last executing test programs: 5.952000871s ago: executing program 0 (id=1192): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000002"], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000fdd13953b2260e2fd1e2465c3060f83d4b795fb5364ff249f18347773a127d5404b4cb379464379d96a8eadb4a94e5171ecf0ec0a13fd38dac0788381470ec43aee68807ee6625daa5f427d0a8a3d65d72041d7ff126241d40dacd9a5f60e8928e6e993d58aad4297cffe54c39fc4045a6f02888ac95bdcb93590ccdac00bff30b6a79cb59c2bf26bdc6", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000000010000000000000", @ANYRES32=0x0, @ANYRES32, @ANYRES8=r0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r2, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000200)='ext4_ext_load_extent\x00', 0xffffffffffffffff, 0x0, 0x9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) socketpair(0xa, 0x3, 0x40, &(0x7f0000000280)) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000e428bab0eb48f1c6ba964d496ac719e2795dce3dbb1d326e4620bb1350d37ba80bdb0668e0a830fb1b86e64f2afca6463080d9b8b9a499766ac9b9d0b8460df68b67450a54d9736af56ffb028f85dc94db752835d533152217c704dbe4c448dadcdb69f591d5d4479f98bd398ee359677c1b8a26fb545ae27c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES64=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000400)={0x0, r4}, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES32=r7], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r8}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000040000000181100", @ANYRES32=r1, @ANYRES16=r5], 0x0, 0x0, 0xfffffffffffffd4a, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x66, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x8, &(0x7f0000000b00)=ANY=[@ANYBLOB="180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000037c9000085000000060000003269da7b6557ce19e6d6de61132dbd72d0ebf11cf69503fc466ca63f72cc62a23353e2bab87e8a3a1ac7f4fa00e1adaa36a62bd2cfe8be12ac623cdf336e212d"], 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0900000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/22], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="980000000000000000000000fdffffff18110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, @void, @value}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r11}, 0x10) 5.471693533s ago: executing program 2 (id=1194): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0xc3200, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1f, 0x6113, 0x7, 0x2, 0x24146, 0x1, 0x4, '\x00', 0x0, r2, 0x502, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00'}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r3, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r3, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000300)=[0x0], &(0x7f0000000340), 0x0, 0x84, &(0x7f0000000380)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0xfb, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a1, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000cc0), 0x4) 5.191972985s ago: executing program 1 (id=1195): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r3 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000080)='(())') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='cpu&\t\t') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x4000, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x110242, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r4}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 5.097954175s ago: executing program 0 (id=1196): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="180200000400000000000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f00000005c0)='mm_page_free\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r3}, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_type(r6, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_type(r7, &(0x7f0000000280), 0x9) openat$cgroup_procs(r6, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000200)=0x1, 0x12) mkdir(0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 4.988033425s ago: executing program 2 (id=1199): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={@cgroup, r1, 0x24, 0x0, 0xffffffffffffffff, @void, @value}, 0x14) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x9) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8941, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 4.590011667s ago: executing program 0 (id=1200): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000652707010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000001000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = perf_event_open$cgroup(&(0x7f0000000040)={0x4, 0x80, 0x2, 0x60, 0x7, 0x7, 0x0, 0x100000001, 0x40000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x2000, 0xf7, 0xfffffffb, 0x5, 0x5b92, 0xb14, 0x8000, 0x0, 0xfffffffd, 0x0, 0x3af}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x0, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffff7fffffffff, r4, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1a, 0x6, 0xf, &(0x7f00000008c0)) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r5 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x3265, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, r4, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x40040000, 0x0, 0x0, 0x0, &(0x7f0000000340), &(0x7f00000003c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32=0x0], 0x48) openat$cgroup_freezer_state(r0, &(0x7f0000000300), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8940, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) 4.574155838s ago: executing program 2 (id=1201): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000b00)='memory.events\x00', 0x26e1, 0x900) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000007a6793da6e7b51db20dbd91384c5099ea0a7af4d3c9bb3ac8c36123608e2600a3fe8ac6ea85c4630de16d782c28e95cc417de7c42391c0f2711dd3c14248", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000090000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'veth1_to_batadv\x00', @broadcast}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000800000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net/syz1\x00', 0x200002, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x38, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r4}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="180200000000000000000000000000008500000053000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 4.07893351s ago: executing program 3 (id=1203): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000180)='kfree\x00'}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000008020000000000000000000001050000018000000000000000010000850200000000000000010000000000000400000000da"], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x101000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='/proc///\x00\x82q\xee\x00!\xbd\xc2\x98#YP\xee\x9c2G\xf0\x81x\x97'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1, 0x0, 0x40}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 3.632963192s ago: executing program 3 (id=1204): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xd, 0x5, 0x4, 0x1, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x29}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000e50000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e334185850000007300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc240, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r1, &(0x7f0000000d40), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="b405000000000000611034000000000063012000000000009500000000000000f4c32bf3df05a034da1b7fdcf645f3580fe49be316bdb665f1b42ff7ef474df46c0f44ef6fb5e031f7cfef720e05af49fad256a74dbc05ae220102a88002814a88e2fac93f6bba2d4d44db49d45e449d31fa52c326486bc1c908dd9b372f7a455c9566ed5ee0a65f3909cfe1219a0a38b416dc55927f32ab452e0ccaf193c27af10a12c42ef8a3199d0fad0a9521094cc7acdcdff80231586f968fab531515e8aaaa1d4a225592ebf062bba60775d0b7daa8ba68c0cd0642ce3efca015362a7b63f629629efb"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x52) 3.436644293s ago: executing program 2 (id=1206): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r1}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x440}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x458cb08, 0xc, 0x0, 0x2421, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000300)={r4, &(0x7f0000000240), 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r6, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 3.321329244s ago: executing program 3 (id=1207): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0xc3200, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000070200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1f, 0x6113, 0x7, 0x2, 0x24146, 0x1, 0x4, '\x00', 0x0, r3, 0x502, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00'}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000700000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r4, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r4, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000300)=[0x0], &(0x7f0000000340), 0x0, 0x84, &(0x7f0000000380)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0xfb, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a1, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000cc0), 0x4) 2.397279848s ago: executing program 2 (id=1208): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="12000000420000000400000002"], 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000040)={r3, &(0x7f0000000280), 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r3, &(0x7f0000000240)}, 0x20) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r7}, 0x10) ioctl$SIOCSIFHWADDR(r6, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) 2.15610113s ago: executing program 1 (id=1210): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e000000000000001c20000009"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001100)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) 2.06937525s ago: executing program 3 (id=1211): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xd, 0x5, 0x4, 0x1, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='rxrpc_abort\x00', r3, 0x0, 0x401}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x29}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000e50000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e334185850000007300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc240, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r1, &(0x7f0000000d40), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="b405000000000000611034000000000063012000000000009500000000000000f4c32bf3df05a034da1b7fdcf645f3580fe49be316bdb665f1b42ff7ef474df46c0f44ef6fb5e031f7cfef720e05af49fad256a74dbc05ae220102a88002814a88e2fac93f6bba2d4d44db49d45e449d31fa52c326486bc1c908dd9b372f7a455c9566ed5ee0a65f3909cfe1219a0a38b416dc55927f32ab452e0ccaf193c27af10a12c42ef8a3199d0fad0a9521094cc7acdcdff80231586f968fab531515e8aaaa1d4a225592ebf062bba60775d0b7daa8ba68c0cd0642ce3efca015362a7b63f629629efb"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x52) 2.008347551s ago: executing program 1 (id=1212): syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00b715000000000000f98c62dd"], 0x48) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[], &(0x7f0000001d80)=""/4096, 0x49, 0x1000, 0x0, 0xcc, 0x10000, @value}, 0x28) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="008000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000001a26f62806e4137e500000020"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000001c0)='sched_move_numa\x00', r3, 0x0, 0x400000000000000}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1208, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454cc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40001) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x0, 0x10001, 0x10000, 0x80362, r2, 0x4, '\x00', 0x0, r4, 0x0, 0x5, 0x2, 0x5, @void, @value, @void, @value}, 0x7b) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xe24}, {0x0, 0x4000}, {0x0}, {0x0}, {&(0x7f00000020c0), 0x500}], 0x5}, 0x0) 1.9879709s ago: executing program 2 (id=1213): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000652707010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000001000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = perf_event_open$cgroup(&(0x7f0000000040)={0x4, 0x80, 0x2, 0x60, 0x7, 0x7, 0x0, 0x100000001, 0x40000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x2000, 0xf7, 0xfffffffb, 0x5, 0x5b92, 0xb14, 0x8000, 0x0, 0xfffffffd, 0x0, 0x3af}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x0, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffff7fffffffff, r4, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1a, 0x6, 0xf, &(0x7f00000008c0)) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r5 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x3265, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, r4, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x40040000, 0x0, 0x0, 0x0, &(0x7f0000000340), &(0x7f00000003c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32=0x0], 0x48) openat$cgroup_freezer_state(r0, &(0x7f0000000300), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8940, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.526133233s ago: executing program 3 (id=1214): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000b00)='memory.events\x00', 0x26e1, 0x900) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xa, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000000080000000e2c4a37300009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net/syz1\x00', 0x200002, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0xb, 0x0, &(0x7f0000000000)="e0b9547ed387dbe9abc89b", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r4}, 0x10) close(0xffffffffffffffff) 907.998836ms ago: executing program 0 (id=1217): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x80ffffffffffff, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x4, &(0x7f0000000500)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x22}]}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 849.970996ms ago: executing program 3 (id=1218): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{0x1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)=r0}, 0x20) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000640)={&(0x7f0000000380)="12545bcf8c", &(0x7f00000003c0)=""/134, &(0x7f0000000480)="cc0896d4d7e8dd3c8f61f364e4cfccd89c7d7fe5d003598929c711c8d045ee2c5d5d2c48f09d9db1b984e9f31e011a4d12562b7d6830f99df5be96fbc62b231098b137be801c65849e32026f044e5ef63cfd86c4240f9befe022b86a0b0222977f3e72328875154716b9f03f0c0b551f5002cbbb039f2c", &(0x7f0000000500)="e0d6d31d19a50db55c488279d825a94a8c6947457b9831095df72b5f17c8d9c99756a1652cda6f8b6c037a3a3a3ba4d74f1d59a264435ff809b323a534c97ad00f5b5a9fdc3d0ca3debdad526fe95a", 0x8, r2, 0x4}, 0x38) perf_event_open$cgroup(&(0x7f00000002c0)={0xf8d669754cb98386, 0x80, 0x29, 0x80, 0xab, 0xfe, 0x0, 0x80000000, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000280)}, 0x40, 0x3, 0x1, 0x9, 0x3, 0x2, 0xf2, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0xa, r1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0xb, 0x0, &(0x7f0000000340)="63eced8e46dc3f0adf33c9", 0x0, 0x1101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x76}, [@call={0x27}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x35, 0x1, 0x3, 0xfffffffc}, {0x61}, {}, {}, {0x6}]}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0xf, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x37) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xf, &(0x7f00000016c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)={@map=r7, r10, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r7}, &(0x7f0000000100), &(0x7f0000000140)=r3}, 0x20) sendmsg(r8, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000001400)='H', 0x20001401}], 0x1}, 0x0) 846.111236ms ago: executing program 1 (id=1219): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={@cgroup, r1, 0x24, 0x0, 0xffffffffffffffff, @void, @value}, 0x14) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x9) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8941, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 678.769867ms ago: executing program 1 (id=1220): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x440}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x458cb08, 0xc, 0x0, 0x2421, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000300)={r4, &(0x7f0000000240), 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r6, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 489.712338ms ago: executing program 0 (id=1221): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x33, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000400)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x10, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="180000000000000000425a98000000000000d218110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007bc1efff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095000000000000009cbb2d8eb20ba245d8be621973a1e71fb58ecd794dc12dbdafb69beea395c850d445185bf5cf56693f4c54b61258ef541efaa810757fed543ae38503f5e8dce4f57723b22aff6e8c01879ec77e43f48d4cb15b17e90c76cefd4fc4893415341c73df2c3ac0c625c0ea3e06d1000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYRESDEC=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2e6405000000000065060400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7956244cef7baf48e6d2885a09a87507ebfc75b5b0f4e4309ebcdac5f7a860c008cbdd3b4c3b7f28754860c9c781f6410457253e89ad528d985636a86ec0f68f59cd1159a2c2e85d726859a919cc9548a349980d1ccdce27f94bc074c27f81078545c146a0857153b7b8f00034debae58a4ab415b0d7ff0575cc272cd3d7e8d974927676468ff2d86e0ffac94792ed9cf6b40b3cf252a47c05ae8a70d57cc3e067d1867b54d24e20000000000000020009ebf84d3b042d6e432cd080e3b57239f0127473e6ba922aff649609d40b47ec331ccba3cf96f9483ff19a6471bf5abc742d9cbcfb964b11b31034694a6aad86cf08a6c7b2235dc99de9aa3e6b77c7a2877261ed32da90864987f30926c9013eec3b86836ae50447aa5a79f40c235000000453302712c3d8fc4e2b61adb0695e800000000d4f4e91f0000002c33df424d1bafe5725c8a404724f8a4f1cda7997b65954f74097579b91da309b887af2485c2d9ab09b506000000000000000bf7b2ff4602aec1eea200000064881c5630521a08e051374cf05c921a06fb7818000000009dc8d95e0e5b365d10e1004dae58b3b5b89709b0ff47b200000000004000cbef88811dc8c1b27ac7d9a6bb70f60eb9c01dd2fc79b85e4d961498f3a80131d21d856177a2189f45d011ef1da5c6d57bb8fd387ccea9c3899a914e47e82f040000009d81003f927355408f87264797d3fa970949793b94329d580500d1f91c0d22587e05a61e3d8576ca168e88d7a9af95b04a37c27bfffab9abbb31fa8c0080258cfa6d3f166e695f3c56490aeef464d9965d70a50f1282619344f223548e75fa39643adac1322c87ca253ff2fb1882760d6feab16bacdf83c11816dbe959ebc5ec479c8319f73e2249eab0486b110702a481d3b51976a52303056e800b4ae5acc2df636a65eb1d672bf2000000cda8462cc9b16624998be65683321e970000000009b8e20762c1bf4a3eb6769f2b23e842bacd9c685edea0ffa3e975424f8ede49e61a4de808a38ba3512d64dc71867df4eee3f1ff791cf7c9862f98b45852e4b2f78721b978a2df2f2a29a387c6f0576b36038f819286eca99a6a434811cf2a117d775fe986a49fb82cf5f15972d5ab18f1045384501adabb20f7b0e15ff47f1744e2341b59034959a1289ba6e243668e6735305707e3de7652bfc5b60c76deff43a1d6fd6a4180ab723735abbeffe7f2ec3a0bb86f9eddfc0f3d1d503d7a54b49e1ae6c5aa620d27e91aa0aa0ed6fcacfc91fbb4c256409e54daefbb107c381fa729ff5f3907d93430da178d685d7730f5e129438a5214f722096d29863301b0b811f69145d3fbd78a9059e454474f92e65828b018174a9f4738b8c71fbdeac26ab95e02f9a847182766964976b1fccdb9f35721e43e33883cf16ed1343fb7429eb395123b0a4262b7023c22039b9002589a378ed4c6267965af78b861bd025312538cec97966b8973d4e299d9802264d06e40ae118e1d242d1128dcedeb44030df12ef68f78215d65f96eb55db8cbcb060008000d988374f85451a694ffe38a1d03916ff1eec72b31c98d42e1a1bda1290de1a499a5a385b31112a48ba3e6d6849914c1788a7aca37177cc341fff44fec5c5e0abae01c439a1b0311e074e81ae9993b5b3459553e4ece78d4c1501c70f5d81e0725d5b273755c0000000000000000aa4234ff82182952a76233d18e7d49638aeb04e7a9e9e7eafb7c255372795d2d192a0a33cab0f5bf2e93e0544fcdf2df2bc6ce96e5a11993d54f97a23754ac828674dbb93c0ad345715be4a13678b01edf76d8a923655800a2c88cce004505ab45d8f5f88aa887bbce5c18970428516f6099bdbb2cd7a2356397f1a0a23e662e2a6c4834400cbaa41c3c574e6e6aefb7a68da5ec1ae49f968bbe0e0bf9878516f553639f5b4828e92019b61f5874be1c7cdd9482df50bc24a8a1fa10d291390eb84e26a2e8dbeaa45604b05a116c1210a7540bf81005044273f5a8ffc538db289350eb248e483bd8920efcf30a798c2b636243e0a37262ca47dfeefa753ba528f7ba77e825051ce69b4475d7d714ba0c636e6ae9f710411d30ef424aeaabe057c7df6ff8f767bcd9012e1047c686f5ccb76ab3a5df53cbc22ba7ea8f6a8e220bb4d83de1e4dc19d6c1be841503850803bc2c2d5e0e34270a7f1cca0c6c53a8e5f891f7a793a70da62d6d88fbb90d220acc687931b42d6be83ab870da3c0a567f5e65ec0457f4ad2a4ec0b671b36388afd5520a8483a4b11f7d02a41b315f0f9e59f47668d68a74838d6976e12fd45200014041dffacbf60892ec8bd7560686f137a806d3dfaba900b47cac62f828342fff009adb5b2251461a1b9d6ba625b8fe04e69a1a4be2696f0000000086e172932e03000000000000005942e1b9d6dc28ab8e19e1111dd893e801015642faf21eef40d6e7de3ef62c4bc5ff17e7aeb2841098f845d1cc9ec4eee79c298fb0ba939b13707044e2e9cc0d350438c1c8c6bb9a38c6ac5ca0d9cf1f3d6915f25cb26edfc28b3079b97df32601240e454db103fb0c4a14c16837394d2b3673a3f160d3a7b83ecd0509ce9eba0c7bf7843799b1b56a234f9eaab8a3f14f1472bb6aaeb8ac9ee4054605558ab31f339f6a4caf2ee2fd01f34dca3300000000000000000000000000000000f59f8e6e00000000c44130098d833a24000000000095e6f945ba9a941cef5e70b8c152321e24b5b29bcf374dcf5a29a35d76e6e2bf8df95462690a4fc9ec8129e92b6ebb4b40a992a75d3c5954d0bfc87db24d856359079b29b3c374d081c300b2cfaa596d24e800ef8e2201f2fb7a9946f89f9f31f7cbd603fd7f8898c70b5c65f2e28f22e1a79a6af3a54861b07f124642e98389557affbdede09b5566a4a1ee73b20846810030a754acddcdafe3ceeeebc0b5f2fedfe7d198e3067f3dbac9441a9ab8409cbbb7e15b9ae3944097de34de2001c8533a3766e6e4c4c4702ccb932a27a3962814cd6aa8fc684beeaa3932efae3a9052be8eec1e95f6ad8d41dd34829503ba4b66e27154cb6e34aa13450522df1723130b6fb9bec59ae347c93f00e40e293c98d849a33f773c743728992f40faccd5c23130a1c6bfd6fc661bca1598137ddd1090ded672f5a48a40cab3f640c8241a364cbde0f188eec7da7bccafbd5bf28a46f0eecc6b550471b0b0770c6a5a411c0e0b19e15a461e7c6833ba936e214b013f2819ec6572a43b5cd32b11d7e4f8dcf8f7820a17b7b2ee6178a03351dd25091e46bfd82a3979b9cad109fd6217cd52aa81bdabd50826a674bd16b8f7e6aed12a305366599f5f029a7b24558c02750500002f1c19d16a6f391906000000cc0bbbfb8c698ecc137d96711100e0108d3bd2afed0b279ebf0527552a9331e646c424b14ffbb815622bfd2f635855bed1b164d0a56bd104be069854111c5b26ec3c652b5f0a6b9676dae987ec23456ba05a4dfb15321ef6b76e7e547a688c67ab531cfc784c9f940d9fb0464a6cce635e14b80dc5c1c64e75e6bd5355d84f8df272f18f58c570e7afd83ee77f157c146aa747b728969aeb4aba1d8f9de14275bf4a53e95235ae13768ab3fb8ab6ea50e884c2ea98e6400bf0c5ae2887cd1da0e57ccfdf5eca2b455247efcc13102846c0a85f20c80007c0ce6efce627b95b8ad3003385de97101678fb2163ecea6e70a77a6fbc089e31a5ccece932229b8f79faa6863d6857c3d9a9710f9f8ad16eeb8342278f311cbc226498028234d21466892983378fe64acbb44f694cd78e43c74aa75505cb1c91b189f8f89f233a05f5cd4e173a373178557843dd705268f74a9e5429945503195aefd6706b584d8408c9652b3fe68500747f7ee8375fa559c3ad195d3795df1a8364cd13acc3256ee4634c73eeb6954d0fcf09ab84df0b8900e0c6fea2ccb600ae7a4b128cae19df160e7c207b89132d1d5bdc9ffc79f0549b82df521817651d5fead5128205b92ccdccc69407ab556217af277af911dbd456dfc43dd061b6c91485dcc208cf0b3d0bf851de413f5de5ec015e296914afab6411109355e027ce04990d9aae251b9deb11b7db45b9f15b7b55d8fdbedd9e6cf891205694f02be8b9ea8ecd41308a0e1b93ae3435bfa88b440b1f701b4d0fc49c82193f27f8023b630ea97edbf3bf421a0a1a2b4ac7bb30bcd1cdd172c0df37408fd6827bb03e8742fc1c7a2befd1299928c5f79e846a8dc7ca648d960a759e6711b69776896a9656d59af6d44bc5348229fa84ae78af8421a22c4b4c17a3d24a4a0104000000000000d77cc4eef51c2b417c8c7458ddd7dd9d1a863bf0a9e1a30a19020490038017a5c7e474c83302a2c2b5c976dacf3dda7191c757f208000000000000005f7ed983f65723fbb36b9b51abb0dbcd33570000000000000000251aa4f139d0485ffcf89f01639fd1579a3802f720a0215c720a97071f5065a23642a58275dbca444b00e2e5835185d5d5b2796eb0fe32cf3b0633f58ecc7648c3c6efe82f93a3008052416512eea30ea9472e0b456a652883c0907323cf03be193ad0438cdef7a98a1671a1918df310dc4bfd61c3db4819ab1c57b348a8ff1ed36364a20fe846f11d045de81f069bac8425b31c5d08b433562ffb318c1285011f9b78b2401989384311101e452f54661ecdb2514a6ae50dbdd422de0f0f8c670000000000390be79688f80c4c314cb1b14afcaa5d23f9032e0ec51f45f447d6a7c798fcf7e60e2180e289410801e4f03a0e140f388f25b92da1025d8409e171a2336ed71cca86eb4658fe06df286e0e20276b0618eeffd05774f15686cd9d3182ca2fec863875f305fed6baf48a594db12582a38cfdffffffffffffff0cf8d920517835fe7d09cfcb624f6931f1cc6f6b71f58de9ddc38e0c43992f6bc57a718d0cfd197b5324b4e05ef1caa96db3ae1f2f2e5791faba2ebbe1a6faf21f2748fb1fb6743c3ca8af4e6b02518c9b7fdc1b5721eb1c3ed98db25536f74ac7861afc94544e52dcb5c60460a05802e3b437ac977bfa26b887a2443e8d559c58187f004eb82b07937df6e96f77ed551926bec4e0188fae10a35d1c5f1768ac6be829be1827f9df303160df18597efba46f1babc3d74adc31ca71bdab9079e4288881b434484eadde9da6b81802842abd462d546c59d87acc014f81d3414759bda12d2a2c6bc1bfa807bd3101eb227184a61107b6d0618e2a3b842671e084ac3f0ff94dc48b51601247318ab4d1c5106458000000000008000000000000cfee0107e6c2fe8639d926829fdbbd86bf591a8c3c235d8939af9d923f648165881a6c29997234406200b3b1c321cc158dbe17123eace3000000000000000000000000000000000000796de6ae4ae40bdf9a6e8c5dc29562262af9cd54e8e3ecc7e3c8cba0ecc791683496c4e5c1a5729714d9f9031f49b400cd2667b4ea6df54809615a4f973f93e6ccec72f16ff998e29ed99df733680a9d5cea57f99cc139b6ea9014f3000000000000000000000000000000000000feeab45a4046a622b0dceb413e4e39b7317e92cbed46b41ab5115bfb542c933783d750852dfdc6656aaf15e10615a88821f2f1bc53969b52d6852755e7681ad5beda80b38ccd34116b99f50b4fdd967b3f20f260455412b675639a26c76840cce40e323bde9d673fceda0ad6981565c8a183d928903b4f4472dde41b6dcd75314c31e704dfcb222c8359fe88944f852242270c932abfaeece0843d708f5cd25b2a63ae1e79723c1c3c013836b47da0a35d0f34c0705caae54024cf8ade6396ff44482284f415e5769d9ae8688a8d5516690aae9ce1c785262734723519b042a161e6efabf263a46ba92254a51ff6502470f3038cf6d8d991931cfd82ea97e1b596133e7754908d912d1054d174f5a731c019f152a5ca2e48599b6d563bfcd8c0950f4292769217a6e309452b14e64ae64ad58ced33582a1b3d2e0c300059fb1ee78cdddb827293de267d64bf47c3c8c419683c948e46de8cea0b232da00ff39ebef3b73b3d6fbeecd3f9ff06b7e08ed8ce2b9b9cf2e08975f5959fa7028f68c525ab173c0c553d21bd1e9176abdf799e7a08d2f3c14e1ca99d525bc3af0ca0f48f145c65b10dfc67803aab67f6b631d3d7e237fec4bc6eacc364b7cdd925973705d40c5a614e354d9b92357845d15ea41ad3e3a98396131f835e17f0cbfbdc59453991e689f9ce19bd4a3b4121e5a8b5dbb519b5556cb70603ceac0b7ca02cb05a01afa3164ca428add947673cdba49a0e6e8aeeddf52c0f0ef224c69a3c96c2fddf56d74c4ae7"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x20e, 0xe40, 0xfd000004, &(0x7f00000004c0)="b9180bb76003070c009e40f086dd1fff290000003b0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472ce0ab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000008000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x8, 0x8, 0x8, 0x4600, 0xffffffffffffffff, 0xfff, '\x00', 0x0, 0xffffffffffffffff, 0x100002, 0x4000005, 0x3, 0x0, @void, @value, @void, @value}, 0x24) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r7, 0x40047459, 0x2000000c) 379.760689ms ago: executing program 4 (id=1222): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={&(0x7f00000001c0)="f3f51d0089db53c9851b37ff612cf930bbbfb00d3e87f6e45781a95a14884e1bbd70060978cd6688440584828c73c9a2408f80d27a933cfb", &(0x7f0000000280)=""/9, &(0x7f00000002c0)="5e06ab03a77a4e51ee7fe2e3859c946343d4db992281f225c58dc21dd026664129e2ca225dbc383684549a", &(0x7f0000000300), 0x3b7, r2}, 0x38) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r4 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000500)={0x0, r0}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB="9feb0100180000000000000060000000600000000b00000000000000000000030000000001000000020000000f0000000500000000000008030000000b0000000000000b0300000000000000000000080bf2356c188a2e00020000049d0100000200000001040000005f61615f5f2e30305f00"/131], &(0x7f0000000580)=""/232, 0x83, 0xe8, 0x0, 0x2, 0x10000, @value=r4}, 0x28) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r6, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r10}, 0x10) ioctl$SIOCSIFHWADDR(r5, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) 296.958799ms ago: executing program 1 (id=1223): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) unlink(&(0x7f0000001ac0)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1a, 0x3, &(0x7f0000000580)=ANY=[@ANYRESOCT=r0], &(0x7f0000000340)='syzkaller\x00', 0x4, 0xc5, &(0x7f0000000480)=""/197, 0x0, 0x4, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x315cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x180, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63fc80fc020c2f00db5b686158bbcfe8875a060300000023000000000000000000000000ac1414aa3a2008"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x103100}) close(r4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907c5"], 0xfdef) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000b00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200"/28], 0x48) unlink(&(0x7f0000000040)='./cgroup\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x42, &(0x7f0000000040), 0x3b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000faa396eb90ba5db53bbe000000"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 87.74003ms ago: executing program 4 (id=1224): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000008020000000000000000000001050000018000000000000000010000850200000000000000010000000000000400000000da"], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x101000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='/proc///\x00\x82q\xee\x00!\xbd\xc2\x98#YP\xee\x9c2G\xf0\x81x\x97'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1, 0x0, 0x40}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 87.30343ms ago: executing program 4 (id=1225): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) 75.41549ms ago: executing program 4 (id=1226): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f00000001c0), 0x4) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r5}, &(0x7f0000000800), &(0x7f0000000840)=r6}, 0x20) getpid() r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x27, 0x0, 0x120, 0x0, 0x0, 0x2100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b70500000000000061105e000000000007000000000000009500000000000000"], &(0x7f00000002c0)='GPL\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) (async) close(r0) 988.05µs ago: executing program 4 (id=1227): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000010850000006d00000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000240)='kfree\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8a, 0xe7c9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 428.87µs ago: executing program 0 (id=1228): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000652707010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000001000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = perf_event_open$cgroup(&(0x7f0000000040)={0x4, 0x80, 0x2, 0x60, 0x7, 0x7, 0x0, 0x100000001, 0x40000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x2000, 0xf7, 0xfffffffb, 0x5, 0x5b92, 0xb14, 0x8000, 0x0, 0xfffffffd, 0x0, 0x3af}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x0, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffff7fffffffff, r4, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1a, 0x6, 0xf, &(0x7f00000008c0)) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r5 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x3265, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, r4, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x40040000, 0x0, 0x0, 0x0, &(0x7f0000000340), &(0x7f00000003c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32=0x0], 0x48) openat$cgroup_freezer_state(r0, &(0x7f0000000300), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8940, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) 0s ago: executing program 4 (id=1229): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000010850000006d00000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000240)='kfree\x00', r3}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8a, 0xe7c9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0, @void, @value, @void, @value}, 0x48) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.93' (ED25519) to the list of known hosts. [ 25.880447][ T28] audit: type=1400 audit(1733408114.074:66): avc: denied { mounton } for pid=288 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.881621][ T288] cgroup: Unknown subsys name 'net' [ 25.903095][ T28] audit: type=1400 audit(1733408114.074:67): avc: denied { mount } for pid=288 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.930115][ T28] audit: type=1400 audit(1733408114.104:68): avc: denied { unmount } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.930296][ T288] cgroup: Unknown subsys name 'devices' [ 26.071025][ T288] cgroup: Unknown subsys name 'hugetlb' [ 26.076569][ T288] cgroup: Unknown subsys name 'rlimit' [ 26.181641][ T28] audit: type=1400 audit(1733408114.374:69): avc: denied { setattr } for pid=288 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.205589][ T28] audit: type=1400 audit(1733408114.374:70): avc: denied { mounton } for pid=288 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 26.215426][ T291] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.231153][ T28] audit: type=1400 audit(1733408114.374:71): avc: denied { mount } for pid=288 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.261958][ T28] audit: type=1400 audit(1733408114.434:72): avc: denied { relabelto } for pid=291 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.271382][ T288] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.287478][ T28] audit: type=1400 audit(1733408114.434:73): avc: denied { write } for pid=291 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.327235][ T28] audit: type=1400 audit(1733408114.464:74): avc: denied { read } for pid=288 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.354647][ T28] audit: type=1400 audit(1733408114.464:75): avc: denied { open } for pid=288 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.067623][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.074890][ T298] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.082484][ T298] device bridge_slave_0 entered promiscuous mode [ 27.091190][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.098220][ T298] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.105773][ T298] device bridge_slave_1 entered promiscuous mode [ 27.157474][ T297] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.164631][ T297] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.172165][ T297] device bridge_slave_0 entered promiscuous mode [ 27.189434][ T297] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.196295][ T297] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.203537][ T297] device bridge_slave_1 entered promiscuous mode [ 27.241807][ T299] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.248734][ T299] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.255956][ T299] device bridge_slave_0 entered promiscuous mode [ 27.276076][ T299] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.282977][ T299] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.290144][ T299] device bridge_slave_1 entered promiscuous mode [ 27.299611][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.306448][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.313782][ T300] device bridge_slave_0 entered promiscuous mode [ 27.320272][ T301] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.327121][ T301] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.334805][ T301] device bridge_slave_0 entered promiscuous mode [ 27.353435][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.360515][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.367637][ T300] device bridge_slave_1 entered promiscuous mode [ 27.374706][ T301] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.381992][ T301] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.389250][ T301] device bridge_slave_1 entered promiscuous mode [ 27.535319][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.542198][ T298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.549586][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.556421][ T298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.593784][ T297] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.601536][ T297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.608804][ T297] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.615758][ T297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.648402][ T301] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.655299][ T301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.662390][ T301] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.669439][ T301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.680529][ T299] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.687654][ T299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.695316][ T299] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.702249][ T299] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.730632][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.737580][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.744763][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.751719][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.781795][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.790227][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.799333][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.806632][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.814307][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.821662][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.828865][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.836078][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.843437][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.850492][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.858343][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.865896][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.883241][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.890900][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.899024][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.915768][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.924902][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.939922][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.948026][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.955384][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.962935][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.971007][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.978077][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.005808][ T298] device veth0_vlan entered promiscuous mode [ 28.023590][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.032110][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.040149][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.047723][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.056034][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.063009][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.071360][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.079448][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.086294][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.093512][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.101371][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.109270][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.117217][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.125270][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.133303][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.140240][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.147533][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.156019][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.164234][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.171091][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.178653][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.187027][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.204582][ T298] device veth1_macvtap entered promiscuous mode [ 28.213376][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.222276][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.233100][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.241745][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.250000][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.263973][ T299] device veth0_vlan entered promiscuous mode [ 28.278376][ T297] device veth0_vlan entered promiscuous mode [ 28.287849][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.296083][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.304273][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.313180][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.321762][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.329336][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.336807][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.346168][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.355490][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.363751][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.372265][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.379216][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.387055][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.395634][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.403708][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.410557][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.417715][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.425752][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.433725][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.442221][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.451672][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.459321][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.467000][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.474632][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.492481][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.501104][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.509498][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.517451][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.525604][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.533414][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.545251][ T299] device veth1_macvtap entered promiscuous mode [ 28.555602][ T301] device veth0_vlan entered promiscuous mode [ 28.562691][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.570028][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.577698][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.586062][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.594362][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.602016][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.610158][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.632392][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.642159][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.651503][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.660024][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.671336][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.679980][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.705154][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.720716][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.737527][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.746016][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.759325][ T301] device veth1_macvtap entered promiscuous mode [ 28.788474][ C0] hrtimer: interrupt took 22861 ns [ 28.865303][ T300] device veth0_vlan entered promiscuous mode [ 28.872192][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.881598][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.890125][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.898142][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.905727][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.914555][ T297] device veth1_macvtap entered promiscuous mode [ 29.130583][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.139021][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.147456][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.184256][ T324] device sit0 entered promiscuous mode [ 29.613350][ T300] device veth1_macvtap entered promiscuous mode [ 29.637605][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.649998][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.659011][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.667713][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.681936][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.690780][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.700141][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.713977][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.722967][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.819469][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.832205][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.991221][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.005667][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.393871][ T357] device sit0 entered promiscuous mode [ 30.830084][ T362] syz.4.11 (362) used greatest stack depth: 21912 bytes left [ 31.019359][ T28] kauditd_printk_skb: 37 callbacks suppressed [ 31.019374][ T28] audit: type=1400 audit(1733408119.214:113): avc: denied { create } for pid=371 comm="syz.2.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 31.320290][ T376] @ÿ: renamed from bond_slave_0 [ 31.936390][ T390] device sit0 left promiscuous mode [ 32.311690][ T393] GPL: port 1(erspan0) entered blocking state [ 32.317900][ T393] GPL: port 1(erspan0) entered disabled state [ 32.390249][ T393] device erspan0 entered promiscuous mode [ 32.439427][ T393] GPL: port 1(erspan0) entered blocking state [ 32.446415][ T393] GPL: port 1(erspan0) entered forwarding state [ 32.922274][ T28] audit: type=1400 audit(1733408121.104:114): avc: denied { write } for pid=419 comm="syz.4.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 33.063267][ T28] audit: type=1400 audit(1733408121.254:115): avc: denied { create } for pid=422 comm="syz.2.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 33.584635][ T28] audit: type=1400 audit(1733408121.774:116): avc: denied { create } for pid=424 comm="syz.4.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 35.582871][ T468] device sit0 entered promiscuous mode [ 35.666557][ T472] device sit0 left promiscuous mode [ 36.248251][ T28] audit: type=1400 audit(1733408124.434:117): avc: denied { write } for pid=488 comm="syz.0.42" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.577654][ T492] device veth0_vlan left promiscuous mode [ 36.631356][ T492] device veth0_vlan entered promiscuous mode [ 37.465289][ T512] GPL: port 1(erspan0) entered blocking state [ 37.568808][ T512] GPL: port 1(erspan0) entered disabled state [ 37.575448][ T512] device erspan0 entered promiscuous mode [ 37.830441][ T515] device syzkaller0 entered promiscuous mode [ 38.022006][ T518] syz.0.50[518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.022076][ T518] syz.0.50[518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.308010][ T519] syz.0.50[519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.450145][ T519] syz.0.50[519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.486342][ T521] device pim6reg1 entered promiscuous mode [ 39.929889][ T28] audit: type=1400 audit(1733408128.124:118): avc: denied { setopt } for pid=550 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 40.018986][ T28] audit: type=1400 audit(1733408128.214:119): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 40.386661][ T28] audit: type=1400 audit(1733408128.574:120): avc: denied { create } for pid=559 comm="syz.2.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 40.779085][ T28] audit: type=1400 audit(1733408128.964:121): avc: denied { create } for pid=570 comm="syz.3.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 42.383430][ T590] device veth1_macvtap left promiscuous mode [ 43.531972][ T28] audit: type=1400 audit(1733408131.724:122): avc: denied { create } for pid=616 comm="syz.2.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 43.601153][ T619] device sit0 entered promiscuous mode [ 44.186947][ T634] Driver unsupported XDP return value 0 on prog (id 144) dev N/A, expect packet loss! [ 44.325629][ T618] device sit0 left promiscuous mode [ 44.364383][ T28] audit: type=1400 audit(1733408132.554:123): avc: denied { relabelfrom } for pid=625 comm="syz.3.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 44.418399][ T28] audit: type=1400 audit(1733408132.574:124): avc: denied { relabelto } for pid=625 comm="syz.3.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 45.386585][ T656] device syzkaller0 entered promiscuous mode [ 47.691296][ T685] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.132738][ T28] audit: type=1400 audit(1733408136.324:125): avc: denied { create } for pid=698 comm="syz.3.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 50.472165][ T734] syz.2.108[734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.472238][ T734] syz.2.108[734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.854089][ T734] device wg2 entered promiscuous mode [ 51.441503][ T28] audit: type=1400 audit(1733408139.634:126): avc: denied { create } for pid=745 comm="syz.2.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 51.999932][ T756] device veth0_vlan left promiscuous mode [ 52.009529][ T756] device veth0_vlan entered promiscuous mode [ 52.016978][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 52.042680][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 52.110107][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 52.872815][ T775] device veth1_macvtap left promiscuous mode [ 52.879345][ T28] audit: type=1400 audit(1733408141.064:127): avc: denied { create } for pid=772 comm="syz.4.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 53.018681][ T775] device macsec0 entered promiscuous mode [ 53.042268][ T779] device veth1_macvtap entered promiscuous mode [ 53.098616][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 56.269553][ T28] audit: type=1400 audit(1733408144.464:128): avc: denied { create } for pid=822 comm="syz.2.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 56.410914][ T821] device veth0_vlan left promiscuous mode [ 56.421716][ T821] device veth0_vlan entered promiscuous mode [ 56.521099][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 56.534704][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 56.652339][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 56.963856][ T28] audit: type=1400 audit(1733408145.124:129): avc: denied { create } for pid=838 comm="syz.1.