805480][ T392] ? ____kasan_slab_free+0x130/0x160 [ 48.810758][ T392] ? get_signal+0xb98/0x12e0 [ 48.815339][ T392] ? kmem_cache_free+0x100/0x2d0 [ 48.820264][ T392] get_signal+0xf23/0x12e0 [ 48.824671][ T392] arch_do_signal_or_restart+0xbf/0x10f0 [ 48.830296][ T392] ? __bad_area_nosemaphore+0x2b0/0x420 [ 48.835828][ T392] ? down_read_trylock+0x100/0x150 [ 48.840927][ T392] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 48.846544][ T392] ? bad_area+0x6a/0x80 [ 48.850695][ T392] exit_to_user_mode_loop+0xa2/0xe0 [ 48.855882][ T392] exit_to_user_mode_prepare+0x76/0xa0 [ 48.861328][ T392] irqentry_exit_to_user_mode+0x9/0x10 [ 48.866773][ T392] irqentry_exit+0x12/0x60 [ 48.871176][ T392] exc_page_fault+0x67/0xc0 [ 48.875668][ T392] ? asm_exc_page_fault+0x8/0x30 [ 48.880592][ T392] asm_exc_page_fault+0x1e/0x30 [ 48.885434][ T392] RIP: 0033:0xd3 [ 48.888976][ T392] Code: Unable to access opcode bytes at RIP 0xa9. [ 48.895465][ T392] RSP: 002b:0000200000000028 EFLAGS: 00010217 [ 48.901523][ T392] RAX: 0000000000000000 RBX: 00007fc39f292090 RCX: 00007fc39f03b6c9 [ 48.909487][ T392] RDX: 0000200000000040 RSI: 0000200000000020 RDI: 0000000082000400 [ 48.917445][ T392] RBP: 00007fc39f0bdf91 R08: 00002000000000c0 R09: 00002000000000c0 [ 48.925408][ T392] R10: 0000200000000080 R11: 0000000000000206 R12: 0000000000000000 [ 48.933369][ T392] R13: 00007fc39f292128 R14: 00007fc39f292090 R15: 00007fff25fa75e8 [ 49.326172][ T392] memory: usage 303524kB, limit 307200kB, failcnt 12883 [ 49.333723][ T392] memory+swap: usage 424068kB, limit 9007199254740988kB, failcnt 0 [ 49.341861][ T392] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 49.463002][ T392] Memory cgroup stats for /syz1: [ 49.463119][ T392] anon 270336 [ 49.463119][ T392] file 310075392 [ 49.463119][ T392] kernel_stack 0 [ 49.463119][ T392] percpu 0 [ 49.463119][ T392] sock 0 [ 49.463119][ T392] shmem 309264384 [ 49.463119][ T392] file_mapped 405504 [ 49.463119][ T392] file_dirty 0 [ 49.463119][ T392] file_writeback 0 [ 49.463119][ T392] anon_thp 0 [ 49.463119][ T392] inactive_anon 309719040 [ 49.463119][ T392] active_anon 540672 [ 49.463119][ T392] inactive_file 94208 [ 49.463119][ T392] active_file 733184 [ 49.463119][ T392] unevictable 0 [ 49.463119][ T392] slab_reclaimable 0 [ 49.463119][ T392] slab_unreclaimable 0 [ 49.463119][ T392] slab 0 [ 49.463119][ T392] workingset_refault_anon 33 [ 49.463119][ T392] workingset_refault_file 924 [ 49.463119][ T392] workingset_activate_anon 0 [ 49.463119][ T392] workingset_activate_file 429 [ 49.463119][ T392] workingset_restore_anon 0 [ 49.463119][ T392] workingset_restore_file 198 [ 49.709740][ T674] FAULT_INJECTION: forcing a failure. [ 49.709740][ T674] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 49.737404][ T674] CPU: 1 PID: 674 Comm: syz.3.107 Not tainted syzkaller #0 [ 49.744775][ T674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 49.754844][ T674] Call Trace: [ 49.758164][ T674] __dump_stack+0x21/0x24 [ 49.762500][ T674] dump_stack_lvl+0x169/0x1d8 [ 49.767179][ T674] ? show_regs_print_info+0x18/0x18 [ 49.772388][ T674] ? kasan_set_track+0x5b/0x70 [ 49.777165][ T674] dump_stack+0x15/0x1c [ 49.781334][ T674] should_fail+0x3c1/0x510 [ 49.785765][ T674] should_fail_alloc_page+0x4f/0x60 [ 49.790978][ T674] __alloc_pages_nodemask+0x109/0x5f0 [ 49.794503][ T392] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null) [ 49.796357][ T674] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 49.796361][ T392] ,cpuset=syz1 [ 49.803205][ T674] ? _raw_spin_trylock_bh+0x130/0x130 [ 49.817474][ T674] __get_free_pages+0xe/0x30 [ 49.822075][ T674] kasan_populate_vmalloc_pte+0x29/0x120 [ 49.827712][ T674] __apply_to_page_range+0x74e/0x9e0 [ 49.833004][ T674] ? kasan_populate_vmalloc+0x70/0x70 [ 49.833736][ T392] ,mems_allowed=0 [ 49.838376][ T674] ? kasan_populate_vmalloc+0x70/0x70 [ 49.838392][ T674] apply_to_page_range+0x3b/0x50 [ 49.852312][ T674] kasan_populate_vmalloc+0x60/0x70 [ 49.857526][ T674] pcpu_get_vm_areas+0x3637/0x4e10 [ 49.858851][ T392] ,oom_memcg= [ 49.862644][ T674] pcpu_create_chunk+0x6ab/0xb40 [ 49.862655][ T674] pcpu_alloc+0x8aa/0x16b0 [ 49.862671][ T674] ? __vmalloc_node_range+0x595/0x780 [ 49.866506][ T392] /syz1 [ 49.870872][ T674] __alloc_percpu_gfp+0x25/0x30 [ 49.875397][ T392] ,task_memcg= [ 49.880625][ T674] prealloc_init+0x24b/0x810 [ 49.880637][ T674] htab_map_alloc+0x688/0x970 [ 49.880652][ T674] map_create+0x44e/0x2090 [ 49.883444][ T392] /syz1 [ 49.888235][ T674] __se_sys_bpf+0x203/0x680 [ 49.891621][ T392] ,task=syz.1.24,pid=406,uid=0 [ 49.896160][ T674] ? __x64_sys_bpf+0x90/0x90 [ 49.896174][ T674] ? debug_smp_processor_id+0x17/0x20 [ 49.896184][ T674] __x64_sys_bpf+0x7b/0x90 [ 49.896193][ T674] do_syscall_64+0x31/0x40 [ 49.896205][ T674] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 49.896215][ T674] RIP: 0033:0x7fddf67266c9 [ 49.896226][ T674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.896233][ T674] RSP: 002b:00007fddf518e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 49.896246][ T674] RAX: ffffffffffffffda RBX: 00007fddf697cfa0 RCX: 00007fddf67266c9 [ 49.896253][ T674] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 49.896259][ T674] RBP: 00007fddf518e090 R08: 0000000000000000 R09: 0000000000000000 [ 49.896266][ T674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 49.896273][ T674] R13: 00007fddf697d038 R14: 00007fddf697cfa0 R15: 00007ffe3f9b82e8 [ 50.016754][ T392] Memory cgroup out of memory: Killed process 406 (syz.1.24) total-vm:90164kB, anon-rss:1176kB, file-rss:53440kB, shmem-rss:0kB, UID:0 pgtables:192kB oom_score_adj:1000 [ 50.038311][ T27] oom_reaper: reaped process 406 (syz.1.24), now anon-rss:0kB, file-rss:53376kB, shmem-rss:0kB [ 50.156508][ T275] syz-executor invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 50.254485][ T275] CPU: 0 PID: 275 Comm: syz-executor Not tainted syzkaller #0 [ 50.261987][ T275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 50.272039][ T275] Call Trace: [ 50.275332][ T275] __dump_stack+0x21/0x24 [ 50.279668][ T275] dump_stack_lvl+0x169/0x1d8 [ 50.284345][ T275] ? show_regs_print_info+0x18/0x18 [ 50.289542][ T275] ? ___ratelimit+0x3d1/0x560 [ 50.294224][ T275] ? __kasan_check_write+0x14/0x20 [ 50.299333][ T275] ? _raw_spin_lock+0x8e/0xe0 [ 50.304010][ T275] dump_stack+0x15/0x1c [ 50.308167][ T275] dump_header+0xdd/0x650 [ 50.312495][ T275] oom_kill_process+0x1fa/0x2c0 [ 50.317348][ T275] out_of_memory+0x94a/0xd70 [ 50.321940][ T275] ? unregister_oom_notifier+0x20/0x20 [ 50.327397][ T275] ? mutex_lock_killable+0xd3/0xe0 [ 50.332507][ T275] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 50.339012][ T275] mem_cgroup_out_of_memory+0x260/0x310 [ 50.344563][ T275] ? mem_cgroup_oom_trylock+0x350/0x350 [ 50.350125][ T275] ? _raw_spin_lock+0x8e/0xe0 [ 50.354808][ T275] ? _raw_spin_trylock_bh+0x130/0x130 [ 50.360177][ T275] ? _raw_spin_unlock+0x4d/0x70 [ 50.365028][ T275] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 50.370570][ T275] ? _raw_spin_unlock_irq+0x4e/0x70 [ 50.375771][ T275] try_charge+0xf61/0x14e0 [ 50.380191][ T275] ? __memcg_kmem_charge+0x140/0x140 [ 50.385469][ T275] ? get_page_from_freelist+0x2235/0x23d0 [ 50.391182][ T275] ? _raw_spin_trylock+0xb1/0x140 [ 50.396203][ T275] ? __add_to_page_cache_locked+0x7f6/0x980 [ 50.402090][ T275] ? read_pages+0x636/0xb50 [ 50.406589][ T275] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 50.412135][ T275] __mem_cgroup_charge+0x14c/0x6d0 [ 50.417250][ T275] __add_to_page_cache_locked+0x1e7/0x980 [ 50.422962][ T275] ? __page_cache_release+0x893/0x920 [ 50.428329][ T275] ? __alloc_pages_nodemask+0x268/0x5f0 [ 50.433868][ T275] ? put_page+0xd0/0xd0 [ 50.438019][ T275] ? workingset_activation+0x250/0x250 [ 50.443476][ T275] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 50.449019][ T275] ? find_get_entry+0x366/0x3c0 [ 50.453866][ T275] ? page_cache_prev_miss+0x210/0x270 [ 50.459233][ T275] add_to_page_cache_lru+0xa7/0x210 [ 50.464427][ T275] pagecache_get_page+0x704/0x930 [ 50.469449][ T275] filemap_fault+0x1ac7/0x2040 [ 50.474217][ T275] ? generic_file_read_iter+0x560/0x560 [ 50.479760][ T275] ? _raw_spin_unlock_irq+0x49/0x70 [ 50.484954][ T275] ? wait_consider_task+0x128f/0x28b0 [ 50.490325][ T275] ? filemap_allow_speculation+0x10/0x10 [ 50.495960][ T275] ? __kasan_check_write+0x14/0x20 [ 50.501068][ T275] ext4_filemap_fault+0x8a/0xa0 [ 50.505921][ T275] handle_pte_fault+0x1fa5/0x3750 [ 50.510944][ T275] handle_mm_fault+0xf3f/0x16a0 [ 50.515796][ T275] ? can_reuse_spf_vma+0xe0/0xe0 [ 50.520729][ T275] ? kernel_wait4+0x1fe/0x260 [ 50.525407][ T275] ? __kasan_check_write+0x14/0x20 [ 50.530514][ T275] ? down_read_trylock+0x100/0x150 [ 50.535621][ T275] ? __init_rwsem+0x1c0/0x1c0 [ 50.540291][ T275] ? find_vma+0x30/0x150 [ 50.544533][ T275] do_user_addr_fault+0x5a2/0xc80 [ 50.549557][ T275] ? do_kern_addr_fault+0x80/0x80 [ 50.554578][ T275] ? debug_smp_processor_id+0x17/0x20 [ 50.559951][ T275] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 50.566011][ T275] exc_page_fault+0x5a/0xc0 [ 50.570512][ T275] ? asm_exc_page_fault+0x8/0x30 [ 50.575449][ T275] asm_exc_page_fault+0x1e/0x30 [ 50.580296][ T275] RIP: 0033:0x7fc39ef11f24 [ 50.584709][ T275] Code: 85 ed 09 00 00 48 b8 db 34 b6 d7 82 de 1b 43 48 f7 a4 24 98 00 00 00 48 8b 05 78 f8 ea 00 48 69 8c 24 90 00 00 00 e8 03 00 00 <8b> 78 08 48 8b 44 24 18 48 c1 ea 12 4c 8b 0d 89 f7 ea 00 48 01 d1 [ 50.604313][ T275] RSP: 002b:00007fff25fa7970 EFLAGS: 00010202 [ 50.610383][ T275] RAX: 0000001b2db24000 RBX: 000000000000003a RCX: 000000000000b798 [ 50.618354][ T275] RDX: 0000000005fc45f9 RSI: 00007fff25fa7a00 RDI: 0000000016d528b0 [ 50.626322][ T275] RBP: 00007fff25fa79ac R08: 000000000000002f R09: 001508d131ea7210 [ 50.634289][ T275] R10: 000000196c6d8064 R11: 0000000000001a4c R12: 0000000000001388 [ 50.642260][ T275] R13: 00000000000927c0 R14: 000000000000b6e0 R15: 00007fff25fa7a00 [ 50.972307][ T275] memory: usage 297900kB, limit 307200kB, failcnt 13427 [ 50.979476][ T275] memory+swap: usage 403268kB, limit 9007199254740988kB, failcnt 0 [ 50.987466][ T275] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 50.994965][ T275] Memory cgroup stats for /syz1: [ 50.996795][ T275] anon 270336 [ 50.996795][ T275] file 297775104 [ 50.996795][ T275] kernel_stack 0 [ 50.996795][ T275] percpu 0 [ 50.996795][ T275] sock 0 [ 50.996795][ T275] shmem 297639936 [ 50.996795][ T275] file_mapped 135168 [ 50.996795][ T275] file_dirty 0 [ 50.996795][ T275] file_writeback 0 [ 50.996795][ T275] anon_thp 0 [ 50.996795][ T275] inactive_anon 299778048 [ 50.996795][ T275] active_anon 2297856 [ 50.996795][ T275] inactive_file 86016 [ 50.996795][ T275] active_file 118784 [ 50.996795][ T275] unevictable 0 [ 50.996795][ T275] slab_reclaimable 0 [ 50.996795][ T275] slab_unreclaimable 0 [ 50.996795][ T275] slab 0 [ 50.996795][ T275] workingset_refault_anon 33 [ 50.996795][ T275] workingset_refault_file 1089 [ 50.996795][ T275] workingset_activate_anon 0 [ 50.996795][ T275] workingset_activate_file 429 [ 50.996795][ T275] workingset_restore_anon 0 [ 50.996795][ T275] workingset_restore_file 198 [ 51.116977][ T275] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz.1.24,pid=398,uid=0 [ 51.358330][ T275] Memory cgroup out of memory: Killed process 398 (syz.1.24) total-vm:90164kB, anon-rss:1168kB, file-rss:53440kB, shmem-rss:0kB, UID:0 pgtables:192kB oom_score_adj:1000 [ 51.939181][ T730] FAULT_INJECTION: forcing a failure. [ 51.939181][ T730] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 52.102971][ T730] CPU: 1 PID: 730 Comm: syz.0.123 Not tainted syzkaller #0 [ 52.110209][ T730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 52.120262][ T730] Call Trace: [ 52.123553][ T730] __dump_stack+0x21/0x24 [ 52.127881][ T730] dump_stack_lvl+0x169/0x1d8 [ 52.132554][ T730] ? show_regs_print_info+0x18/0x18 [ 52.137752][ T730] ? unwind_get_return_address+0x4d/0x90 [ 52.143384][ T730] dump_stack+0x15/0x1c [ 52.147533][ T730] should_fail+0x3c1/0x510 [ 52.151945][ T730] should_fail_alloc_page+0x4f/0x60 [ 52.157137][ T730] __alloc_pages_nodemask+0x109/0x5f0 [ 52.162502][ T730] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 52.168051][ T730] pipe_write+0x570/0x1890 [ 52.172468][ T730] ? pipe_write+0x151/0x1890 [ 52.177058][ T730] ? pipe_read+0xfe0/0xfe0 [ 52.181469][ T730] ? fsnotify_perm+0x66/0x4b0 [ 52.186141][ T730] ? security_file_permission+0x83/0xa0 [ 52.191680][ T730] ? iov_iter_init+0x3f/0x120 [ 52.196358][ T730] vfs_write+0x725/0xd60 [ 52.200597][ T730] ? kernel_write+0x3c0/0x3c0 [ 52.205269][ T730] ? trie_delete_elem+0x40e/0x710 [ 52.210293][ T730] ? __fget_files+0x2c4/0x320 [ 52.214969][ T730] ? __fdget_pos+0x1f7/0x380 [ 52.219569][ T730] ? ksys_write+0x71/0x240 [ 52.223993][ T730] ksys_write+0x140/0x240 [ 52.228322][ T730] ? __ia32_sys_read+0x90/0x90 [ 52.233081][ T730] ? __bpf_trace_sys_enter+0x62/0x70 [ 52.238361][ T730] __x64_sys_write+0x7b/0x90 [ 52.242953][ T730] do_syscall_64+0x31/0x40 [ 52.247370][ T730] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 52.253261][ T730] RIP: 0033:0x7fb26dd326c9 [ 52.257674][ T730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.277288][ T730] RSP: 002b:00007fb26c79a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 52.285704][ T730] RAX: ffffffffffffffda RBX: 00007fb26df88fa0 RCX: 00007fb26dd326c9 [ 52.293679][ T730] RDX: 000000000000fdef RSI: 0000200000000500 RDI: 0000000000000000 [ 52.301659][ T730] RBP: 00007fb26c79a090 R08: 0000000000000000 R09: 0000000000000000 [ 52.309639][ T730] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 52.317613][ T730] R13: 00007fb26df89038 R14: 00007fb26df88fa0 R15: 00007ffed082ad08 [ 53.956007][ T763] device syzkaller0 entered promiscuous mode [ 54.013046][ T764] device syzkaller0 entered promiscuous mode [ 54.579354][ T781] device pim6reg1 entered promiscuous mode [ 57.465688][ T24] audit: type=1400 audit(1762335493.970:120): avc: denied { create } for pid=845 comm="syz.3.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 57.817015][ T852] cgroup: fork rejected by pids controller in /syz2 [ 58.824298][ T869] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.833444][ T869] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.841099][ T869] device bridge_slave_0 entered promiscuous mode [ 58.920383][ T869] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.934772][ T869] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.975005][ T869] device bridge_slave_1 entered promiscuous mode [ 59.015790][ T881] device sit0 entered promiscuous mode [ 59.545101][ T24] audit: type=1400 audit(1762335496.050:121): avc: denied { create } for pid=869 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 59.589059][ T24] audit: type=1400 audit(1762335496.050:122): avc: denied { write } for pid=869 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 59.611743][ T24] audit: type=1400 audit(1762335496.050:123): avc: denied { read } for pid=869 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 59.834270][ T7] device bridge_slave_1 left promiscuous mode [ 59.840463][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.847951][ T7] device bridge_slave_0 left promiscuous mode [ 59.854238][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.861916][ T7] device veth1_macvtap left promiscuous mode [ 60.143237][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.151401][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.159207][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.167721][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.179159][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.186218][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.193892][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.202193][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.210575][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.217638][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.225451][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.262568][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 60.270758][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.309885][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 60.318600][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.334631][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 60.343951][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 60.355477][ T869] device veth0_vlan entered promiscuous mode [ 60.413697][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 60.427473][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 60.450784][ T869] device veth1_macvtap entered promiscuous mode [ 60.529915][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 60.537463][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 60.544945][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 60.553063][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 60.561137][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 60.720444][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 60.728935][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 60.737691][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 60.746312][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 60.912498][ T895] FAULT_INJECTION: forcing a failure. [ 60.912498][ T895] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 60.925919][ T895] CPU: 1 PID: 895 Comm: syz.2.165 Not tainted syzkaller #0 [ 60.933132][ T895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 60.943192][ T895] Call Trace: [ 60.946493][ T895] __dump_stack+0x21/0x24 [ 60.950830][ T895] dump_stack_lvl+0x169/0x1d8 [ 60.955513][ T895] ? show_regs_print_info+0x18/0x18 [ 60.960720][ T895] ? unwind_get_return_address+0x4d/0x90 [ 60.966354][ T895] dump_stack+0x15/0x1c [ 60.970513][ T895] should_fail+0x3c1/0x510 [ 60.974941][ T895] should_fail_alloc_page+0x4f/0x60 [ 60.980148][ T895] __alloc_pages_nodemask+0x109/0x5f0 [ 60.985527][ T895] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 60.991083][ T895] pipe_write+0x570/0x1890 [ 60.995501][ T895] ? pipe_write+0x151/0x1890 [ 61.000099][ T895] ? pipe_read+0xfe0/0xfe0 [ 61.004524][ T895] ? fsnotify_perm+0x66/0x4b0 [ 61.009208][ T895] ? security_file_permission+0x83/0xa0 [ 61.014757][ T895] ? iov_iter_init+0x3f/0x120 [ 61.019445][ T895] vfs_write+0x725/0xd60 [ 61.023703][ T895] ? __kasan_slab_free+0x11/0x20 [ 61.028650][ T895] ? kernel_write+0x3c0/0x3c0 [ 61.033339][ T895] ? trie_delete_elem+0x40e/0x710 [ 61.038370][ T895] ? __fget_files+0x2c4/0x320 [ 61.043060][ T895] ? __fdget_pos+0x1f7/0x380 [ 61.047652][ T895] ? ksys_write+0x71/0x240 [ 61.048713][ T898] FAULT_INJECTION: forcing a failure. [ 61.048713][ T898] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 61.052069][ T895] ksys_write+0x140/0x240 [ 61.052080][ T895] ? __ia32_sys_read+0x90/0x90 [ 61.052091][ T895] ? __bpf_trace_sys_enter+0x62/0x70 [ 61.052102][ T895] __x64_sys_write+0x7b/0x90 [ 61.052119][ T895] do_syscall_64+0x31/0x40 [ 61.088623][ T895] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 61.094510][ T895] RIP: 0033:0x7f86e5b076c9 [ 61.098931][ T895] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 61.118531][ T895] RSP: 002b:00007f86e456f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 61.126940][ T895] RAX: ffffffffffffffda RBX: 00007f86e5d5dfa0 RCX: 00007f86e5b076c9 [ 61.134903][ T895] RDX: 000000000000fdef RSI: 0000200000000500 RDI: 0000000000000000 [ 61.142865][ T895] RBP: 00007f86e456f090 R08: 0000000000000000 R09: 0000000000000000 [ 61.150829][ T895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 61.158788][ T895] R13: 00007f86e5d5e038 R14: 00007f86e5d5dfa0 R15: 00007ffecaddc728 [ 61.172755][ T898] CPU: 1 PID: 898 Comm: syz.1.174 Not tainted syzkaller #0 [ 61.179986][ T898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 61.190047][ T898] Call Trace: [ 61.193344][ T898] __dump_stack+0x21/0x24 [ 61.197690][ T898] dump_stack_lvl+0x169/0x1d8 [ 61.202380][ T898] ? show_regs_print_info+0x18/0x18 [ 61.207594][ T898] dump_stack+0x15/0x1c [ 61.211744][ T898] should_fail+0x3c1/0x510 [ 61.216154][ T898] should_fail_alloc_page+0x4f/0x60 [ 61.221339][ T898] __alloc_pages_nodemask+0x109/0x5f0 [ 61.226704][ T898] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 61.232238][ T898] ? __kmalloc+0x1a7/0x330 [ 61.236654][ T898] ? __vmalloc_node_range+0x29f/0x780 [ 61.242012][ T898] __vmalloc_node_range+0x353/0x780 [ 61.247199][ T898] bpf_map_area_alloc+0xd5/0xe0 [ 61.252039][ T898] ? htab_map_alloc+0x4b6/0x970 [ 61.256902][ T898] htab_map_alloc+0x4b6/0x970 [ 61.261584][ T898] map_create+0x44e/0x2090 [ 61.265994][ T898] __se_sys_bpf+0x203/0x680 [ 61.270486][ T898] ? __x64_sys_bpf+0x90/0x90 [ 61.275071][ T898] ? __bpf_trace_sys_enter+0x62/0x70 [ 61.280343][ T898] __x64_sys_bpf+0x7b/0x90 [ 61.284746][ T898] do_syscall_64+0x31/0x40 [ 61.289153][ T898] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 61.295035][ T898] RIP: 0033:0x7fc39f03b6c9 [ 61.299440][ T898] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 61.319033][ T898] RSP: 002b:00007fc39daa3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 61.327435][ T898] RAX: ffffffffffffffda RBX: 00007fc39f291fa0 RCX: 00007fc39f03b6c9 [ 61.335407][ T898] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 61.343375][ T898] RBP: 00007fc39daa3090 R08: 0000000000000000 R09: 0000000000000000 [ 61.351340][ T898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 61.359301][ T898] R13: 00007fc39f292038 R14: 00007fc39f291fa0 R15: 00007fff25fa75e8 [ 62.719266][ T932] device wg2 entered promiscuous mode [ 64.298377][ T977] device sit0 entered promiscuous mode [ 64.428255][ T991] FAULT_INJECTION: forcing a failure. [ 64.428255][ T991] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 64.446320][ T991] CPU: 0 PID: 991 Comm: syz.4.202 Not tainted syzkaller #0 [ 64.453545][ T991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 64.463603][ T991] Call Trace: [ 64.466900][ T991] __dump_stack+0x21/0x24 [ 64.471230][ T991] dump_stack_lvl+0x169/0x1d8 [ 64.475907][ T991] ? show_regs_print_info+0x18/0x18 [ 64.481102][ T991] dump_stack+0x15/0x1c [ 64.485258][ T991] should_fail+0x3c1/0x510 [ 64.489682][ T991] should_fail_alloc_page+0x4f/0x60 [ 64.494880][ T991] __alloc_pages_nodemask+0x109/0x5f0 [ 64.500254][ T991] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 64.505799][ T991] ? pcpu_block_update_hint_alloc+0x8b5/0xc50 [ 64.511864][ T991] ? find_next_bit+0x80/0x100 [ 64.516539][ T991] pcpu_populate_chunk+0x184/0xca0 [ 64.521654][ T991] pcpu_alloc+0xb4c/0x16b0 [ 64.526091][ T991] __alloc_percpu_gfp+0x25/0x30 [ 64.530956][ T991] prealloc_init+0x24b/0x810 [ 64.535561][ T991] htab_map_alloc+0x688/0x970 [ 64.540244][ T991] map_create+0x44e/0x2090 [ 64.544673][ T991] __se_sys_bpf+0x203/0x680 [ 64.549174][ T991] ? __x64_sys_bpf+0x90/0x90 [ 64.553766][ T991] ? debug_smp_processor_id+0x17/0x20 [ 64.559134][ T991] __x64_sys_bpf+0x7b/0x90 [ 64.563553][ T991] do_syscall_64+0x31/0x40 [ 64.567970][ T991] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 64.573859][ T991] RIP: 0033:0x7f350cac66c9 [ 64.578275][ T991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 64.597892][ T991] RSP: 002b:00007f350b52e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 64.606313][ T991] RAX: ffffffffffffffda RBX: 00007f350cd1cfa0 RCX: 00007f350cac66c9 [ 64.614281][ T991] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 64.622250][ T991] RBP: 00007f350b52e090 R08: 0000000000000000 R09: 0000000000000000 [ 64.630228][ T991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 64.638204][ T991] R13: 00007f350cd1d038 R14: 00007f350cd1cfa0 R15: 00007fff1c4b7398 [ 64.722782][ T999] FAULT_INJECTION: forcing a failure. [ 64.722782][ T999] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 64.791701][ T999] CPU: 0 PID: 999 Comm: syz.0.204 Not tainted syzkaller #0 [ 64.798938][ T999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 64.808993][ T999] Call Trace: [ 64.812287][ T999] __dump_stack+0x21/0x24 [ 64.816618][ T999] dump_stack_lvl+0x169/0x1d8 [ 64.821303][ T999] ? show_regs_print_info+0x18/0x18 [ 64.826507][ T999] dump_stack+0x15/0x1c [ 64.830669][ T999] should_fail+0x3c1/0x510 [ 64.835087][ T999] should_fail_alloc_page+0x4f/0x60 [ 64.840283][ T999] __alloc_pages_nodemask+0x109/0x5f0 [ 64.845659][ T999] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 64.851217][ T999] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 64.857028][ T999] ? __vmalloc_node_range+0x3cd/0x780 [ 64.862400][ T999] __vmalloc_node_range+0x353/0x780 [ 64.867604][ T999] bpf_map_area_alloc+0xd5/0xe0 [ 64.872451][ T999] ? htab_map_alloc+0x4b6/0x970 [ 64.877297][ T999] htab_map_alloc+0x4b6/0x970 [ 64.881974][ T999] map_create+0x44e/0x2090 [ 64.886389][ T999] __se_sys_bpf+0x203/0x680 [ 64.890889][ T999] ? __x64_sys_bpf+0x90/0x90 [ 64.895479][ T999] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 64.901629][ T999] __x64_sys_bpf+0x7b/0x90 [ 64.906050][ T999] do_syscall_64+0x31/0x40 [ 64.910469][ T999] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 64.916363][ T999] RIP: 0033:0x7fb26dd326c9 [ 64.920778][ T999] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 64.940379][ T999] RSP: 002b:00007fb26c79a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 64.948789][ T999] RAX: ffffffffffffffda RBX: 00007fb26df88fa0 RCX: 00007fb26dd326c9 [ 64.956749][ T999] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 64.964712][ T999] RBP: 00007fb26c79a090 R08: 0000000000000000 R09: 0000000000000000 [ 64.972677][ T999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 64.980658][ T999] R13: 00007fb26df89038 R14: 00007fb26df88fa0 R15: 00007ffed082ad08 [ 65.176028][ T24] audit: type=1400 audit(1762335501.680:124): avc: denied { create } for pid=1007 comm="syz.4.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 65.196151][ T1008] device sit0 left promiscuous mode [ 65.236262][ T1009] device sit0 entered promiscuous mode [ 66.146286][ T1026] device macsec0 entered promiscuous mode [ 66.266367][ T1033] FAULT_INJECTION: forcing a failure. [ 66.266367][ T1033] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 66.312917][ T1033] CPU: 0 PID: 1033 Comm: syz.0.214 Not tainted syzkaller #0 [ 66.320234][ T1033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 66.330285][ T1033] Call Trace: [ 66.333579][ T1033] __dump_stack+0x21/0x24 [ 66.337912][ T1033] dump_stack_lvl+0x169/0x1d8 [ 66.342586][ T1033] ? show_regs_print_info+0x18/0x18 [ 66.347785][ T1033] ? __schedule+0xb4f/0x1310 [ 66.352372][ T1033] dump_stack+0x15/0x1c [ 66.356524][ T1033] should_fail+0x3c1/0x510 [ 66.360940][ T1033] should_fail_alloc_page+0x4f/0x60 [ 66.366132][ T1033] __alloc_pages_nodemask+0x109/0x5f0 [ 66.371504][ T1033] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 66.377052][ T1033] ? pcpu_block_update_hint_alloc+0x8b5/0xc50 [ 66.383121][ T1033] ? find_next_bit+0x80/0x100 [ 66.387795][ T1033] pcpu_populate_chunk+0x184/0xca0 [ 66.392903][ T1033] pcpu_alloc+0xb4c/0x16b0 [ 66.397320][ T1033] __alloc_percpu_gfp+0x25/0x30 [ 66.402170][ T1033] prealloc_init+0x24b/0x810 [ 66.406772][ T1033] htab_map_alloc+0x688/0x970 [ 66.411458][ T1033] map_create+0x44e/0x2090 [ 66.415873][ T1033] __se_sys_bpf+0x203/0x680 [ 66.420375][ T1033] ? __x64_sys_bpf+0x90/0x90 [ 66.424968][ T1033] ? debug_smp_processor_id+0x17/0x20 [ 66.430335][ T1033] __x64_sys_bpf+0x7b/0x90 [ 66.434748][ T1033] do_syscall_64+0x31/0x40 [ 66.439163][ T1033] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 66.445063][ T1033] RIP: 0033:0x7fb26dd326c9 [ 66.449496][ T1033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 66.469107][ T1033] RSP: 002b:00007fb26c79a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 66.477522][ T1033] RAX: ffffffffffffffda RBX: 00007fb26df88fa0 RCX: 00007fb26dd326c9 [ 66.485498][ T1033] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 66.493471][ T1033] RBP: 00007fb26c79a090 R08: 0000000000000000 R09: 0000000000000000 [ 66.501438][ T1033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 66.509517][ T1033] R13: 00007fb26df89038 R14: 00007fb26df88fa0 R15: 00007ffed082ad08 [ 66.598656][ T1040] FAULT_INJECTION: forcing a failure. [ 66.598656][ T1040] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 66.617940][ T1040] CPU: 1 PID: 1040 Comm: syz.4.217 Not tainted syzkaller #0 [ 66.625244][ T1040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 66.635303][ T1040] Call Trace: [ 66.638614][ T1040] __dump_stack+0x21/0x24 [ 66.642956][ T1040] dump_stack_lvl+0x169/0x1d8 [ 66.647676][ T1040] ? show_regs_print_info+0x18/0x18 [ 66.652881][ T1040] ? irq_exit_rcu+0x9/0x10 [ 66.657297][ T1040] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 66.663102][ T1040] dump_stack+0x15/0x1c [ 66.667255][ T1040] should_fail+0x3c1/0x510 [ 66.671669][ T1040] should_fail_alloc_page+0x4f/0x60 [ 66.676856][ T1040] __alloc_pages_nodemask+0x109/0x5f0 [ 66.682220][ T1040] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 66.687756][ T1040] ? __kmalloc+0x1a7/0x330 [ 66.692160][ T1040] ? __vmalloc_node_range+0x29f/0x780 [ 66.697519][ T1040] __vmalloc_node_range+0x353/0x780 [ 66.702723][ T1040] bpf_map_area_alloc+0xd5/0xe0 [ 66.707591][ T1040] ? htab_map_alloc+0x4b6/0x970 [ 66.712442][ T1040] htab_map_alloc+0x4b6/0x970 [ 66.717115][ T1040] map_create+0x44e/0x2090 [ 66.721520][ T1040] __se_sys_bpf+0x203/0x680 [ 66.726010][ T1040] ? __x64_sys_bpf+0x90/0x90 [ 66.730597][ T1040] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 66.736739][ T1040] __x64_sys_bpf+0x7b/0x90 [ 66.741143][ T1040] do_syscall_64+0x31/0x40 [ 66.745551][ T1040] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 66.751440][ T1040] RIP: 0033:0x7f350cac66c9 [ 66.755848][ T1040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 66.775441][ T1040] RSP: 002b:00007f350b52e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 66.783844][ T1040] RAX: ffffffffffffffda RBX: 00007f350cd1cfa0 RCX: 00007f350cac66c9 [ 66.792733][ T1040] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 66.800695][ T1040] RBP: 00007f350b52e090 R08: 0000000000000000 R09: 0000000000000000 [ 66.808657][ T1040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 66.816623][ T1040] R13: 00007f350cd1d038 R14: 00007f350cd1cfa0 R15: 00007fff1c4b7398 [ 67.880800][ T24] audit: type=1400 audit(1762335504.380:125): avc: denied { create } for pid=1066 comm="syz.0.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 68.002895][ T1069] device pim6reg1 entered promiscuous mode [ 68.159147][ T1073] device wg2 entered promiscuous mode [ 68.409059][ T1095] device veth0_vlan left promiscuous mode [ 68.427530][ T1095] device veth0_vlan entered promiscuous mode [ 68.621473][ T1120] FAULT_INJECTION: forcing a failure. [ 68.621473][ T1120] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 68.637382][ T1120] CPU: 0 PID: 1120 Comm: syz.0.240 Not tainted syzkaller #0 [ 68.644689][ T1120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 68.654758][ T1120] Call Trace: [ 68.658048][ T1120] __dump_stack+0x21/0x24 [ 68.662371][ T1120] dump_stack_lvl+0x169/0x1d8 [ 68.667037][ T1120] ? show_regs_print_info+0x18/0x18 [ 68.672227][ T1120] ? irq_exit_rcu+0x9/0x10 [ 68.676634][ T1120] dump_stack+0x15/0x1c [ 68.680776][ T1120] should_fail+0x3c1/0x510 [ 68.685183][ T1120] should_fail_alloc_page+0x4f/0x60 [ 68.690367][ T1120] __alloc_pages_nodemask+0x109/0x5f0 [ 68.695728][ T1120] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 68.701263][ T1120] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 68.707060][ T1120] __vmalloc_node_range+0x353/0x780 [ 68.712253][ T1120] bpf_map_area_alloc+0xd5/0xe0 [ 68.717091][ T1120] ? htab_map_alloc+0x4b6/0x970 [ 68.721926][ T1120] htab_map_alloc+0x4b6/0x970 [ 68.726594][ T1120] map_create+0x44e/0x2090 [ 68.730998][ T1120] __se_sys_bpf+0x203/0x680 [ 68.735495][ T1120] ? __x64_sys_bpf+0x90/0x90 [ 68.740082][ T1120] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 68.746135][ T1120] ? debug_smp_processor_id+0x17/0x20 [ 68.751495][ T1120] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 68.757550][ T1120] __x64_sys_bpf+0x7b/0x90 [ 68.761957][ T1120] do_syscall_64+0x31/0x40 [ 68.766368][ T1120] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 68.772248][ T1120] RIP: 0033:0x7fb26dd326c9 [ 68.776657][ T1120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 68.796252][ T1120] RSP: 002b:00007fb26c79a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 68.804656][ T1120] RAX: ffffffffffffffda RBX: 00007fb26df88fa0 RCX: 00007fb26dd326c9 [ 68.812619][ T1120] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 68.820582][ T1120] RBP: 00007fb26c79a090 R08: 0000000000000000 R09: 0000000000000000 [ 68.828544][ T1120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 68.836507][ T1120] R13: 00007fb26df89038 R14: 00007fb26df88fa0 R15: 00007ffed082ad08 [ 68.973160][ T1136] device pim6reg1 entered promiscuous mode [ 69.038048][ T1142] FAULT_INJECTION: forcing a failure. [ 69.038048][ T1142] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 69.051183][ T1142] CPU: 1 PID: 1142 Comm: syz.4.246 Not tainted syzkaller #0 [ 69.058464][ T1142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 69.068511][ T1142] Call Trace: [ 69.071798][ T1142] __dump_stack+0x21/0x24 [ 69.076119][ T1142] dump_stack_lvl+0x169/0x1d8 [ 69.080788][ T1142] ? thaw_kernel_threads+0x220/0x220 [ 69.086058][ T1142] ? vsnprintf+0x1871/0x1960 [ 69.090637][ T1142] ? show_regs_print_info+0x18/0x18 [ 69.095824][ T1142] dump_stack+0x15/0x1c [ 69.099973][ T1142] should_fail+0x3c1/0x510 [ 69.104382][ T1142] should_fail_usercopy+0x1a/0x20 [ 69.109393][ T1142] _copy_to_user+0x20/0x90 [ 69.113797][ T1142] simple_read_from_buffer+0xe9/0x160 [ 69.119156][ T1142] proc_fail_nth_read+0x19a/0x210 [ 69.124168][ T1142] ? proc_fault_inject_write+0x2f0/0x2f0 [ 69.129790][ T1142] ? rw_verify_area+0x1c0/0x360 [ 69.134628][ T1142] ? proc_fault_inject_write+0x2f0/0x2f0 [ 69.140249][ T1142] vfs_read+0x1fe/0xa10 [ 69.144400][ T1142] ? kernel_read+0x70/0x70 [ 69.148809][ T1142] ? __kasan_check_write+0x14/0x20 [ 69.153908][ T1142] ? mutex_lock+0x8c/0xe0 [ 69.158223][ T1142] ? mutex_trylock+0xa0/0xa0 [ 69.162799][ T1142] ? __fget_files+0x2c4/0x320 [ 69.167468][ T1142] ? __fdget_pos+0x2d2/0x380 [ 69.172045][ T1142] ? ksys_read+0x71/0x240 [ 69.176366][ T1142] ksys_read+0x140/0x240 [ 69.180597][ T1142] ? vfs_write+0xd60/0xd60 [ 69.185001][ T1142] ? __bpf_trace_sys_enter+0x62/0x70 [ 69.190276][ T1142] __x64_sys_read+0x7b/0x90 [ 69.194765][ T1142] do_syscall_64+0x31/0x40 [ 69.199173][ T1142] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 69.205058][ T1142] RIP: 0033:0x7f350cac50dc [ 69.209464][ T1142] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 69.229153][ T1142] RSP: 002b:00007f350b52e030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 69.237556][ T1142] RAX: ffffffffffffffda RBX: 00007f350cd1cfa0 RCX: 00007f350cac50dc [ 69.245525][ T1142] RDX: 000000000000000f RSI: 00007f350b52e0a0 RDI: 0000000000000007 [ 69.253484][ T1142] RBP: 00007f350b52e090 R08: 0000000000000000 R09: 0000000000000000 [ 69.261443][ T1142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 69.269406][ T1142] R13: 00007f350cd1d038 R14: 00007f350cd1cfa0 R15: 00007fff1c4b7398 [ 69.682487][ T1162] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 69.783381][ T1165] device veth0_vlan left promiscuous mode [ 69.807207][ T1165] device veth0_vlan entered promiscuous mode [ 69.849855][ T1162] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.857637][ T1162] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.202805][ T24] audit: type=1400 audit(1762335509.700:126): avc: denied { relabelfrom } for pid=1303 comm="syz.4.