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 58.466138][ T872] device veth0_vlan left promiscuous mode [ 58.479276][ T872] device veth0_vlan entered promiscuous mode [ 60.984325][ T926] device veth0_vlan left promiscuous mode [ 61.029597][ T926] device veth0_vlan entered promiscuous mode [ 61.062121][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 61.080442][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 61.154359][ T943] FAULT_INJECTION: forcing a failure. [ 61.154359][ T943] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 61.168403][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 61.215652][ T933] device veth0_vlan left promiscuous mode [ 61.275974][ T943] CPU: 0 PID: 943 Comm: syz.1.167 Not tainted 6.1.115-syzkaller-00002-g182b090f35f3 #0 [ 61.285633][ T943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 61.295884][ T943] Call Trace: [ 61.299184][ T943] [ 61.301957][ T943] dump_stack_lvl+0x151/0x1b7 [ 61.307187][ T943] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 61.312634][ T943] ? migrate_enable+0x1cb/0x2b0 [ 61.318362][ T943] ? __copy_map_value+0xb0/0x6c0 [ 61.324189][ T943] dump_stack+0x15/0x19 [ 61.328269][ T943] should_fail_ex+0x3d0/0x520 [ 61.332865][ T943] should_fail+0xb/0x10 [ 61.336997][ T943] should_fail_usercopy+0x1a/0x20 [ 61.341893][ T943] _copy_from_user+0x1e/0xc0 [ 61.346508][ T943] generic_map_update_batch+0x54c/0x8c0 [ 61.352244][ T943] ? generic_map_delete_batch+0x5c0/0x5c0 [ 61.358205][ T943] ? generic_map_delete_batch+0x5c0/0x5c0 [ 61.363988][ T943] bpf_map_do_batch+0x4cc/0x630 [ 61.368606][ T943] __sys_bpf+0x66b/0x7f0 [ 61.372892][ T943] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 61.378112][ T943] ? __ia32_sys_read+0x90/0x90 [ 61.382792][ T943] ? debug_smp_processor_id+0x17/0x20 [ 61.387999][ T943] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 61.393907][ T943] __x64_sys_bpf+0x7c/0x90 [ 61.398155][ T943] x64_sys_call+0x87f/0x9a0 [ 61.402658][ T943] do_syscall_64+0x3b/0xb0 [ 61.406924][ T943] ? clear_bhb_loop+0x55/0xb0 [ 61.411425][ T943] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 61.417166][ T943] RIP: 0033:0x7f3173f7ff19 [ 61.421414][ T943] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 61.441025][ T943] RSP: 002b:00007f3174dec058 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 61.449391][ T943] RAX: ffffffffffffffda RBX: 00007f3174145fa0 RCX: 00007f3173f7ff19 [ 61.457200][ T943] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 61.465094][ T943] RBP: 00007f3174dec0a0 R08: 0000000000000000 R09: 0000000000000000 [ 61.472904][ T943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 61.480725][ T943] R13: 0000000000000000 R14: 00007f3174145fa0 R15: 00007ffe7063b5d8 [ 61.488533][ T943] [ 61.526171][ T947] FAULT_INJECTION: forcing a failure. [ 61.526171][ T947] name failslab, interval 1, probability 0, space 0, times 1 [ 61.581895][ T933] device veth0_vlan entered promiscuous mode [ 61.609362][ T947] CPU: 0 PID: 947 Comm: syz.3.168 Not tainted 6.1.115-syzkaller-00002-g182b090f35f3 #0 [ 61.618834][ T947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 61.628812][ T947] Call Trace: [ 61.632063][ T947] [ 61.634846][ T947] dump_stack_lvl+0x151/0x1b7 [ 61.639448][ T947] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 61.644816][ T947] ? preempt_schedule_irq+0xe7/0x140 [ 61.650032][ T947] dump_stack+0x15/0x19 [ 61.654664][ T947] should_fail_ex+0x3d0/0x520 [ 61.659263][ T947] ? security_inode_alloc+0x29/0x120 [ 61.664680][ T947] __should_failslab+0xaf/0xf0 [ 61.669630][ T947] should_failslab+0x9/0x20 [ 61.673987][ T947] kmem_cache_alloc+0x3b/0x320 [ 61.678763][ T947] ? security_inode_alloc+0x13/0x120 [ 61.683861][ T947] security_inode_alloc+0x29/0x120 [ 61.688806][ T947] inode_init_always+0x720/0x970 [ 61.693582][ T947] ? sockfs_init_fs_context+0xb0/0xb0 [ 61.698789][ T947] new_inode_pseudo+0x98/0x1d0 [ 61.703476][ T947] __sock_create+0x132/0x7e0 [ 61.707995][ T947] __sys_socketpair+0x29f/0x6e0 [ 61.712681][ T947] ? __ia32_sys_socket+0x90/0x90 [ 61.717451][ T947] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 61.724060][ T947] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 61.730618][ T947] __x64_sys_socketpair+0x9b/0xb0 [ 61.735575][ T947] x64_sys_call+0x19b/0x9a0 [ 61.740083][ T947] do_syscall_64+0x3b/0xb0 [ 61.744343][ T947] ? clear_bhb_loop+0x55/0xb0 [ 61.748849][ T947] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 61.754669][ T947] RIP: 0033:0x7f2daa77ff19 [ 61.759086][ T947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 61.778743][ T947] RSP: 002b:00007f2daa5ff058 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 61.786974][ T947] RAX: ffffffffffffffda RBX: 00007f2daa945fa0 RCX: 00007f2daa77ff19 [ 61.795058][ T947] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000018 [ 61.803159][ T947] RBP: 00007f2daa5ff0a0 R08: 0000000000000000 R09: 0000000000000000 [ 61.811388][ T947] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 61.819553][ T947] R13: 0000000000000000 R14: 00007f2daa945fa0 R15: 00007ffeba73e8d8 [ 61.827375][ T947] [ 61.938822][ T947] socket: no more sockets [ 62.899294][ T789] syz.2.120 (789) used greatest stack depth: 21688 bytes left [ 64.526415][ T1094] cgroup: fork rejected by pids controller in /syz4 [ 64.533167][ T1096] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 64.558616][ T1096] pim6reg0: linktype set to 65534 [ 64.659414][ T299] syz-executor (299) used greatest stack depth: 21232 bytes left [ 66.088466][ C0] sched: RT throttling activated [ 68.180125][ T1150] device syzkaller0 entered promiscuous mode [ 68.246904][ T1128] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.254431][ T1128] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.261823][ T1128] device bridge_slave_0 entered promiscuous mode [ 68.272445][ T1128] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.280541][ T1128] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.288763][ T1128] device bridge_slave_1 entered promiscuous mode [ 68.350362][ T28] audit: type=1400 audit(1733408156.544:130): avc: denied { tracepoint } for pid=1182 comm="syz.2.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 68.394788][ T1180] IPv6: sit1: Disabled Multicast RS [ 68.440715][ T342] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.453407][ T342] device bridge_slave_0 left promiscuous mode [ 68.463694][ T342] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.472452][ T342] device veth1_macvtap left promiscuous mode [ 68.479084][ T342] device veth0_vlan left promiscuous mode [ 68.678034][ T1128] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.685425][ T1128] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.692889][ T1128] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.700482][ T1128] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.802866][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.810851][ T583] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.818973][ T583] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.860295][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.875099][ T583] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.882666][ T583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.893366][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.901898][ T583] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.908973][ T583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.916284][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.925154][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.944605][ T1128] device veth0_vlan entered promiscuous mode [ 69.062815][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 69.075521][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.084250][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.107111][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.128198][ T1128] device veth1_macvtap entered promiscuous mode [ 69.295440][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 69.310037][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 69.318269][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 69.371462][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 69.387340][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 69.420267][ T28] audit: type=1400 audit(1733408157.614:131): avc: denied { mounton } for pid=1128 comm="syz-executor" path="/root/syzkaller.qtCOGV/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 69.452359][ T28] audit: type=1400 audit(1733408157.614:132): avc: denied { mount } for pid=1128 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 69.474726][ T28] audit: type=1400 audit(1733408157.644:133): avc: denied { mounton } for pid=1128 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=522 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 73.152553][ T28] audit: type=1400 audit(1733408161.344:134): avc: denied { create } for pid=1298 comm="syz.2.318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 73.300539][ T1330] device syzkaller0 entered promiscuous mode [ 73.533773][ T1373] tap0: tun_chr_ioctl cmd 2148553947 [ 73.830512][ T1429] device syzkaller0 entered promiscuous mode [ 73.903819][ T1438] device syzkaller0 entered promiscuous mode [ 74.312646][ T28] audit: type=1400 audit(1733408162.504:135): avc: denied { create } for pid=1523 comm="syz.3.424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 74.341802][ T28] audit: type=1400 audit(1733408162.534:136): avc: denied { read } for pid=1523 comm="syz.3.424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 74.442620][ T28] audit: type=1400 audit(1733408162.634:137): avc: denied { write } for pid=1532 comm="syz.2.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 75.465262][ T1625] device syzkaller0 entered promiscuous mode [ 75.645635][ T1668] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 75.652663][ T1668] pim6reg0: linktype set to 778 [ 75.701270][ T28] audit: type=1400 audit(1733408163.894:138): avc: denied { create } for pid=1672 comm="syz.1.497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 78.303513][ T1758] device veth0_vlan left promiscuous mode [ 78.310017][ T1758] device veth0_vlan entered promiscuous mode [ 78.634531][ T28] audit: type=1400 audit(1733408166.824:139): avc: denied { setopt } for pid=1777 comm="syz.4.540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 78.872116][ T1785] device veth0_vlan left promiscuous mode [ 78.906964][ T1785] device veth0_vlan entered promiscuous mode [ 79.015760][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.297476][ T1808] device pim6reg1 entered promiscuous mode [ 79.328518][ T1795] device veth0_vlan left promiscuous mode [ 79.392367][ T1795] device veth0_vlan entered promiscuous mode [ 79.978265][ T1828] syz.0.557 (1828) used obsolete PPPIOCDETACH ioctl [ 80.357967][ T1853] syz.1.566[1853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.358059][ T1853] syz.1.566[1853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.853622][ T1860] device veth0_vlan left promiscuous mode [ 80.872184][ T1860] device veth0_vlan entered promiscuous mode [ 81.233373][ T1882] FAULT_INJECTION: forcing a failure. [ 81.233373][ T1882] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 81.246415][ T1882] CPU: 1 PID: 1882 Comm: syz.0.573 Not tainted 6.1.115-syzkaller-00002-g182b090f35f3 #0 [ 81.256311][ T1882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 81.266290][ T1882] Call Trace: [ 81.269502][ T1882] [ 81.272291][ T1882] dump_stack_lvl+0x151/0x1b7 [ 81.276999][ T1882] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 81.282662][ T1882] ? __build_skb_around+0x23f/0x3d0 [ 81.287777][ T1882] dump_stack+0x15/0x19 [ 81.291837][ T1882] should_fail_ex+0x3d0/0x520 [ 81.297459][ T1882] should_fail+0xb/0x10 [ 81.301461][ T1882] should_fail_usercopy+0x1a/0x20 [ 81.307697][ T1882] _copy_from_iter+0x18d/0xe00 [ 81.312626][ T1882] ? sock_alloc_send_pskb+0x936/0xa50 [ 81.319348][ T1882] ? copyout_mc+0x80/0x80 [ 81.324364][ T1882] ? __kasan_check_read+0x11/0x20 [ 81.329387][ T1882] skb_copy_datagram_from_iter+0x100/0x6d0 [ 81.335723][ T1882] tun_get_user+0x1957/0x3a90 [ 81.341097][ T1882] ? _kstrtol+0x150/0x150 [ 81.345248][ T1882] ? tun_do_read+0x2000/0x2000 [ 81.350244][ T1882] ? ref_tracker_alloc+0x31d/0x450 [ 81.355190][ T1882] ? ref_tracker_dir_print+0x160/0x160 [ 81.361010][ T1882] ? avc_policy_seqno+0x1b/0x70 [ 81.365754][ T1882] ? tun_get+0xe9/0x120 [ 81.369965][ T1882] tun_chr_write_iter+0x129/0x210 [ 81.374913][ T1882] vfs_write+0xaf6/0xed0 [ 81.378995][ T1882] ? __kasan_slab_free+0x11/0x20 [ 81.383769][ T1882] ? file_end_write+0x1c0/0x1c0 [ 81.388444][ T1882] ? __fget_files+0x2cb/0x330 [ 81.392958][ T1882] ? __fdget_pos+0x204/0x390 [ 81.397440][ T1882] ? ksys_write+0x77/0x2c0 [ 81.401648][ T1882] ksys_write+0x199/0x2c0 [ 81.405983][ T1882] ? __this_cpu_preempt_check+0x13/0x20 [ 81.411359][ T1882] ? __ia32_sys_read+0x90/0x90 [ 81.415955][ T1882] ? debug_smp_processor_id+0x17/0x20 [ 81.421430][ T1882] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 81.427369][ T1882] __x64_sys_write+0x7b/0x90 [ 81.431759][ T1882] x64_sys_call+0x2f/0x9a0 [ 81.436115][ T1882] do_syscall_64+0x3b/0xb0 [ 81.440551][ T1882] ? clear_bhb_loop+0x55/0xb0 [ 81.445058][ T1882] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 81.450797][ T1882] RIP: 0033:0x7f59dbb7ff19 [ 81.455035][ T1882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 81.474506][ T1882] RSP: 002b:00007f59dca78058 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 81.482733][ T1882] RAX: ffffffffffffffda RBX: 00007f59dbd45fa0 RCX: 00007f59dbb7ff19 [ 81.490540][ T1882] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 81.498367][ T1882] RBP: 00007f59dca780a0 R08: 0000000000000000 R09: 0000000000000000 [ 81.506155][ T1882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.513974][ T1882] R13: 0000000000000000 R14: 00007f59dbd45fa0 R15: 00007fffd6332e58 [ 81.521803][ T1882] [ 81.545438][ T28] audit: type=1400 audit(1733408169.734:140): avc: denied { ioctl } for pid=1880 comm="syz.2.574" path="socket:[21120]" dev="sockfs" ino=21120 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 82.706653][ T1913] device veth0_vlan left promiscuous mode [ 82.734146][ T1913] device veth0_vlan entered promiscuous mode [ 82.777481][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 82.827184][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 82.844233][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 82.872699][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.034116][ T1941] syz.3.587[1941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.034198][ T1941] syz.3.587[1941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.992528][ T1970] FAULT_INJECTION: forcing a failure. [ 83.992528][ T1970] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 84.093019][ T1960] device pim6reg1 entered promiscuous mode [ 84.116389][ T1970] CPU: 0 PID: 1970 Comm: syz.1.601 Not tainted 6.1.115-syzkaller-00002-g182b090f35f3 #0 [ 84.125948][ T1970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 84.135841][ T1970] Call Trace: [ 84.138974][ T1970] [ 84.141743][ T1970] dump_stack_lvl+0x151/0x1b7 [ 84.146259][ T1970] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 84.151549][ T1970] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 84.156843][ T1970] dump_stack+0x15/0x19 [ 84.160836][ T1970] should_fail_ex+0x3d0/0x520 [ 84.165352][ T1970] should_fail_alloc_page+0x68/0x90 [ 84.170382][ T1970] prepare_alloc_pages+0x14e/0x6f0 [ 84.175331][ T1970] ? __alloc_pages_bulk+0xda0/0xda0 [ 84.180374][ T1970] ? __alloc_pages+0x610/0x610 [ 84.184997][ T1970] __alloc_pages+0x162/0x610 [ 84.189478][ T1970] ? prep_new_page+0x110/0x110 [ 84.194093][ T1970] ? __alloc_pages+0x234/0x610 [ 84.198678][ T1970] ? prep_new_page+0x110/0x110 [ 84.203290][ T1970] ? __kasan_check_write+0x14/0x20 [ 84.208247][ T1970] ? _raw_spin_lock+0xa4/0x1b0 [ 84.212826][ T1970] pte_alloc_one+0x73/0x1b0 [ 84.217166][ T1970] ? pfn_modify_allowed+0x2f0/0x2f0 [ 84.222373][ T1970] ? __pmd_alloc+0x48d/0x550 [ 84.226962][ T1970] __pte_alloc+0x86/0x350 [ 84.231127][ T1970] ? __pud_alloc+0x260/0x260 [ 84.235551][ T1970] ? pmd_install+0x260/0x260 [ 84.239978][ T1970] ? __kasan_check_read+0x11/0x20 [ 84.244837][ T1970] ? hugepage_vma_check+0x182/0x4f0 [ 84.249874][ T1970] handle_mm_fault+0x2d90/0x30e0 [ 84.254647][ T1970] ? numa_migrate_prep+0xe0/0xe0 [ 84.259419][ T1970] ? down_read_trylock+0x319/0x7d0 [ 84.264466][ T1970] ? lock_mm_and_find_vma+0x9c/0x310 [ 84.269685][ T1970] exc_page_fault+0x24d/0x6d0 [ 84.274197][ T1970] asm_exc_page_fault+0x27/0x30 [ 84.278880][ T1970] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 84.284436][ T1970] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f [ 84.303878][ T1970] RSP: 0018:ffffc9000eba7dd8 EFLAGS: 00050297 [ 84.309787][ T1970] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 84.317592][ T1970] RDX: ffff8881145dd100 RSI: 0000000000000005 RDI: 0000000000000000 [ 84.325487][ T1970] RBP: ffffc9000eba7ed8 R08: ffffffff8401d28e R09: ffffed1022e95b65 [ 84.333298][ T1970] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 84.341113][ T1970] R13: 1ffff92001d74fc4 R14: 1ffff92001d74fcc R15: 0000000020000000 [ 84.348930][ T1970] ? __sys_socketpair+0x14e/0x6e0 [ 84.353785][ T1970] ? __sys_socketpair+0x171/0x6e0 [ 84.358644][ T1970] ? __ia32_sys_socket+0x90/0x90 [ 84.363427][ T1970] ? __ia32_sys_read+0x90/0x90 [ 84.368122][ T1970] ? debug_smp_processor_id+0x17/0x20 [ 84.373315][ T1970] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 84.379222][ T1970] __x64_sys_socketpair+0x9b/0xb0 [ 84.384074][ T1970] x64_sys_call+0x19b/0x9a0 [ 84.388411][ T1970] do_syscall_64+0x3b/0xb0 [ 84.392665][ T1970] ? clear_bhb_loop+0x55/0xb0 [ 84.397181][ T1970] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 84.402914][ T1970] RIP: 0033:0x7f3173f7ff19 [ 84.407159][ T1970] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 84.426781][ T1970] RSP: 002b:00007f3174dec058 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 84.435029][ T1970] RAX: ffffffffffffffda RBX: 00007f3174145fa0 RCX: 00007f3173f7ff19 [ 84.443012][ T1970] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 84.450827][ T1970] RBP: 00007f3174dec0a0 R08: 0000000000000000 R09: 0000000000000000 [ 84.460267][ T1970] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 84.469807][ T1970] R13: 0000000000000001 R14: 00007f3174145fa0 R15: 00007ffe7063b5d8 [ 84.478289][ T1970] [ 84.753165][ T28] audit: type=1400 audit(1733408172.934:141): avc: denied { create } for pid=1977 comm="syz.1.603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 85.868888][ T2020] device veth0_vlan left promiscuous mode [ 85.974773][ T2020] device veth0_vlan entered promiscuous mode [ 85.998393][ T2020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 86.096391][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 86.107853][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 86.136304][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 86.416317][ T28] audit: type=1400 audit(1733408174.604:142): avc: denied { create } for