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 73.281305][ T24] audit: type=1400 audit(1762335509.700:127): avc: denied { relabelto } for pid=1303 comm="syz.4.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 74.072755][ T1344] device veth1_macvtap left promiscuous mode [ 74.165071][ T1348] FAULT_INJECTION: forcing a failure. [ 74.165071][ T1348] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 74.213975][ T1348] CPU: 0 PID: 1348 Comm: syz.2.316 Not tainted syzkaller #0 [ 74.221307][ T1348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 74.231367][ T1348] Call Trace: [ 74.234662][ T1348] __dump_stack+0x21/0x24 [ 74.238995][ T1348] dump_stack_lvl+0x169/0x1d8 [ 74.243669][ T1348] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 74.249817][ T1348] ? show_regs_print_info+0x18/0x18 [ 74.255004][ T1348] ? dump_stack+0x9/0x1c [ 74.259238][ T1348] dump_stack+0x15/0x1c [ 74.263383][ T1348] should_fail+0x3c1/0x510 [ 74.267789][ T1348] should_fail_alloc_page+0x4f/0x60 [ 74.272977][ T1348] __alloc_pages_nodemask+0x109/0x5f0 [ 74.278336][ T1348] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 74.283870][ T1348] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 74.289668][ T1348] __vmalloc_node_range+0x353/0x780 [ 74.294858][ T1348] bpf_map_area_alloc+0xd5/0xe0 [ 74.299695][ T1348] ? htab_map_alloc+0x4b6/0x970 [ 74.304539][ T1348] htab_map_alloc+0x4b6/0x970 [ 74.309205][ T1348] map_create+0x44e/0x2090 [ 74.313609][ T1348] __se_sys_bpf+0x203/0x680 [ 74.318102][ T1348] ? __x64_sys_bpf+0x90/0x90 [ 74.322684][ T1348] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 74.328829][ T1348] __x64_sys_bpf+0x7b/0x90 [ 74.333234][ T1348] do_syscall_64+0x31/0x40 [ 74.337645][ T1348] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 74.343524][ T1348] RIP: 0033:0x7f86e5b076c9 [ 74.347929][ T1348] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 74.367521][ T1348] RSP: 002b:00007f86e456f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 74.375927][ T1348] RAX: ffffffffffffffda RBX: 00007f86e5d5dfa0 RCX: 00007f86e5b076c9 [ 74.383886][ T1348] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 74.391847][ T1348] RBP: 00007f86e456f090 R08: 0000000000000000 R09: 0000000000000000 [ 74.399809][ T1348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 74.407772][ T1348] R13: 00007f86e5d5e038 R14: 00007f86e5d5dfa0 R15: 00007ffecaddc728 [ 74.490458][ T1344] device veth1_macvtap entered promiscuous mode [ 74.501656][ T1344] device macsec0 entered promiscuous mode [ 74.799140][ T1378] syz.3.326[1378] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.799191][ T1378] syz.3.326[1378] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.998177][ T1400] FAULT_INJECTION: forcing a failure. [ 74.998177][ T1400] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 75.030462][ T1400] CPU: 0 PID: 1400 Comm: syz.0.332 Not tainted syzkaller #0 [ 75.037788][ T1400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 75.047836][ T1400] Call Trace: [ 75.051123][ T1400] __dump_stack+0x21/0x24 [ 75.055442][ T1400] dump_stack_lvl+0x169/0x1d8 [ 75.060108][ T1400] ? show_regs_print_info+0x18/0x18 [ 75.065301][ T1400] dump_stack+0x15/0x1c [ 75.069444][ T1400] should_fail+0x3c1/0x510 [ 75.073857][ T1400] should_fail_alloc_page+0x4f/0x60 [ 75.079046][ T1400] __alloc_pages_nodemask+0x109/0x5f0 [ 75.084408][ T1400] ? __irq_exit_rcu+0x40/0x150 [ 75.089163][ T1400] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 75.094700][ T1400] ? asm_common_interrupt+0x40/0x40 [ 75.099889][ T1400] ? __vmalloc_node_range+0x3cd/0x780 [ 75.105252][ T1400] ? __alloc_pages_nodemask+0x1/0x5f0 [ 75.110610][ T1400] __vmalloc_node_range+0x353/0x780 [ 75.115799][ T1400] bpf_map_area_alloc+0xd5/0xe0 [ 75.120637][ T1400] ? htab_map_alloc+0x4b6/0x970 [ 75.125473][ T1400] htab_map_alloc+0x4b6/0x970 [ 75.130140][ T1400] map_create+0x44e/0x2090 [ 75.134548][ T1400] __se_sys_bpf+0x203/0x680 [ 75.139039][ T1400] ? __x64_sys_bpf+0x90/0x90 [ 75.143624][ T1400] ? __bpf_trace_sys_enter+0x62/0x70 [ 75.148896][ T1400] __x64_sys_bpf+0x7b/0x90 [ 75.153300][ T1400] do_syscall_64+0x31/0x40 [ 75.157710][ T1400] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 75.163589][ T1400] RIP: 0033:0x7fb26dd326c9 [ 75.167993][ T1400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 75.187589][ T1400] RSP: 002b:00007fb26c79a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 75.195993][ T1400] RAX: ffffffffffffffda RBX: 00007fb26df88fa0 RCX: 00007fb26dd326c9 [ 75.203957][ T1400] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 75.211916][ T1400] RBP: 00007fb26c79a090 R08: 0000000000000000 R09: 0000000000000000 [ 75.219875][ T1400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 75.227835][ T1400] R13: 00007fb26df89038 R14: 00007fb26df88fa0 R15: 00007ffed082ad08 [ 75.242030][ T1390] device wg2 left promiscuous mode [ 75.298451][ T1403] device veth0_vlan left promiscuous mode [ 75.311354][ T1403] device veth0_vlan entered promiscuous mode [ 75.341674][ T893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.350091][ T893] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 75.357647][ T893] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 75.382937][ T24] audit: type=1400 audit(1762335511.880:128): avc: denied { ioctl } for pid=1406 comm="syz.2.335" path="uts:[4026532834]" dev="nsfs" ino=4026532834 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.424864][ T24] audit: type=1400 audit(1762335511.920:129): avc: denied { create } for pid=1408 comm="syz.0.336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 75.520219][ T1416] device syzkaller0 entered promiscuous mode [ 75.902096][ T1449] FAULT_INJECTION: forcing a failure. [ 75.902096][ T1449] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 75.915722][ T1449] CPU: 0 PID: 1449 Comm: syz.3.346 Not tainted syzkaller #0 [ 75.923005][ T1449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 75.933056][ T1449] Call Trace: [ 75.936356][ T1449] __dump_stack+0x21/0x24 [ 75.940688][ T1449] dump_stack_lvl+0x169/0x1d8 [ 75.945366][ T1449] ? show_regs_print_info+0x18/0x18 [ 75.950566][ T1449] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 75.956374][ T1449] dump_stack+0x15/0x1c [ 75.960532][ T1449] should_fail+0x3c1/0x510 [ 75.964952][ T1449] should_fail_alloc_page+0x4f/0x60 [ 75.970150][ T1449] __alloc_pages_nodemask+0x109/0x5f0 [ 75.975526][ T1449] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 75.981071][ T1449] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 75.986884][ T1449] __vmalloc_node_range+0x353/0x780 [ 75.992089][ T1449] bpf_map_area_alloc+0xd5/0xe0 [ 75.996941][ T1449] ? htab_map_alloc+0x4b6/0x970 [ 76.001789][ T1449] htab_map_alloc+0x4b6/0x970 [ 76.006470][ T1449] map_create+0x44e/0x2090 [ 76.010888][ T1449] __se_sys_bpf+0x203/0x680 [ 76.015389][ T1449] ? __x64_sys_bpf+0x90/0x90 [ 76.019992][ T1449] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 76.026065][ T1449] ? debug_smp_processor_id+0x17/0x20 [ 76.031441][ T1449] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 76.037509][ T1449] __x64_sys_bpf+0x7b/0x90 [ 76.041925][ T1449] do_syscall_64+0x31/0x40 [ 76.046344][ T1449] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 76.052236][ T1449] RIP: 0033:0x7fddf67266c9 [ 76.056653][ T1449] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 76.076271][ T1449] RSP: 002b:00007fddf518e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 76.084701][ T1449] RAX: ffffffffffffffda RBX: 00007fddf697cfa0 RCX: 00007fddf67266c9 [ 76.092682][ T1449] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 76.100662][ T1449] RBP: 00007fddf518e090 R08: 0000000000000000 R09: 0000000000000000 [ 76.108646][ T1449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 76.116621][ T1449] R13: 00007fddf697d038 R14: 00007fddf697cfa0 R15: 00007ffe3f9b82e8 [ 76.890776][ T1492] FAULT_INJECTION: forcing a failure. [ 76.890776][ T1492] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 76.956143][ T1492] CPU: 0 PID: 1492 Comm: syz.1.359 Not tainted syzkaller #0 [ 76.963471][ T1492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 76.973528][ T1492] Call Trace: [ 76.976827][ T1492] __dump_stack+0x21/0x24 [ 76.981158][ T1492] dump_stack_lvl+0x169/0x1d8 [ 76.985834][ T1492] ? show_regs_print_info+0x18/0x18 [ 76.991032][ T1492] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 76.996836][ T1492] dump_stack+0x15/0x1c [ 77.000987][ T1492] should_fail+0x3c1/0x510 [ 77.005403][ T1492] should_fail_alloc_page+0x4f/0x60 [ 77.010599][ T1492] __alloc_pages_nodemask+0x109/0x5f0 [ 77.015967][ T1492] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 77.021515][ T1492] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 77.027337][ T1492] __vmalloc_node_range+0x353/0x780 [ 77.032543][ T1492] bpf_map_area_alloc+0xd5/0xe0 [ 77.037399][ T1492] ? htab_map_alloc+0x4b6/0x970 [ 77.042255][ T1492] htab_map_alloc+0x4b6/0x970 [ 77.046933][ T1492] map_create+0x44e/0x2090 [ 77.051352][ T1492] __se_sys_bpf+0x203/0x680 [ 77.055855][ T1492] ? __x64_sys_bpf+0x90/0x90 [ 77.060448][ T1492] ? debug_smp_processor_id+0x17/0x20 [ 77.065815][ T1492] __x64_sys_bpf+0x7b/0x90 [ 77.070232][ T1492] do_syscall_64+0x31/0x40 [ 77.074649][ T1492] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 77.080535][ T1492] RIP: 0033:0x7fc39f03b6c9 [ 77.084949][ T1492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 77.104552][ T1492] RSP: 002b:00007fc39daa3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 77.112962][ T1492] RAX: ffffffffffffffda RBX: 00007fc39f291fa0 RCX: 00007fc39f03b6c9 [ 77.120931][ T1492] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 77.128899][ T1492] RBP: 00007fc39daa3090 R08: 0000000000000000 R09: 0000000000000000 [ 77.136868][ T1492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 77.144837][ T1492] R13: 00007fc39f292038 R14: 00007fc39f291fa0 R15: 00007fff25fa75e8 [ 79.493397][ T1565] device veth0_vlan left promiscuous mode [ 79.536336][ T1565] device veth0_vlan entered promiscuous mode [ 79.556650][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.566057][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.573831][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.636683][ T1578] device veth1_macvtap left promiscuous mode [ 79.645826][ T1578] device macsec0 entered promiscuous mode [ 79.652853][ T1582] device sit0 left promiscuous mode [ 79.946704][ T24] audit: type=1400 audit(1762335516.450:130): avc: denied { write } for pid=1595 comm="syz.0.388" name="cgroup.subtree_control" dev="cgroup2" ino=202 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 80.025574][ T1596] device veth0_vlan left promiscuous mode [ 80.084448][ T1596] device veth0_vlan entered promiscuous mode [ 80.119707][ T24] audit: type=1400 audit(1762335516.480:131): avc: denied { open } for pid=1595 comm="syz.0.388" path="" dev="cgroup2" ino=202 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 80.164700][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 80.185291][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 80.290921][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 81.572425][ T1656] syz.0.409 uses obsolete (PF_INET,SOCK_PACKET) [ 81.868417][ T1660] device pim6reg1 entered promiscuous mode [ 83.344219][ T1708] cgroup: fork rejected by pids controller in /syz4 [ 83.548954][ T1762] FAULT_INJECTION: forcing a failure. [ 83.548954][ T1762] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 83.603316][ T1762] CPU: 0 PID: 1762 Comm: syz.1.433 Not tainted syzkaller #0 [ 83.610647][ T1762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 83.620708][ T1762] Call Trace: [ 83.624009][ T1762] __dump_stack+0x21/0x24 [ 83.628367][ T1762] dump_stack_lvl+0x169/0x1d8 [ 83.633051][ T1762] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 83.639227][ T1762] ? show_regs_print_info+0x18/0x18 [ 83.644424][ T1762] ? dump_stack+0x9/0x1c [ 83.648669][ T1762] dump_stack+0x15/0x1c [ 83.652826][ T1762] should_fail+0x3c1/0x510 [ 83.657250][ T1762] should_fail_alloc_page+0x4f/0x60 [ 83.662459][ T1762] __alloc_pages_nodemask+0x109/0x5f0 [ 83.667845][ T1762] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 83.673401][ T1762] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 83.679219][ T1762] ? __vmalloc_node_range+0x3cd/0x780 [ 83.684606][ T1762] __vmalloc_node_range+0x353/0x780 [ 83.689810][ T1762] bpf_map_area_alloc+0xd5/0xe0 [ 83.694663][ T1762] ? htab_map_alloc+0x4b6/0x970 [ 83.699515][ T1762] htab_map_alloc+0x4b6/0x970 [ 83.704202][ T1762] map_create+0x44e/0x2090 [ 83.708625][ T1762] __se_sys_bpf+0x203/0x680 [ 83.713127][ T1762] ? __x64_sys_bpf+0x90/0x90 [ 83.717724][ T1762] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 83.723889][ T1762] __x64_sys_bpf+0x7b/0x90 [ 83.728333][ T1762] do_syscall_64+0x31/0x40 [ 83.732763][ T1762] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 83.738659][ T1762] RIP: 0033:0x7fc39f03b6c9 [ 83.743082][ T1762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 83.762692][ T1762] RSP: 002b:00007fc39daa3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 83.771113][ T1762] RAX: ffffffffffffffda RBX: 00007fc39f291fa0 RCX: 00007fc39f03b6c9 [ 83.779091][ T1762] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 83.787070][ T1762] RBP: 00007fc39daa3090 R08: 0000000000000000 R09: 0000000000000000 [ 83.795161][ T1762] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 83.803151][ T1762] R13: 00007fc39f292038 R14: 00007fc39f291fa0 R15: 00007fff25fa75e8 [ 84.677012][ T1862] device pim6reg1 entered promiscuous mode [ 84.707632][ T1860] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.734807][ T1860] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.742282][ T1860] device bridge_slave_0 entered promiscuous mode [ 84.776884][ T1860] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.784136][ T1860] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.791619][ T1860] device bridge_slave_1 entered promiscuous mode [ 85.031787][ T1860] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.038886][ T1860] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.046171][ T1860] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.053216][ T1860] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.133917][ T893] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.163000][ T893] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.252776][ T893] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 85.264592][ T893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 85.306921][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 85.321385][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 85.329721][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.336786][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.356611][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 85.368501][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 85.388189][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.395282][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.409677][ T24] audit: type=1400 audit(1762335521.910:132): avc: denied { create } for pid=1888 comm="syz.2.450" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 85.468159][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 85.478191][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 85.535364][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 85.605993][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 85.655135][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 85.680885][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 85.726326][ T1860] device veth0_vlan entered promiscuous mode [ 85.789114][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 85.826146][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 85.950191][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 85.964725][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 85.995248][ T1860] device veth1_macvtap entered promiscuous mode [ 86.048076][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 86.057490][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 86.065835][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 86.110228][ T49] device bridge_slave_1 left promiscuous mode [ 86.116822][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.124606][ T49] device bridge_slave_0 left promiscuous mode [ 86.130768][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.139584][ T49] device veth1_macvtap left promiscuous mode [ 86.145696][ T49] device veth0_vlan left promiscuous mode [ 86.311609][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 86.329119][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 86.347142][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 86.355952][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 87.199105][ T1920] FAULT_INJECTION: forcing a failure. [ 87.199105][ T1920] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 87.212687][ T1920] CPU: 0 PID: 1920 Comm: syz.4.461 Not tainted syzkaller #0 [ 87.219977][ T1920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 87.230032][ T1920] Call Trace: [ 87.233325][ T1920] __dump_stack+0x21/0x24 [ 87.237651][ T1920] dump_stack_lvl+0x169/0x1d8 [ 87.242325][ T1920] ? show_regs_print_info+0x18/0x18 [ 87.247516][ T1920] ? irq_exit_rcu+0x9/0x10 [ 87.251923][ T1920] dump_stack+0x15/0x1c [ 87.256071][ T1920] should_fail+0x3c1/0x510 [ 87.260480][ T1920] should_fail_alloc_page+0x4f/0x60 [ 87.265667][ T1920] __alloc_pages_nodemask+0x109/0x5f0 [ 87.271034][ T1920] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 87.276574][ T1920] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 87.282371][ T1920] __vmalloc_node_range+0x353/0x780 [ 87.287569][ T1920] bpf_map_area_alloc+0xd5/0xe0 [ 87.292416][ T1920] ? htab_map_alloc+0x4b6/0x970 [ 87.297258][ T1920] htab_map_alloc+0x4b6/0x970 [ 87.301928][ T1920] map_create+0x44e/0x2090 [ 87.306337][ T1920] __se_sys_bpf+0x203/0x680 [ 87.310829][ T1920] ? __x64_sys_bpf+0x90/0x90 [ 87.315415][ T1920] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 87.321558][ T1920] __x64_sys_bpf+0x7b/0x90 [ 87.325970][ T1920] do_syscall_64+0x31/0x40 [ 87.330386][ T1920] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 87.336273][ T1920] RIP: 0033:0x7fdfd644c6c9 [ 87.340679][ T1920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 87.360279][ T1920] RSP: 002b:00007fdfd4eb4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 87.368689][ T1920] RAX: ffffffffffffffda RBX: 00007fdfd66a2fa0 RCX: 00007fdfd644c6c9 [ 87.376656][ T1920] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 87.384625][ T1920] RBP: 00007fdfd4eb4090 R08: 0000000000000000 R09: 0000000000000000 [ 87.392591][ T1920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 87.400556][ T1920] R13: 00007fdfd66a3038 R14: 00007fdfd66a2fa0 R15: 00007fff352a8ba8 [ 87.454584][ T1922] device syzkaller0 entered promiscuous mode [ 89.643128][ T1979] device syzkaller0 entered promiscuous mode [ 89.764314][ T1986] device veth1_macvtap left promiscuous mode [ 89.930940][ T1990] device veth1_macvtap entered promiscuous mode [ 89.968648][ T1990] device macsec0 entered promiscuous mode [ 90.043483][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 91.758350][ T2042] FAULT_INJECTION: forcing a failure. [ 91.758350][ T2042] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 91.811362][ T2042] CPU: 0 PID: 2042 Comm: syz.4.499 Not tainted syzkaller #0 [ 91.818682][ T2042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 91.828744][ T2042] Call Trace: [ 91.832042][ T2042] __dump_stack+0x21/0x24 [ 91.836379][ T2042] dump_stack_lvl+0x169/0x1d8 [ 91.841064][ T2042] ? show_regs_print_info+0x18/0x18 [ 91.846268][ T2042] ? kasan_check_range+0x7f/0x290 [ 91.851294][ T2042] dump_stack+0x15/0x1c [ 91.855451][ T2042] should_fail+0x3c1/0x510 [ 91.859873][ T2042] should_fail_alloc_page+0x4f/0x60 [ 91.865073][ T2042] __alloc_pages_nodemask+0x109/0x5f0 [ 91.870450][ T2042] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 91.876005][ T2042] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 91.881820][ T2042] __vmalloc_node_range+0x353/0x780 [ 91.887028][ T2042] bpf_map_area_alloc+0xd5/0xe0 [ 91.891881][ T2042] ? htab_map_alloc+0x4b6/0x970 [ 91.896741][ T2042] htab_map_alloc+0x4b6/0x970 [ 91.901418][ T2042] map_create+0x44e/0x2090 [ 91.905836][ T2042] __se_sys_bpf+0x203/0x680 [ 91.910343][ T2042] ? __x64_sys_bpf+0x90/0x90 [ 91.914948][ T2042] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 91.921020][ T2042] ? debug_smp_processor_id+0x17/0x20 [ 91.926394][ T2042] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 91.932467][ T2042] __x64_sys_bpf+0x7b/0x90 [ 91.936881][ T2042] do_syscall_64+0x31/0x40 [ 91.941292][ T2042] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 91.947174][ T2042] RIP: 0033:0x7fdfd644c6c9 [ 91.951579][ T2042] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.971173][ T2042] RSP: 002b:00007fdfd4eb4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 91.979575][ T2042] RAX: ffffffffffffffda RBX: 00007fdfd66a2fa0 RCX: 00007fdfd644c6c9 [ 91.987536][ T2042] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 91.995502][ T2042] RBP: 00007fdfd4eb4090 R08: 0000000000000000 R09: 0000000000000000 [ 92.003465][ T2042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 92.011431][ T2042] R13: 00007fdfd66a3038 R14: 00007fdfd66a2fa0 R15: 00007fff352a8ba8 [ 93.126650][ T2074] syz.4.510[2074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.126738][ T2074] syz.4.510[2074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.244067][ T2076] syz.4.510[2076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.324248][ T2076] syz.4.510[2076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.683546][ T24] audit: type=1400 audit(1762335530.190:133): avc: denied { create } for pid=2101 comm="syz.3.518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 96.235106][ T2166] device veth1_macvtap left promiscuous mode [ 96.311809][ T2166] device macsec0 left promiscuous mode [ 96.376020][ T2168] device veth1_macvtap entered promiscuous mode [ 96.432978][ T2168] device macsec0 entered promiscuous mode [ 96.464474][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 96.485411][ T24] audit: type=1400 audit(1762335532.990:134): avc: denied { create } for pid=2169 comm="syz.1.540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 96.755687][ T2184] FAULT_INJECTION: forcing a failure. [ 96.755687][ T2184] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 96.818371][ T2184] CPU: 0 PID: 2184 Comm: syz.1.546 Not tainted syzkaller #0 [ 96.825693][ T2184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 96.835755][ T2184] Call Trace: [ 96.839056][ T2184] __dump_stack+0x21/0x24 [ 96.843389][ T2184] dump_stack_lvl+0x169/0x1d8 [ 96.848067][ T2184] ? show_regs_print_info+0x18/0x18 [ 96.853271][ T2184] ? slab_post_alloc_hook+0x5d/0x2f0 [ 96.858562][ T2184] ? __alloc_skb+0x9e/0x520 [ 96.863081][ T2184] ? alloc_skb_with_frags+0xa2/0x560 [ 96.868372][ T2184] ? sock_alloc_send_pskb+0x853/0x980 [ 96.873754][ T2184] ? tun_chr_write_iter+0x1bf/0x270 [ 96.878970][ T2184] dump_stack+0x15/0x1c [ 96.883129][ T2184] should_fail+0x3c1/0x510 [ 96.887549][ T2184] should_fail_alloc_page+0x4f/0x60 [ 96.892746][ T2184] __alloc_pages_nodemask+0x109/0x5f0 [ 96.898119][ T2184] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 96.903667][ T2184] kmalloc_order+0x4c/0x160 [ 96.908180][ T2184] ? slab_post_alloc_hook+0x7d/0x2f0 [ 96.913467][ T2184] kmalloc_order_trace+0x16/0x80 [ 96.918407][ T2184] __kmalloc_track_caller+0x1d7/0x320 [ 96.923780][ T2184] ? __alloc_skb+0x9e/0x520 [ 96.928307][ T2184] ? alloc_skb_with_frags+0xa2/0x560 [ 96.933593][ T2184] __alloc_skb+0xdc/0x520 [ 96.937925][ T2184] alloc_skb_with_frags+0xa2/0x560 [ 96.943037][ T2184] sock_alloc_send_pskb+0x853/0x980 [ 96.948239][ T2184] ? is_bpf_text_address+0x177/0x190 [ 96.953528][ T2184] ? __kernel_text_address+0xa0/0x100 [ 96.958901][ T2184] ? sock_kzfree_s+0x60/0x60 [ 96.963493][ T2184] ? stack_trace_save+0x98/0xe0 [ 96.968351][ T2184] tun_get_user+0x4bd/0x3090 [ 96.972961][ T2184] ? tun_do_read+0x1c00/0x1c00 [ 96.977731][ T2184] ? kstrtouint_from_user+0x1a0/0x200 [ 96.983105][ T2184] ? __fsnotify_parent+0x5f5/0x6c0 [ 96.988214][ T2184] ? avc_policy_seqno+0x1b/0x70 [ 96.993064][ T2184] ? selinux_file_permission+0x2a5/0x510 [ 96.998695][ T2184] ? fsnotify_perm+0x66/0x4b0 [ 97.003376][ T2184] tun_chr_write_iter+0x1bf/0x270 [ 97.008405][ T2184] vfs_write+0x725/0xd60 [ 97.012658][ T2184] ? __bpf_trace_kmem_free+0x6f/0x90 [ 97.017946][ T2184] ? kernel_write+0x3c0/0x3c0 [ 97.022623][ T2184] ? __fget_files+0x2c4/0x320 [ 97.027304][ T2184] ? __fdget_pos+0x1f7/0x380 [ 97.031896][ T2184] ? ksys_write+0x71/0x240 [ 97.036310][ T2184] ksys_write+0x140/0x240 [ 97.040644][ T2184] ? __ia32_sys_read+0x90/0x90 [ 97.045415][ T2184] ? debug_smp_processor_id+0x17/0x20 [ 97.050788][ T2184] __x64_sys_write+0x7b/0x90 [ 97.055383][ T2184] do_syscall_64+0x31/0x40 [ 97.059805][ T2184] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 97.065706][ T2184] RIP: 0033:0x7fc39f03b6c9 [ 97.070131][ T2184] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 97.089745][ T2184] RSP: 002b:00007fc39daa3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 97.098175][ T2184] RAX: ffffffffffffffda RBX: 00007fc39f291fa0 RCX: 00007fc39f03b6c9 [ 97.106151][ T2184] RDX: 000000000000fdef RSI: 0000200000000580 RDI: 00000000000000c8 [ 97.114131][ T2184] RBP: 00007fc39daa3090 R08: 0000000000000000 R09: 0000000000000000 [ 97.122104][ T2184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 97.130079][ T2184] R13: 00007fc39f292038 R14: 00007fc39f291fa0 R15: 00007fff25fa75e8 [ 97.196133][ T24] audit: type=1400 audit(1762335533.700:135): avc: denied { create } for pid=2185 comm="syz.0.547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 97.922177][ T2202] device syzkaller0 entered promiscuous mode [ 98.354514][ T2212] device veth0_vlan left promiscuous mode [ 98.370285][ T2212] device veth0_vlan entered promiscuous mode [ 98.466496][ T2219] FAULT_INJECTION: forcing a failure. [ 98.466496][ T2219] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 98.569483][ T2220] device pim6reg1 entered promiscuous mode [ 98.570547][ T2219] CPU: 0 PID: 2219 Comm: syz.4.559 Not tainted syzkaller #0 [ 98.582621][ T2219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 98.592678][ T2219] Call Trace: [ 98.595972][ T2219] __dump_stack+0x21/0x24 [ 98.600308][ T2219] dump_stack_lvl+0x169/0x1d8 [ 98.604987][ T2219] ? show_regs_print_info+0x18/0x18 [ 98.610185][ T2219] dump_stack+0x15/0x1c [ 98.614338][ T2219] should_fail+0x3c1/0x510 [ 98.618753][ T2219] should_fail_usercopy+0x1a/0x20 [ 98.623777][ T2219] _copy_from_iter+0x1d1/0x9f0 [ 98.628559][ T2219] ? __kasan_check_read+0x11/0x20 [ 98.633581][ T2219] ? __check_object_size+0x2f4/0x3c0 [ 98.638863][ T2219] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 98.644709][ T2219] ? skb_put+0x10e/0x1f0 [ 98.648964][ T2219] tun_get_user+0x140a/0x3090 [ 98.653664][ T2219] ? __x64_sys_openat+0x136/0x160 [ 98.658695][ T2219] ? tun_do_read+0x1c00/0x1c00 [ 98.663460][ T2219] ? kstrtouint_from_user+0x1a0/0x200 [ 98.668833][ T2219] ? __fsnotify_parent+0x5f5/0x6c0 [ 98.673952][ T2219] ? avc_policy_seqno+0x1b/0x70 [ 98.678798][ T2219] ? selinux_file_permission+0x2a5/0x510 [ 98.684431][ T2219] ? fsnotify_perm+0x66/0x4b0 [ 98.689110][ T2219] tun_chr_write_iter+0x1bf/0x270 [ 98.694135][ T2219] vfs_write+0x725/0xd60 [ 98.698380][ T2219] ? kernel_write+0x3c0/0x3c0 [ 98.703206][ T2219] ? __fget_files+0x2c4/0x320 [ 98.707899][ T2219] ? __fdget_pos+0x1f7/0x380 [ 98.712493][ T2219] ? ksys_write+0x71/0x240 [ 98.716907][ T2219] ksys_write+0x140/0x240 [ 98.721236][ T2219] ? __ia32_sys_read+0x90/0x90 [ 98.726000][ T2219] ? debug_smp_processor_id+0x17/0x20 [ 98.731369][ T2219] __x64_sys_write+0x7b/0x90 [ 98.735959][ T2219] do_syscall_64+0x31/0x40 [ 98.740386][ T2219] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 98.746278][ T2219] RIP: 0033:0x7fdfd644c6c9 [ 98.750693][ T2219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 98.770293][ T2219] RSP: 002b:00007fdfd4eb4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 98.778706][ T2219] RAX: ffffffffffffffda RBX: 00007fdfd66a2fa0 RCX: 00007fdfd644c6c9 [ 98.786674][ T2219] RDX: 000000000000fdef RSI: 0000200000000580 RDI: 00000000000000c8 [ 98.794648][ T2219] RBP: 00007fdfd4eb4090 R08: 0000000000000000 R09: 0000000000000000 [ 98.802622][ T2219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 98.810592][ T2219] R13: 00007fdfd66a3038 R14: 00007fdfd66a2fa0 R15: 00007fff352a8ba8 [ 100.245924][ T2266] FAULT_INJECTION: forcing a failure. [ 100.245924][ T2266] name failslab, interval 1, probability 0, space 0, times 1 [ 100.258617][ T2266] CPU: 0 PID: 2266 Comm: syz.2.572 Not tainted syzkaller #0 [ 100.265910][ T2266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 100.275977][ T2266] Call Trace: [ 100.279281][ T2266] __dump_stack+0x21/0x24 [ 100.283622][ T2266] dump_stack_lvl+0x169/0x1d8 [ 100.288310][ T2266] ? thaw_kernel_threads+0x220/0x220 [ 100.293613][ T2266] ? show_regs_print_info+0x18/0x18 [ 100.298839][ T2266] ? fib6_table_lookup+0x8a9/0x9f0 [ 100.303961][ T2266] dump_stack+0x15/0x1c [ 100.308121][ T2266] should_fail+0x3c1/0x510 [ 100.312544][ T2266] ? dst_alloc+0x176/0x4f0 [ 100.316967][ T2266] __should_failslab+0xa4/0xe0 [ 100.321735][ T2266] should_failslab+0x9/0x20 [ 100.326244][ T2266] kmem_cache_alloc+0x3d/0x2e0 [ 100.331014][ T2266] dst_alloc+0x176/0x4f0 [ 100.335270][ T2266] ip6_pol_route+0x960/0x1110 [ 100.339952][ T2266] ? fib6_table_lookup+0x9f0/0x9f0 [ 100.345071][ T2266] ? __kasan_check_write+0x14/0x20 [ 100.350190][ T2266] ? prep_compound_page+0x253/0x330 [ 100.355390][ T2266] ? prep_new_page+0x10c/0x180 [ 100.360158][ T2266] ip6_pol_route_input+0x56/0x80 [ 100.365094][ T2266] fib6_rule_lookup+0x1c6/0x560 [ 100.369948][ T2266] ? ip6_route_input_lookup+0xd0/0xd0 [ 100.375315][ T2266] ? fib6_lookup+0x2a0/0x2a0 [ 100.379901][ T2266] ? ip6t_do_table+0x1348/0x14e0 [ 100.384842][ T2266] ip6_route_input+0x58b/0x780 [ 100.389604][ T2266] ? ip6_multipath_l3_keys+0x5f0/0x5f0 [ 100.395067][ T2266] ? ip6table_raw_hook+0x6a/0x80 [ 100.400008][ T2266] ? ip6table_mangle_net_exit+0x80/0x80 [ 100.405557][ T2266] ip6_rcv_finish+0x155/0x360 [ 100.410247][ T2266] ipv6_rcv+0xec/0x210 [ 100.414319][ T2266] ? __kmalloc_track_caller+0x1d7/0x320 [ 100.419864][ T2266] ? ip6_rcv_finish+0x360/0x360 [ 100.424709][ T2266] ? refcount_add+0x80/0x80 [ 100.429224][ T2266] ? ip6_rcv_finish+0x360/0x360 [ 100.434094][ T2266] __netif_receive_skb+0xc8/0x280 [ 100.439128][ T2266] netif_receive_skb+0x9b/0x3d0 [ 100.443981][ T2266] ? is_bpf_text_address+0x177/0x190 [ 100.449263][ T2266] ? netif_receive_skb_core+0x100/0x100 [ 100.454808][ T2266] ? __kasan_check_write+0x14/0x20 [ 100.459929][ T2266] ? virtio_net_hdr_to_skb+0x6d1/0x10c0 [ 100.465472][ T2266] tun_rx_batched+0x5e8/0x710 [ 100.470150][ T2266] ? local_bh_enable+0x30/0x30 [ 100.474913][ T2266] tun_get_user+0x25d0/0x3090 [ 100.479587][ T2266] ? tun_do_read+0x1c00/0x1c00 [ 100.484351][ T2266] ? kstrtouint_from_user+0x1a0/0x200 [ 100.489720][ T2266] ? __fsnotify_parent+0x5f5/0x6c0 [ 100.494848][ T2266] ? avc_policy_seqno+0x1b/0x70 [ 100.499732][ T2266] ? selinux_file_permission+0x2a5/0x510 [ 100.505368][ T2266] ? fsnotify_perm+0x66/0x4b0 [ 100.510046][ T2266] tun_chr_write_iter+0x1bf/0x270 [ 100.515074][ T2266] vfs_write+0x725/0xd60 [ 100.519319][ T2266] ? __bpf_trace_kmem_free+0x6f/0x90 [ 100.524606][ T2266] ? kernel_write+0x3c0/0x3c0 [ 100.529282][ T2266] ? __fget_files+0x2c4/0x320 [ 100.533959][ T2266] ? __fdget_pos+0x1f7/0x380 [ 100.538544][ T2266] ? ksys_write+0x71/0x240 [ 100.542958][ T2266] ksys_write+0x140/0x240 [ 100.547282][ T2266] ? __ia32_sys_read+0x90/0x90 [ 100.552043][ T2266] ? debug_smp_processor_id+0x17/0x20 [ 100.557414][ T2266] __x64_sys_write+0x7b/0x90 [ 100.562003][ T2266] do_syscall_64+0x31/0x40 [ 100.566417][ T2266] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 100.572303][ T2266] RIP: 0033:0x7f86e5b076c9 [ 100.576716][ T2266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.596320][ T2266] RSP: 002b:00007f86e456f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 100.604730][ T2266] RAX: ffffffffffffffda RBX: 00007f86e5d5dfa0 RCX: 00007f86e5b076c9 [ 100.612701][ T2266] RDX: 000000000000fdef RSI: 0000200000000580 RDI: 00000000000000c8 [ 100.620670][ T2266] RBP: 00007f86e456f090 R08: 0000000000000000 R09: 0000000000000000 [ 100.628640][ T2266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.636613][ T2266] R13: 00007f86e5d5e038 R14: 00007f86e5d5dfa0 R15: 00007ffecaddc728 [ 101.231006][ T2294] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.238221][ T2294] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.511015][ T2331] FAULT_INJECTION: forcing a failure. [ 102.511015][ T2331] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 102.561244][ T2331] CPU: 1 PID: 2331 Comm: syz.3.594 Not tainted syzkaller #0 [ 102.568587][ T2331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 102.578650][ T2331] Call Trace: [ 102.581950][ T2331] __dump_stack+0x21/0x24 [ 102.586286][ T2331] dump_stack_lvl+0x169/0x1d8 [ 102.590956][ T2331] ? show_regs_print_info+0x18/0x18 [ 102.596145][ T2331] ? kasan_check_range+0x27/0x290 [ 102.601159][ T2331] dump_stack+0x15/0x1c [ 102.605306][ T2331] should_fail+0x3c1/0x510 [ 102.609718][ T2331] should_fail_alloc_page+0x4f/0x60 [ 102.614904][ T2331] __alloc_pages_nodemask+0x109/0x5f0 [ 102.620266][ T2331] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 102.626062][ T2331] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 102.631598][ T2331] ? __vmalloc_node_range+0x3cd/0x780 [ 102.636957][ T2331] ? __alloc_pages_nodemask+0xd/0x5f0 [ 102.642324][ T2331] __vmalloc_node_range+0x353/0x780 [ 102.647512][ T2331] bpf_map_area_alloc+0xd5/0xe0 [ 102.652351][ T2331] ? htab_map_alloc+0x4b6/0x970 [ 102.657188][ T2331] htab_map_alloc+0x4b6/0x970 [ 102.661853][ T2331] map_create+0x44e/0x2090 [ 102.666258][ T2331] __se_sys_bpf+0x203/0x680 [ 102.670756][ T2331] ? __x64_sys_bpf+0x90/0x90 [ 102.675336][ T2331] ? __se_sys_bpf+0x11/0x680 [ 102.679915][ T2331] ? debug_smp_processor_id+0x17/0x20 [ 102.685273][ T2331] __x64_sys_bpf+0x7b/0x90 [ 102.689682][ T2331] do_syscall_64+0x31/0x40 [ 102.694088][ T2331] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 102.699967][ T2331] RIP: 0033:0x7fddf67266c9 [ 102.704374][ T2331] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 102.723966][ T2331] RSP: 002b:00007fddf518e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 102.732369][ T2331] RAX: ffffffffffffffda RBX: 00007fddf697cfa0 RCX: 00007fddf67266c9 [ 102.740336][ T2331] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 102.748314][ T2331] RBP: 00007fddf518e090 R08: 0000000000000000 R09: 0000000000000000 [ 102.756274][ T2331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 102.764235][ T2331] R13: 00007fddf697d038 R14: 00007fddf697cfa0 R15: 00007ffe3f9b82e8 [ 102.932087][ T24] audit: type=1400 audit(1762335539.430:136): avc: denied { create } for pid=2345 comm="syz.4.