pid=2040 comm="syz.1.625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 86.538208][ T28] audit: type=1400 audit(1733408174.724:143): avc: denied { ioctl } for pid=2046 comm="syz.2.626" path="mnt:[4026532545]" dev="nsfs" ino=4026532545 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 86.693959][ T2061] FAULT_INJECTION: forcing a failure. [ 86.693959][ T2061] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 86.707291][ T2061] CPU: 0 PID: 2061 Comm: syz.2.630 Not tainted 6.1.115-syzkaller-00002-g182b090f35f3 #0 [ 86.716857][ T2061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 86.726830][ T2061] Call Trace: [ 86.729947][ T2061] [ 86.732735][ T2061] dump_stack_lvl+0x151/0x1b7 [ 86.737237][ T2061] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 86.742533][ T2061] ? __kasan_check_write+0x14/0x20 [ 86.747483][ T2061] dump_stack+0x15/0x19 [ 86.751475][ T2061] should_fail_ex+0x3d0/0x520 [ 86.755989][ T2061] should_fail+0xb/0x10 [ 86.759986][ T2061] should_fail_usercopy+0x1a/0x20 [ 86.764853][ T2061] _copy_from_user+0x1e/0xc0 [ 86.769282][ T2061] copy_msghdr_from_user+0xaa/0x670 [ 86.774298][ T2061] ? __kasan_check_write+0x14/0x20 [ 86.779247][ T2061] ? proc_fail_nth_write+0x20b/0x290 [ 86.784375][ T2061] ? sendmsg_copy_msghdr+0x70/0x70 [ 86.789420][ T2061] __sys_recvmsg+0x24b/0x3d0 [ 86.793892][ T2061] ? ____sys_recvmsg+0x530/0x530 [ 86.798622][ T2061] ? __kasan_check_write+0x14/0x20 [ 86.803736][ T2061] ? __ia32_sys_read+0x90/0x90 [ 86.808322][ T2061] ? debug_smp_processor_id+0x17/0x20 [ 86.813530][ T2061] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 86.819464][ T2061] __x64_sys_recvmsg+0x7f/0x90 [ 86.824028][ T2061] x64_sys_call+0x171/0x9a0 [ 86.828366][ T2061] do_syscall_64+0x3b/0xb0 [ 86.832622][ T2061] ? clear_bhb_loop+0x55/0xb0 [ 86.837133][ T2061] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 86.842860][ T2061] RIP: 0033:0x7fe29777ff19 [ 86.847114][ T2061] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 86.866558][ T2061] RSP: 002b:00007fe298665058 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 86.874797][ T2061] RAX: ffffffffffffffda RBX: 00007fe297945fa0 RCX: 00007fe29777ff19 [ 86.882609][ T2061] RDX: 0000000001000000 RSI: 00000000200004c0 RDI: 0000000000000003 [ 86.890422][ T2061] RBP: 00007fe2986650a0 R08: 0000000000000000 R09: 0000000000000000 [ 86.898237][ T2061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 86.906046][ T2061] R13: 0000000000000000 R14: 00007fe297945fa0 R15: 00007ffdc8d18e08 [ 86.913862][ T2061] [ 87.123163][ T2070] FAULT_INJECTION: forcing a failure. [ 87.123163][ T2070] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 87.138113][ T2070] CPU: 0 PID: 2070 Comm: syz.3.633 Not tainted 6.1.115-syzkaller-00002-g182b090f35f3 #0 [ 87.147665][ T2070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 87.157556][ T2070] Call Trace: [ 87.160675][ T2070] [ 87.163458][ T2070] dump_stack_lvl+0x151/0x1b7 [ 87.167972][ T2070] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 87.173265][ T2070] dump_stack+0x15/0x19 [ 87.177253][ T2070] should_fail_ex+0x3d0/0x520 [ 87.181767][ T2070] should_fail_alloc_page+0x68/0x90 [ 87.186810][ T2070] prepare_alloc_pages+0x14e/0x6f0 [ 87.191753][ T2070] ? __alloc_pages_bulk+0xda0/0xda0 [ 87.196782][ T2070] ? kasan_check_range+0x69/0x2a0 [ 87.201645][ T2070] __alloc_pages+0x162/0x610 [ 87.206075][ T2070] ? prep_new_page+0x110/0x110 [ 87.210764][ T2070] ? _raw_spin_trylock_bh+0x190/0x190 [ 87.215967][ T2070] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 87.221959][ T2070] __get_free_pages+0xe/0x30 [ 87.226391][ T2070] kasan_populate_vmalloc_pte+0x39/0x130 [ 87.231943][ T2070] ? __apply_to_page_range+0x8ca/0xbe0 [ 87.237233][ T2070] __apply_to_page_range+0x8dd/0xbe0 [ 87.242354][ T2070] ? kasan_populate_vmalloc+0x70/0x70 [ 87.247562][ T2070] ? kasan_populate_vmalloc+0x70/0x70 [ 87.252769][ T2070] apply_to_page_range+0x3b/0x50 [ 87.257540][ T2070] kasan_populate_vmalloc+0x65/0x70 [ 87.262575][ T2070] alloc_vmap_area+0x1961/0x1aa0 [ 87.267356][ T2070] ? vm_map_ram+0x940/0x940 [ 87.271690][ T2070] ? __kasan_kmalloc+0x9c/0xb0 [ 87.276291][ T2070] ? kmalloc_node_trace+0x3d/0xb0 [ 87.281151][ T2070] __get_vm_area_node+0x171/0x370 [ 87.286019][ T2070] __vmalloc_node_range+0x338/0x1560 [ 87.291130][ T2070] ? htab_map_alloc+0x39d/0xf80 [ 87.295825][ T2070] ? vmap+0x2b0/0x2b0 [ 87.299649][ T2070] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 87.305292][ T2070] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 87.311268][ T2070] bpf_map_area_alloc+0xdc/0xf0 [ 87.315952][ T2070] ? htab_map_alloc+0x39d/0xf80 [ 87.320728][ T2070] htab_map_alloc+0x39d/0xf80 [ 87.325243][ T2070] ? htab_map_alloc_check+0x3c5/0x4b0 [ 87.330446][ T2070] map_create+0x44a/0xcf0 [ 87.334615][ T2070] __sys_bpf+0x2e6/0x7f0 [ 87.338701][ T2070] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 87.343900][ T2070] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 87.350062][ T2070] __x64_sys_bpf+0x7c/0x90 [ 87.354315][ T2070] x64_sys_call+0x87f/0x9a0 [ 87.358653][ T2070] do_syscall_64+0x3b/0xb0 [ 87.362905][ T2070] ? clear_bhb_loop+0x55/0xb0 [ 87.367421][ T2070] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 87.373149][ T2070] RIP: 0033:0x7f2daa77ff19 [ 87.377401][ T2070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 87.396843][ T2070] RSP: 002b:00007f2daa5ff058 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 87.405087][ T2070] RAX: ffffffffffffffda RBX: 00007f2daa945fa0 RCX: 00007f2daa77ff19 [ 87.412897][ T2070] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 87.420711][ T2070] RBP: 00007f2daa5ff0a0 R08: 0000000000000000 R09: 0000000000000000 [ 87.428520][ T2070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 87.436333][ T2070] R13: 0000000000000000 R14: 00007f2daa945fa0 R15: 00007ffeba73e8d8 [ 87.444150][ T2070] [ 87.463561][ T28] audit: type=1400 audit(1733408175.654:144): avc: denied { remove_name } for pid=85 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 87.675838][ T2073] device veth0_vlan left promiscuous mode [ 87.682053][ T28] audit: type=1400 audit(1733408175.654:145): avc: denied { rename } for pid=85 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 87.700047][ T2073] device veth0_vlan entered promiscuous mode [ 87.717729][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 87.731072][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 87.765049][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 87.940300][ T2098] FAULT_INJECTION: forcing a failure. [ 87.940300][ T2098] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 88.118546][ T2098] CPU: 1 PID: 2098 Comm: syz.0.642 Not tainted 6.1.115-syzkaller-00002-g182b090f35f3 #0 [ 88.128117][ T2098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 88.138098][ T2098] Call Trace: [ 88.141220][ T2098] [ 88.144001][ T2098] dump_stack_lvl+0x151/0x1b7 [ 88.148509][ T2098] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 88.153805][ T2098] ? __kasan_check_write+0x14/0x20 [ 88.158753][ T2098] dump_stack+0x15/0x19 [ 88.162745][ T2098] should_fail_ex+0x3d0/0x520 [ 88.167255][ T2098] should_fail+0xb/0x10 [ 88.171252][ T2098] should_fail_usercopy+0x1a/0x20 [ 88.176107][ T2098] _copy_from_user+0x1e/0xc0 [ 88.180534][ T2098] perf_copy_attr+0x163/0x880 [ 88.185055][ T2098] __se_sys_perf_event_open+0xd7/0x3d60 [ 88.190429][ T2098] ? __kasan_check_write+0x14/0x20 [ 88.195375][ T2098] ? mutex_unlock+0xb2/0x260 [ 88.199811][ T2098] ? __mutex_lock_slowpath+0x10/0x10 [ 88.204926][ T2098] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 88.210393][ T2098] ? fput+0x15b/0x1b0 [ 88.214210][ T2098] ? __ia32_sys_read+0x90/0x90 [ 88.218920][ T2098] ? debug_smp_processor_id+0x17/0x20 [ 88.224104][ T2098] __x64_sys_perf_event_open+0xbf/0xd0 [ 88.229402][ T2098] x64_sys_call+0x7de/0x9a0 [ 88.233737][ T2098] do_syscall_64+0x3b/0xb0 [ 88.237994][ T2098] ? clear_bhb_loop+0x55/0xb0 [ 88.242520][ T2098] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 88.248231][ T2098] RIP: 0033:0x7f59dbb7ff19 [ 88.252483][ T2098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 88.272104][ T2098] RSP: 002b:00007f59dca78058 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 88.280352][ T2098] RAX: ffffffffffffffda RBX: 00007f59dbd45fa0 RCX: 00007f59dbb7ff19 [ 88.288243][ T2098] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001080 [ 88.296231][ T2098] RBP: 00007f59dca780a0 R08: 0000000000000000 R09: 0000000000000000 [ 88.304039][ T2098] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 88.311852][ T2098] R13: 0000000000000000 R14: 00007f59dbd45fa0 R15: 00007fffd6332e58 [ 88.319671][ T2098] [ 88.920176][ T2124] device veth0_vlan left promiscuous mode [ 88.977377][ T2124] device veth0_vlan entered promiscuous mode [ 89.331776][ T28] audit: type=1400 audit(1733408177.524:146): avc: denied { create } for pid=2125 comm="syz.3.650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 90.199399][ T2132] device veth0_vlan left promiscuous mode [ 90.329149][ T2132] device veth0_vlan entered promiscuous mode [ 91.353961][ T2169] device veth0_vlan left promiscuous mode [ 91.417400][ T2169] device veth0_vlan entered promiscuous mode [ 91.482858][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.491270][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.525990][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 93.335746][ T2219] device veth0_vlan left promiscuous mode [ 93.344012][ T2219] device veth0_vlan entered promiscuous mode [ 93.398064][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 93.423566][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 93.466701][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 93.630726][ T2238] FAULT_INJECTION: forcing a failure. [ 93.630726][ T2238] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 93.643783][ T2238] CPU: 0 PID: 2238 Comm: syz.2.683 Not tainted 6.1.115-syzkaller-00002-g182b090f35f3 #0 [ 93.653328][ T2238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 93.663219][ T2238] Call Trace: [ 93.666336][ T2238] [ 93.669115][ T2238] dump_stack_lvl+0x151/0x1b7 [ 93.673642][ T2238] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 93.679010][ T2238] dump_stack+0x15/0x19 [ 93.683002][ T2238] should_fail_ex+0x3d0/0x520 [ 93.687525][ T2238] should_fail+0xb/0x10 [ 93.691502][ T2238] should_fail_usercopy+0x1a/0x20 [ 93.696365][ T2238] copy_page_from_iter_atomic+0x349/0x10b0 [ 93.702007][ T2238] ? shmem_get_folio+0xa0/0xa0 [ 93.706606][ T2238] ? fault_in_readable+0x172/0x2d0 [ 93.711555][ T2238] ? pipe_zero+0x220/0x220 [ 93.715804][ T2238] ? shmem_write_begin+0x1f0/0x3a0 [ 93.720756][ T2238] ? __kasan_check_write+0x14/0x20 [ 93.725833][ T2238] ? shmem_writepage+0xe00/0xe00 [ 93.730596][ T2238] generic_perform_write+0x369/0x5c0 [ 93.735722][ T2238] ? generic_file_direct_write+0x6b0/0x6b0 [ 93.741360][ T2238] ? __file_remove_privs+0x640/0x640 [ 93.746494][ T2238] ? generic_write_checks+0x15c/0x1c0 [ 93.751687][ T2238] __generic_file_write_iter+0x174/0x3a0 [ 93.757156][ T2238] generic_file_write_iter+0xb1/0x310 [ 93.762364][ T2238] vfs_write+0xaf6/0xed0 [ 93.766441][ T2238] ? __kasan_slab_free+0x11/0x20 [ 93.771219][ T2238] ? file_end_write+0x1c0/0x1c0 [ 93.775900][ T2238] ? mutex_lock+0xb1/0x1e0 [ 93.780156][ T2238] ? bit_wait_io_timeout+0x120/0x120 [ 93.785372][ T2238] ? __fdget_pos+0x2e2/0x390 [ 93.789910][ T2238] ? ksys_write+0x77/0x2c0 [ 93.794169][ T2238] ksys_write+0x199/0x2c0 [ 93.798321][ T2238] ? __this_cpu_preempt_check+0x13/0x20 [ 93.803697][ T2238] ? __ia32_sys_read+0x90/0x90 [ 93.808377][ T2238] ? debug_smp_processor_id+0x17/0x20 [ 93.813584][ T2238] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 93.819503][ T2238] __x64_sys_write+0x7b/0x90 [ 93.823917][ T2238] x64_sys_call+0x2f/0x9a0 [ 93.828167][ T2238] do_syscall_64+0x3b/0xb0 [ 93.832421][ T2238] ? clear_bhb_loop+0x55/0xb0 [ 93.836931][ T2238] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 93.842662][ T2238] RIP: 0033:0x7fe29777ff19 [ 93.846915][ T2238] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 93.866462][ T2238] RSP: 002b:00007fe298665058 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 93.874701][ T2238] RAX: ffffffffffffffda RBX: 00007fe297945fa0 RCX: 00007fe29777ff19 [ 93.882513][ T2238] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000007 [ 93.890323][ T2238] RBP: 00007fe2986650a0 R08: 0000000000000000 R09: 0000000000000000 [ 93.898133][ T2238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 93.905945][ T2238] R13: 0000000000000000 R14: 00007fe297945fa0 R15: 00007ffdc8d18e08 [ 93.913763][ T2238] [ 94.463779][ T2252] device syzkaller0 entered promiscuous mode [ 95.009339][ T2269] device veth0_vlan left promiscuous mode [ 95.020244][ T2269] device veth0_vlan entered promiscuous mode [ 96.519277][ T2323] device veth0_vlan left promiscuous mode [ 96.616968][ T2323] device veth0_vlan entered promiscuous mode [ 97.553475][ T2355] FAULT_INJECTION: forcing a failure. [ 97.553475][ T2355] name failslab, interval 1, probability 0, space 0, times 0 [ 97.566171][ T2355] CPU: 1 PID: 2355 Comm: syz.2.714 Not tainted 6.1.115-syzkaller-00002-g182b090f35f3 #0 [ 97.575703][ T2355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 97.585603][ T2355] Call Trace: [ 97.588731][ T2355] [ 97.591502][ T2355] dump_stack_lvl+0x151/0x1b7 [ 97.596010][ T2355] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 97.601305][ T2355] dump_stack+0x15/0x19 [ 97.605303][ T2355] should_fail_ex+0x3d0/0x520 [ 97.609817][ T2355] ? skb_clone+0x1f8/0x380 [ 97.614062][ T2355] __should_failslab+0xaf/0xf0 [ 97.618667][ T2355] should_failslab+0x9/0x20 [ 97.623003][ T2355] kmem_cache_alloc+0x3b/0x320 [ 97.627606][ T2355] ? __kernel_text_address+0xd/0x40 [ 97.632641][ T2355] skb_clone+0x1f8/0x380 [ 97.636716][ T2355] bpf_clone_redirect+0xa5/0x3c0 [ 97.641493][ T2355] bpf_prog_64e505a7b7f97a05+0x55/0x5a [ 97.646787][ T2355] ? layout_symtab+0x710/0x9f0 [ 97.651385][ T2355] ? __stack_depot_save+0x36/0x480 [ 97.656332][ T2355] ? kasan_set_track+0x60/0x70 [ 97.660937][ T2355] ? kasan_set_track+0x4b/0x70 [ 97.665530][ T2355] ? kasan_save_alloc_info+0x1f/0x30 [ 97.670650][ T2355] ? __kasan_slab_alloc+0x6c/0x80 [ 97.675514][ T2355] ? slab_post_alloc_hook+0x53/0x2c0 [ 97.680634][ T2355] ? kmem_cache_alloc+0x175/0x320 [ 97.685492][ T2355] ? build_skb+0x2c/0x220 [ 97.689659][ T2355] ? bpf_prog_test_run_skb+0x3ad/0x13a0 [ 97.695041][ T2355] ? bpf_prog_test_run+0x3b0/0x630 [ 97.699985][ T2355] ? __sys_bpf+0x59f/0x7f0 [ 97.704239][ T2355] ? __x64_sys_bpf+0x7c/0x90 [ 97.708666][ T2355] ? x64_sys_call+0x87f/0x9a0 [ 97.713177][ T2355] ? do_syscall_64+0x3b/0xb0 [ 97.717607][ T2355] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 97.723517][ T2355] ? ktime_get+0x12f/0x160 [ 97.727761][ T2355] bpf_test_run+0x4ab/0xa40 [ 97.732104][ T2355] ? convert___skb_to_skb+0x670/0x670 [ 97.737306][ T2355] ? eth_type_trans+0x342/0x710 [ 97.741999][ T2355] ? eth_get_headlen+0x240/0x240 [ 97.746767][ T2355] ? bpf_prog_test_run_skb+0x7ab/0x13a0 [ 97.752149][ T2355] ? convert___skb_to_skb+0x44/0x670 [ 97.757268][ T2355] ? memcpy+0x56/0x70 [ 97.761089][ T2355] bpf_prog_test_run_skb+0xaf1/0x13a0 [ 97.766302][ T2355] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 97.772025][ T2355] ? __kasan_check_write+0x14/0x20 [ 97.777057][ T2355] ? fput+0x15b/0x1b0 [ 97.780874][ T2355] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 97.786693][ T2355] bpf_prog_test_run+0x3b0/0x630 [ 97.791464][ T2355] ? bpf_prog_query+0x260/0x260 [ 97.796159][ T2355] ? selinux_bpf+0xd2/0x100 [ 97.800494][ T2355] ? security_bpf+0x82/0xb0 [ 97.804849][ T2355] __sys_bpf+0x59f/0x7f0 [ 97.808912][ T2355] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 97.814122][ T2355] ? __ia32_sys_read+0x90/0x90 [ 97.818738][ T2355] ? debug_smp_processor_id+0x17/0x20 [ 97.823926][ T2355] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 97.829830][ T2355] __x64_sys_bpf+0x7c/0x90 [ 97.834083][ T2355] x64_sys_call+0x87f/0x9a0 [ 97.838421][ T2355] do_syscall_64+0x3b/0xb0 [ 97.842673][ T2355] ? clear_bhb_loop+0x55/0xb0 [ 97.847186][ T2355] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 97.852913][ T2355] RIP: 0033:0x7fe29777ff19 [ 97.857169][ T2355] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 97.876608][ T2355] RSP: 002b:00007fe298665058 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 97.884856][ T2355] RAX: ffffffffffffffda RBX: 00007fe297945fa0 RCX: 00007fe29777ff19 [ 97.892700][ T2355] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 97.900472][ T2355] RBP: 00007fe2986650a0 R08: 0000000000000000 R09: 0000000000000000 [ 97.908286][ T2355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 97.916101][ T2355] R13: 0000000000000000 R14: 00007fe297945fa0 R15: 00007ffdc8d18e08 [ 97.923917][ T2355] [ 98.372433][ T2375] device wg2 entered promiscuous mode [ 98.457878][ T2366] device veth0_vlan left promiscuous mode [ 98.465987][ T2366] device veth0_vlan entered promiscuous mode [ 98.472691][ T2366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 98.492111][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 98.519236][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 98.556225][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 98.676524][ T28] audit: type=1400 audit(1733408186.864:147): avc: denied { write } for pid=2385 comm="syz.2.724" name="cgroup.subtree_control" dev="cgroup2" ino=418 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 98.769308][ T28] audit: type=1400 audit(1733408186.864:148): avc: denied { open } for pid=2385 