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 109.158440][ T2532] device syzkaller0 entered promiscuous mode [ 110.298515][ T2589] device sit0 left promiscuous mode [ 110.315072][ T2589] device sit0 entered promiscuous mode [ 110.420301][ T2593] device syzkaller0 entered promiscuous mode [ 114.092287][ T2756] FAULT_INJECTION: forcing a failure. [ 114.092287][ T2756] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 114.111604][ T2756] CPU: 0 PID: 2756 Comm: syz.0.738 Not tainted syzkaller #0 [ 114.118907][ T2756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 114.128962][ T2756] Call Trace: [ 114.132258][ T2756] __dump_stack+0x21/0x24 [ 114.136593][ T2756] dump_stack_lvl+0x169/0x1d8 [ 114.141270][ T2756] ? show_regs_print_info+0x18/0x18 [ 114.146469][ T2756] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 114.152275][ T2756] dump_stack+0x15/0x1c [ 114.156433][ T2756] should_fail+0x3c1/0x510 [ 114.160850][ T2756] should_fail_alloc_page+0x4f/0x60 [ 114.166053][ T2756] __alloc_pages_nodemask+0x109/0x5f0 [ 114.171425][ T2756] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 114.176966][ T2756] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 114.182782][ T2756] __vmalloc_node_range+0x353/0x780 [ 114.187989][ T2756] bpf_map_area_alloc+0xd5/0xe0 [ 114.192839][ T2756] ? htab_map_alloc+0x4b6/0x970 [ 114.197690][ T2756] htab_map_alloc+0x4b6/0x970 [ 114.202372][ T2756] map_create+0x44e/0x2090 [ 114.206787][ T2756] __se_sys_bpf+0x203/0x680 [ 114.211286][ T2756] ? __x64_sys_bpf+0x90/0x90 [ 114.215881][ T2756] ? debug_smp_processor_id+0x17/0x20 [ 114.221255][ T2756] __x64_sys_bpf+0x7b/0x90 [ 114.225674][ T2756] do_syscall_64+0x31/0x40 [ 114.230096][ T2756] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 114.235985][ T2756] RIP: 0033:0x7fb26dd326c9 [ 114.240402][ T2756] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 114.260007][ T2756] RSP: 002b:00007fb26c79a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 114.268430][ T2756] RAX: ffffffffffffffda RBX: 00007fb26df88fa0 RCX: 00007fb26dd326c9 [ 114.276405][ T2756] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 114.284379][ T2756] RBP: 00007fb26c79a090 R08: 0000000000000000 R09: 0000000000000000 [ 114.292350][ T2756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 114.300322][ T2756] R13: 00007fb26df89038 R14: 00007fb26df88fa0 R15: 00007ffed082ad08 [ 114.944093][ T24] audit: type=1400 audit(1762335551.450:137): avc: denied { create } for pid=2789 comm="syz.2.750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 115.017170][ T2794] FAULT_INJECTION: forcing a failure. [ 115.017170][ T2794] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 115.059936][ T2794] CPU: 0 PID: 2794 Comm: syz.1.751 Not tainted syzkaller #0 [ 115.067270][ T2794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 115.077338][ T2794] Call Trace: [ 115.080638][ T2794] __dump_stack+0x21/0x24 [ 115.084968][ T2794] dump_stack_lvl+0x169/0x1d8 [ 115.089657][ T2794] ? show_regs_print_info+0x18/0x18 [ 115.094866][ T2794] ? irq_exit_rcu+0x9/0x10 [ 115.099301][ T2794] dump_stack+0x15/0x1c [ 115.103462][ T2794] should_fail+0x3c1/0x510 [ 115.107872][ T2794] should_fail_alloc_page+0x4f/0x60 [ 115.113061][ T2794] __alloc_pages_nodemask+0x109/0x5f0 [ 115.118424][ T2794] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 115.123956][ T2794] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 115.129758][ T2794] ? __vmalloc_node_range+0x3cd/0x780 [ 115.135120][ T2794] __vmalloc_node_range+0x353/0x780 [ 115.140309][ T2794] bpf_map_area_alloc+0xd5/0xe0 [ 115.145148][ T2794] ? htab_map_alloc+0x4b6/0x970 [ 115.149990][ T2794] htab_map_alloc+0x4b6/0x970 [ 115.154663][ T2794] map_create+0x44e/0x2090 [ 115.159067][ T2794] __se_sys_bpf+0x203/0x680 [ 115.163556][ T2794] ? __x64_sys_bpf+0x90/0x90 [ 115.168140][ T2794] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 115.174283][ T2794] __x64_sys_bpf+0x7b/0x90 [ 115.178689][ T2794] do_syscall_64+0x31/0x40 [ 115.183098][ T2794] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 115.188976][ T2794] RIP: 0033:0x7fc39f03b6c9 [ 115.193381][ T2794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 115.212975][ T2794] RSP: 002b:00007fc39daa3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 115.221381][ T2794] RAX: ffffffffffffffda RBX: 00007fc39f291fa0 RCX: 00007fc39f03b6c9 [ 115.229343][ T2794] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 115.237304][ T2794] RBP: 00007fc39daa3090 R08: 0000000000000000 R09: 0000000000000000 [ 115.245262][ T2794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 115.253227][ T2794] R13: 00007fc39f292038 R14: 00007fc39f291fa0 R15: 00007fff25fa75e8 [ 115.512079][ T2815] device syzkaller0 entered promiscuous mode [ 117.655280][ T2882] syz.0.786[2882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.655362][ T2882] syz.0.786[2882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.851416][ T2916] tap0: tun_chr_ioctl cmd 1074025677 [ 118.900329][ T2916] tap0: linktype set to 780 [ 119.281077][ T2930] device syzkaller0 entered promiscuous mode [ 121.668881][ T3005] FAULT_INJECTION: forcing a failure. [ 121.668881][ T3005] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 121.805980][ T3005] CPU: 0 PID: 3005 Comm: syz.3.829 Not tainted syzkaller #0 [ 121.813301][ T3005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 121.823359][ T3005] Call Trace: [ 121.826650][ T3005] __dump_stack+0x21/0x24 [ 121.830967][ T3005] dump_stack_lvl+0x169/0x1d8 [ 121.835634][ T3005] ? show_regs_print_info+0x18/0x18 [ 121.840821][ T3005] dump_stack+0x15/0x1c [ 121.844969][ T3005] should_fail+0x3c1/0x510 [ 121.849375][ T3005] should_fail_alloc_page+0x4f/0x60 [ 121.854560][ T3005] __alloc_pages_nodemask+0x109/0x5f0 [ 121.859922][ T3005] ? __irq_exit_rcu+0x40/0x150 [ 121.864675][ T3005] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 121.870208][ T3005] ? asm_common_interrupt+0x40/0x40 [ 121.875396][ T3005] ? __vmalloc_node_range+0x3cd/0x780 [ 121.880756][ T3005] ? __sanitizer_cov_trace_pc+0x5c/0x60 [ 121.886289][ T3005] __vmalloc_node_range+0x353/0x780 [ 121.891481][ T3005] bpf_map_area_alloc+0xd5/0xe0 [ 121.896317][ T3005] ? htab_map_alloc+0x4b6/0x970 [ 121.901154][ T3005] htab_map_alloc+0x4b6/0x970 [ 121.905820][ T3005] map_create+0x44e/0x2090 [ 121.910229][ T3005] __se_sys_bpf+0x203/0x680 [ 121.914718][ T3005] ? __x64_sys_bpf+0x90/0x90 [ 121.919298][ T3005] ? debug_smp_processor_id+0x17/0x20 [ 121.924656][ T3005] __x64_sys_bpf+0x7b/0x90 [ 121.929060][ T3005] do_syscall_64+0x31/0x40 [ 121.933464][ T3005] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 121.939346][ T3005] RIP: 0033:0x7fddf67266c9 [ 121.943754][ T3005] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 121.963345][ T3005] RSP: 002b:00007fddf518e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 121.971750][ T3005] RAX: ffffffffffffffda RBX: 00007fddf697cfa0 RCX: 00007fddf67266c9 [ 121.979710][ T3005] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 121.987671][ T3005] RBP: 00007fddf518e090 R08: 0000000000000000 R09: 0000000000000000 [ 121.995633][ T3005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 122.003597][ T3005] R13: 00007fddf697d038 R14: 00007fddf697cfa0 R15: 00007ffe3f9b82e8 [ 122.253354][ T3013] device sit0 left promiscuous mode [ 123.696921][ T3045] FAULT_INJECTION: forcing a failure. [ 123.696921][ T3045] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 123.779720][ T3045] CPU: 1 PID: 3045 Comm: syz.2.842 Not tainted syzkaller #0 [ 123.787045][ T3045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 123.797105][ T3045] Call Trace: [ 123.800405][ T3045] __dump_stack+0x21/0x24 [ 123.804740][ T3045] dump_stack_lvl+0x169/0x1d8 [ 123.809423][ T3045] ? show_regs_print_info+0x18/0x18 [ 123.814623][ T3045] dump_stack+0x15/0x1c [ 123.818781][ T3045] should_fail+0x3c1/0x510 [ 123.823204][ T3045] should_fail_alloc_page+0x4f/0x60 [ 123.828407][ T3045] __alloc_pages_nodemask+0x109/0x5f0 [ 123.833780][ T3045] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 123.839329][ T3045] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 123.845141][ T3045] __vmalloc_node_range+0x353/0x780 [ 123.850342][ T3045] bpf_map_area_alloc+0xd5/0xe0 [ 123.855197][ T3045] ? htab_map_alloc+0x4b6/0x970 [ 123.860050][ T3045] htab_map_alloc+0x4b6/0x970 [ 123.864730][ T3045] map_create+0x44e/0x2090 [ 123.869149][ T3045] __se_sys_bpf+0x203/0x680 [ 123.873658][ T3045] ? __x64_sys_bpf+0x90/0x90 [ 123.878258][ T3045] ? debug_smp_processor_id+0x17/0x20 [ 123.883632][ T3045] __x64_sys_bpf+0x7b/0x90 [ 123.888049][ T3045] do_syscall_64+0x31/0x40 [ 123.892468][ T3045] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 123.898354][ T3045] RIP: 0033:0x7f86e5b076c9 [ 123.902762][ T3045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 123.922355][ T3045] RSP: 002b:00007f86e456f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 123.930758][ T3045] RAX: ffffffffffffffda RBX: 00007f86e5d5dfa0 RCX: 00007f86e5b076c9 [ 123.938718][ T3045] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 123.946679][ T3045] RBP: 00007f86e456f090 R08: 0000000000000000 R09: 0000000000000000 [ 123.954639][ T3045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 123.962608][ T3045] R13: 00007f86e5d5e038 R14: 00007f86e5d5dfa0 R15: 00007ffecaddc728 [ 124.158723][ T24] audit: type=1400 audit(1762335560.660:138): avc: denied { create } for pid=3050 comm="syz.2.844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 125.318532][ T24] audit: type=1400 audit(1762335561.820:139): avc: denied { create } for pid=3085 comm="syz.4.855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 126.861335][ T3154] FAULT_INJECTION: forcing a failure. [ 126.861335][ T3154] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 126.936993][ T3154] CPU: 0 PID: 3154 Comm: syz.0.878 Not tainted syzkaller #0 [ 126.944312][ T3154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 126.954361][ T3154] Call Trace: [ 126.957657][ T3154] __dump_stack+0x21/0x24 [ 126.961980][ T3154] dump_stack_lvl+0x169/0x1d8 [ 126.966653][ T3154] ? show_regs_print_info+0x18/0x18 [ 126.971839][ T3154] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 126.977633][ T3154] dump_stack+0x15/0x1c [ 126.981779][ T3154] should_fail+0x3c1/0x510 [ 126.986191][ T3154] should_fail_alloc_page+0x4f/0x60 [ 126.991378][ T3154] __alloc_pages_nodemask+0x109/0x5f0 [ 126.996741][ T3154] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 127.002276][ T3154] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 127.008073][ T3154] __vmalloc_node_range+0x353/0x780 [ 127.013263][ T3154] bpf_map_area_alloc+0xd5/0xe0 [ 127.018104][ T3154] ? htab_map_alloc+0x4b6/0x970 [ 127.022941][ T3154] htab_map_alloc+0x4b6/0x970 [ 127.027609][ T3154] map_create+0x44e/0x2090 [ 127.032014][ T3154] __se_sys_bpf+0x203/0x680 [ 127.036508][ T3154] ? __x64_sys_bpf+0x90/0x90 [ 127.041091][ T3154] ? debug_smp_processor_id+0x17/0x20 [ 127.046449][ T3154] __x64_sys_bpf+0x7b/0x90 [ 127.050853][ T3154] do_syscall_64+0x31/0x40 [ 127.055262][ T3154] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 127.061140][ T3154] RIP: 0033:0x7fb26dd326c9 [ 127.065545][ T3154] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 127.085137][ T3154] RSP: 002b:00007fb26c79a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 127.093542][ T3154] RAX: ffffffffffffffda RBX: 00007fb26df88fa0 RCX: 00007fb26dd326c9 [ 127.101502][ T3154] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 127.109463][ T3154] RBP: 00007fb26c79a090 R08: 0000000000000000 R09: 0000000000000000 [ 127.117424][ T3154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 127.125385][ T3154] R13: 00007fb26df89038 R14: 00007fb26df88fa0 R15: 00007ffed082ad08 [ 128.877067][ T3224] ------------[ cut here ]------------ [ 128.882577][ T3224] trace type BPF program uses run-time allocation [ 128.957088][ T3224] WARNING: CPU: 0 PID: 