comm="syz.2.724" path="" dev="cgroup2" ino=418 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 100.040044][ T2421] FAULT_INJECTION: forcing a failure. [ 100.040044][ T2421] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 100.153093][ T2421] CPU: 0 PID: 2421 Comm: syz.0.733 Not tainted 6.1.115-syzkaller-00002-g182b090f35f3 #0 [ 100.162660][ T2421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 100.172551][ T2421] Call Trace: [ 100.175671][ T2421] [ 100.178448][ T2421] dump_stack_lvl+0x151/0x1b7 [ 100.182965][ T2421] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 100.188256][ T2421] dump_stack+0x15/0x19 [ 100.192260][ T2421] should_fail_ex+0x3d0/0x520 [ 100.196944][ T2421] should_fail_alloc_page+0x68/0x90 [ 100.201969][ T2421] prepare_alloc_pages+0x14e/0x6f0 [ 100.206919][ T2421] ? __alloc_pages_bulk+0xda0/0xda0 [ 100.211953][ T2421] ? slab_post_alloc_hook+0x53/0x2c0 [ 100.217075][ T2421] ? alloc_vmap_area+0x1a5/0x1aa0 [ 100.221931][ T2421] ? __get_vm_area_node+0x171/0x370 [ 100.226964][ T2421] ? __vmalloc_node_range+0x338/0x1560 [ 100.232263][ T2421] __alloc_pages+0x162/0x610 [ 100.236689][ T2421] ? prep_new_page+0x110/0x110 [ 100.241294][ T2421] ? _raw_spin_trylock_bh+0x190/0x190 [ 100.246498][ T2421] __get_free_pages+0xe/0x30 [ 100.250921][ T2421] kasan_populate_vmalloc_pte+0x39/0x130 [ 100.256394][ T2421] ? __apply_to_page_range+0x8ca/0xbe0 [ 100.261686][ T2421] __apply_to_page_range+0x8dd/0xbe0 [ 100.266896][ T2421] ? kasan_populate_vmalloc+0x70/0x70 [ 100.272275][ T2421] ? kasan_populate_vmalloc+0x70/0x70 [ 100.277481][ T2421] apply_to_page_range+0x3b/0x50 [ 100.282263][ T2421] kasan_populate_vmalloc+0x65/0x70 [ 100.287297][ T2421] alloc_vmap_area+0x1961/0x1aa0 [ 100.292066][ T2421] ? vm_map_ram+0x940/0x940 [ 100.296403][ T2421] ? __kasan_kmalloc+0x9c/0xb0 [ 100.301000][ T2421] ? kmalloc_node_trace+0x3d/0xb0 [ 100.305869][ T2421] __get_vm_area_node+0x171/0x370 [ 100.310721][ T2421] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 100.316633][ T2421] __vmalloc_node_range+0x338/0x1560 [ 100.321747][ T2421] ? sock_hash_alloc+0x29a/0x540 [ 100.326524][ T2421] ? vmap+0x2b0/0x2b0 [ 100.330334][ T2421] ? kasan_save_alloc_info+0x1f/0x30 [ 100.335457][ T2421] ? __kasan_kmalloc+0x9c/0xb0 [ 100.340062][ T2421] ? bpf_map_area_alloc+0x4f/0xf0 [ 100.344923][ T2421] ? __kmalloc_node+0xb4/0x1e0 [ 100.349514][ T2421] bpf_map_area_alloc+0xdc/0xf0 [ 100.354270][ T2421] ? sock_hash_alloc+0x29a/0x540 [ 100.359011][ T2421] sock_hash_alloc+0x29a/0x540 [ 100.363578][ T2421] map_create+0x44a/0xcf0 [ 100.367741][ T2421] __sys_bpf+0x2e6/0x7f0 [ 100.371826][ T2421] ? clockevents_program_event+0x22f/0x300 [ 100.377465][ T2421] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 100.382673][ T2421] ? __sched_clock_gtod_offset+0x100/0x100 [ 100.388319][ T2421] ? debug_smp_processor_id+0x17/0x20 [ 100.393520][ T2421] __x64_sys_bpf+0x7c/0x90 [ 100.397777][ T2421] x64_sys_call+0x87f/0x9a0 [ 100.402116][ T2421] do_syscall_64+0x3b/0xb0 [ 100.406363][ T2421] ? clear_bhb_loop+0x55/0xb0 [ 100.410877][ T2421] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 100.416617][ T2421] RIP: 0033:0x7f59dbb7ff19 [ 100.420858][ T2421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.440422][ T2421] RSP: 002b:00007f59dca78058 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 100.448664][ T2421] RAX: ffffffffffffffda RBX: 00007f59dbd45fa0 RCX: 00007f59dbb7ff19 [ 100.456471][ T2421] RDX: 0000000000000050 RSI: 0000000020000600 RDI: 0000000000000000 [ 100.464522][ T2421] RBP: 00007f59dca780a0 R08: 0000000000000000 R09: 0000000000000000 [ 100.472336][ T2421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.480144][ T2421] R13: 0000000000000000 R14: 00007f59dbd45fa0 R15: 00007fffd6332e58 [ 100.487957][ T2421] [ 100.640115][ T2424] device veth0_vlan left promiscuous mode [ 100.657069][ T2424] device veth0_vlan entered promiscuous mode [ 100.664533][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.679198][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.686513][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.890901][ T2441] device pim6reg1 entered promiscuous mode [ 102.761913][ T2492] device sit0 entered promiscuous mode [ 105.070607][ T2548] FAULT_INJECTION: forcing a failure. [ 105.070607][ T2548] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 105.219161][ T2548] CPU: 0 PID: 2548 Comm: syz.2.771 Not tainted 6.1.115-syzkaller-00002-g182b090f35f3 #0 [ 105.228727][ T2548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 105.238624][ T2548] Call Trace: [ 105.241744][ T2548] [ 105.244519][ T2548] dump_stack_lvl+0x151/0x1b7 [ 105.249035][ T2548] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 105.254329][ T2548] ? gfp_zone+0x65/0x160 [ 105.258413][ T2548] dump_stack+0x15/0x19 [ 105.262397][ T2548] should_fail_ex+0x3d0/0x520 [ 105.266909][ T2548] should_fail_alloc_page+0x68/0x90 [ 105.271946][ T2548] prepare_alloc_pages+0x14e/0x6f0 [ 105.276891][ T2548] ? __alloc_pages_bulk+0xda0/0xda0 [ 105.281928][ T2548] __alloc_pages+0x162/0x610 [ 105.286351][ T2548] ? prep_new_page+0x110/0x110 [ 105.290952][ T2548] ? _raw_spin_trylock_bh+0x190/0x190 [ 105.296159][ T2548] ? memset_erms+0x9/0x10 [ 105.300331][ T2548] __get_free_pages+0xe/0x30 [ 105.304750][ T2548] kasan_populate_vmalloc_pte+0x39/0x130 [ 105.310219][ T2548] ? __apply_to_page_range+0x8ca/0xbe0 [ 105.315512][ T2548] __apply_to_page_range+0x8dd/0xbe0 [ 105.320634][ T2548] ? kasan_populate_vmalloc+0x70/0x70 [ 105.325842][ T2548] ? kasan_populate_vmalloc+0x70/0x70 [ 105.331050][ T2548] apply_to_page_range+0x3b/0x50 [ 105.335822][ T2548] kasan_populate_vmalloc+0x65/0x70 [ 105.340858][ T2548] alloc_vmap_area+0x1961/0x1aa0 [ 105.345634][ T2548] ? vm_map_ram+0x940/0x940 [ 105.349969][ T2548] ? __kasan_kmalloc+0x9c/0xb0 [ 105.354574][ T2548] ? kmalloc_node_trace+0x3d/0xb0 [ 105.359429][ T2548] __get_vm_area_node+0x171/0x370 [ 105.364296][ T2548] __vmalloc_node_range+0x338/0x1560 [ 105.369411][ T2548] ? stack_map_alloc+0x30c/0x520 [ 105.374188][ T2548] ? selinux_capable+0x2f1/0x430 [ 105.378959][ T2548] ? selinux_capset+0xf0/0xf0 [ 105.383472][ T2548] ? vmap+0x2b0/0x2b0 [ 105.387288][ T2548] ? cap_capable+0x1d2/0x270 [ 105.391727][ T2548] bpf_map_area_alloc+0xdc/0xf0 [ 105.396401][ T2548] ? stack_map_alloc+0x30c/0x520 [ 105.401175][ T2548] stack_map_alloc+0x30c/0x520 [ 105.405778][ T2548] map_create+0x44a/0xcf0 [ 105.409942][ T2548] __sys_bpf+0x2e6/0x7f0 [ 105.414021][ T2548] ? clockevents_program_event+0x22f/0x300 [ 105.419672][ T2548] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 105.424872][ T2548] ? __sched_clock_gtod_offset+0x100/0x100 [ 105.430511][ T2548] ? debug_smp_processor_id+0x17/0x20 [ 105.435725][ T2548] __x64_sys_bpf+0x7c/0x90 [ 105.439973][ T2548] x64_sys_call+0x87f/0x9a0 [ 105.444323][ T2548] do_syscall_64+0x3b/0xb0 [ 105.448568][ T2548] ? clear_bhb_loop+0x55/0xb0 [ 105.453082][ T2548] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 105.458808][ T2548] RIP: 0033:0x7fe29777ff19 [ 105.463062][ T2548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 105.482500][ T2548] RSP: 002b:00007fe298665058 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 105.490745][ T2548] RAX: ffffffffffffffda RBX: 00007fe297945fa0 RCX: 00007fe29777ff19 [ 105.498644][ T2548] RDX: 0000000000000048 RSI: 00000000200005c0 RDI: 0000000000000000 [ 105.506452][ T2548] RBP: 00007fe2986650a0 R08: 0000000000000000 R09: 0000000000000000 [ 105.514264][ T2548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 105.522078][ T2548] R13: 0000000000000000 R14: 00007fe297945fa0 R15: 00007ffdc8d18e08 [ 105.529900][ T2548] [ 109.440170][ T2593] device veth0_vlan left promiscuous mode [ 109.445988][ T2593] device veth0_vlan entered promiscuous mode [ 109.722361][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.741219][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 109.765937][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.853445][ T2608] device wg2 entered promiscuous mode [ 110.107174][ T2615] device wg2 left promiscuous mode [ 110.209796][ T2617] device wg2 entered promiscuous mode [ 110.965124][ T2630] device veth0_vlan left promiscuous mode [ 111.021768][ T2630] device veth0_vlan entered promiscuous mode [ 111.306433][ T2648] device veth0_vlan left promiscuous mode [ 111.313806][ T2648] device veth0_vlan entered promiscuous mode [ 111.385558][ T2654] FAULT_INJECTION: forcing a failure. [ 111.385558][ T2654] name failslab, interval 1, probability 0, space 0, times 0 [ 111.468959][ T2654] CPU: 1 PID: 2654 Comm: syz.4.798 Not tainted 6.1.115-syzkaller-00002-g182b090f35f3 #0 [ 111.478530][ T2654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 111.488441][ T2654] Call Trace: [ 111.491546][ T2654] [ 111.494346][ T2654] dump_stack_lvl+0x151/0x1b7 [ 111.498833][ T2654] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 111.504567][ T2654] dump_stack+0x15/0x19 [ 111.508562][ T2654] should_fail_ex+0x3d0/0x520 [ 111.513183][ T2654] __should_failslab+0xaf/0xf0 [ 111.517758][ T2654] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 111.523312][ T2654] should_failslab+0x9/0x20 [ 111.527785][ T2654] __kmem_cache_alloc_node+0x3d/0x2a0 [ 111.533068][ T2654] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 111.538617][ T2654] kmalloc_trace+0x2a/0xa0 [ 111.542956][ T2654] selinux_sk_alloc_security+0x7d/0x1a0 [ 111.548342][ T2654] security_sk_alloc+0x72/0xb0 [ 111.552954][ T2654] sk_prot_alloc+0x114/0x330 [ 111.557556][ T2654] sk_alloc+0x38/0x440 [ 111.561534][ T2654] ? bpf_test_init+0x169/0x190 [ 111.566129][ T2654] bpf_prog_test_run_skb+0x384/0x13a0 [ 111.571377][ T2654] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 111.577060][ T2654] ? __kasan_check_write+0x14/0x20 [ 111.582010][ T2654] ? fput+0x15b/0x1b0 [ 111.585829][ T2654] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 111.591557][ T2654] bpf_prog_test_run+0x3b0/0x630 [ 111.596367][ T2654] ? bpf_prog_query+0x260/0x260 [ 111.601019][ T2654] ? selinux_bpf+0xd2/0x100 [ 111.605375][ T2654] ? security_bpf+0x82/0xb0 [ 111.609697][ T2654] __sys_bpf+0x59f/0x7f0 [ 111.614141][ T2654] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 111.619756][ T2654] ? __ia32_sys_read+0x90/0x90 [ 111.624598][ T2654] ? debug_smp_processor_id+0x17/0x20 [ 111.630229][ T2654] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 111.636340][ T2654] __x64_sys_bpf+0x7c/0x90 [ 111.640840][ T2654] x64_sys_call+0x87f/0x9a0 [ 111.645266][ T2654] do_syscall_64+0x3b/0xb0 [ 111.649535][ T2654] ? clear_bhb_loop+0x55/0xb0 [ 111.654377][ T2654] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 111.660510][ T2654] RIP: 0033:0x7fc9e457ff19 [ 111.665137][ T2654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 111.685376][ T2654] RSP: 002b:00007fc9e5442058 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 111.694534][ T2654] RAX: ffffffffffffffda RBX: 00007fc9e4745fa0 RCX: 00007fc9e457ff19 [ 111.703827][ T2654] RDX: 0000000000000050 RSI: 0000000020000900 RDI: 000000000000000a [ 111.712255][ T2654] RBP: 00007fc9e54420a0 R08: 0000000000000000 R09: 0000000000000000 [ 111.720179][ T2654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 111.728349][ T2654] R13: 0000000000000000 R14: 00007fc9e4745fa0 R15: 00007ffc6d9617a8 [ 111.736329][ T2654] [ 111.864944][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 111.975850][ T2662] device wg2 left promiscuous mode [ 112.272101][ T2662] device wg2 entered promiscuous mode [ 113.182843][ T2681] bond_slave_1: mtu less than device minimum [ 115.168378][ T28] audit: type=1400 audit(1733408203.354:149): avc: denied { create } for pid=2720 comm="syz.1.817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 115.672231][ T2733] device sit0 left promiscuous mode [ 116.087072][ T2735] device sit0 entered promiscuous mode [ 116.813998][ T2763] device sit0 left promiscuous mode [ 117.566848][ T2777] device sit0 entered promiscuous mode [ 117.720700][ T2793] FAULT_INJECTION: forcing a failure. [ 117.720700][ T2793] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 117.834041][ T2793] CPU: 1 PID: 2793 Comm: syz.2.838 Not tainted 6.1.115-syzkaller-00002-g182b090f35f3 #0 [ 117.843608][ T2793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 117.853766][ T2793] Call Trace: [ 117.856879][ T2793] [ 117.859654][ T2793] dump_stack_lvl+0x151/0x1b7 [ 117.864188][ T2793] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 117.869684][ T2793] ? kasan_set_track+0x60/0x70 [ 117.874238][ T2793] dump_stack+0x15/0x19 [ 117.878229][ T2793] should_fail_ex+0x3d0/0x520 [ 117.882760][ T2793] should_fail_alloc_page+0x68/0x90 [ 117.887883][ T2793] prepare_alloc_pages+0x14e/0x6f0 [ 117.892851][ T2793] ? __alloc_pages_bulk+0xda0/0xda0 [ 117.897871][ T2793] __alloc_pages+0x162/0x610 [ 117.902265][ T2793] ? prep_new_page+0x110/0x110 [ 117.906872][ T2793] __folio_alloc+0x15/0x40 [ 117.911118][ T2793] shmem_alloc_and_acct_folio+0x78c/0xa50 [ 117.916686][ T2793] ? mem_cgroup_swap_full+0x1a0/0x1a0 [ 117.921881][ T2793] ? shmem_replace_folio+0x6a0/0x6a0 [ 117.927454][ T2793] ? xas_load+0x39d/0x3b0 [ 117.931610][ T2793] ? __filemap_get_folio+0xaa1/0xae0 [ 117.936959][ T2793] ? page_cache_prev_miss+0x410/0x410 [ 117.942357][ T2793] ? down_read_trylock+0x319/0x7d0 [ 117.947694][ T2793] shmem_get_folio_gfp+0x12d4/0x24b0 [ 117.953385][ T2793] ? shmem_get_folio+0xa0/0xa0 [ 117.957966][ T2793] ? fault_in_iov_iter_readable+0x49/0x290 [ 117.963879][ T2793] ? fault_in_readable+0x172/0x2d0 [ 117.968836][ T2793] ? fault_in_readable+0x17c/0x2d0 [ 117.973863][ T2793] shmem_write_begin+0x164/0x3a0 [ 117.978629][ T2793] ? __kasan_check_write+0x14/0x20 [ 117.983576][ T2793] ? shmem_writepage+0xe00/0xe00 [ 117.988345][ T2793] generic_perform_write+0x2f9/0x5c0 [ 117.993466][ T2793] ? generic_file_direct_write+0x6b0/0x6b0 [ 117.999107][ T2793] ? __file_remove_privs+0x640/0x640 [ 118.004226][ T2793] ? generic_write_checks+0x15c/0x1c0 [ 118.009443][ T2793] __generic_file_write_iter+0x174/0x3a0 [ 118.014992][ T2793] generic_file_write_iter+0xb1/0x310 [ 118.020197][ T2793] vfs_write+0xaf6/0xed0 [ 118.024275][ T2793] ? __kasan_slab_free+0x11/0x20 [ 118.029064][ T2793] ? file_end_write+0x1c0/0x1c0 [ 118.033740][ T2793] ? mutex_lock+0xb1/0x1e0 [ 118.037991][ T2793] ? bit_wait_io_timeout+0x120/0x120 [ 118.043118][ T2793] ? __fdget_pos+0x2e2/0x390 [ 118.047540][ T2793] ? ksys_write+0x77/0x2c0 [ 118.052052][ T2793] ksys_write+0x199/0x2c0 [ 118.056217][ T2793] ? __this_cpu_preempt_check+0x13/0x20 [ 118.061790][ T2793] ? __ia32_sys_read+0x90/0x90 [ 118.066379][ T2793] ? debug_smp_processor_id+0x17/0x20 [ 118.071589][ T2793] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 118.077506][ T2793] __x64_sys_write+0x7b/0x90 [ 118.081919][ T2793] x64_sys_call+0x2f/0x9a0 [ 118.086166][ T2793] do_syscall_64+0x3b/0xb0 [ 118.090520][ T2793] ? clear_bhb_loop+0x55/0xb0 [ 118.095019][ T2793] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 118.100771][ T2793] RIP: 0033:0x7fe29777ff19 [ 118.105002][ T2793] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 118.124458][ T2793] RSP: 002b:00007fe298665058 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 118.132693][ T2793] RAX: ffffffffffffffda RBX: 00007fe297945fa0 RCX: 00007fe29777ff19 [ 118.140615][ T2793] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000005 [ 118.148549][ T2793] RBP: 00007fe2986650a0 R08: 0000000000000000 R09: 0000000000000000 [ 118.156758][ T2793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 118.164691][ T2793] R13: 0000000000000000 R14: 00007fe297945fa0 R15: 00007ffdc8d18e08 [ 118.172590][ T2793] [ 119.490375][ T2840] device pim6reg1 entered promiscuous mode [ 119.694105][ T2834] device veth0_vlan left promiscuous mode [ 119.774848][ T2834] device veth0_vlan entered promiscuous mode [ 120.024835][ T2874] syz.0.865[2874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.024907][ T2874] syz.0.865[2874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.101530][ T2874] device wg2 left promiscuous mode [ 120.369338][ T2877] device wg2 entered promiscuous mode [ 121.902090][ T2914] device sit0 entered promiscuous mode [ 122.772469][ T2923] device veth1_macvtap left promiscuous mode [ 124.789546][ T2960] syz.2.888[2960] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.789633][ T2960] syz.2.888[2960] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.910494][ T2960] syz.2.888[2960] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.005110][ T2968] device pim6reg1 entered promiscuous mode [ 125.131697][ T2960] syz.2.888[2960] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.593262][ T2975] device veth0_vlan left promiscuous mode [ 125.689318][ T2975] device veth0_vlan entered promiscuous mode [ 126.076508][ T2993] bond_slave_1: mtu less than device minimum [ 126.303214][ T2994] device veth0_vlan left promiscuous mode [ 126.309369][ T2994] device veth0_vlan entered promiscuous mode [ 126.979333][ T3023] device veth0_vlan left promiscuous mode [ 127.029736][ T3023] device veth0_vlan entered promiscuous mode [ 127.097422][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 127.172741][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 127.191845][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 127.269589][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 127.833498][ T3058] device wg2 left promiscuous mode [ 127.884598][ T3068] device wg2 entered promiscuous mode [ 127.947230][ T28] audit: type=1400 audit(1733408216.124:150): avc: denied { attach_queue } for pid=3049 comm="syz.2.917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 