3224 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 129.102998][ T3224] Modules linked in: [ 129.189857][ T3224] CPU: 1 PID: 3224 Comm: syz.2.899 Not tainted syzkaller #0 [ 129.383041][ T3224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 129.451011][ T3224] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 129.500500][ T3224] Code: 85 e9 14 fe ff ff e8 99 fa ef ff 31 c0 e9 15 fe ff ff e8 8d fa ef ff c6 05 34 c9 2c 05 01 48 c7 c7 80 7a 05 85 e8 7a a4 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 129.598734][ T24] audit: type=1400 audit(1762335566.100:140): avc: denied { tracepoint } for pid=3241 comm="syz.0.904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 129.682928][ T3224] RSP: 0018:ffffc90000c47468 EFLAGS: 00010246 [ 129.709651][ T3224] RAX: 34c781ede32af900 RBX: 0000000000000001 RCX: 0000000000080000 [ 129.749486][ T3224] RDX: ffffc9000254f000 RSI: 0000000000002188 RDI: 0000000000002189 [ 129.757621][ T3224] RBP: ffffc90000c474b0 R08: dffffc0000000000 R09: ffffed103ee0a5f8 [ 129.765731][ T3224] R10: ffffed103ee0a5f8 R11: 1ffff1103ee0a5f7 R12: ffff88811a68c000 [ 129.787113][ T3224] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88811baca000 [ 129.836923][ T3224] FS: 00007f86e456f6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 129.846434][ T3224] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 129.853275][ T3224] CR2: 0000000000000000 CR3: 000000010ba45000 CR4: 00000000003506b0 [ 129.866796][ T3224] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 129.879604][ T3224] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 129.888115][ T3224] Call Trace: [ 129.905238][ T3259] device wg2 entered promiscuous mode [ 129.910866][ T3224] ? __fdget+0x1a1/0x230 [ 129.915251][ T3224] resolve_pseudo_ldimm64+0x526/0x1020 [ 129.921661][ T3224] ? bpf_check+0xd680/0xd680 [ 129.926424][ T3224] ? kvmalloc_node+0x88/0x130 [ 129.931490][ T3224] bpf_check+0x8d4b/0xd680 [ 129.936074][ T3224] ? bpf_get_btf_vmlinux+0x60/0x60 [ 129.977495][ T3224] ? 0xffffffffa0016000 [ 130.037413][ T3224] ? is_bpf_text_address+0x177/0x190 [ 130.064665][ T3224] ? selinux_bpf_prog_alloc+0x51/0x140 [ 130.092959][ T3224] ? __kernel_text_address+0xa0/0x100 [ 130.139827][ T3224] ? unwind_get_return_address+0x4d/0x90 [ 130.146713][ T3224] ? stack_trace_save+0xe0/0xe0 [ 130.162330][ T3224] ? arch_stack_walk+0xee/0x140 [ 130.169612][ T3224] ? stack_trace_save+0x98/0xe0 [ 130.174710][ T3224] ? stack_trace_snprint+0xf0/0xf0 [ 130.179847][ T3224] ? __kasan_slab_alloc+0x69/0xf0 [ 130.185754][ T3224] ? selinux_bpf_prog_alloc+0x51/0x140 [ 130.191273][ T3224] ? __kasan_kmalloc+0xec/0x110 [ 130.196464][ T3224] ? __kasan_kmalloc+0xda/0x110 [ 130.201333][ T3224] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 130.207180][ T3224] ? selinux_bpf_prog_alloc+0x51/0x140 [ 130.212643][ T3224] ? security_bpf_prog_alloc+0x62/0x90 [ 130.238797][ T3224] ? bpf_prog_load+0x949/0x1420 [ 130.262500][ T3224] ? __se_sys_bpf+0x442/0x680 [ 130.322871][ T3224] ? __x64_sys_bpf+0x7b/0x90 [ 130.344304][ T3224] ? do_syscall_64+0x31/0x40 [ 130.379623][ T3224] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 130.420939][ T3224] ? memset+0x35/0x40 [ 130.446082][ T3224] ? bpf_obj_name_cpy+0x193/0x1e0 [ 130.494651][ T3224] bpf_prog_load+0xf5a/0x1420 [ 130.515131][ T3224] ? map_freeze+0x320/0x320 [ 130.534025][ T3224] ? selinux_bpf+0xc7/0xf0 [ 130.553093][ T3224] ? security_bpf+0x82/0xa0 [ 130.572515][ T3224] __se_sys_bpf+0x442/0x680 [ 130.598353][ T3224] ? __x64_sys_bpf+0x90/0x90 [ 130.637835][ T3224] ? __kasan_check_read+0x11/0x20 [ 130.688881][ T3224] __x64_sys_bpf+0x7b/0x90 [ 130.723717][ T3224] do_syscall_64+0x31/0x40 [ 130.808783][ T3224] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 130.873749][ T3224] RIP: 0033:0x7f86e5b076c9 [ 130.942352][ T3224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 131.025377][ T3224] RSP: 002b:00007f86e456f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 131.106357][ T3224] RAX: ffffffffffffffda RBX: 00007f86e5d5dfa0 RCX: 00007f86e5b076c9 [ 131.147897][ T24] audit: type=1400 audit(1762335567.650:141): avc: denied { create } for pid=3283 comm="syz.0.920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 131.193211][ T3224] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 131.267231][ T3224] RBP: 00007f86e5b89f91 R08: 0000000000000000 R09: 0000000000000000 [ 131.348523][ T3224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 131.463037][ T3224] R13: 00007f86e5d5e038 R14: 00007f86e5d5dfa0 R15: 00007ffecaddc728 [ 131.528104][ T3224] ---[ end trace 8a9873c0b4527dee ]--- [ 134.319516][ T24] audit: type=1400 audit(1762335570.820:142): avc: denied { read } for pid=3385 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Stopping sshd: stopped /usr/sbin/sshd (pid 186) OK Stopping crond: stopped /usr/sbin/crond (pid 179) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 133) [ 135.375046][ T24] audit: type=1400 audit(1762335571.870:143): avc: denied { search } for pid=3441 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: [ 135.733014][ T24] audit: type=1400 audit(1762335572.230:144): avc: denied { write } for pid=134 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=412 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 135.864693][ T24] audit: type=1400 audit(1762335572.230:145): avc: denied { remove_name } for pid=134 comm="dhcpcd" name="sock" dev="tmpfs" ino=414 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping iptables: [ 135.946675][ T24] audit: type=1400 audit(1762335572.230:146): avc: denied { unlink } for pid=134 comm="dhcpcd" name="sock" dev="tmpfs" ino=414 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 OK Stopping system message bus: [ 136.025897][ T24] audit: type=1400 audit(1762335572.270:147): avc: denied { unlink } for pid=134 comm="dhcpcd" name="pid" dev="tmpfs" ino=413 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 136.057249][ T24] audit: type=1400 audit(1762335572.450:148): avc: denied { search } for pid=3463 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 136.170748][ T24] audit: type=1400 audit(1762335572.450:149): avc: denied { write } for pid=3463 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 done [ 136.226656][ T3465] device syzkaller0 entered promiscuous mode [ 136.250452][ T24] audit: type=1400 audit(1762335572.450:150): avc: denied { add_name } for pid=3463 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 136.305949][ T24] audit: type=1400 audit(1762335572.450:151): avc: denied { create } for pid=3463 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 136.376070][ T24] audit: type=1400 audit(1762335572.450:152): avc: denied { read open } for pid=3463 comm="iptables" path="/run/xtables.lock" dev="tmpfs" ino=4301 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 killall: can't kill pid 578: No such process Stopping klogd: OK Stopping acpid: [ 137.277164][ T3516] FAULT_INJECTION: forcing a failure. [ 137.277164][ T3516] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 137.339712][ T3516] CPU: 1 PID: 3516 Comm: syz.4.988 Tainted: G W syzkaller #0 [ 137.348407][ T3516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 137.358456][ T3516] Call Trace: [ 137.361740][ T3516] __dump_stack+0x21/0x24 [ 137.366062][ T3516] dump_stack_lvl+0x169/0x1d8 [ 137.370728][ T3516] ? show_regs_print_info+0x18/0x18 [ 137.375913][ T3516] dump_stack+0x15/0x1c [ 137.380055][ T3516] should_fail+0x3c1/0x510 [ 137.384462][ T3516] should_fail_alloc_page+0x4f/0x60 [ 137.389644][ T3516] __alloc_pages_nodemask+0x109/0x5f0 [ 137.395011][ T3516] ? __irq_exit_rcu+0x40/0x150 [ 137.399761][ T3516] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 137.405297][ T3516] ? asm_common_interrupt+0x40/0x40 [ 137.410483][ T3516] ? __vmalloc_node_range+0x3cd/0x780 [ 137.415839][ T3516] ? __alloc_pages_nodemask+0x6/0x5f0 [ 137.421201][ T3516] __vmalloc_node_range+0x353/0x780 [ 137.426390][ T3516] bpf_map_area_alloc+0xd5/0xe0 [ 137.431226][ T3516] ? htab_map_alloc+0x4b6/0x970 [ 137.436061][ T3516] htab_map_alloc+0x4b6/0x970 [ 137.440727][ T3516] map_create+0x44e/0x2090 [ 137.445130][ T3516] __se_sys_bpf+0x203/0x680 [ 137.449621][ T3516] ? __x64_sys_bpf+0x90/0x90 [ 137.454206][ T3516] ? debug_smp_processor_id+0x17/0x20 [ 137.459564][ T3516] __x64_sys_bpf+0x7b/0x90 [ 137.463966][ T3516] do_syscall_64+0x31/0x40 [ 137.468369][ T3516] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 137.474247][ T3516] RIP: 0033:0x7fdfd644c6c9 [ 137.478650][ T3516] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.498242][ T3516] RSP: 002b:00007fdfd4eb4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 137.506647][ T3516] RAX: ffffffffffffffda RBX: 00007fdfd66a2fa0 RCX: 00007fdfd644c6c9 [ 137.514609][ T3516] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 137.522567][ T3516] RBP: 00007fdfd4eb4090 R08: 0000000000000000 R09: 0000000000000000 [ 137.530529][ T3516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 137.538492][ T3516] R13: 00007fdfd66a3038 R14: 00007fdfd66a2fa0 R15: 00007fff352a8ba8 OK Stopping syslogd: stopped /sbin/syslogd (pid 77) OK umount: can't remount debugfs read-only Connection to 10.128.1.170 closed by remote host. [ 138.617251][ T3565] FAULT_INJECTION: forcing a failure. [ 138.617251][ T3565] name fail_page_alloc, interval 1, probability 0, space 0, times 0 umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only The system is going down NOW! Sent SIGTERM to all processes [ 138.717123][ T3565] CPU: 0 PID: 3565 Comm: syz.1.1003 Tainted: G W syzkaller #0 [ 138.725903][ T3565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 138.735961][ T3565] Call Trace: [ 138.739256][ T3565] __dump_stack+0x21/0x24 [ 138.743598][ T3565] dump_stack_lvl+0x169/0x1d8 [ 138.748280][ T3565] ? show_regs_print_info+0x18/0x18 [ 138.753484][ T3565] dump_stack+0x15/0x1c [ 138.757640][ T3565] should_fail+0x3c1/0x510 [ 138.762055][ T3565] should_fail_alloc_page+0x4f/0x60 [ 138.767253][ T3565] __alloc_pages_nodemask+0x109/0x5f0 [ 138.772622][ T3565] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 138.778168][ T3565] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 138.783979][ T3565] __vmalloc_node_range+0x353/0x780 [ 138.789296][ T3565] bpf_map_area_alloc+0xd5/0xe0 [ 138.795040][ T3565] ? htab_map_alloc+0x4b6/0x970 [ 138.799893][ T3565] htab_map_alloc+0x4b6/0x970 [ 138.804576][ T3565] map_create+0x44e/0x2090 [ 138.809003][ T3565] __se_sys_bpf+0x203/0x680 [ 138.813512][ T3565] ? __x64_sys_bpf+0x90/0x90 [ 138.818111][ T3565] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 138.824189][ T3565] ? debug_smp_processor_id+0x17/0x20 [ 138.829564][ T3565] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 138.835636][ T3565] __x64_sys_bpf+0x7b/0x90 [ 138.840052][ T3565] do_syscall_64+0x31/0x40 [ 138.844476][ T3565] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 138.850372][ T3565] RIP: 0033:0x7fc39f03b6c9 [ 138.854791][ T3565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 138.874394][ T3565] RSP: 002b:00007fc39daa3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 138.882793][ T3565] RAX: ffffffffffffffda RBX: 00007fc39f291fa0 RCX: 00007fc39f03b6c9 [ 138.890742][ T3565] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 138.898693][ T3565] RBP: 00007fc39daa3090 R08: 0000000000000000 R09: 0000000000000000 [ 138.906646][ T3565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 138.914597][ T3565] R13: 00007fc39f292038 R14: 00007fc39f291fa0 R15: 00007fff25fa75e8 Sent SIGKILL to all processes Requesting system poweroff [ 140.712890][ T3566] kvm: exiting hardware virtualization [ 140.718978][ T3566] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 140.725570][ T3566] ACPI: Preparing to enter system sleep state S5 [ 140.732086][ T3566] reboot: Power down serialport: VM disconnected.