128.266730][ T3082] device veth0_vlan left promiscuous mode [ 128.374578][ T3082] device veth0_vlan entered promiscuous mode [ 128.512769][ T3087] device pim6reg1 entered promiscuous mode [ 129.514674][ T3101] device veth0_vlan left promiscuous mode [ 129.660479][ T3101] device veth0_vlan entered promiscuous mode [ 130.458898][ T3133] device pim6reg1 entered promiscuous mode [ 130.849010][ T28] audit: type=1400 audit(1733408219.044:151): avc: denied { create } for pid=3144 comm="syz.0.942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 131.579179][ T3164] FAULT_INJECTION: forcing a failure. [ 131.579179][ T3164] name failslab, interval 1, probability 0, space 0, times 0 [ 131.703217][ T3164] CPU: 0 PID: 3164 Comm: syz.2.948 Not tainted 6.1.115-syzkaller-00002-g182b090f35f3 #0 [ 131.712785][ T3164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 131.722679][ T3164] Call Trace: [ 131.725799][ T3164] [ 131.728580][ T3164] dump_stack_lvl+0x151/0x1b7 [ 131.733093][ T3164] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 131.738389][ T3164] ? skb_release_data+0x19e/0x840 [ 131.743244][ T3164] ? __kasan_kmalloc+0x9c/0xb0 [ 131.747853][ T3164] dump_stack+0x15/0x19 [ 131.751847][ T3164] should_fail_ex+0x3d0/0x520 [ 131.756359][ T3164] ? skb_clone+0x1f8/0x380 [ 131.760692][ T3164] __should_failslab+0xaf/0xf0 [ 131.765640][ T3164] should_failslab+0x9/0x20 [ 131.769978][ T3164] kmem_cache_alloc+0x3b/0x320 [ 131.774579][ T3164] skb_clone+0x1f8/0x380 [ 131.778664][ T3164] bpf_clone_redirect+0xa5/0x3c0 [ 131.783438][ T3164] bpf_prog_64e505a7b7f97a05+0x55/0x5a [ 131.788728][ T3164] ? layout_symtab+0x710/0x9f0 [ 131.793331][ T3164] ? __stack_depot_save+0x36/0x480 [ 131.798282][ T3164] ? kasan_set_track+0x60/0x70 [ 131.802965][ T3164] ? kasan_set_track+0x4b/0x70 [ 131.807644][ T3164] ? kasan_save_alloc_info+0x1f/0x30 [ 131.812767][ T3164] ? __kasan_slab_alloc+0x6c/0x80 [ 131.817627][ T3164] ? slab_post_alloc_hook+0x53/0x2c0 [ 131.822751][ T3164] ? kmem_cache_alloc+0x175/0x320 [ 131.827609][ T3164] ? build_skb+0x2c/0x220 [ 131.831777][ T3164] ? bpf_prog_test_run_skb+0x3ad/0x13a0 [ 131.837154][ T3164] ? bpf_prog_test_run+0x3b0/0x630 [ 131.842100][ T3164] ? __sys_bpf+0x59f/0x7f0 [ 131.846352][ T3164] ? __x64_sys_bpf+0x7c/0x90 [ 131.850781][ T3164] ? x64_sys_call+0x87f/0x9a0 [ 131.855296][ T3164] ? do_syscall_64+0x3b/0xb0 [ 131.859718][ T3164] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 131.865624][ T3164] ? __kasan_check_read+0x11/0x20 [ 131.870499][ T3164] ? bpf_test_timer_continue+0x140/0x460 [ 131.875953][ T3164] bpf_test_run+0x4ab/0xa40 [ 131.880293][ T3164] ? convert___skb_to_skb+0x670/0x670 [ 131.885500][ T3164] ? eth_type_trans+0x342/0x710 [ 131.890185][ T3164] ? eth_get_headlen+0x240/0x240 [ 131.894960][ T3164] ? bpf_prog_test_run_skb+0x7ab/0x13a0 [ 131.900338][ T3164] ? convert___skb_to_skb+0x44/0x670 [ 131.905459][ T3164] ? memcpy+0x56/0x70 [ 131.909365][ T3164] bpf_prog_test_run_skb+0xaf1/0x13a0 [ 131.914579][ T3164] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 131.920316][ T3164] ? __kasan_check_write+0x14/0x20 [ 131.925257][ T3164] ? fput+0x15b/0x1b0 [ 131.929070][ T3164] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 131.934801][ T3164] bpf_prog_test_run+0x3b0/0x630 [ 131.939573][ T3164] ? bpf_prog_query+0x260/0x260 [ 131.944257][ T3164] ? selinux_bpf+0xd2/0x100 [ 131.948597][ T3164] ? security_bpf+0x82/0xb0 [ 131.952940][ T3164] __sys_bpf+0x59f/0x7f0 [ 131.957022][ T3164] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 131.962226][ T3164] ? __ia32_sys_read+0x90/0x90 [ 131.966828][ T3164] ? debug_smp_processor_id+0x17/0x20 [ 131.972032][ T3164] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 131.977930][ T3164] __x64_sys_bpf+0x7c/0x90 [ 131.982184][ T3164] x64_sys_call+0x87f/0x9a0 [ 131.986523][ T3164] do_syscall_64+0x3b/0xb0 [ 131.990773][ T3164] ? clear_bhb_loop+0x55/0xb0 [ 131.995288][ T3164] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 132.001025][ T3164] RIP: 0033:0x7fe29777ff19 [ 132.005272][ T3164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 132.024719][ T3164] RSP: 002b:00007fe298665058 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 132.032958][ T3164] RAX: ffffffffffffffda RBX: 00007fe297945fa0 RCX: 00007fe29777ff19 [ 132.040769][ T3164] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 132.049188][ T3164] RBP: 00007fe2986650a0 R08: 0000000000000000 R09: 0000000000000000 [ 132.057001][ T3164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 132.064809][ T3164] R13: 0000000000000000 R14: 00007fe297945fa0 R15: 00007ffdc8d18e08 [ 132.072625][ T3164] [ 137.926792][ T3231] device veth0_vlan left promiscuous mode [ 137.933289][ T3231] device veth0_vlan entered promiscuous mode [ 141.096933][ T3334] device sit0 entered promiscuous mode [ 141.301098][ T3344] syz.3.1007[3344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.301165][ T3344] syz.3.1007[3344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.730310][ T3338] device veth0_vlan left promiscuous mode [ 141.751435][ T3338] device veth0_vlan entered promiscuous mode [ 142.287379][ T3346] device syzkaller0 entered promiscuous mode [ 143.685402][ T3395] device wg2 entered promiscuous mode [ 143.738055][ T3396] device wg2 left promiscuous mode [ 144.264731][ T3411] device veth0_vlan left promiscuous mode [ 144.275169][ T3411] device veth0_vlan entered promiscuous mode [ 144.289952][ T3411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 144.311390][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 144.341244][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 144.348412][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 144.541947][ T3403] device wg2 entered promiscuous mode [ 145.066737][ T3446] device pim6reg1 entered promiscuous mode [ 145.089341][ T3445] device veth0_vlan left promiscuous mode [ 145.095942][ T3445] device veth0_vlan entered promiscuous mode [ 145.196989][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 145.209674][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 145.254907][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 145.395460][ T3461] device sit0 left promiscuous mode [ 145.798628][ T3453] device veth0_vlan left promiscuous mode [ 145.869396][ T3453] device veth0_vlan entered promiscuous mode [ 146.506709][ T3486] device syzkaller0 entered promiscuous mode [ 146.677001][ T3496] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 146.699866][ T3496] syzkaller0: Linktype set failed because interface is up [ 147.073590][ T3514] FAULT_INJECTION: forcing a failure. [ 147.073590][ T3514] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 147.140432][ T3514] CPU: 1 PID: 3514 Comm: syz.2.1058 Not tainted 6.1.115-syzkaller-00002-g182b090f35f3 #0 [ 147.150564][ T3514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 147.160455][ T3514] Call Trace: [ 147.163670][ T3514] [ 147.166526][ T3514] dump_stack_lvl+0x151/0x1b7 [ 147.171043][ T3514] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 147.176338][ T3514] dump_stack+0x15/0x19 [ 147.180332][ T3514] should_fail_ex+0x3d0/0x520 [ 147.185018][ T3514] should_fail+0xb/0x10 [ 147.189025][ T3514] should_fail_usercopy+0x1a/0x20 [ 147.193866][ T3514] _copy_to_user+0x1e/0x90 [ 147.198118][ T3514] generic_map_lookup_batch+0x6ff/0xcc0 [ 147.203611][ T3514] ? bpf_map_update_value+0x410/0x410 [ 147.208791][ T3514] ? bpf_map_do_batch+0x2d5/0x630 [ 147.213783][ T3514] ? bpf_map_update_value+0x410/0x410 [ 147.219828][ T3514] bpf_map_do_batch+0x2e2/0x630 [ 147.224485][ T3514] __sys_bpf+0x66b/0x7f0 [ 147.228563][ T3514] ? clockevents_program_event+0x22f/0x300 [ 147.234224][ T3514] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 147.239415][ T3514] ? __sched_clock_gtod_offset+0x100/0x100 [ 147.245062][ T3514] ? debug_smp_processor_id+0x17/0x20 [ 147.250268][ T3514] __x64_sys_bpf+0x7c/0x90 [ 147.254743][ T3514] x64_sys_call+0x87f/0x9a0 [ 147.259062][ T3514] do_syscall_64+0x3b/0xb0 [ 147.263315][ T3514] ? clear_bhb_loop+0x55/0xb0 [ 147.267823][ T3514] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 147.273554][ T3514] RIP: 0033:0x7fe29777ff19 [ 147.277801][ T3514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 147.297654][ T3514] RSP: 002b:00007fe298665058 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 147.305931][ T3514] RAX: ffffffffffffffda RBX: 00007fe297945fa0 RCX: 00007fe29777ff19 [ 147.313736][ T3514] RDX: 0000000000000038 RSI: 00000000200004c0 RDI: 0000000000000018 [ 147.321567][ T3514] RBP: 00007fe2986650a0 R08: 0000000000000000 R09: 0000000000000000 [ 147.329356][ T3514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 147.337165][ T3514] R13: 0000000000000000 R14: 00007fe297945fa0 R15: 00007ffdc8d18e08 [ 147.344986][ T3514] [ 149.635558][ T3582] device wg2 left promiscuous mode [ 149.644923][ T3583] device wg2 entered promiscuous mode [ 150.080321][ T3578] device sit0 entered promiscuous mode [ 151.852327][ T28] audit: type=1400 audit(1733408240.044:152): avc: denied { create } for pid=3628 comm="syz.4.1093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 153.805561][ T3658] device veth0_vlan left promiscuous mode [ 153.842139][ T3658] device veth0_vlan entered promiscuous mode [ 153.980001][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.033866][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 154.137121][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.379285][ T3701] device veth0_vlan left promiscuous mode [ 155.385284][ T3701] device veth0_vlan entered promiscuous mode [ 155.412020][ T3724] syz.4.1122[3724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.412109][ T3724] syz.4.1122[3724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.424584][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.546724][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.596810][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 159.205892][ T3797] FAULT_INJECTION: forcing a failure. [ 159.205892][ T3797] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 159.344647][ T3797] CPU: 0 PID: 3797 Comm: syz.2.1145 Not tainted 6.1.115-syzkaller-00002-g182b090f35f3 #0 [ 159.354564][ T3797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 159.364627][ T3797] Call Trace: [ 159.367745][ T3797] [ 159.370523][ T3797] dump_stack_lvl+0x151/0x1b7 [ 159.375036][ T3797] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 159.380330][ T3797] ? __sk_destruct+0x4bb/0x5c0 [ 159.384931][ T3797] dump_stack+0x15/0x19 [ 159.388920][ T3797] should_fail_ex+0x3d0/0x520 [ 159.393530][ T3797] should_fail+0xb/0x10 [ 159.397516][ T3797] should_fail_usercopy+0x1a/0x20 [ 159.402378][ T3797] _copy_to_user+0x1e/0x90 [ 159.406627][ T3797] simple_read_from_buffer+0xc7/0x150 [ 159.411834][ T3797] proc_fail_nth_read+0x1a3/0x210 [ 159.416696][ T3797] ? proc_fault_inject_write+0x390/0x390 [ 159.422172][ T3797] ? fsnotify_perm+0x269/0x5b0 [ 159.426770][ T3797] ? security_file_permission+0x86/0xb0 [ 159.432147][ T3797] ? proc_fault_inject_write+0x390/0x390 [ 159.437706][ T3797] vfs_read+0x26c/0xae0 [ 159.441696][ T3797] ? __kasan_check_write+0x14/0x20 [ 159.446734][ T3797] ? kernel_read+0x1f0/0x1f0 [ 159.451167][ T3797] ? mutex_lock+0xb1/0x1e0 [ 159.455665][ T3797] ? bit_wait_io_timeout+0x120/0x120 [ 159.460796][ T3797] ? __fdget_pos+0x2e2/0x390 [ 159.465300][ T3797] ? ksys_read+0x77/0x2c0 [ 159.469496][ T3797] ksys_read+0x199/0x2c0 [ 159.473630][ T3797] ? __this_cpu_preempt_check+0x13/0x20 [ 159.479020][ T3797] ? xfd_validate_state+0x6f/0x170 [ 159.484142][ T3797] ? vfs_write+0xed0/0xed0 [ 159.488512][ T3797] ? fpregs_restore_userregs+0x130/0x290 [ 159.493960][ T3797] __x64_sys_read+0x7b/0x90 [ 159.498454][ T3797] x64_sys_call+0x28/0x9a0 [ 159.502643][ T3797] do_syscall_64+0x3b/0xb0 [ 159.506890][ T3797] ? clear_bhb_loop+0x55/0xb0 [ 159.511585][ T3797] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 159.517630][ T3797] RIP: 0033:0x7fe29777e92c [ 159.521867][ T3797] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 159.541675][ T3797] RSP: 002b:00007fe298665050 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 159.549907][ T3797] RAX: ffffffffffffffda RBX: 00007fe297945fa0 RCX: 00007fe29777e92c [ 159.557708][ T3797] RDX: 000000000000000f RSI: 00007fe2986650b0 RDI: 000000000000000c [ 159.565824][ T3797] RBP: 00007fe2986650a0 R08: 0000000000000000 R09: 0000000000000000 [ 159.574066][ T3797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 159.581981][ T3797] R13: 0000000000000000 R14: 00007fe297945fa0 R15: 00007ffdc8d18e08 [ 159.591624][ T3797] [ 160.958506][ T3837] device veth0_vlan left promiscuous mode [ 161.025548][ T3837] device veth0_vlan entered promiscuous mode [ 161.112916][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.138028][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.233183][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 161.497457][ T3863] device sit0 entered promiscuous mode [ 162.832516][ T3893] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 162.900464][ T3893] pim6reg0: linktype set to 778 [ 163.642407][ T3914] device sit0 entered promiscuous mode [ 168.743215][ T4017] device veth0_vlan left promiscuous mode [ 168.816944][ T4017] device veth0_vlan entered promiscuous mode [ 168.848807][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 168.897761][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 168.986149][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 170.770575][ T4058] device wg2 left promiscuous mode [ 170.783196][ T4062] device wg2 entered promiscuous mode [ 170.982761][ T4061] device veth0_vlan left promiscuous mode [ 170.995150][ T4061] device veth0_vlan entered promiscuous mode [ 171.009799][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.018157][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.026030][ T1920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 271.398496][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 271.405293][ C0] (detected by 0, t=10002 jiffies, g=20453, q=103 ncpus=2) [ 271.412401][ C0] rcu: All QSes seen, last rcu_preempt kthread activity 10002 (4294964353-4294954351), jiffies_till_next_fqs=1, root ->qsmask 0x0 [ 271.425597][ C0] rcu: rcu_preempt kthread starved for 10002 jiffies! g20453 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 271.436617][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 271.446423][ C0] rcu: RCU grace-period kthread stack dump: [ 271.452160][ C0] task:rcu_preempt state:R running task stack:27496 pid:14 ppid:2 flags:0x00004000 [ 271.462746][ C0] Call Trace: [ 271.465868][ C0] [ 271.468650][ C0] __schedule+0xcb5/0x1560 [ 271.472897][ C0] ? __sched_text_start+0x8/0x8 [ 271.477582][ C0] ? __kasan_check_write+0x14/0x20 [ 271.482529][ C0] schedule+0xc3/0x180 [ 271.486434][ C0] schedule_timeout+0x18c/0x380 [ 271.491121][ C0] ? _raw_spin_unlock_irq+0x4d/0x70 [ 271.496154][ C0] ? console_conditional_schedule+0x10/0x10 [ 271.501886][ C0] ? update_process_times+0x1b0/0x1b0 [ 271.507092][ C0] ? prepare_to_swait_event+0x308/0x320 [ 271.512472][ C0] rcu_gp_fqs_loop+0x2ed/0x10a0 [ 271.517160][ C0] ? _raw_spin_unlock_irq+0x4d/0x70 [ 271.522193][ C0] ? rcu_gp_init+0xc7f/0xfa0 [ 271.526631][ C0] ? rcu_gp_init+0xfa0/0xfa0 [ 271.531048][ C0] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 271.536691][ C0] ? finish_swait+0x17d/0x1b0 [ 271.541202][ C0] rcu_gp_kthread+0xa3/0x3a0 [ 271.545640][ C0] ? queued_spin_lock_slowpath+0x50/0x50 [ 271.551098][ C0] ? set_cpus_allowed_ptr+0xa4/0xe0 [ 271.556218][ C0] ? __kasan_check_read+0x11/0x20 [ 271.561078][ C0] ? __kthread_parkme+0x12d/0x180 [ 271.565937][ C0] kthread+0x26d/0x300 [ 271.569845][ C0] ? queued_spin_lock_slowpath+0x50/0x50 [ 271.575311][ C0] ? kthread_blkcg+0xd0/0xd0 [ 271.579737][ C0] ret_from_fork+0x1f/0x30 [ 271.583992][ C0] [ 271.586865][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 271.593021][ C0] Sending NMI from CPU 0 to CPUs 1: [ 271.598109][ C1] NMI backtrace for cpu 1 [ 271.598126][ C1] CPU: 1 PID: 4052 Comm: syz.3.1218 Not tainted 6.1.115-syzkaller-00002-g182b090f35f3 #0 [ 271.598143][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 271.598153][ C1] RIP: 0010:kvm_wait+0x117/0x180 [ 271.598175][ C1] Code: 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 53 41 0f b6 45 00 44 38 f0 0f 85 63 ff ff ff 66 90 0f 00 2d 0a eb 50 04 f4 54 ff ff ff fa 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b [ 271.598189][ C1] RSP: 0018:ffffc9000f416de0 EFLAGS: 00000046 [ 271.598204][ C1] RAX: 0000000000000003 RBX: 1ffff92001e82dc0 RCX: ffffffff8521d43c [ 271.598216][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff8881f6f27b80 [ 271.598227][ C1] RBP: ffffc9000f416e90 R08: dffffc0000000000 R09: ffffed103ede4f71 [ 271.598238][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 271.598249][ C1] R13: ffff8881f6f27b80 R14: 0000000000000003 R15: 1ffff92001e82dc4 [ 271.598261][ C1] FS: 000055556cc2d500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 271.598275][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 271.598286][ C1] CR2: 0000000100000000 CR3: 0000000109cbe000 CR4: 00000000003506a0 [ 271.598300][ C1] DR0: 0000000020000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 271.598310][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff1 DR7: 0000000000000600 [ 271.598334][ C1] Call Trace: [ 271.598341][ C1] [ 271.598347][ C1] ? show_regs+0x58/0x60 [ 271.598366][ C1] ? nmi_cpu_backtrace+0x285/0x2f0 [ 271.598388][ C1] ? nmi_trigger_cpumask_backtrace+0x3b0/0x3b0 [ 271.598410][ C1] ? kvm_wait+0x117/0x180 [ 271.598423][ C1] ? kvm_wait+0x117/0x180 [ 271.598436][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 271.598455][ C1] ? nmi_handle+0xa7/0x280 [ 271.598470][ C1] ? kvm_wait+0x117/0x180 [ 271.598484][ C1] ? default_do_nmi+0x69/0x160 [ 271.598503][ C1] ? exc_nmi+0xad/0x100 [ 271.598520][ C1] ? end_repeat_nmi+0x16/0x31 [ 271.598541][ C1] ? __pv_queued_spin_lock_slowpath+0x67c/0xda0 [ 271.598560][ C1] ? kvm_wait+0x117/0x180 [ 271.598574][ C1] ? kvm_wait+0x117/0x180 [ 271.598588][ C1] ? kvm_wait+0x117/0x180 [ 271.598602][ C1] [ 271.598628][ C1] [ 271.598634][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 271.598649][ C1] ? pv_hash+0x86/0x150 [ 271.598668][ C1] __pv_queued_spin_lock_slowpath+0x6de/0xda0 [ 271.598686][ C1] ? 0xffffffffa0001a9c [ 271.598700][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 271.598718][ C1] ? __kernel_text_address+0xd/0x40 [ 271.598732][ C1] ? unwind_get_return_address+0x4d/0x90 [ 271.598753][ C1] _raw_spin_lock_irqsave+0x1a0/0x210 [ 271.598770][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 271.598785][ C1] ? stack_trace_save+0x113/0x1c0 [ 271.598802][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 271.598819][ C1] lock_timer_base+0x12f/0x270 [ 271.598839][ C1] __mod_timer+0x1c9/0xcf0 [ 271.598857][ C1] ? kasan_save_stack+0x4d/0x60 [ 271.598877][ C1] ? kasan_save_stack+0x3b/0x60 [ 271.598895][ C1] ? __kasan_record_aux_stack+0xb4/0xc0 [ 271.598909][ C1] ? kasan_record_aux_stack_noalloc+0xb/0x10 [ 271.598924][ C1] ? bpf_prog_5186c38a4019a4cb+0x42/0x46 [ 271.598939][ C1] ? bpf_trace_run3+0x177/0x2e0 [ 271.598953][ C1] ? __bpf_trace_timer_start+0x2b/0x40 [ 271.598972][ C1] ? __mod_timer+0x8d3/0xcf0 [ 271.598989][ C1] ? add_timer+0x68/0x80 [ 271.599007][ C1] ? mod_timer_pending+0x30/0x30 [ 271.599025][ C1] ? perf_trace_event_unreg+0xb7/0x1b0 [ 271.599048][ C1] ? perf_trace_destroy+0xaa/0x170 [ 271.599068][ C1] ? tp_perf_event_destroy+0x15/0x20 [ 271.599087][ C1] ? _free_event+0x973/0xce0 [ 271.599103][ C1] ? perf_event_release_kernel+0x85a/0x8e0 [ 271.599125][ C1] ? __fput+0x1e5/0x870 [ 271.599140][ C1] ? ____fput+0x15/0x20 [ 271.599153][ C1] ? task_work_run+0x24d/0x2e0 [ 271.599166][ C1] ? exit_to_user_mode_prepare+0x5a/0xa0 [ 271.599185][ C1] ? syscall_exit_to_user_mode+0x26/0x130 [ 271.599204][ C1] ? do_syscall_64+0x47/0xb0 [ 271.599220][ C1] add_timer+0x68/0x80 [ 271.599238][ C1] __queue_delayed_work+0x16d/0x1f0 [ 271.599258][ C1] queue_delayed_work_on+0x10f/0x180 [ 271.599277][ C1] ? delayed_work_timer_fn+0x80/0x80 [ 271.599297][ C1] kvfree_call_rcu+0x490/0x800 [ 271.599315][ C1] ? __kasan_check_write+0x14/0x20 [ 271.599331][ C1] ? call_rcu+0x10f0/0x10f0 [ 271.599347][ C1] ? longest_prefix_match+0x331/0x650 [ 271.599372][ C1] trie_delete_elem+0x5a6/0x760 [ 271.599394][ C1] bpf_prog_5186c38a4019a4cb+0x42/0x46 [ 271.599408][ C1] bpf_trace_run3+0x177/0x2e0 [ 271.599423][ C1] ? bpf_trace_run2+0x290/0x290 [ 271.599436][ C1] ? calc_wheel_index+0xe4/0xa50 [ 271.599457][ C1] ? timer_update_keys+0xb0/0xb0 [ 271.599476][ C1] ? debug_smp_processor_id+0x17/0x20 [ 271.599496][ C1] __bpf_trace_timer_start+0x2b/0x40 [ 271.599515][ C1] enqueue_timer+0x303/0x480 [ 271.599536][ C1] __mod_timer+0x8d3/0xcf0 [ 271.599557][ C1] ? mod_timer_pending+0x30/0x30 [ 271.599576][ C1] ? smp_call_function_many_cond+0x78/0x930 [ 271.599597][ C1] ? __cma_alloc+0x6b9/0xd30 [ 271.599616][ C1] add_timer+0x68/0x80 [ 271.599634][ C1] __queue_delayed_work+0x16d/0x1f0 [ 271.599653][ C1] queue_delayed_work_on+0x10f/0x180 [ 271.599671][ C1] ? delayed_work_timer_fn+0x80/0x80 [ 271.599688][ C1] ? _raw_spin_unlock+0x4c/0x70 [ 271.599703][ C1] ? srcu_gp_start+0x18f/0x2d0 [ 271.599720][ C1] srcu_gp_start_if_needed+0xc56/0x1060 [ 271.599739][ C1] ? __static_call_update+0x578/0x5c0 [ 271.599760][ C1] ? start_poll_synchronize_srcu+0x20/0x20 [ 271.599778][ C1] ? __static_call_return0+0x10/0x10 [ 271.599800][ C1] ? __traceiter_cma_alloc_start+0xd0/0xd0 [ 271.599814][ C1] start_poll_synchronize_srcu+0x10/0x20 [ 271.599831][ C1] tracepoint_probe_unregister+0x6da/0x900 [ 271.599852][ C1] ? trace_event_raw_event_cma_alloc_class+0x2d0/0x2d0 [ 271.599868][ C1] trace_event_reg+0x21d/0x260 [ 271.599886][ C1] perf_trace_event_unreg+0xb7/0x1b0 [ 271.599908][ C1] perf_trace_destroy+0xaa/0x170 [ 271.599929][ C1] tp_perf_event_destroy+0x15/0x20 [ 271.599946][ C1] ? perf_swevent_read+0x10/0x10 [ 271.599963][ C1] _free_event+0x973/0xce0 [ 271.599981][ C1] perf_event_release_kernel+0x85a/0x8e0 [ 271.600004][ C1] ? perf_event_read_local+0x720/0x720 [ 271.600026][ C1] ? percpu_counter_add_batch+0x13d/0x160 [ 271.600048][ C1] ? perf_mmap+0x13b0/0x13b0 [ 271.600066][ C1] perf_release+0x3b/0x40 [ 271.600084][ C1] __fput+0x1e5/0x870 [ 271.600099][ C1] ____fput+0x15/0x20 [ 271.600113][ C1] task_work_run+0x24d/0x2e0 [ 271.600128][ C1] ? task_work_cancel+0x2e0/0x2e0 [ 271.600141][ C1] ? close_fd+0x2f0/0x2f0 [ 271.600160][ C1] ? debug_smp_processor_id+0x17/0x20 [ 271.600179][ C1] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 271.600197][ C1] exit_to_user_mode_loop+0x94/0xa0 [ 271.600215][ C1] exit_to_user_mode_prepare+0x5a/0xa0 [ 271.600233][ C1] syscall_exit_to_user_mode+0x26/0x130 [ 271.600252][ C1] do_syscall_64+0x47/0xb0 [ 271.600267][ C1] ? clear_bhb_loop+0x55/0xb0 [ 271.600286][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 271.600303][ C1] RIP: 0033:0x7f2daa77ff19 [ 271.600316][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 271.600328][ C1] RSP: 002b:00007ffeba73ea38 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 271.600344][ C1] RAX: 0000000000000000 RBX: 00007f2daa947ba0 RCX: 00007f2daa77ff19 [ 271.600354][ C1] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 271.600364][ C1] RBP: 00007f2daa947ba0 R08: 0000000000016f04 R09: 00007ffeba73ed1f [ 271.600374][ C1] R10: 00007f2daa947ac0 R11: 0000000000000246 R12: 0000000000029d21 [ 271.600384][ C1] R13: 00007ffeba73eb40 R14: 0000000000000032 R15: ffffffffffffffff [ 271.600399][ C1] [ 419.113887][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 246s! [kworker/u4:5:583] [ 419.122058][ C0] Modules linked in: [ 419.125796][ C0] CPU: 0 PID: 583 Comm: kworker/u4:5 Not tainted 6.1.115-syzkaller-00002-g182b090f35f3 #0 [ 419.136176][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 419.146170][ C0] Workqueue: events_unbound toggle_allocation_gate [ 419.152761][ C0] RIP: 0010:smp_call_function_many_cond+0x854/0x930 [ 419.159666][ C0] Code: e6 01 31 ff e8 bd 9b 09 00 41 83 e7 01 49 bf 00 00 00 00 00 fc ff df 75 0a e8 f8 97 09 00 e9 2f ff ff ff f3 90 42 0f b6 04 3b <84> c0 75 14 41 f7 06 01 00 00 00 0f 84 12 ff ff ff e8 d6 97 09 00 [ 419.180501][ C0] RSP: 0018:ffffc900011a7840 EFLAGS: 00000293 [ 419.186412][ C0] RAX: 0000000000000000 RBX: 1ffff1103ede7885 RCX: ffff888119010000 [ 419.194214][ C0] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 419.202409][ C0] RBP: ffffc900011a7958 R08: ffffffff816beea3 R09: ffffed103edc71fb [ 419.210291][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000001 [ 419.218214][ C0] R13: 0000000800000000 R14: ffff8881f6f3c428 R15: dffffc0000000000 [ 419.226338][ C0] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 419.235107][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 419.241614][ C0] CR2: 0000000000000000 CR3: 000000000700f000 CR4: 00000000003506b0 [ 419.249800][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000082 [ 419.257603][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 419.266496][ C0] Call Trace: [ 419.269857][ C0] [ 419.272644][ C0] ? show_regs+0x58/0x60 [ 419.276832][ C0] ? watchdog_timer_fn+0x4b1/0x5f0 [ 419.281862][ C0] ? proc_watchdog_cpumask+0xf0/0xf0 [ 419.287069][ C0] ? __hrtimer_run_queues+0x41a/0xad0 [ 419.292297][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 419.297394][ C0] ? clockevents_program_event+0x22f/0x300 [ 419.303182][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 419.309880][ C0] ? hrtimer_interrupt+0x40c/0xaa0 [ 419.314818][ C0] ? __sysvec_apic_timer_interrupt+0xfb/0x3f0 [ 419.320816][ C0] ? sysvec_apic_timer_interrupt+0xa4/0xc0 [ 419.326561][ C0] [ 419.329338][ C0] [ 419.332116][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 419.338207][ C0] ? smp_call_function_many_cond+0x833/0x930 [ 419.344733][ C0] ? smp_call_function_many_cond+0x854/0x930 [ 419.350547][ C0] ? text_poke_sync+0x30/0x30 [ 419.355138][ C0] ? smp_call_function_many+0x40/0x40 [ 419.360346][ C0] ? text_poke_sync+0x30/0x30 [ 419.364856][ C0] on_each_cpu_cond_mask+0x40/0x80 [ 419.369804][ C0] ? kmem_cache_alloc_bulk+0x105/0x3d0 [ 419.375271][ C0] text_poke_bp_batch+0x1e9/0x730 [ 419.380130][ C0] ? text_poke_loc_init+0x680/0x680 [ 419.385471][ C0] ? __kasan_check_write+0x14/0x20 [ 419.390414][ C0] ? mutex_lock+0xb1/0x1e0 [ 419.394649][ C0] ? __mutex_lock_slowpath+0x10/0x10 [ 419.399770][ C0] ? bit_wait_io_timeout+0x120/0x120 [ 419.405000][ C0] ? text_poke_queue+0xe4/0x1a0 [ 419.409684][ C0] text_poke_finish+0x1a/0x30 [ 419.414197][ C0] arch_jump_label_transform_apply+0x15/0x30 [ 419.420006][ C0] __jump_label_update+0x36a/0x380 [ 419.424955][ C0] jump_label_update+0x3af/0x450 [ 419.429724][ C0] static_key_enable_cpuslocked+0x12f/0x250 [ 419.435870][ C0] static_key_enable+0x1a/0x30 [ 419.440563][ C0] toggle_allocation_gate+0xbf/0x450 [ 419.445909][ C0] ? show_object+0xa0/0xa0 [ 419.450143][ C0] ? _raw_spin_unlock+0x4c/0x70 [ 419.454850][ C0] ? finish_task_switch+0x167/0x7b0 [ 419.459866][ C0] ? __kasan_check_read+0x11/0x20 [ 419.464727][ C0] ? read_word_at_a_time+0x12/0x20 [ 419.469679][ C0] ? strscpy+0x9c/0x260 [ 419.473695][ C0] process_one_work+0x73d/0xcb0 [ 419.478365][ C0] worker_thread+0xa60/0x1260 [ 419.482868][ C0] ? __kasan_check_read+0x11/0x20 [ 419.487726][ C0] kthread+0x26d/0x300 [ 419.491634][ C0] ? worker_clr_flags+0x1a0/0x1a0 [ 419.496500][ C0] ? kthread_blkcg+0xd0/0xd0 [ 419.501090][ C0] ret_from_fork+0x1f/0x30 [ 419.505357][ C0] [ 419.508217][ C0] Sending NMI from CPU 0 to CPUs 1: [ 419.513968][ C1] NMI backtrace for cpu 1 [ 419.513989][ C1] CPU: 1 PID: 4052 Comm: syz.3.1218 Not tainted 6.1.115-syzkaller-00002-g182b090f35f3 #0 [ 419.514007][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 419.514017][ C1] RIP: 0010:kvm_wait+0x117/0x180 [ 419.514045][ C1] Code: 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 53 41 0f b6 45 00 44 38 f0 0f 85 63 ff ff ff 66 90 0f 00 2d 0a eb 50 04 f4 54 ff ff ff fa 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b [ 419.514059][ C1] RSP: 0018:ffffc9000f416de0 EFLAGS: 00000046 [ 419.514073][ C1] RAX: 0000000000000003 RBX: 1ffff92001e82dc0 RCX: ffffffff8521d43c [ 419.514085][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff8881f6f27b80 [ 419.514096][ C1] RBP: ffffc9000f416e90 R08: dffffc0000000000 R09: ffffed103ede4f71 [ 419.514106][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 419.514115][ C1] R13: ffff8881f6f27b80 R14: 0000000000000003 R15: 1ffff92001e82dc4 [ 419.514126][ C1] FS: 000055556cc2d500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 419.514141][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 419.514152][ C1] CR2: 0000000100000000 CR3: 0000000109cbe000 CR4: 00000000003506a0 [ 419.514166][ C1] DR0: 0000000020000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 419.514176][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff1 DR7: 0000000000000600 [ 419.514186][ C1] Call Trace: [ 419.514193][ C1] [ 419.514200][ C1] ? show_regs+0x58/0x60 [ 419.514233][ C1] ? nmi_cpu_backtrace+0x285/0x2f0 [ 419.514259][ C1] ? nmi_trigger_cpumask_backtrace+0x3b0/0x3b0 [ 419.514280][ C1] ? kvm_wait+0x117/0x180 [ 419.514294][ C1] ? kvm_wait+0x117/0x180 [ 419.514315][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 419.514334][ C1] ? nmi_handle+0xa7/0x280 [ 419.514349][ C1] ? kvm_wait+0x117/0x180 [ 419.514363][ C1] ? kvm_wait+0x117/0x180 [ 419.514376][ C1] ? default_do_nmi+0x69/0x160 [ 419.514394][ C1] ? exc_nmi+0xad/0x100 [ 419.514411][ C1] ? end_repeat_nmi+0x16/0x31 [ 419.514432][ C1] ? __pv_queued_spin_lock_slowpath+0x67c/0xda0 [ 419.514451][ C1] ? kvm_wait+0x117/0x180 [ 419.514463][ C1] ? kvm_wait+0x117/0x180 [ 419.514477][ C1] ? kvm_wait+0x117/0x180 [ 419.514490][ C1] [ 419.514495][ C1] [ 419.514500][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 419.514515][ C1] ? pv_hash+0x86/0x150 [ 419.514535][ C1] __pv_queued_spin_lock_slowpath+0x6de/0xda0 [ 419.514553][ C1] ? 0xffffffffa0001a9c [ 419.514566][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 419.514584][ C1] ? __kernel_text_address+0xd/0x40 [ 419.514598][ C1] ? unwind_get_return_address+0x4d/0x90 [ 419.514620][ C1] _raw_spin_lock_irqsave+0x1a0/0x210 [ 419.514638][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 419.514653][ C1] ? stack_trace_save+0x113/0x1c0 [ 419.514669][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 419.514685][ C1] lock_timer_base+0x12f/0x270 [ 419.514704][ C1] __mod_timer+0x1c9/0xcf0 [ 419.514722][ C1] ? kasan_save_stack+0x4d/0x60 [ 419.514742][ C1] ? kasan_save_stack+0x3b/0x60 [ 419.514759][ C1] ? __kasan_record_aux_stack+0xb4/0xc0 [ 419.514773][ C1] ? kasan_record_aux_stack_noalloc+0xb/0x10 [ 419.514788][ C1] ? bpf_prog_5186c38a4019a4cb+0x42/0x46 [ 419.514802][ C1] ? bpf_trace_run3+0x177/0x2e0 [ 419.514817][ C1] ? __bpf_trace_timer_start+0x2b/0x40 [ 419.514835][ C1] ? __mod_timer+0x8d3/0xcf0 [ 419.514939][ C1] ? add_timer+0x68/0x80 [ 419.514965][ C1] ? mod_timer_pending+0x30/0x30 [ 419.514984][ C1] ? perf_trace_event_unreg+0xb7/0x1b0 [ 419.515006][ C1] ? perf_trace_destroy+0xaa/0x170 [ 419.515026][ C1] ? tp_perf_event_destroy+0x15/0x20 [ 419.515045][ C1] ? _free_event+0x973/0xce0 [ 419.515062][ C1] ? perf_event_release_kernel+0x85a/0x8e0 [ 419.515086][ C1] ? __fput+0x1e5/0x870 [ 419.515101][ C1] ? ____fput+0x15/0x20 [ 419.515115][ C1] ? task_work_run+0x24d/0x2e0 [ 419.515129][ C1] ? exit_to_user_mode_prepare+0x5a/0xa0 [ 419.515149][ C1] ? syscall_exit_to_user_mode+0x26/0x130 [ 419.515168][ C1] ? do_syscall_64+0x47/0xb0 [ 419.515186][ C1] add_timer+0x68/0x80 [ 419.515205][ C1] __queue_delayed_work+0x16d/0x1f0 [ 419.515225][ C1] queue_delayed_work_on+0x10f/0x180 [ 419.515243][ C1] ? delayed_work_timer_fn+0x80/0x80 [ 419.515263][ C1] kvfree_call_rcu+0x490/0x800 [ 419.515283][ C1] ? __kasan_check_write+0x14/0x20 [ 419.515299][ C1] ? call_rcu+0x10f0/0x10f0 [ 419.515316][ C1] ? longest_prefix_match+0x331/0x650 [ 419.515341][ C1] trie_delete_elem+0x5a6/0x760 [ 419.515365][ C1] bpf_prog_5186c38a4019a4cb+0x42/0x46 [ 419.515381][ C1] bpf_trace_run3+0x177/0x2e0 [ 419.515397][ C1] ? bpf_trace_run2+0x290/0x290 [ 419.515423][ C1] ? calc_wheel_index+0xe4/0xa50 [ 419.515446][ C1] ? timer_update_keys+0xb0/0xb0 [ 419.515466][ C1] ? debug_smp_processor_id+0x17/0x20 [ 419.515487][ C1] __bpf_trace_timer_start+0x2b/0x40 [ 419.515507][ C1] enqueue_timer+0x303/0x480 [ 419.515527][ C1] __mod_timer+0x8d3/0xcf0 [ 419.515549][ C1] ? mod_timer_pending+0x30/0x30 [ 419.515567][ C1] ? smp_call_function_many_cond+0x78/0x930 [ 419.515590][ C1] ? __cma_alloc+0x6b9/0xd30 [ 419.515606][ C1] add_timer+0x68/0x80 [ 419.515624][ C1] __queue_delayed_work+0x16d/0x1f0 [ 419.515642][ C1] queue_delayed_work_on+0x10f/0x180 [ 419.515660][ C1] ? delayed_work_timer_fn+0x80/0x80 [ 419.515678][ C1] ? _raw_spin_unlock+0x4c/0x70 [ 419.515694][ C1] ? srcu_gp_start+0x18f/0x2d0 [ 419.515711][ C1] srcu_gp_start_if_needed+0xc56/0x1060 [ 419.515731][ C1] ? __static_call_update+0x578/0x5c0 [ 419.515753][ C1] ? start_poll_synchronize_srcu+0x20/0x20 [ 419.515771][ C1] ? __static_call_return0+0x10/0x10 [ 419.515793][ C1] ? __traceiter_cma_alloc_start+0xd0/0xd0 [ 419.515808][ C1] start_poll_synchronize_srcu+0x10/0x20 [ 419.515825][ C1] tracepoint_probe_unregister+0x6da/0x900 [ 419.515846][ C1] ? trace_event_raw_event_cma_alloc_class+0x2d0/0x2d0 [ 419.515863][ C1] trace_event_reg+0x21d/0x260 [ 419.515881][ C1] perf_trace_event_unreg+0xb7/0x1b0 [ 419.515909][ C1] perf_trace_destroy+0xaa/0x170 [ 419.515929][ C1] tp_perf_event_destroy+0x15/0x20 [ 419.515947][ C1] ? perf_swevent_read+0x10/0x10 [ 419.515964][ C1] _free_event+0x973/0xce0 [ 419.515982][ C1] perf_event_release_kernel+0x85a/0x8e0 [ 419.516006][ C1] ? perf_event_read_local+0x720/0x720 [ 419.516029][ C1] ? percpu_counter_add_batch+0x13d/0x160 [ 419.516052][ C1] ? perf_mmap+0x13b0/0x13b0 [ 419.516071][ C1] perf_release+0x3b/0x40 [ 419.516088][ C1] __fput+0x1e5/0x870 [ 419.516104][ C1] ____fput+0x15/0x20 [ 419.516118][ C1] task_work_run+0x24d/0x2e0 [ 419.516133][ C1] ? task_work_cancel+0x2e0/0x2e0 [ 419.516146][ C1] ? close_fd+0x2f0/0x2f0 [ 419.516168][ C1] ? debug_smp_processor_id+0x17/0x20 [ 419.516187][ C1] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 419.516207][ C1] exit_to_user_mode_loop+0x94/0xa0 [ 419.516225][ C1] exit_to_user_mode_prepare+0x5a/0xa0 [ 419.516243][ C1] syscall_exit_to_user_mode+0x26/0x130 [ 419.516262][ C1] do_syscall_64+0x47/0xb0 [ 419.516277][ C1] ? clear_bhb_loop+0x55/0xb0 [ 419.516296][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 419.516314][ C1] RIP: 0033:0x7f2daa77ff19 [ 419.516329][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 419.516342][ C1] RSP: 002b:00007ffeba73ea38 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 419.516361][ C1] RAX: 0000000000000000 RBX: 00007f2daa947ba0 RCX: 00007f2daa77ff19 [ 419.516372][ C1] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 419.516382][ C1] RBP: 00007f2daa947ba0 R08: 0000000000016f04 R09: 00007ffeba73ed1f [ 419.516393][ C1] R10: 00007f2daa947ac0 R11: 0000000000000246 R12: 0000000000029d21 [ 419.516404][ C1] R13: 00007ffeba73eb40 R14: 0000000000000032 R15: ffffffffffffffff [ 419.516418][ C1]